last executing test programs: 6m52.04699076s ago: executing program 4 (id=1716): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r4, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 6m50.889625753s ago: executing program 4 (id=1724): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = dup(r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @empty}], 0x1c) sendmsg$inet6(r1, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x4048043) r3 = dup(r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x8003, 0x1, 0xe652, 0x2, 0x4, 0x8, 0xff}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0xce20, 0x6, @empty, 0x2d}}, 0x7, 0x1, 0xf06, 0x3, 0xb4, 0x7f, 0x9}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e60, 0xeffffff2, @empty, 0x5}}, 0x10001fc, 0x6, 0xffff1896, 0x3, 0x26, 0xffffffb9, 0x1a}, 0x9c) semop(0x0, &(0x7f0000000080)=[{0x1, 0x8001, 0x800}], 0x1) 6m50.852504184s ago: executing program 4 (id=1725): recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/62, 0x3e, 0x10120, 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000001500)={'sit0\x00', 0x0, 0x10, 0x8, 0x6, 0xf0, {{0x5, 0x4, 0x1, 0x28, 0x14, 0x64, 0x0, 0x7, 0x4, 0x0, @remote, @remote}}}}) 6m49.352524533s ago: executing program 4 (id=1745): mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x88) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040090}, 0x2400c8c1) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x83) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40086602, &(0x7f0000000000)) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) 6m49.266841985s ago: executing program 4 (id=1746): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = openat$sysfs(0xffffff9c, &(0x7f00000003c0)='/sys/power/pm_trace_dev_match', 0x20800, 0x2) read$msr(r3, &(0x7f00000002c0)=""/4096, 0x1000) 6m49.109741938s ago: executing program 4 (id=1747): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x6000000000000000) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040)=0xfffffffc, 0x4) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=""/184, 0xb8}, 0x9}, {{&(0x7f0000000240)=@x25, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/23, 0x17}], 0x1, &(0x7f0000000380)=""/130, 0x82}, 0x13939393}], 0x2, 0x45833af92e4b399e, 0x0) 6m49.075045008s ago: executing program 32 (id=1747): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x6000000000000000) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040)=0xfffffffc, 0x4) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=""/184, 0xb8}, 0x9}, {{&(0x7f0000000240)=@x25, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/23, 0x17}], 0x1, &(0x7f0000000380)=""/130, 0x82}, 0x13939393}], 0x2, 0x45833af92e4b399e, 0x0) 2.856360185s ago: executing program 1 (id=10623): r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2100) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x500, &(0x7f00000001c0)={&(0x7f0000000580)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r1, {0x6}}}, 0x24}}, 0x0) 2.216905487s ago: executing program 2 (id=10637): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x7ff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000500)='kfree\x00', r0}, 0x18) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0xfffffffd, 0x2, 0x0, 'queue0\x00', 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) 2.08280124s ago: executing program 2 (id=10641): socket(0x1e, 0x80004, 0x0) socket(0x1e, 0x4, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x70bd28, 0x1, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x2c}}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x2}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r5, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x9, 0x3, 0xc4f, 0x1, 0x1}, 0x50) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) io_uring_setup(0x6b9e, &(0x7f0000000240)={0x0, 0x1f59, 0x0, 0x800103fc, 0x3d, 0x0, r7}) r8 = socket(0x40000000015, 0x5, 0x0) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), r7) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x50, r9, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xfb7}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010102}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x48001) setsockopt$SO_RDS_TRANSPORT(r8, 0x114, 0x8, &(0x7f00000008c0), 0x4) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000f00)='kfree\x00', r11}, 0x18) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000012700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) r13 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r13, 0xffffffffffffffff, 0x100000000000000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000100), 0x6c7, r6}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, &(0x7f0000000340)=""/211, &(0x7f0000000080), &(0x7f0000000440), 0x3, r6}, 0x38) 2.002984091s ago: executing program 1 (id=10643): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f00000000c0)={0x0, 0x3a, &(0x7f0000000040)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 1.718942387s ago: executing program 1 (id=10645): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) inotify_init() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) syz_usb_disconnect(r3) 1.618863209s ago: executing program 2 (id=10648): bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r1, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r1, 0x5, 0x4) 1.173402817s ago: executing program 2 (id=10655): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000004c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffd}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) r2 = getpid() process_vm_readv(r2, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) 1.073492319s ago: executing program 3 (id=10660): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6ed0000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) futex(&(0x7f0000004000)=0xfffff000, 0x5, 0x0, 0x0, &(0x7f0000004000)=0x200000, 0xa3020000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) kexec_load(0xffffffff, 0x3, &(0x7f0000000580)=[{&(0x7f0000000300)="34bbc6af086103706644b12c5d6584fa81565840c834a001dd278165dea601b70f341288226b6fba5005171617d137d5fc47281e991de1e915b70e27fdeda6d48acfbee285d45bc48232fe019158820fd866a6522c401dd7828570e61b2b8de276702a17ec60771f70b7649f80ac4d6b840e7d5db4b3d3f36b892cad2745533bbc367f0e629e5352064adcbc4636023c3260ac6f30ad9b35280e211c32195e829708a8601e47f5c77ce104059f98145a027009c64549ba722347cebe1d4fa8864d13c92fed9afea56cb9dd5334d76be4a11c68312f", 0xd5, 0x4}, {&(0x7f0000000280)="68a08f2f0eba5ec3c373148d0feae953ccd4ffb70ff2b7695a1cd13e71a97e2a2b", 0x21, 0x57, 0x2}, {&(0x7f0000000400)="4ef5205f0cffb355cfaf510cbd937453b896f777184b44688ce1e6fbecae3e58ddd774b2761c", 0x26, 0x8, 0x2}], 0x160000) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) fcntl$notify(r2, 0x402, 0x29) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r3, 0x0, 0x100000000}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r4, 0x0, 0x0) 1.03989234s ago: executing program 3 (id=10661): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x18) munlock(&(0x7f0000ff2000/0xd000)=nil, 0xd000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x84d03, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r7}, 0x18) r8 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r8, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x3, 0xd, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x3, 0x9, 0x80, 0x0, "1cdc0dca1d9f68846960e56de42944af"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}}]}, 0x68}, 0x1, 0x7}, 0x0) 958.085781ms ago: executing program 1 (id=10663): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r2, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000000)=0x80) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000300)=@v3={0x3000000, [{0xf0, 0x4}, {0x800, 0x3}]}, 0x18, 0x1) 937.185322ms ago: executing program 3 (id=10665): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) renameat2(0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0xffffffffffffff9c, 0x0, 0x4) modify_ldt$write(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000770000000e000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f00000006c0)=@v3={0x3000000, [{0x3, 0x2}, {0x9, 0x56}], 0xee01}, 0x18, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8aedff00000000bfa200000000000007020000f8ffffffb70300000800b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400000010000104fcffffff940220da73ed637a", @ANYRES32=0x0, @ANYBLOB="0315000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00', 0x0}) sendto$packet(r5, &(0x7f0000000180)="10030600e0ff020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r7}, 0x14) 883.245373ms ago: executing program 1 (id=10666): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) syz_usb_disconnect(r2) 811.038344ms ago: executing program 2 (id=10669): syz_io_uring_setup(0xa30, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1cd9, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xd4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="010300000100f1dbdf2526"], 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x40c4}, 0x20040840) r6 = socket(0x10, 0x3, 0x0) sendto$inet6(r6, &(0x7f0000000440)="7800000018002507b9409b14ffff00000204be04020506050e020409430008000400790000000000000052164cbf0568d0bf46d32345653600648d0a0012000200000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160005000a005a0a2a1ce000e200c523eb6ed538f2", 0x78, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpgid(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) mount$tmpfs(0x0, &(0x7f0000000100)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000140), 0x10008, &(0x7f0000000000)=ANY=[@ANYBLOB='mpo\x00=intMrlgb\x00\x00=stati#,\x00']) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) cachestat(r1, &(0x7f0000000300)={0x8, 0x40000}, &(0x7f0000000340), 0x0) r8 = syz_io_uring_setup(0x49d, &(0x7f0000000540)={0x0, 0x9f4b, 0x1, 0x1, 0x144}, &(0x7f00000001c0)=0x0, &(0x7f0000000240)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd=r7, 0x7, &(0x7f00000000c0)=""/207, 0xcf, 0x10, 0x1}) io_uring_enter(r8, 0xfd0, 0x4c0, 0x43, 0x0, 0xf5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 768.514425ms ago: executing program 3 (id=10671): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x0, 0x0, 0xffffffff}, 0x1c) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r2, 0xffffffffffffffff, 0x0) 737.546206ms ago: executing program 3 (id=10673): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) inotify_init() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) syz_usb_disconnect(r3) 720.161566ms ago: executing program 0 (id=10674): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x8020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) pidfd_send_signal(0xffffffffffffffff, 0x3d, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0x5}, 0x18) kexec_load(0x3e00, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000c00)={0x1f8, 0x9, 0xb, 0x0, 0x70bd28, 0x25dfdbfd, {0x3, 0x0, 0xa}, [@typed={0x7, 0x133, 0x0, 0x0, @str='syz'}, @typed={0x8, 0x3e, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x14, 0x11c, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x8, 0x13, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="04daff3c8abe16b7d94d7776626cf2ee91f7af7bc234026f561c62c6cd751a9f3535a5cf5354ef715af7d9550c6fb08daefe31f231c933421b49cab5da8e1eb387c3dbbe9fd1625c0f6b66d7ffd2d49e620d28dcf0f0b0a9c0bcf171fdf50ba8466bc394d2bb5c768b5cd8d972730f9d04b4b1096341caa76986c7a9d9da59d6104ee84d337c60aedc72dd1df8db9e19030d594f71e0979d8ebb1ca10b41d95f0eca118e3d0177e29b8e4c511feceb1e9214e866a919a6356c53a430782d3bc08fd8e76576032586b468a4651e493d5285737f3839491488d8a7f5c60d3d746a520029b74efc3f0b337918", @typed={0x6, 0xf, 0x0, 0x0, @str='&\x00'}, @typed={0xba, 0x72, 0x0, 0x0, @binary="0e7cb7c228c7af7d9becde7e71b35681dddd349538f07b9fe2d0703d57b03f3d0afb58347e7efc0c9e58d7d2d326a6fec99f7799974a6c3393ed965c39c2b37d2d7f13428ffbfdf649273271712af67025b20a9d128d31634a1309c0cc1835f06c43833d5437e123c99df2c3dbdacd44e976177ef0a98d3374be396fcf14c4e7f055b26f8004aea87837db653e4c886b0df9255c256a7ad0b3c537e47341b0d878edd38c194d16515bd9fac2b04aba9454750be1574f"}, @typed={0x8, 0x30, 0x0, 0x0, @u32=0x53f9b567}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x240401d1}, 0x4000800) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@ldst={0x3, 0x0, 0x0, 0x8, 0xa, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2400}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0x7, 0xea, &(0x7f0000000400)=""/234, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0, 0x10, 0xb}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0), r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)={0x3, 'vlan1\x00', {0x6}, 0xc}) 634.935368ms ago: executing program 2 (id=10676): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x8, 0x510, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x723, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x48) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000580)={@private2, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2000000, 0x0, 0x7d, 0x200, 0xfffffffffffffffd, 0x930311}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={@mcast1, @private0, @remote, 0x0, 0x0, 0x5, 0x0, 0x4000000000000009, 0x10200}) chmod(&(0x7f0000000280)='./file0\x00', 0x244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() write$P9_RGETLOCK(r0, &(0x7f00000001c0)={0x2e, 0x37, 0x1, {0x2, 0x80000000, 0x0, r2, 0x10, 'nomblk_io_submit'}}, 0x2e) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r5, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 577.765949ms ago: executing program 5 (id=10677): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r2, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000000)=0x80) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000300)=@v3={0x3000000, [{0xf0, 0x4}, {0x800, 0x3}]}, 0x18, 0x1) 555.185309ms ago: executing program 0 (id=10678): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000180), 0x0, 0x0, 0x1) 538.427789ms ago: executing program 5 (id=10679): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000640)="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", 0x28e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000140)="404e8269db2bfd39d0df9eda352d1073bcd2aef6ccf89d0bde3c37e135354087093ddb9990700c33fd72ed12fef37764532d4662b4151b3d39f8b94d1c851c7635f40eaea8a126fb03d000011c8ff51ff2034a22482a412d6f7ef3579d710df850c4a8d1230dd75f0c3e01adbd4d7423fc7fccd81a14e0f27c173247707a3b8a5867aad17ed86e9fe8688aa1b726518f3c76231f3ca18b64bbe383b56ae9b11d2aee5022a27c5f22d6f6caef3bfaa6dabad21c0a5a5d", 0xb6}, {&(0x7f00000002c0)="a644436d07214f1640fa2ebf0cf31abf010854f9b04422775df039843c98b72f45eb1ae73fb46faabcd035bb8935081048b14818c9ebeb373096688ecc57aa9ce63df5e02b1f9f9f5729c28055161b838106db86294803367740d3947f50b86cca", 0x61}, {&(0x7f0000000340)="130a58f0018f50eb4ab714b4822919907e05589e33a4cb71bce227c47eed28f531014e0c9b17bfea4ebc097e280fa5447cd8bec23a29eb0680b0e0bf798e17ab67483c094eecf232f7f81c947cc23a039543c5d40ec5a591b6cc33eeedba96f26cca56e0adc77b7edd224144ee9d841d5381889e043fe53091326a89d56baf77d977170355d3453f8132", 0x8a}, {&(0x7f0000000440)="eaacec91f29886681996de91a10d6e03c0a696be4db24ff167daaba1d3df8c28507d4d35eea7c81736d23733f03d8f0c100b715d06e61f57138654d8307416dd532c35", 0x43}], 0x4}}], 0x2, 0x480e0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 538.014529ms ago: executing program 0 (id=10680): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) 522.76851ms ago: executing program 5 (id=10681): r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/file3\x00', 0x1c0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='./file1/file3\x00', 0x8) renameat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file3\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file1/file3\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) socket$tipc(0x1e, 0x5, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) 517.53337ms ago: executing program 0 (id=10682): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) 452.761551ms ago: executing program 0 (id=10683): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c000000030a03000000000000000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x400c0d1}, 0x0) 452.246871ms ago: executing program 0 (id=10684): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'vlan0\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x9, 0x400}, 0x100b28, 0x6, 0x3, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) rt_sigsuspend(&(0x7f00000002c0)={[0x225c17d03]}, 0x8) sendmsg$nl_route(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) socket$xdp(0x2c, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) 131.702997ms ago: executing program 1 (id=10685): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./bus\x00', 0x4000, &(0x7f0000000300)={[{@resuid}, {@dioread_nolock}, {@noblock_validity}, {@norecovery}, {@resuid}, {@quota}]}, 0x8, 0x445, &(0x7f0000001dc0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) inotify_init1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2c00) rmdir(&(0x7f0000000100)='./control\x00') pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x9000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r2, &(0x7f00000009c0)=';', 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendfile(r2, r1, 0x0, 0x3ffff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r6, &(0x7f00000009c0)="3bf5", 0x2) sendfile(r6, r5, 0x0, 0x3ffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = epoll_create1(0x80000) r9 = fcntl$dupfd(r7, 0x406, r8) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r9, &(0x7f0000000040)={0x30000011}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000140)={0x0, 0xf1f, [0x9, 0x8, 0x1, 0x5, 0x5, 0x3f71]}) epoll_pwait(r8, &(0x7f0000000080)=[{}], 0x1, 0x8001, 0x0, 0x0) 99.215038ms ago: executing program 5 (id=10686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r1) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="01002abd7000fbdbdf250400000005000a0000000000080001"], 0x3c}, 0x1, 0x0, 0x0, 0x26040041}, 0x40) 64.860079ms ago: executing program 5 (id=10687): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x7ff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000500)='kfree\x00', r0}, 0x18) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0xfffffffd, 0x2, 0x0, 'queue0\x00', 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) 38.311359ms ago: executing program 3 (id=10688): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x8020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) pidfd_send_signal(0xffffffffffffffff, 0x3d, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0x5}, 0x18) kexec_load(0x3e00, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000c00)={0x1f8, 0x9, 0xb, 0x0, 0x70bd28, 0x25dfdbfd, {0x3, 0x0, 0xa}, [@typed={0x7, 0x133, 0x0, 0x0, @str='syz'}, @typed={0x8, 0x3e, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x14, 0x11c, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x8, 0x13, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="04daff3c8abe16b7d94d7776626cf2ee91f7af7bc234026f561c62c6cd751a9f3535a5cf5354ef715af7d9550c6fb08daefe31f231c933421b49cab5da8e1eb387c3dbbe9fd1625c0f6b66d7ffd2d49e620d28dcf0f0b0a9c0bcf171fdf50ba8466bc394d2bb5c768b5cd8d972730f9d04b4b1096341caa76986c7a9d9da59d6104ee84d337c60aedc72dd1df8db9e19030d594f71e0979d8ebb1ca10b41d95f0eca118e3d0177e29b8e4c511feceb1e9214e866a919a6356c53a430782d3bc08fd8e76576032586b468a4651e493d5285737f3839491488d8a7f5c60d3d746a520029b74efc3f0b337918", @typed={0x6, 0xf, 0x0, 0x0, @str='&\x00'}, @typed={0xba, 0x72, 0x0, 0x0, @binary="0e7cb7c228c7af7d9becde7e71b35681dddd349538f07b9fe2d0703d57b03f3d0afb58347e7efc0c9e58d7d2d326a6fec99f7799974a6c3393ed965c39c2b37d2d7f13428ffbfdf649273271712af67025b20a9d128d31634a1309c0cc1835f06c43833d5437e123c99df2c3dbdacd44e976177ef0a98d3374be396fcf14c4e7f055b26f8004aea87837db653e4c886b0df9255c256a7ad0b3c537e47341b0d878edd38c194d16515bd9fac2b04aba9454750be1574f"}, @typed={0x8, 0x30, 0x0, 0x0, @u32=0x53f9b567}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x240401d1}, 0x4000800) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@ldst={0x3, 0x0, 0x0, 0x8, 0xa, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2400}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0x7, 0xea, &(0x7f0000000400)=""/234, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0, 0x10, 0xb}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0), r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)={0x3, 'vlan1\x00', {0x6}, 0xc}) 0s ago: executing program 5 (id=10689): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file2\x00', 0x1808004, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES64], 0x4, 0x7cc, &(0x7f0000002200)="$eJzs3U1sHOUZAOB3HJsEI6WIVimKQpgEKgUJzHoNpi4HWNZje2C9a+2uq0RVRSNwkBUHKBS15AJRJWirVlVPPVKu3HqjqtRKPbQ9VSqHXnpD4lRRqX+iqpBczew6/v9JcEIgz2PF3+zsO9/3zmY978za+20AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJHUJyuV0SQa+bfnT6fbq0+2W7M73L/S32/XNes8vm7ciKT4F4cOxUf/6q370urdR4pvJ+NY79axOFQ0h+LibUduf/SLgwMr2++Q0NU6sce4JOL1IqnzZ5eWFl66BolcRz/69RVv8t/l4vt01sw7rXy2Np2leaeVToyPVx6cmeqkU3kj65zpdLPZtN7Oat1WOz1Vvy8dnZgYS7ORM6355vRkrZGtrHzkgWqlMp4+OTKX1dqdVvPBJ6NTn8kbjbw5XcZUK9+NIuaR4on4VN5Nu1ltNk3PLS4tjK3JKtkq1SJodKs7DvSeP8fuvf2DV97/5+JC8YTcbn+T/hOzOjparY6OPzzx8COVymC1Ul2/orJBXI6IgYgi4po8afkM2d8DOHwCA/36H43IoxnzcTrSDV9DETEU9ZiMdrRitlj3l6FNUX0r9f8rD/79TzuNu7b+r1T5O1fvPhpl/T/eu3V8u/q/KYsdv4auKHpPXy/Hq3ExzsfZWIqlWIiX9rf/g/ue8cAn7SFZd2s6smhGHp1oRR6zUSvXpP01aUzEeIxHJZ6OmZiKTqQxFXk0IotOnIlOdCMrn1H1aEcWtehGK9qRxqmox32RxmhMxESMRRpZjMSZaMV8NGM6Hoha2cu5WCwf97ENWR65NX713J8/eKtYvhw0utNuFSdzRdA/dgjaVO53rP/Ly8X5wsYI9f9mdw2O4nB1llfqPwAAAPC5lZSvviflS/x3lUtTeSP7xh627A5eh/QAAACAfVD+5v9Y0QwVS3dFUlz/V7aIfO+65wYAAADsj6R8j10SEcNxd2/pXCzG67EQW70IAAAAAHwGlb//P140wxGvlStWpktx/Q8AAACfEz/Ybo7991fm2O3MHUx+U84BnFyaO31vcqFWxNUuHOht12++frnH7tTR5HC/k7IZH7x4WxIRg/XsWLIy++XHB3vth+X3o6tzCWw313/Sbu+YQOycQHkrfhwnejEnnu21z/bvSXqjDE/ljWyk3mo8Wk6JWPzrvvL84vciitF/2Jw9nMS5xaWFkWdeWHq2zOVS0culC/0JFNfNo7j8hR1zWe4/AnHX1ns8VL4Roz/ucG/cytr9Hyi3/t9yOc/stvufrB3zjTjZizk53GuHV+7pjXmoGHN05NHRqNUOD3Sz091XltfsfT+L0d32fJf/hTfinl7MPafu6TVbZFFdl8Xzm7Oors2i91jEwD5l8daJ107/5/etJBvbLYuxK8hi+UDExiwAPi3nyll/VqvQrWUVKopKoaj/G+rurStb7uFY++/VUXpnGR/3u42INbVuMDZW99W+91bdl6N3RD/ViznVO58YPLpFXalscUR/cfHFP/SP6A+98/NffPP4H39ZjntV1e2duK8X02/ijt9tU2OLff7Jhqr6drHF21uOW5yDdRrVJC5FHPjOhRfjyMuvXnxg8cLZ5xaeW3i+Wh0brzxUqTxcjaHyVKHf7JApADev3T9jZ9uIW/pdJA9td1Xdr3h3XP6TgpF4Jl6IpSjOAO7uxd69edx3iyvxNX+GcP8uV63Daz7h5f5dri1XY6ubY5PYJnZszSP25Z+VzUfX5L8DAK6LkzvU4V3q/+VX5u/f5bp7fS3fcHUc29fyrXz1mj4aAHBzyNofJsPdN5N2O597enRiYrTWncnSdqv+VNrOJ6ezNG92s3Z9ptacztK5dqvbqq+8cDyZddLO/Nxcq91Np1rtNAY6+enyk9/T/ke/d7LZWrOb1ztzjazWydJ6q9mt1bvpZN6pp3PzTzTyzkzWLjfuzGX1fCqv17p5q5l2WvPtejaSpp0sWxOYT2bNbj6VF4vNdK6dz9balyKiMT+bpZNZp97O57qtXocrY+XNqVZ7tux2ZPPu/+16P94AcCN4+dWL588uLS28dHULf91L8Ke9jwDAeqo0AAAAAAAAAAAAAADc+Da/Xa9Y+wneEXhlCwfjmg9xEy18rT8lY29NsXSDJPbpLXzrscfObxfzxGt3zuytn61/UrZ6q+ubhyNuefenvTWPbx/8/f7P3/7s6XsRcRWbLyc7xKw7TNxynQ9LAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALCl/wcAAP//ez9qPw==") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) close(r2) kernel console output (not intermixed with test programs): 16365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29055 comm="syz.3.9654" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 480.112240][ T29] audit: type=1400 audit(1758763744.753:16366): avc: denied { name_bind } for pid=29067 comm="syz.3.9658" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 480.140074][T29070] netlink: 'syz.1.9659': attribute type 20 has an invalid length. [ 480.197683][ T29] audit: type=1400 audit(1758763744.837:16367): avc: denied { read } for pid=29071 comm="syz.0.9660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 480.232013][T29072] netlink: 'syz.0.9660': attribute type 16 has an invalid length. [ 480.245580][T29072] netlink: 'syz.0.9660': attribute type 17 has an invalid length. [ 480.287677][T29084] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9664'. [ 480.334978][T29086] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=29086 comm=syz.3.9665 [ 480.490858][T29072] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 480.542540][T29091] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 480.619215][T29104] netlink: 'syz.2.9671': attribute type 20 has an invalid length. [ 480.713756][ T29] audit: type=1326 audit(1758763745.383:16368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29105 comm="syz.2.9672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 480.737824][ T29] audit: type=1326 audit(1758763745.383:16369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29105 comm="syz.2.9672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 480.762067][ T29] audit: type=1326 audit(1758763745.383:16370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29105 comm="syz.2.9672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 481.266573][T29139] FAULT_INJECTION: forcing a failure. [ 481.266573][T29139] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.279746][T29139] CPU: 0 UID: 0 PID: 29139 Comm: syz.3.9684 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 481.279840][T29139] Tainted: [W]=WARN [ 481.279848][T29139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 481.279860][T29139] Call Trace: [ 481.279868][T29139] [ 481.279876][T29139] __dump_stack+0x1d/0x30 [ 481.279898][T29139] dump_stack_lvl+0xe8/0x140 [ 481.279917][T29139] dump_stack+0x15/0x1b [ 481.279931][T29139] should_fail_ex+0x265/0x280 [ 481.280027][T29139] should_fail+0xb/0x20 [ 481.280043][T29139] should_fail_usercopy+0x1a/0x20 [ 481.280064][T29139] _copy_to_user+0x20/0xa0 [ 481.280092][T29139] simple_read_from_buffer+0xb5/0x130 [ 481.280172][T29139] proc_fail_nth_read+0x10e/0x150 [ 481.280249][T29139] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 481.280310][T29139] vfs_read+0x1a5/0x770 [ 481.280332][T29139] ? __rcu_read_unlock+0x4f/0x70 [ 481.280355][T29139] ? __fget_files+0x184/0x1c0 [ 481.280449][T29139] ksys_read+0xda/0x1a0 [ 481.280473][T29139] __x64_sys_read+0x40/0x50 [ 481.280502][T29139] x64_sys_call+0x27bc/0x2ff0 [ 481.280553][T29139] do_syscall_64+0xd2/0x200 [ 481.280581][T29139] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 481.280601][T29139] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 481.280650][T29139] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 481.280673][T29139] RIP: 0033:0x7f49a744d8dc [ 481.280689][T29139] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 481.280721][T29139] RSP: 002b:00007f49a5eaf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 481.280740][T29139] RAX: ffffffffffffffda RBX: 00007f49a76a5fa0 RCX: 00007f49a744d8dc [ 481.280755][T29139] RDX: 000000000000000f RSI: 00007f49a5eaf0a0 RDI: 0000000000000003 [ 481.280775][T29139] RBP: 00007f49a5eaf090 R08: 0000000000000000 R09: 0000000000000000 [ 481.280825][T29139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.280854][T29139] R13: 00007f49a76a6038 R14: 00007f49a76a5fa0 R15: 00007ffe2bcad8d8 [ 481.280871][T29139] [ 481.591723][T29147] FAULT_INJECTION: forcing a failure. [ 481.591723][T29147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.604884][T29147] CPU: 1 UID: 0 PID: 29147 Comm: syz.0.9686 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 481.604918][T29147] Tainted: [W]=WARN [ 481.604926][T29147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 481.604938][T29147] Call Trace: [ 481.604996][T29147] [ 481.605003][T29147] __dump_stack+0x1d/0x30 [ 481.605025][T29147] dump_stack_lvl+0xe8/0x140 [ 481.605055][T29147] dump_stack+0x15/0x1b [ 481.605073][T29147] should_fail_ex+0x265/0x280 [ 481.605098][T29147] should_fail+0xb/0x20 [ 481.605199][T29147] should_fail_usercopy+0x1a/0x20 [ 481.605225][T29147] _copy_from_iter+0xd2/0xe80 [ 481.605248][T29147] ? __build_skb_around+0x1a0/0x200 [ 481.605273][T29147] ? __alloc_skb+0x223/0x320 [ 481.605293][T29147] netlink_sendmsg+0x471/0x6b0 [ 481.605350][T29147] ? __pfx_netlink_sendmsg+0x10/0x10 [ 481.605377][T29147] __sock_sendmsg+0x142/0x180 [ 481.605404][T29147] ____sys_sendmsg+0x31e/0x4e0 [ 481.605483][T29147] ___sys_sendmsg+0x17b/0x1d0 [ 481.605522][T29147] __x64_sys_sendmsg+0xd4/0x160 [ 481.605593][T29147] x64_sys_call+0x191e/0x2ff0 [ 481.605612][T29147] do_syscall_64+0xd2/0x200 [ 481.605642][T29147] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 481.605726][T29147] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 481.605848][T29147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 481.605871][T29147] RIP: 0033:0x7fec6588eec9 [ 481.605888][T29147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 481.605906][T29147] RSP: 002b:00007fec642ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 481.605927][T29147] RAX: ffffffffffffffda RBX: 00007fec65ae5fa0 RCX: 00007fec6588eec9 [ 481.605941][T29147] RDX: 0000000000004000 RSI: 0000200000000280 RDI: 0000000000000003 [ 481.605968][T29147] RBP: 00007fec642ef090 R08: 0000000000000000 R09: 0000000000000000 [ 481.605979][T29147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.605990][T29147] R13: 00007fec65ae6038 R14: 00007fec65ae5fa0 R15: 00007fffcdca5448 [ 481.606009][T29147] [ 482.062941][T29179] futex_wake_op: syz.1.9701 tries to shift op by 32; fix this program [ 482.087110][T29181] netlink: 'syz.3.9702': attribute type 7 has an invalid length. [ 482.096140][ T23] IPVS: starting estimator thread 0... [ 482.137188][T29193] FAULT_INJECTION: forcing a failure. [ 482.137188][T29193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.150363][T29193] CPU: 1 UID: 0 PID: 29193 Comm: syz.3.9707 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 482.150428][T29193] Tainted: [W]=WARN [ 482.150434][T29193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 482.150479][T29193] Call Trace: [ 482.150485][T29193] [ 482.150493][T29193] __dump_stack+0x1d/0x30 [ 482.150515][T29193] dump_stack_lvl+0xe8/0x140 [ 482.150549][T29193] dump_stack+0x15/0x1b [ 482.150564][T29193] should_fail_ex+0x265/0x280 [ 482.150662][T29193] should_fail+0xb/0x20 [ 482.150758][T29193] should_fail_usercopy+0x1a/0x20 [ 482.150784][T29193] _copy_to_user+0x20/0xa0 [ 482.150813][T29193] simple_read_from_buffer+0xb5/0x130 [ 482.150908][T29193] proc_fail_nth_read+0x10e/0x150 [ 482.150990][T29193] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 482.151016][T29193] vfs_read+0x1a5/0x770 [ 482.151038][T29193] ? __rcu_read_unlock+0x4f/0x70 [ 482.151118][T29193] ? __fget_files+0x184/0x1c0 [ 482.151137][T29193] ? finish_task_switch+0xad/0x2b0 [ 482.151160][T29193] ksys_read+0xda/0x1a0 [ 482.151187][T29193] __x64_sys_read+0x40/0x50 [ 482.151207][T29193] x64_sys_call+0x27bc/0x2ff0 [ 482.151246][T29193] do_syscall_64+0xd2/0x200 [ 482.151276][T29193] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 482.151315][T29193] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 482.151342][T29193] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.151363][T29193] RIP: 0033:0x7f49a744d8dc [ 482.151379][T29193] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 482.151464][T29193] RSP: 002b:00007f49a5eaf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 482.151484][T29193] RAX: ffffffffffffffda RBX: 00007f49a76a5fa0 RCX: 00007f49a744d8dc [ 482.151496][T29193] RDX: 000000000000000f RSI: 00007f49a5eaf0a0 RDI: 0000000000000003 [ 482.151508][T29193] RBP: 00007f49a5eaf090 R08: 0000000000000000 R09: 0000000000000000 [ 482.151518][T29193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.151529][T29193] R13: 00007f49a76a6038 R14: 00007f49a76a5fa0 R15: 00007ffe2bcad8d8 [ 482.151546][T29193] [ 482.405385][T29185] IPVS: using max 2592 ests per chain, 129600 per kthread [ 482.517554][ T23] IPVS: starting estimator thread 0... [ 482.559307][T29221] macvtap0: refused to change device tx_queue_len [ 482.605045][T29215] IPVS: using max 2544 ests per chain, 127200 per kthread [ 482.724691][T29241] vhci_hcd: invalid port number 253 [ 482.730129][T29241] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 483.012769][T29272] vhci_hcd: invalid port number 253 [ 483.018119][T29272] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 483.193636][T29289] futex_wake_op: syz.1.9744 tries to shift op by 32; fix this program [ 483.258626][T29298] vhci_hcd: invalid port number 253 [ 483.264005][T29298] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 483.432484][T29307] __nla_validate_parse: 6 callbacks suppressed [ 483.432501][T29307] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9750'. [ 483.527875][T29311] FAULT_INJECTION: forcing a failure. [ 483.527875][T29311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.541419][T29311] CPU: 1 UID: 0 PID: 29311 Comm: syz.1.9752 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 483.541488][T29311] Tainted: [W]=WARN [ 483.541496][T29311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 483.541509][T29311] Call Trace: [ 483.541515][T29311] [ 483.541523][T29311] __dump_stack+0x1d/0x30 [ 483.541544][T29311] dump_stack_lvl+0xe8/0x140 [ 483.541629][T29311] dump_stack+0x15/0x1b [ 483.541660][T29311] should_fail_ex+0x265/0x280 [ 483.541680][T29311] should_fail+0xb/0x20 [ 483.541699][T29311] should_fail_usercopy+0x1a/0x20 [ 483.541724][T29311] _copy_from_iter+0xd2/0xe80 [ 483.541797][T29311] ? is_bpf_text_address+0x141/0x160 [ 483.541897][T29311] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 483.541919][T29311] ? kernel_text_address+0x94/0xb0 [ 483.541970][T29311] ? __kernel_text_address+0xd/0x40 [ 483.541991][T29311] ? unwind_get_return_address+0x16/0x40 [ 483.542018][T29311] ? _find_next_bit+0x29/0x90 [ 483.542039][T29311] tun_get_user+0x14d/0x2680 [ 483.542059][T29311] ? pcpu_freelist_pop+0x75/0xa0 [ 483.542109][T29311] ? _parse_integer_limit+0x170/0x190 [ 483.542137][T29311] ? ref_tracker_alloc+0x1f2/0x2f0 [ 483.542161][T29311] ? selinux_file_permission+0x1e4/0x320 [ 483.542219][T29311] tun_chr_write_iter+0x15e/0x210 [ 483.542238][T29311] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 483.542257][T29311] vfs_write+0x527/0x960 [ 483.542284][T29311] ksys_write+0xda/0x1a0 [ 483.542345][T29311] __x64_sys_write+0x40/0x50 [ 483.542384][T29311] x64_sys_call+0x27fe/0x2ff0 [ 483.542403][T29311] do_syscall_64+0xd2/0x200 [ 483.542434][T29311] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 483.542475][T29311] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 483.542533][T29311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 483.542551][T29311] RIP: 0033:0x7f47388deec9 [ 483.542564][T29311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 483.542581][T29311] RSP: 002b:00007f4737347038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 483.542677][T29311] RAX: ffffffffffffffda RBX: 00007f4738b35fa0 RCX: 00007f47388deec9 [ 483.542748][T29311] RDX: 0000000000000036 RSI: 00002000000005c0 RDI: 0000000000000003 [ 483.542759][T29311] RBP: 00007f4737347090 R08: 0000000000000000 R09: 0000000000000000 [ 483.542772][T29311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.542823][T29311] R13: 00007f4738b36038 R14: 00007f4738b35fa0 R15: 00007ffc8c296188 [ 483.542839][T29311] [ 483.951128][T29321] futex_wake_op: syz.1.9757 tries to shift op by 32; fix this program [ 484.049806][T29330] FAULT_INJECTION: forcing a failure. [ 484.049806][T29330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 484.062945][T29330] CPU: 0 UID: 0 PID: 29330 Comm: gtp Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 484.063010][T29330] Tainted: [W]=WARN [ 484.063017][T29330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 484.063109][T29330] Call Trace: [ 484.063115][T29330] [ 484.063124][T29330] __dump_stack+0x1d/0x30 [ 484.063145][T29330] dump_stack_lvl+0xe8/0x140 [ 484.063165][T29330] dump_stack+0x15/0x1b [ 484.063257][T29330] should_fail_ex+0x265/0x280 [ 484.063317][T29330] should_fail+0xb/0x20 [ 484.063344][T29330] should_fail_usercopy+0x1a/0x20 [ 484.063366][T29330] _copy_to_user+0x20/0xa0 [ 484.063397][T29330] generic_map_lookup_batch+0x57a/0x7c0 [ 484.063494][T29330] ? __pfx_generic_map_lookup_batch+0x10/0x10 [ 484.063581][T29330] bpf_map_do_batch+0x1b7/0x380 [ 484.063671][T29330] ? security_bpf+0x2b/0x90 [ 484.063687][T29330] __sys_bpf+0x490/0x7b0 [ 484.063718][T29330] __x64_sys_bpf+0x41/0x50 [ 484.063788][T29330] x64_sys_call+0x2aea/0x2ff0 [ 484.063810][T29330] do_syscall_64+0xd2/0x200 [ 484.063910][T29330] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 484.063936][T29330] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 484.063961][T29330] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 484.064040][T29330] RIP: 0033:0x7f47388deec9 [ 484.064056][T29330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.064071][T29330] RSP: 002b:00007f4737347038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 484.064087][T29330] RAX: ffffffffffffffda RBX: 00007f4738b35fa0 RCX: 00007f47388deec9 [ 484.064098][T29330] RDX: 0000000000000038 RSI: 00002000000001c0 RDI: 0000000000000018 [ 484.064109][T29330] RBP: 00007f4737347090 R08: 0000000000000000 R09: 0000000000000000 [ 484.064192][T29330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.064203][T29330] R13: 00007f4738b36038 R14: 00007f4738b35fa0 R15: 00007ffc8c296188 [ 484.064221][T29330] [ 484.405476][T29326] netlink: 256 bytes leftover after parsing attributes in process `syz.3.9759'. [ 484.572655][T29367] netlink: 20 bytes leftover after parsing attributes in process `syz.5.9763'. [ 484.595705][T29333] netlink: 12 bytes leftover after parsing attributes in process `syz.5.9763'. [ 484.789429][T29421] futex_wake_op: syz.2.9771 tries to shift op by 32; fix this program [ 485.035859][T29428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=29428 comm=syz.0.9774 [ 485.222007][T29451] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9783'. [ 485.231495][T29451] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9783'. [ 485.479209][T29469] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9791'. [ 485.523517][T29471] vhci_hcd: invalid port number 96 [ 485.528874][T29471] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 485.540201][T29475] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 485.551591][T29476] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9787'. [ 485.560678][T29476] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9787'. [ 485.577331][ T29] kauditd_printk_skb: 207 callbacks suppressed [ 485.577346][ T29] audit: type=1400 audit(1758763750.486:16578): avc: denied { write } for pid=29477 comm="syz.3.9794" name="mcfilter6" dev="proc" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 485.608272][ T29] audit: type=1400 audit(1758763750.496:16579): avc: denied { read } for pid=29477 comm="syz.3.9794" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 485.629238][ T29] audit: type=1326 audit(1758763750.496:16580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.653468][ T29] audit: type=1326 audit(1758763750.496:16581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.677906][ T29] audit: type=1326 audit(1758763750.496:16582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.701658][ T29] audit: type=1326 audit(1758763750.496:16583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.726767][ T29] audit: type=1326 audit(1758763750.496:16584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.750782][ T29] audit: type=1326 audit(1758763750.496:16585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.774596][ T29] audit: type=1326 audit(1758763750.496:16586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.798274][ T29] audit: type=1326 audit(1758763750.496:16587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29477 comm="syz.3.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 485.880083][T29489] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9798'. [ 486.077715][T29499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29499 comm=syz.0.9803 [ 486.166344][T29515] vhci_hcd: invalid port number 253 [ 486.171613][T29515] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 486.202895][T29521] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 486.202895][T29520] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 486.253275][T29525] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 486.401031][T29536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=29536 comm=syz.0.9817 [ 486.490228][T29544] vhci_hcd: invalid port number 253 [ 486.495663][T29544] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 486.812606][T29574] vhci_hcd: invalid port number 253 [ 486.818023][T29574] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 486.836806][T29579] FAULT_INJECTION: forcing a failure. [ 486.836806][T29579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 486.849880][T29579] CPU: 1 UID: 0 PID: 29579 Comm: syz.1.9835 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 486.849909][T29579] Tainted: [W]=WARN [ 486.849914][T29579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 486.849931][T29579] Call Trace: [ 486.849938][T29579] [ 486.849946][T29579] __dump_stack+0x1d/0x30 [ 486.849967][T29579] dump_stack_lvl+0xe8/0x140 [ 486.850013][T29579] dump_stack+0x15/0x1b [ 486.850028][T29579] should_fail_ex+0x265/0x280 [ 486.850051][T29579] should_fail+0xb/0x20 [ 486.850069][T29579] should_fail_usercopy+0x1a/0x20 [ 486.850144][T29579] _copy_from_user+0x1c/0xb0 [ 486.850173][T29579] __sys_sendto+0x19e/0x330 [ 486.850202][T29579] __x64_sys_sendto+0x76/0x90 [ 486.850226][T29579] x64_sys_call+0x2d05/0x2ff0 [ 486.850274][T29579] do_syscall_64+0xd2/0x200 [ 486.850303][T29579] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 486.850328][T29579] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 486.850389][T29579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.850411][T29579] RIP: 0033:0x7f47388deec9 [ 486.850426][T29579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.850441][T29579] RSP: 002b:00007f4737347038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 486.850458][T29579] RAX: ffffffffffffffda RBX: 00007f4738b35fa0 RCX: 00007f47388deec9 [ 486.850524][T29579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 486.850543][T29579] RBP: 00007f4737347090 R08: 00002000000001c0 R09: 000000000000001c [ 486.850554][T29579] R10: 0000000020004000 R11: 0000000000000246 R12: 0000000000000001 [ 486.850564][T29579] R13: 00007f4738b36038 R14: 00007f4738b35fa0 R15: 00007ffc8c296188 [ 486.850612][T29579] [ 487.088064][T29585] netlink: 'syz.2.9838': attribute type 16 has an invalid length. [ 487.100023][T29585] netlink: 'syz.2.9838': attribute type 17 has an invalid length. [ 487.100539][T29583] bond0: entered promiscuous mode [ 487.113457][T29583] bond0: entered allmulticast mode [ 487.114731][T29583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 487.431712][T29585] batman_adv: batadv0: Interface activated: dummy0 [ 487.440001][T29585] batadv0: mtu less than device minimum [ 487.448529][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.460479][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.473128][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.485316][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.497368][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.510482][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.523121][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.535657][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.547934][T29585] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (0) [ 487.764313][T29632] FAULT_INJECTION: forcing a failure. [ 487.764313][T29632] name failslab, interval 1, probability 0, space 0, times 0 [ 487.777307][T29632] CPU: 0 UID: 0 PID: 29632 Comm: syz.5.9856 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 487.777336][T29632] Tainted: [W]=WARN [ 487.777343][T29632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 487.777355][T29632] Call Trace: [ 487.777360][T29632] [ 487.777375][T29632] __dump_stack+0x1d/0x30 [ 487.777441][T29632] dump_stack_lvl+0xe8/0x140 [ 487.777459][T29632] dump_stack+0x15/0x1b [ 487.777476][T29632] should_fail_ex+0x265/0x280 [ 487.777500][T29632] should_failslab+0x8c/0xb0 [ 487.777520][T29632] kmem_cache_alloc_node_noprof+0x57/0x320 [ 487.777567][T29632] ? __alloc_skb+0x101/0x320 [ 487.777631][T29632] __alloc_skb+0x101/0x320 [ 487.777653][T29632] netlink_alloc_large_skb+0xba/0xf0 [ 487.777677][T29632] netlink_sendmsg+0x3cf/0x6b0 [ 487.777706][T29632] ? __pfx_netlink_sendmsg+0x10/0x10 [ 487.777733][T29632] __sock_sendmsg+0x142/0x180 [ 487.777792][T29632] ____sys_sendmsg+0x31e/0x4e0 [ 487.777818][T29632] ___sys_sendmsg+0x17b/0x1d0 [ 487.777856][T29632] __x64_sys_sendmsg+0xd4/0x160 [ 487.777887][T29632] x64_sys_call+0x191e/0x2ff0 [ 487.778022][T29632] do_syscall_64+0xd2/0x200 [ 487.778050][T29632] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 487.778071][T29632] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 487.778102][T29632] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 487.778174][T29632] RIP: 0033:0x7fab9529eec9 [ 487.778197][T29632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 487.778212][T29632] RSP: 002b:00007fab93d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 487.778229][T29632] RAX: ffffffffffffffda RBX: 00007fab954f5fa0 RCX: 00007fab9529eec9 [ 487.778303][T29632] RDX: 0000000020050800 RSI: 00002000000000c0 RDI: 0000000000000008 [ 487.778316][T29632] RBP: 00007fab93d07090 R08: 0000000000000000 R09: 0000000000000000 [ 487.778329][T29632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.778343][T29632] R13: 00007fab954f6038 R14: 00007fab954f5fa0 R15: 00007ffeb2fc3c28 [ 487.778363][T29632] [ 488.065056][T29647] vhci_hcd: invalid port number 253 [ 488.070265][T29647] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 488.327593][T29682] __nla_validate_parse: 13 callbacks suppressed [ 488.327610][T29682] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9876'. [ 488.372198][T29686] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9873'. [ 488.381237][T29686] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9873'. [ 488.647907][T29698] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9882'. [ 488.902796][T29720] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9889'. [ 488.968575][T29724] netlink: 'syz.3.9891': attribute type 16 has an invalid length. [ 488.976635][T29724] netlink: 'syz.3.9891': attribute type 17 has an invalid length. [ 489.109890][T29726] netlink: 'syz.0.9892': attribute type 16 has an invalid length. [ 489.118690][T29726] netlink: 'syz.0.9892': attribute type 17 has an invalid length. [ 489.253878][T29742] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=29742 comm=syz.3.9897 [ 489.279434][T29740] ALSA: seq fatal error: cannot create timer (-19) [ 489.450481][T29749] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9901'. [ 489.557932][T29755] netlink: 'syz.3.9903': attribute type 16 has an invalid length. [ 489.572104][T29755] netlink: 'syz.3.9903': attribute type 17 has an invalid length. [ 489.602338][T29757] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 489.788936][T29767] bridge0: entered promiscuous mode [ 489.847972][T29769] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9908'. [ 490.121677][T29779] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 490.171051][T29785] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9914'. [ 490.376896][T29805] netlink: 32 bytes leftover after parsing attributes in process `syz.5.9921'. [ 490.422523][ T29] kauditd_printk_skb: 352 callbacks suppressed [ 490.422591][ T29] audit: type=1400 audit(1758763755.567:16940): avc: denied { read } for pid=29798 comm="syz.5.9921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 490.731087][ T29] audit: type=1326 audit(1758763755.882:16941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.754815][ T29] audit: type=1326 audit(1758763755.893:16942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.778425][ T29] audit: type=1326 audit(1758763755.893:16943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.802194][ T29] audit: type=1326 audit(1758763755.893:16944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.812098][T29815] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9924'. [ 490.825825][ T29] audit: type=1326 audit(1758763755.893:16945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.858451][ T29] audit: type=1326 audit(1758763755.893:16946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.882245][ T29] audit: type=1326 audit(1758763755.893:16947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.905848][ T29] audit: type=1326 audit(1758763755.893:16948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 490.929611][ T29] audit: type=1326 audit(1758763755.893:16949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29809 comm="syz.2.9924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fac4094eec9 code=0x7ffc0000 [ 491.034269][T29768] bridge0: left promiscuous mode [ 491.158452][T29825] FAULT_INJECTION: forcing a failure. [ 491.158452][T29825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 491.171565][T29825] CPU: 1 UID: 0 PID: 29825 Comm: syz.2.9926 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 491.171593][T29825] Tainted: [W]=WARN [ 491.171650][T29825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 491.171660][T29825] Call Trace: [ 491.171666][T29825] [ 491.171672][T29825] __dump_stack+0x1d/0x30 [ 491.171690][T29825] dump_stack_lvl+0xe8/0x140 [ 491.171707][T29825] dump_stack+0x15/0x1b [ 491.171724][T29825] should_fail_ex+0x265/0x280 [ 491.171796][T29825] should_fail+0xb/0x20 [ 491.171813][T29825] should_fail_usercopy+0x1a/0x20 [ 491.171834][T29825] _copy_from_user+0x1c/0xb0 [ 491.171875][T29825] ___sys_sendmsg+0xc1/0x1d0 [ 491.171914][T29825] __x64_sys_sendmsg+0xd4/0x160 [ 491.171939][T29825] x64_sys_call+0x191e/0x2ff0 [ 491.172033][T29825] do_syscall_64+0xd2/0x200 [ 491.172063][T29825] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 491.172147][T29825] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 491.172176][T29825] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 491.172198][T29825] RIP: 0033:0x7fac4094eec9 [ 491.172229][T29825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.172246][T29825] RSP: 002b:00007fac3f3af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 491.172265][T29825] RAX: ffffffffffffffda RBX: 00007fac40ba5fa0 RCX: 00007fac4094eec9 [ 491.172276][T29825] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 491.172289][T29825] RBP: 00007fac3f3af090 R08: 0000000000000000 R09: 0000000000000000 [ 491.172303][T29825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 491.172371][T29825] R13: 00007fac40ba6038 R14: 00007fac40ba5fa0 R15: 00007ffea9c9d9f8 [ 491.172388][T29825] [ 491.570504][T29841] IPv6: NLM_F_CREATE should be specified when creating new route [ 491.923972][T29845] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 492.026723][T29854] futex_wake_op: syz.5.9938 tries to shift op by 32; fix this program [ 492.583590][T29895] 9pnet_fd: Insufficient options for proto=fd [ 492.943565][T29919] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 493.029716][T29922] bond0: entered promiscuous mode [ 493.035099][T29922] bond0: entered allmulticast mode [ 493.092245][T29925] __nla_validate_parse: 8 callbacks suppressed [ 493.092281][T29925] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9960'. [ 493.121592][T29922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 493.182055][T29924] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9960'. [ 493.266295][T29930] FAULT_INJECTION: forcing a failure. [ 493.266295][T29930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 493.280036][T29930] CPU: 0 UID: 0 PID: 29930 Comm: syz.0.9964 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 493.280066][T29930] Tainted: [W]=WARN [ 493.280073][T29930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 493.280086][T29930] Call Trace: [ 493.280093][T29930] [ 493.280101][T29930] __dump_stack+0x1d/0x30 [ 493.280142][T29930] dump_stack_lvl+0xe8/0x140 [ 493.280159][T29930] dump_stack+0x15/0x1b [ 493.280173][T29930] should_fail_ex+0x265/0x280 [ 493.280196][T29930] should_fail+0xb/0x20 [ 493.280217][T29930] should_fail_usercopy+0x1a/0x20 [ 493.280269][T29930] _copy_to_user+0x20/0xa0 [ 493.280344][T29930] simple_read_from_buffer+0xb5/0x130 [ 493.280365][T29930] proc_fail_nth_read+0x10e/0x150 [ 493.280395][T29930] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 493.280476][T29930] vfs_read+0x1a5/0x770 [ 493.280493][T29930] ? __rcu_read_unlock+0x4f/0x70 [ 493.280514][T29930] ? __fget_files+0x184/0x1c0 [ 493.280542][T29930] ksys_read+0xda/0x1a0 [ 493.280566][T29930] __x64_sys_read+0x40/0x50 [ 493.280619][T29930] x64_sys_call+0x27bc/0x2ff0 [ 493.280642][T29930] do_syscall_64+0xd2/0x200 [ 493.280672][T29930] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 493.280699][T29930] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 493.280783][T29930] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 493.280801][T29930] RIP: 0033:0x7fec6588d8dc [ 493.280815][T29930] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 493.280833][T29930] RSP: 002b:00007fec642ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 493.280885][T29930] RAX: ffffffffffffffda RBX: 00007fec65ae5fa0 RCX: 00007fec6588d8dc [ 493.280899][T29930] RDX: 000000000000000f RSI: 00007fec642ef0a0 RDI: 0000000000000004 [ 493.280913][T29930] RBP: 00007fec642ef090 R08: 0000000000000000 R09: 0000000000000000 [ 493.280926][T29930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.280937][T29930] R13: 00007fec65ae6038 R14: 00007fec65ae5fa0 R15: 00007fffcdca5448 [ 493.280953][T29930] [ 493.522381][T29934] futex_wake_op: syz.5.9966 tries to shift op by 32; fix this program [ 493.824513][T29952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=29952 comm=syz.1.9971 [ 493.986039][T29973] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 494.095627][T29981] netlink: 20 bytes leftover after parsing attributes in process `syz.5.9981'. [ 494.117204][T29981] netlink: 12 bytes leftover after parsing attributes in process `syz.5.9981'. [ 494.365137][T30004] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9983'. [ 494.466213][T30015] FAULT_INJECTION: forcing a failure. [ 494.466213][T30015] name failslab, interval 1, probability 0, space 0, times 0 [ 494.479084][T30015] CPU: 1 UID: 0 PID: 30015 Comm: syz.5.9985 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 494.479187][T30015] Tainted: [W]=WARN [ 494.479194][T30015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 494.479205][T30015] Call Trace: [ 494.479210][T30015] [ 494.479216][T30015] __dump_stack+0x1d/0x30 [ 494.479235][T30015] dump_stack_lvl+0xe8/0x140 [ 494.479272][T30015] dump_stack+0x15/0x1b [ 494.479287][T30015] should_fail_ex+0x265/0x280 [ 494.479312][T30015] ? io_ring_ctx_alloc+0x38/0x660 [ 494.479333][T30015] should_failslab+0x8c/0xb0 [ 494.479391][T30015] __kmalloc_cache_noprof+0x4c/0x320 [ 494.479420][T30015] ? avc_has_perm_noaudit+0x1b1/0x200 [ 494.479445][T30015] io_ring_ctx_alloc+0x38/0x660 [ 494.479483][T30015] ? avc_has_perm+0xf7/0x180 [ 494.479504][T30015] ? io_uring_fill_params+0x270/0x300 [ 494.479605][T30015] io_uring_create+0x10f/0x610 [ 494.479631][T30015] __se_sys_io_uring_setup+0x1f7/0x210 [ 494.479662][T30015] __x64_sys_io_uring_setup+0x31/0x40 [ 494.479688][T30015] x64_sys_call+0x2b21/0x2ff0 [ 494.479733][T30015] do_syscall_64+0xd2/0x200 [ 494.479788][T30015] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 494.479836][T30015] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 494.479865][T30015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.479883][T30015] RIP: 0033:0x7fab9529eec9 [ 494.479896][T30015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.479910][T30015] RSP: 002b:00007fab93d06fc8 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 494.479995][T30015] RAX: ffffffffffffffda RBX: 00007fab954f5fa0 RCX: 00007fab9529eec9 [ 494.480006][T30015] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000114 [ 494.480018][T30015] RBP: 00002000000002c0 R08: 0000000000000000 R09: 0000000000000000 [ 494.480082][T30015] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 494.480092][T30015] R13: 0000000000000000 R14: 0000000000000114 R15: 0000000000000000 [ 494.480117][T30015] [ 494.956475][T30041] netlink: 14 bytes leftover after parsing attributes in process `syz.2.9994'. [ 494.990738][T30047] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9993'. [ 495.019431][T30041] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 495.030693][T30047] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9993'. [ 495.051524][T30041] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 495.071289][T30041] bond0 (unregistering): Released all slaves [ 495.159830][T30104] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 495.222408][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 495.222423][ T29] audit: type=1326 audit(1758763760.607:17095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30046 comm="syz.5.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 495.284074][ T29] audit: type=1326 audit(1758763760.607:17096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30046 comm="syz.5.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 495.414654][T30108] futex_wake_op: syz.5.10001 tries to shift op by 32; fix this program [ 495.473624][T30110] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=30110 comm=syz.0.10002 [ 495.502204][T30114] FAULT_INJECTION: forcing a failure. [ 495.502204][T30114] name failslab, interval 1, probability 0, space 0, times 0 [ 495.514902][T30114] CPU: 1 UID: 0 PID: 30114 Comm: syz.5.10003 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 495.514929][T30114] Tainted: [W]=WARN [ 495.514935][T30114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 495.514947][T30114] Call Trace: [ 495.514954][T30114] [ 495.514961][T30114] __dump_stack+0x1d/0x30 [ 495.514983][T30114] dump_stack_lvl+0xe8/0x140 [ 495.515057][T30114] dump_stack+0x15/0x1b [ 495.515071][T30114] should_fail_ex+0x265/0x280 [ 495.515147][T30114] should_failslab+0x8c/0xb0 [ 495.515172][T30114] __kmalloc_noprof+0xa5/0x3e0 [ 495.515228][T30114] ? io_cache_alloc_new+0x2a/0xb0 [ 495.515380][T30114] io_cache_alloc_new+0x2a/0xb0 [ 495.515404][T30114] __io_prep_rw+0xcf/0x6d0 [ 495.515423][T30114] ? __io_alloc_req_refill+0x12e/0x1d0 [ 495.515476][T30114] io_prep_read+0x20/0xa0 [ 495.515499][T30114] io_submit_sqes+0x5ec/0x1060 [ 495.515528][T30114] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 495.515551][T30114] ? 0xffffffff81000000 [ 495.515635][T30114] ? __rcu_read_unlock+0x4f/0x70 [ 495.515654][T30114] ? get_pid_task+0x96/0xd0 [ 495.515812][T30114] ? proc_fail_nth_write+0x13b/0x160 [ 495.515854][T30114] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 495.515928][T30114] ? vfs_write+0x7e8/0x960 [ 495.516012][T30114] ? __rcu_read_unlock+0x4f/0x70 [ 495.516082][T30114] ? __fget_files+0x184/0x1c0 [ 495.516110][T30114] ? fput+0x8f/0xc0 [ 495.516141][T30114] __x64_sys_io_uring_enter+0x78/0x90 [ 495.516168][T30114] x64_sys_call+0x2de1/0x2ff0 [ 495.516263][T30114] do_syscall_64+0xd2/0x200 [ 495.516293][T30114] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 495.516315][T30114] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 495.516346][T30114] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.516405][T30114] RIP: 0033:0x7fab9529eec9 [ 495.516417][T30114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.516431][T30114] RSP: 002b:00007fab93d07038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 495.516452][T30114] RAX: ffffffffffffffda RBX: 00007fab954f5fa0 RCX: 00007fab9529eec9 [ 495.516466][T30114] RDX: 00000000000004c3 RSI: 00000000000074d1 RDI: 000000000000000a [ 495.516477][T30114] RBP: 00007fab93d07090 R08: 0000000000000000 R09: fffffffffffffd1d [ 495.516489][T30114] R10: 0000000000000043 R11: 0000000000000246 R12: 0000000000000001 [ 495.516523][T30114] R13: 00007fab954f6038 R14: 00007fab954f5fa0 R15: 00007ffeb2fc3c28 [ 495.516544][T30114] [ 495.859398][ T29] audit: type=1326 audit(1758763761.279:17097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 495.916577][T30145] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10014'. [ 495.918482][ T29] audit: type=1326 audit(1758763761.279:17098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 495.949399][ T29] audit: type=1326 audit(1758763761.279:17099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 495.973107][ T29] audit: type=1326 audit(1758763761.279:17100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 495.997095][ T29] audit: type=1326 audit(1758763761.279:17101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 496.020826][ T29] audit: type=1326 audit(1758763761.279:17102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 496.044549][ T29] audit: type=1326 audit(1758763761.279:17103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 496.067975][T30147] netlink: 20 bytes leftover after parsing attributes in process `syz.2.10009'. [ 496.068343][ T29] audit: type=1326 audit(1758763761.279:17104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30137 comm="syz.5.10011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 496.077626][T30149] futex_wake_op: syz.1.10013 tries to shift op by 32; fix this program [ 496.108980][T30152] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 496.307274][T30221] vhci_hcd: invalid port number 253 [ 496.312587][T30221] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 496.527229][T30245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=30245 comm=syz.5.10029 [ 496.909436][T30305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=30305 comm=syz.2.10046 [ 497.032438][T30321] FAULT_INJECTION: forcing a failure. [ 497.032438][T30321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.045632][T30321] CPU: 1 UID: 0 PID: 30321 Comm: syz.0.10053 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 497.045662][T30321] Tainted: [W]=WARN [ 497.045717][T30321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 497.045730][T30321] Call Trace: [ 497.045738][T30321] [ 497.045746][T30321] __dump_stack+0x1d/0x30 [ 497.045768][T30321] dump_stack_lvl+0xe8/0x140 [ 497.045789][T30321] dump_stack+0x15/0x1b [ 497.045804][T30321] should_fail_ex+0x265/0x280 [ 497.045826][T30321] should_fail+0xb/0x20 [ 497.045923][T30321] should_fail_usercopy+0x1a/0x20 [ 497.045956][T30321] _copy_from_user+0x1c/0xb0 [ 497.045987][T30321] __sys_bpf+0x178/0x7b0 [ 497.046023][T30321] __x64_sys_bpf+0x41/0x50 [ 497.046091][T30321] x64_sys_call+0x2aea/0x2ff0 [ 497.046111][T30321] do_syscall_64+0xd2/0x200 [ 497.046141][T30321] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 497.046163][T30321] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 497.046244][T30321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 497.046262][T30321] RIP: 0033:0x7fec6588eec9 [ 497.046278][T30321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.046296][T30321] RSP: 002b:00007fec642ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 497.046315][T30321] RAX: ffffffffffffffda RBX: 00007fec65ae5fa0 RCX: 00007fec6588eec9 [ 497.046382][T30321] RDX: 0000000000000020 RSI: 00002000000003c0 RDI: 0000000000000004 [ 497.046445][T30321] RBP: 00007fec642ef090 R08: 0000000000000000 R09: 0000000000000000 [ 497.046459][T30321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.046471][T30321] R13: 00007fec65ae6038 R14: 00007fec65ae5fa0 R15: 00007fffcdca5448 [ 497.046489][T30321] [ 497.310165][T30324] netlink: 'syz.2.10054': attribute type 16 has an invalid length. [ 497.318158][T30324] netlink: 'syz.2.10054': attribute type 17 has an invalid length. [ 497.394151][T30324] net_ratelimit: 15 callbacks suppressed [ 497.394162][T30324] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 497.507898][T30343] futex_wake_op: syz.2.10062 tries to shift op by 32; fix this program [ 497.736407][T30370] netlink: 'syz.2.10068': attribute type 16 has an invalid length. [ 497.744478][T30370] netlink: 'syz.2.10068': attribute type 17 has an invalid length. [ 497.822409][T30370] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 497.884896][T30395] futex_wake_op: syz.0.10074 tries to shift op by 32; fix this program [ 497.987293][T30400] FAULT_INJECTION: forcing a failure. [ 497.987293][T30400] name failslab, interval 1, probability 0, space 0, times 0 [ 498.000782][T30400] CPU: 1 UID: 0 PID: 30400 Comm: syz.2.10077 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 498.000840][T30400] Tainted: [W]=WARN [ 498.000846][T30400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 498.000857][T30400] Call Trace: [ 498.000863][T30400] [ 498.000869][T30400] __dump_stack+0x1d/0x30 [ 498.000927][T30400] dump_stack_lvl+0xe8/0x140 [ 498.000947][T30400] dump_stack+0x15/0x1b [ 498.001002][T30400] should_fail_ex+0x265/0x280 [ 498.001074][T30400] should_failslab+0x8c/0xb0 [ 498.001099][T30400] kmem_cache_alloc_node_noprof+0x57/0x320 [ 498.001156][T30400] ? __alloc_skb+0x101/0x320 [ 498.001179][T30400] __alloc_skb+0x101/0x320 [ 498.001201][T30400] pfkey_sendmsg+0xd7/0x900 [ 498.001230][T30400] ? avc_has_perm+0xf7/0x180 [ 498.001268][T30400] ? selinux_socket_sendmsg+0x175/0x1b0 [ 498.001307][T30400] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 498.001331][T30400] __sock_sendmsg+0x142/0x180 [ 498.001385][T30400] ____sys_sendmsg+0x31e/0x4e0 [ 498.001452][T30400] ___sys_sendmsg+0x17b/0x1d0 [ 498.001546][T30400] __x64_sys_sendmsg+0xd4/0x160 [ 498.001575][T30400] x64_sys_call+0x191e/0x2ff0 [ 498.001595][T30400] do_syscall_64+0xd2/0x200 [ 498.001674][T30400] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 498.001699][T30400] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 498.001772][T30400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 498.001801][T30400] RIP: 0033:0x7fac4094eec9 [ 498.001817][T30400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.001835][T30400] RSP: 002b:00007fac3f3af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 498.001930][T30400] RAX: ffffffffffffffda RBX: 00007fac40ba5fa0 RCX: 00007fac4094eec9 [ 498.001941][T30400] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 498.001952][T30400] RBP: 00007fac3f3af090 R08: 0000000000000000 R09: 0000000000000000 [ 498.001962][T30400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.001974][T30400] R13: 00007fac40ba6038 R14: 00007fac40ba5fa0 R15: 00007ffea9c9d9f8 [ 498.001993][T30400] [ 498.360808][T30411] 9pnet_fd: Insufficient options for proto=fd [ 498.500318][T30420] futex_wake_op: syz.0.10085 tries to shift op by 32; fix this program [ 498.536168][T30422] netlink: 'syz.2.10086': attribute type 13 has an invalid length. [ 498.544337][T30422] netlink: 'syz.2.10086': attribute type 17 has an invalid length. [ 498.710305][T30422] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 498.909166][T30458] futex_wake_op: syz.2.10102 tries to shift op by 32; fix this program [ 499.246564][T30489] futex_wake_op: syz.5.10114 tries to shift op by 32; fix this program [ 499.247163][T30488] __nla_validate_parse: 10 callbacks suppressed [ 499.247176][T30488] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10113'. [ 499.284514][T30493] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 499.603786][T30511] FAULT_INJECTION: forcing a failure. [ 499.603786][T30511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 499.616993][T30511] CPU: 0 UID: 0 PID: 30511 Comm: syz.0.10122 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 499.617070][T30511] Tainted: [W]=WARN [ 499.617078][T30511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 499.617091][T30511] Call Trace: [ 499.617097][T30511] [ 499.617105][T30511] __dump_stack+0x1d/0x30 [ 499.617201][T30511] dump_stack_lvl+0xe8/0x140 [ 499.617220][T30511] dump_stack+0x15/0x1b [ 499.617233][T30511] should_fail_ex+0x265/0x280 [ 499.617258][T30511] should_fail+0xb/0x20 [ 499.617288][T30511] should_fail_usercopy+0x1a/0x20 [ 499.617319][T30511] _copy_from_user+0x1c/0xb0 [ 499.617351][T30511] __se_sys_mount+0x10d/0x2e0 [ 499.617371][T30511] ? fput+0x8f/0xc0 [ 499.617419][T30511] ? ksys_write+0x192/0x1a0 [ 499.617443][T30511] __x64_sys_mount+0x67/0x80 [ 499.617484][T30511] x64_sys_call+0x2b4d/0x2ff0 [ 499.617502][T30511] do_syscall_64+0xd2/0x200 [ 499.617527][T30511] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 499.617583][T30511] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 499.617685][T30511] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 499.617713][T30511] RIP: 0033:0x7fec6588eec9 [ 499.617727][T30511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.617801][T30511] RSP: 002b:00007fec642ef038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 499.617822][T30511] RAX: ffffffffffffffda RBX: 00007fec65ae5fa0 RCX: 00007fec6588eec9 [ 499.617907][T30511] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 499.617921][T30511] RBP: 00007fec642ef090 R08: 0000200000000240 R09: 0000000000000000 [ 499.617932][T30511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 499.617965][T30511] R13: 00007fec65ae6038 R14: 00007fec65ae5fa0 R15: 00007fffcdca5448 [ 499.617985][T30511] [ 499.971466][T30521] futex_wake_op: syz.0.10127 tries to shift op by 32; fix this program [ 500.032372][T30526] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10129'. [ 500.103617][ T29] kauditd_printk_skb: 243 callbacks suppressed [ 500.103632][ T29] audit: type=1326 audit(1758763765.741:17348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30517 comm="syz.5.10125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 500.133518][ T29] audit: type=1326 audit(1758763765.741:17349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30517 comm="syz.5.10125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9529eec9 code=0x7ffc0000 [ 500.197993][T30547] netlink: 'syz.2.10137': attribute type 16 has an invalid length. [ 500.198031][T30546] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 500.205969][T30547] netlink: 'syz.2.10137': attribute type 17 has an invalid length. [ 500.244466][T30547] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 500.398928][ T29] audit: type=1326 audit(1758763766.045:17350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.425260][ T29] audit: type=1326 audit(1758763766.045:17351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.448975][ T29] audit: type=1326 audit(1758763766.045:17352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.472625][ T29] audit: type=1326 audit(1758763766.045:17353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.496451][ T29] audit: type=1326 audit(1758763766.045:17354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.500358][T30560] futex_wake_op: syz.3.10142 tries to shift op by 32; fix this program [ 500.520263][ T29] audit: type=1326 audit(1758763766.045:17355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.520332][ T29] audit: type=1326 audit(1758763766.056:17356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.520358][ T29] audit: type=1326 audit(1758763766.056:17357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30556 comm="syz.3.10141" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 500.632744][T30565] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10144'. [ 500.755048][T30569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=30569 comm=syz.5.10146 [ 500.855403][T30583] futex_wake_op: syz.5.10153 tries to shift op by 32; fix this program [ 500.895376][T30587] netlink: 24 bytes leftover after parsing attributes in process `syz.0.10155'. [ 500.910887][T30589] FAULT_INJECTION: forcing a failure. [ 500.910887][T30589] name failslab, interval 1, probability 0, space 0, times 0 [ 500.923659][T30589] CPU: 0 UID: 0 PID: 30589 Comm: syz.5.10156 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 500.923689][T30589] Tainted: [W]=WARN [ 500.923695][T30589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 500.923706][T30589] Call Trace: [ 500.923711][T30589] [ 500.923719][T30589] __dump_stack+0x1d/0x30 [ 500.923787][T30589] dump_stack_lvl+0xe8/0x140 [ 500.923804][T30589] dump_stack+0x15/0x1b [ 500.923818][T30589] should_fail_ex+0x265/0x280 [ 500.923839][T30589] should_failslab+0x8c/0xb0 [ 500.923860][T30589] kmem_cache_alloc_noprof+0x50/0x310 [ 500.923921][T30589] ? security_inode_alloc+0x37/0x100 [ 500.923947][T30589] security_inode_alloc+0x37/0x100 [ 500.924032][T30589] inode_init_always_gfp+0x4b7/0x500 [ 500.924056][T30589] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 500.924078][T30589] alloc_inode+0x58/0x170 [ 500.924100][T30589] new_inode+0x1d/0xe0 [ 500.924191][T30589] shmem_get_inode+0x244/0x750 [ 500.924239][T30591] netlink: 256 bytes leftover after parsing attributes in process `syz.0.10157'. [ 500.924212][T30589] ? __se_sys_memfd_create+0x1cc/0x590 [ 500.924318][T30589] __shmem_file_setup+0x113/0x210 [ 500.924351][T30589] shmem_file_setup+0x3b/0x50 [ 500.924369][T30589] __se_sys_memfd_create+0x2c3/0x590 [ 500.924422][T30589] __x64_sys_memfd_create+0x31/0x40 [ 500.924443][T30589] x64_sys_call+0x2abe/0x2ff0 [ 500.924524][T30589] do_syscall_64+0xd2/0x200 [ 500.924553][T30589] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 500.924651][T30589] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 500.924687][T30589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 500.924714][T30589] RIP: 0033:0x7fab9529eec9 [ 500.924728][T30589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 500.924746][T30589] RSP: 002b:00007fab93d06e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 500.924765][T30589] RAX: ffffffffffffffda RBX: 00000000000004d8 RCX: 00007fab9529eec9 [ 500.924778][T30589] RDX: 00007fab93d06ef0 RSI: 0000000000000000 RDI: 00007fab95322960 [ 500.924790][T30589] RBP: 0000200000000900 R08: 00007fab93d06bb7 R09: 00007fab93d06e40 [ 500.924803][T30589] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000280 [ 500.924851][T30589] R13: 00007fab93d06ef0 R14: 00007fab93d06eb0 R15: 0000200000000840 [ 500.924870][T30589] [ 501.165006][T30596] netlink: 256 bytes leftover after parsing attributes in process `syz.5.10159'. [ 501.232906][T30599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=30599 comm=syz.2.10160 [ 501.266500][T30625] futex_wake_op: syz.2.10166 tries to shift op by 32; fix this program [ 501.417943][T30642] netlink: 28 bytes leftover after parsing attributes in process `syz.3.10172'. [ 501.508262][T30648] vhci_hcd: invalid port number 253 [ 501.513561][T30648] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 501.573193][T30658] syzkaller0: entered promiscuous mode [ 501.578709][T30658] syzkaller0: entered allmulticast mode [ 501.599627][T30663] futex_wake_op: syz.1.10178 tries to shift op by 32; fix this program [ 501.673732][T30672] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10181'. [ 501.886869][T30678] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10183'. [ 501.895926][T30678] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10183'. [ 501.911179][T30678] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 501.919888][T30678] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 501.932291][T30677] FAULT_INJECTION: forcing a failure. [ 501.932291][T30677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 501.945434][T30677] CPU: 0 UID: 0 PID: 30677 Comm: syz.2.10184 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 501.945461][T30677] Tainted: [W]=WARN [ 501.945467][T30677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 501.945477][T30677] Call Trace: [ 501.945516][T30677] [ 501.945593][T30677] __dump_stack+0x1d/0x30 [ 501.945612][T30677] dump_stack_lvl+0xe8/0x140 [ 501.945631][T30677] dump_stack+0x15/0x1b [ 501.945648][T30677] should_fail_ex+0x265/0x280 [ 501.945671][T30677] should_fail+0xb/0x20 [ 501.945688][T30677] should_fail_usercopy+0x1a/0x20 [ 501.945739][T30677] _copy_from_user+0x1c/0xb0 [ 501.945771][T30677] __sys_bpf+0x178/0x7b0 [ 501.945806][T30677] __x64_sys_bpf+0x41/0x50 [ 501.945876][T30677] x64_sys_call+0x2aea/0x2ff0 [ 501.945895][T30677] do_syscall_64+0xd2/0x200 [ 501.945994][T30677] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 501.946015][T30677] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 501.946112][T30677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.946134][T30677] RIP: 0033:0x7fac4094eec9 [ 501.946148][T30677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.946163][T30677] RSP: 002b:00007fac3f36d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 501.946184][T30677] RAX: ffffffffffffffda RBX: 00007fac40ba6180 RCX: 00007fac4094eec9 [ 501.946196][T30677] RDX: 000000000000000c RSI: 0000200000000080 RDI: 000000000000000a [ 501.946210][T30677] RBP: 00007fac3f36d090 R08: 0000000000000000 R09: 0000000000000000 [ 501.946295][T30677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 501.946305][T30677] R13: 00007fac40ba6218 R14: 00007fac40ba6180 R15: 00007ffea9c9d9f8 [ 501.946325][T30677] [ 502.667937][T30692] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 502.684034][T30695] futex_wake_op: syz.5.10191 tries to shift op by 32; fix this program [ 502.853130][T30707] netlink: 'syz.2.10196': attribute type 16 has an invalid length. [ 502.867915][T30707] netlink: 'syz.2.10196': attribute type 17 has an invalid length. [ 502.943482][T30707] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 503.183602][T30723] FAULT_INJECTION: forcing a failure. [ 503.183602][T30723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 503.196902][T30723] CPU: 1 UID: 0 PID: 30723 Comm: syz.1.10200 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 503.196936][T30723] Tainted: [W]=WARN [ 503.196942][T30723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 503.196954][T30723] Call Trace: [ 503.197013][T30723] [ 503.197019][T30723] __dump_stack+0x1d/0x30 [ 503.197041][T30723] dump_stack_lvl+0xe8/0x140 [ 503.197060][T30723] dump_stack+0x15/0x1b [ 503.197081][T30723] should_fail_ex+0x265/0x280 [ 503.197101][T30723] should_fail+0xb/0x20 [ 503.197146][T30723] should_fail_usercopy+0x1a/0x20 [ 503.197167][T30723] _copy_from_user+0x1c/0xb0 [ 503.197192][T30723] __sys_bpf+0x178/0x7b0 [ 503.197257][T30723] __x64_sys_bpf+0x41/0x50 [ 503.197335][T30723] x64_sys_call+0x2aea/0x2ff0 [ 503.197353][T30723] do_syscall_64+0xd2/0x200 [ 503.197382][T30723] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 503.197469][T30723] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 503.197498][T30723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 503.197516][T30723] RIP: 0033:0x7f47388deec9 [ 503.197532][T30723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 503.197548][T30723] RSP: 002b:00007f4737347038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 503.197569][T30723] RAX: ffffffffffffffda RBX: 00007f4738b35fa0 RCX: 00007f47388deec9 [ 503.197639][T30723] RDX: 000000000000003c RSI: 00002000000003c0 RDI: 000000000000001c [ 503.197651][T30723] RBP: 00007f4737347090 R08: 0000000000000000 R09: 0000000000000000 [ 503.197662][T30723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 503.197673][T30723] R13: 00007f4738b36038 R14: 00007f4738b35fa0 R15: 00007ffc8c296188 [ 503.197689][T30723] [ 503.527277][T30738] netlink: 'syz.1.10206': attribute type 16 has an invalid length. [ 503.535496][T30738] netlink: 'syz.1.10206': attribute type 17 has an invalid length. [ 503.565520][T30738] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 503.631439][T30742] ipvlan2: entered promiscuous mode [ 503.638401][T30742] bridge0: port 3(ipvlan2) entered blocking state [ 503.644970][T30742] bridge0: port 3(ipvlan2) entered disabled state [ 503.651686][T30742] ipvlan2: entered allmulticast mode [ 503.657031][T30742] bridge0: entered allmulticast mode [ 503.662549][T30742] ipvlan2: left allmulticast mode [ 503.667580][T30742] bridge0: left allmulticast mode [ 503.678382][T30748] IPv4: Oversized IP packet from 127.202.26.0 [ 503.678659][T30749] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 503.692890][T30749] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 503.851492][T30740] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 503.859990][T30740] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 504.411512][T30791] netlink: 'syz.2.10215': attribute type 16 has an invalid length. [ 504.419565][T30791] netlink: 'syz.2.10215': attribute type 17 has an invalid length. [ 504.463915][T30791] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 504.687734][T30809] __nla_validate_parse: 2 callbacks suppressed [ 504.687750][T30809] netlink: 100 bytes leftover after parsing attributes in process `syz.2.10222'. [ 504.762104][T30814] netlink: 'syz.2.10224': attribute type 16 has an invalid length. [ 504.771188][T30814] netlink: 'syz.2.10224': attribute type 17 has an invalid length. [ 504.863011][T30814] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 505.114599][T30827] netlink: 'syz.2.10229': attribute type 16 has an invalid length. [ 505.122600][T30827] netlink: 'syz.2.10229': attribute type 17 has an invalid length. [ 505.139704][T30827] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 505.368612][T30832] 9pnet: Could not find request transport: fd0x0000000000000004 [ 505.483197][T30839] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 505.628341][T30852] IPv6: NLM_F_CREATE should be specified when creating new route [ 505.811325][T30863] 9pnet: Could not find request transport: fd0x0000000000000004 [ 505.894487][T30743] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 505.969775][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 505.969788][ T29] audit: type=1326 audit(1758763771.893:17455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 505.969820][ T29] audit: type=1326 audit(1758763771.893:17456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.018845][ T29] audit: type=1326 audit(1758763771.935:17457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.049636][ T29] audit: type=1326 audit(1758763771.935:17458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.049719][ T29] audit: type=1326 audit(1758763771.935:17459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.049863][ T29] audit: type=1326 audit(1758763771.935:17460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.071015][ T29] audit: type=1326 audit(1758763771.956:17461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.145714][ T29] audit: type=1326 audit(1758763771.956:17462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.145744][ T29] audit: type=1326 audit(1758763771.956:17463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.145772][ T29] audit: type=1326 audit(1758763771.967:17464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30865 comm="syz.1.10245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f47388deec9 code=0x7ffc0000 [ 506.205750][ T2226] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 506.268937][ T2226] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 506.355734][ T2226] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 506.395179][T30978] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=30978 comm=syz.3.10250 [ 506.421511][ T2226] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 506.456262][T30869] chnl_net:caif_netlink_parms(): no params data found [ 506.564841][T31030] netlink: 256 bytes leftover after parsing attributes in process `syz.2.10255'. [ 506.610294][T30869] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.617835][T30869] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.626983][T30869] bridge_slave_0: entered allmulticast mode [ 506.644721][T30869] bridge_slave_0: entered promiscuous mode [ 506.652032][ T2226] bridge_slave_1: left allmulticast mode [ 506.657945][ T2226] bridge_slave_1: left promiscuous mode [ 506.664542][ T2226] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.688572][ T2226] bridge_slave_0: left allmulticast mode [ 506.694508][ T2226] bridge_slave_0: left promiscuous mode [ 506.700213][ T2226] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.734440][T31090] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 506.758177][T31091] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31091 comm=syz.0.10263 [ 506.774736][ T2226] bond1 (unregistering): (slave ip6gretap1): Removing an active aggregator [ 506.784783][ T2226] bond1 (unregistering): (slave ip6gretap1): Releasing backup interface [ 506.840865][ T2226] bond1 (unregistering): Released all slaves [ 506.849660][ T2226] bond2 (unregistering): Released all slaves [ 506.858436][ T2226] bond0 (unregistering): Released all slaves [ 506.866519][T30869] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.873584][T30869] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.880744][T30869] bridge_slave_1: entered allmulticast mode [ 506.888025][T30869] bridge_slave_1: entered promiscuous mode [ 506.905285][ T2226] tipc: Disabling bearer [ 506.910536][ T2226] tipc: Left network mode [ 506.923857][T30869] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 506.934895][ T2226] hsr_slave_0: left promiscuous mode [ 506.940993][ T2226] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 506.948381][ T2226] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 506.956352][ T2226] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 506.964007][ T2226] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 506.974331][ T2226] veth1_macvtap: left promiscuous mode [ 506.980074][ T2226] veth0_macvtap: left promiscuous mode [ 506.985654][ T2226] veth1_vlan: left promiscuous mode [ 506.992555][ T2226] veth0_vlan: left promiscuous mode [ 507.056418][ T2226] team0 (unregistering): Port device team_slave_1 removed [ 507.066204][ T2226] team0 (unregistering): Port device team_slave_0 removed [ 507.102804][T30869] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 507.132706][T30869] team0: Port device team_slave_0 added [ 507.139786][T30869] team0: Port device team_slave_1 added [ 507.164698][T30869] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 507.171903][T30869] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 507.197971][T30869] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 507.214616][T30869] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 507.222066][T30869] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 507.248480][T30869] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 507.295635][T30869] hsr_slave_0: entered promiscuous mode [ 507.310330][T30869] hsr_slave_1: entered promiscuous mode [ 507.319336][T30869] debugfs: 'hsr0' already exists in 'hsr' [ 507.325289][T30869] Cannot create hsr debugfs directory [ 507.338444][T31194] ipvlan2: entered promiscuous mode [ 507.345507][T31194] bridge0: port 3(ipvlan2) entered blocking state [ 507.352081][T31194] bridge0: port 3(ipvlan2) entered disabled state [ 507.362395][T31194] ipvlan2: entered allmulticast mode [ 507.367767][T31194] bridge0: entered allmulticast mode [ 507.375628][T31219] FAULT_INJECTION: forcing a failure. [ 507.375628][T31219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 507.377239][T31221] IPv4: Oversized IP packet from 127.202.26.0 [ 507.388718][T31219] CPU: 1 UID: 0 PID: 31219 Comm: syz.3.10273 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 507.388748][T31219] Tainted: [W]=WARN [ 507.388754][T31219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 507.388764][T31219] Call Trace: [ 507.388771][T31219] [ 507.388779][T31219] __dump_stack+0x1d/0x30 [ 507.388800][T31219] dump_stack_lvl+0xe8/0x140 [ 507.388889][T31219] dump_stack+0x15/0x1b [ 507.388905][T31219] should_fail_ex+0x265/0x280 [ 507.388930][T31219] should_fail+0xb/0x20 [ 507.388963][T31219] should_fail_usercopy+0x1a/0x20 [ 507.388987][T31219] _copy_from_user+0x1c/0xb0 [ 507.389017][T31219] l2cap_sock_setsockopt+0x95a/0x11d0 [ 507.389108][T31219] ? __pfx_l2cap_sock_setsockopt+0x10/0x10 [ 507.389130][T31219] __sys_setsockopt+0x181/0x200 [ 507.389222][T31219] __x64_sys_setsockopt+0x64/0x80 [ 507.389309][T31219] x64_sys_call+0x20ec/0x2ff0 [ 507.389351][T31219] do_syscall_64+0xd2/0x200 [ 507.389381][T31219] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 507.389416][T31219] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 507.389444][T31219] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 507.389465][T31219] RIP: 0033:0x7f49a744eec9 [ 507.389480][T31219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 507.389497][T31219] RSP: 002b:00007f49a5eaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 507.389565][T31219] RAX: ffffffffffffffda RBX: 00007f49a76a5fa0 RCX: 00007f49a744eec9 [ 507.389577][T31219] RDX: 000000000000000a RSI: 0000000000000112 RDI: 0000000000000004 [ 507.389590][T31219] RBP: 00007f49a5eaf090 R08: 0000000000000004 R09: 0000000000000000 [ 507.389703][T31219] R10: 0000200000000340 R11: 0000000000000246 R12: 0000000000000001 [ 507.389716][T31219] R13: 00007f49a76a6038 R14: 00007f49a76a5fa0 R15: 00007ffe2bcad8d8 [ 507.389735][T31219] [ 507.391992][T31194] ipvlan2: left allmulticast mode [ 507.587930][T31194] bridge0: left allmulticast mode [ 507.667475][T31223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31223 comm=syz.0.10274 [ 507.706918][T31277] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 507.798082][T31314] validate_nla: 2 callbacks suppressed [ 507.798093][T31314] netlink: 'syz.1.10285': attribute type 16 has an invalid length. [ 507.811493][T31314] netlink: 'syz.1.10285': attribute type 17 has an invalid length. [ 507.827717][T31314] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 507.874869][T31318] x_tables: ip6_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 16 [ 508.034189][T31334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31334 comm=syz.1.10290 [ 508.045768][T30869] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 508.057150][T30869] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 508.067434][T30869] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 508.077540][T30869] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 508.119496][T30869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 508.135162][T30869] 8021q: adding VLAN 0 to HW filter on device team0 [ 508.148010][T29350] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.155169][T29350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.168483][ T2226] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.175644][ T2226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.226756][T31358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31358 comm=syz.1.10293 [ 508.335644][T31368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31368 comm=syz.2.10297 [ 508.339407][T30869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 508.426389][T31377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31377 comm=syz.1.10300 [ 508.514871][T31381] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10301'. [ 508.552235][T31419] netlink: 'syz.2.10303': attribute type 1 has an invalid length. [ 508.552774][T31422] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 508.591712][T31425] FAULT_INJECTION: forcing a failure. [ 508.591712][T31425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 508.604847][T31425] CPU: 0 UID: 0 PID: 31425 Comm: syz.1.10307 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 508.604879][T31425] Tainted: [W]=WARN [ 508.604886][T31425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 508.604949][T31425] Call Trace: [ 508.604955][T31425] [ 508.604961][T31425] __dump_stack+0x1d/0x30 [ 508.604980][T31425] dump_stack_lvl+0xe8/0x140 [ 508.604996][T31425] dump_stack+0x15/0x1b [ 508.605010][T31425] should_fail_ex+0x265/0x280 [ 508.605067][T31425] should_fail+0xb/0x20 [ 508.605089][T31425] should_fail_usercopy+0x1a/0x20 [ 508.605114][T31425] _copy_from_user+0x1c/0xb0 [ 508.605143][T31425] ___sys_sendmsg+0xc1/0x1d0 [ 508.605243][T31425] __x64_sys_sendmsg+0xd4/0x160 [ 508.605273][T31425] x64_sys_call+0x191e/0x2ff0 [ 508.605354][T31425] do_syscall_64+0xd2/0x200 [ 508.605380][T31425] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 508.605401][T31425] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 508.605429][T31425] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 508.605524][T31425] RIP: 0033:0x7f47388deec9 [ 508.605538][T31425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 508.605553][T31425] RSP: 002b:00007f4737347038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 508.605627][T31425] RAX: ffffffffffffffda RBX: 00007f4738b35fa0 RCX: 00007f47388deec9 [ 508.605638][T31425] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 508.605650][T31425] RBP: 00007f4737347090 R08: 0000000000000000 R09: 0000000000000000 [ 508.605667][T31425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 508.605677][T31425] R13: 00007f4738b36038 R14: 00007f4738b35fa0 R15: 00007ffc8c296188 [ 508.605693][T31425] [ 508.782971][T31399] erspan0: entered allmulticast mode [ 508.839179][T30869] veth0_vlan: entered promiscuous mode [ 508.884780][T30869] veth1_vlan: entered promiscuous mode [ 508.890850][T31434] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 508.928585][T30869] veth0_macvtap: entered promiscuous mode [ 508.947631][T30869] veth1_macvtap: entered promiscuous mode [ 508.965535][T30869] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 508.981429][T30869] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 508.996491][T29378] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.014384][T29378] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.025507][T31438] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31438 comm=syz.1.10311 [ 509.042114][T29378] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.062697][T29378] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.153080][T31449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31449 comm=syz.5.10314 [ 509.429912][T31479] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10317'. [ 509.543534][T31492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31492 comm=syz.0.10321 [ 509.655564][T31502] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 509.756574][T31526] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 510.232268][T31543] netlink: 'syz.3.10335': attribute type 16 has an invalid length. [ 510.240267][T31543] netlink: 'syz.3.10335': attribute type 17 has an invalid length. [ 510.306067][T31543] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 510.496838][T31555] netlink: 16 bytes leftover after parsing attributes in process `syz.2.10338'. [ 510.505934][T31555] netlink: 16 bytes leftover after parsing attributes in process `syz.2.10338'. [ 510.674721][T31568] loop5: detected capacity change from 0 to 128 [ 510.688008][T31570] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 510.701016][T31568] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 510.715329][T31568] ext4 filesystem being mounted at /4/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 510.764313][T30869] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 510.797517][ T29] kauditd_printk_skb: 412 callbacks suppressed [ 510.797577][ T29] audit: type=1326 audit(1758763776.965:17877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.840505][ T29] audit: type=1326 audit(1758763776.996:17878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.860868][T31588] netlink: 256 bytes leftover after parsing attributes in process `syz.5.10350'. [ 510.864308][ T29] audit: type=1326 audit(1758763776.996:17879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.897776][ T29] audit: type=1326 audit(1758763776.996:17880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.921729][ T29] audit: type=1326 audit(1758763776.996:17881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.945436][ T29] audit: type=1326 audit(1758763776.996:17882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.969287][ T29] audit: type=1326 audit(1758763776.996:17883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 510.992967][ T29] audit: type=1326 audit(1758763776.996:17884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 511.016596][ T29] audit: type=1326 audit(1758763776.996:17885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 511.040284][ T29] audit: type=1326 audit(1758763776.996:17886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31583 comm="syz.5.10348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f55c01feec9 code=0x7ffc0000 [ 511.305049][T31620] ipvlan2: entered promiscuous mode [ 511.314524][T31620] bridge0: port 3(ipvlan2) entered blocking state [ 511.321005][T31620] bridge0: port 3(ipvlan2) entered disabled state [ 511.330125][T31620] ipvlan2: entered allmulticast mode [ 511.335648][T31620] bridge0: entered allmulticast mode [ 511.343474][T31620] ipvlan2: left allmulticast mode [ 511.348517][T31620] bridge0: left allmulticast mode [ 511.397164][T31640] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 511.420289][T31642] netlink: 'syz.2.10369': attribute type 16 has an invalid length. [ 511.435899][T31642] netlink: 'syz.2.10369': attribute type 17 has an invalid length. [ 511.472186][T31642] erspan0: left allmulticast mode [ 511.480121][T31648] x_tables: ip6_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 16 [ 511.546910][T31642] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 511.643936][T31656] selinux_netlink_send: 1 callbacks suppressed [ 511.643988][T31656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=31656 comm=syz.1.10376 [ 511.678332][T31662] ipvlan2: entered promiscuous mode [ 511.686228][T31662] bridge0: port 3(ipvlan2) entered blocking state [ 511.692789][T31662] bridge0: port 3(ipvlan2) entered disabled state [ 511.699544][T31662] ipvlan2: entered allmulticast mode [ 511.705082][T31662] bridge0: entered allmulticast mode [ 511.711925][T31662] ipvlan2: left allmulticast mode [ 511.716956][T31662] bridge0: left allmulticast mode [ 511.761971][T31680] x_tables: ip6_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 16 [ 511.771307][T31682] vhci_hcd: invalid port number 253 [ 511.777475][T31682] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 511.819071][T31686] netlink: 256 bytes leftover after parsing attributes in process `syz.1.10388'. [ 511.872219][T31700] smc: net device bond0 applied user defined pnetid SYZ0 [ 511.885509][T31700] smc: net device bond0 erased user defined pnetid SYZ0 [ 511.895017][T31706] FAULT_INJECTION: forcing a failure. [ 511.895017][T31706] name failslab, interval 1, probability 0, space 0, times 0 [ 511.907834][T31706] CPU: 1 UID: 0 PID: 31706 Comm: syz.1.10395 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 511.907925][T31706] Tainted: [W]=WARN [ 511.907931][T31706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 511.907942][T31706] Call Trace: [ 511.907947][T31706] [ 511.907953][T31706] __dump_stack+0x1d/0x30 [ 511.907970][T31706] dump_stack_lvl+0xe8/0x140 [ 511.907987][T31706] dump_stack+0x15/0x1b [ 511.908077][T31706] should_fail_ex+0x265/0x280 [ 511.908098][T31706] should_failslab+0x8c/0xb0 [ 511.908118][T31706] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 511.908226][T31706] ? sidtab_sid2str_get+0xa0/0x130 [ 511.908247][T31706] kmemdup_noprof+0x2b/0x70 [ 511.908308][T31706] sidtab_sid2str_get+0xa0/0x130 [ 511.908381][T31706] security_sid_to_context_core+0x1eb/0x2e0 [ 511.908401][T31706] security_sid_to_context+0x27/0x40 [ 511.908470][T31706] selinux_lsmprop_to_secctx+0x67/0xf0 [ 511.908489][T31706] security_lsmprop_to_secctx+0x43/0x80 [ 511.908579][T31706] audit_log_task_context+0x77/0x190 [ 511.908606][T31706] audit_log_task+0xf4/0x250 [ 511.908630][T31706] audit_seccomp+0x61/0x100 [ 511.908714][T31706] ? __seccomp_filter+0x68c/0x10d0 [ 511.908732][T31706] __seccomp_filter+0x69d/0x10d0 [ 511.908750][T31706] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 511.908832][T31706] ? vfs_write+0x7e8/0x960 [ 511.908884][T31706] ? __rcu_read_unlock+0x4f/0x70 [ 511.908902][T31706] ? __fget_files+0x184/0x1c0 [ 511.908924][T31706] __secure_computing+0x82/0x150 [ 511.908942][T31706] syscall_trace_enter+0xcf/0x1e0 [ 511.909000][T31706] do_syscall_64+0xac/0x200 [ 511.909027][T31706] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 511.909046][T31706] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 511.909106][T31706] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 511.909124][T31706] RIP: 0033:0x7f47388deec9 [ 511.909143][T31706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 511.909157][T31706] RSP: 002b:00007f4737347038 EFLAGS: 00000246 ORIG_RAX: 0000000000000098 [ 511.909173][T31706] RAX: ffffffffffffffda RBX: 00007f4738b35fa0 RCX: 00007f47388deec9 [ 511.909185][T31706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 511.909230][T31706] RBP: 00007f4737347090 R08: 0000000000000000 R09: 0000000000000000 [ 511.909240][T31706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 511.909251][T31706] R13: 00007f4738b36038 R14: 00007f4738b35fa0 R15: 00007ffc8c296188 [ 511.909267][T31706] [ 512.205940][T31712] x_tables: ip6_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 16 [ 512.327531][T31728] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 512.344883][T31729] ipvlan2: entered promiscuous mode [ 512.351455][T31729] bridge0: port 3(ipvlan2) entered blocking state [ 512.357873][T31729] bridge0: port 3(ipvlan2) entered disabled state [ 512.365941][T31729] ipvlan2: entered allmulticast mode [ 512.371470][T31729] bridge0: entered allmulticast mode [ 512.381801][T31729] ipvlan2: left allmulticast mode [ 512.386894][T31729] bridge0: left allmulticast mode [ 512.547617][T31738] netlink: 'syz.2.10407': attribute type 16 has an invalid length. [ 512.557483][T31738] netlink: 'syz.2.10407': attribute type 17 has an invalid length. [ 512.632771][T31738] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 512.716771][T31740] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10408'. [ 512.734335][T31740] FAULT_INJECTION: forcing a failure. [ 512.734335][T31740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.747594][T31740] CPU: 1 UID: 0 PID: 31740 Comm: syz.2.10408 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 512.747659][T31740] Tainted: [W]=WARN [ 512.747666][T31740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 512.747679][T31740] Call Trace: [ 512.747685][T31740] [ 512.747693][T31740] __dump_stack+0x1d/0x30 [ 512.747729][T31740] dump_stack_lvl+0xe8/0x140 [ 512.747746][T31740] dump_stack+0x15/0x1b [ 512.747760][T31740] should_fail_ex+0x265/0x280 [ 512.747840][T31740] should_fail+0xb/0x20 [ 512.747857][T31740] should_fail_usercopy+0x1a/0x20 [ 512.747908][T31740] _copy_from_user+0x1c/0xb0 [ 512.747939][T31740] ___sys_sendmsg+0xc1/0x1d0 [ 512.747978][T31740] __x64_sys_sendmsg+0xd4/0x160 [ 512.748014][T31740] x64_sys_call+0x191e/0x2ff0 [ 512.748035][T31740] do_syscall_64+0xd2/0x200 [ 512.748138][T31740] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 512.748181][T31740] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 512.748209][T31740] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 512.748230][T31740] RIP: 0033:0x7fac4094eec9 [ 512.748247][T31740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.748263][T31740] RSP: 002b:00007fac3f3af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 512.748316][T31740] RAX: ffffffffffffffda RBX: 00007fac40ba5fa0 RCX: 00007fac4094eec9 [ 512.748329][T31740] RDX: 0000000000000010 RSI: 0000200000000280 RDI: 0000000000000003 [ 512.748420][T31740] RBP: 00007fac3f3af090 R08: 0000000000000000 R09: 0000000000000000 [ 512.748434][T31740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.748447][T31740] R13: 00007fac40ba6038 R14: 00007fac40ba5fa0 R15: 00007ffea9c9d9f8 [ 512.748468][T31740] [ 512.984316][T31746] netlink: 'syz.3.10409': attribute type 16 has an invalid length. [ 512.992575][T31746] netlink: 'syz.3.10409': attribute type 17 has an invalid length. [ 513.034840][T31746] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 513.058910][T31758] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10411'. [ 513.107545][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10411'. [ 513.121732][T31760] x_tables: ip6_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 16 [ 513.828647][T31808] netlink: 'syz.2.10429': attribute type 16 has an invalid length. [ 513.836752][T31808] netlink: 'syz.2.10429': attribute type 17 has an invalid length. [ 513.846653][T31812] x_tables: ip6_tables: AUDIT.0 target: invalid size 8 (kernel) != (user) 16 [ 513.859709][T31808] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 513.905071][T31816] ipvlan2: entered promiscuous mode [ 513.915863][T31816] bridge0: port 3(ipvlan2) entered blocking state [ 513.922665][T31816] bridge0: port 3(ipvlan2) entered disabled state [ 513.929203][T31816] ipvlan2: entered allmulticast mode [ 513.934728][T31816] bridge0: entered allmulticast mode [ 513.941163][T31816] ipvlan2: left allmulticast mode [ 513.946208][T31816] bridge0: left allmulticast mode [ 513.953741][T31822] netlink: 256 bytes leftover after parsing attributes in process `syz.2.10434'. [ 514.048583][T31839] netlink: 256 bytes leftover after parsing attributes in process `syz.0.10437'. [ 514.258390][T31867] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10446'. [ 514.885587][T31922] FAULT_INJECTION: forcing a failure. [ 514.885587][T31922] name failslab, interval 1, probability 0, space 0, times 0 [ 514.898310][T31922] CPU: 1 UID: 0 PID: 31922 Comm: syz.5.10467 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 514.898344][T31922] Tainted: [W]=WARN [ 514.898352][T31922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 514.898364][T31922] Call Trace: [ 514.898370][T31922] [ 514.898378][T31922] __dump_stack+0x1d/0x30 [ 514.898400][T31922] dump_stack_lvl+0xe8/0x140 [ 514.898421][T31922] dump_stack+0x15/0x1b [ 514.898441][T31922] should_fail_ex+0x265/0x280 [ 514.898463][T31922] should_failslab+0x8c/0xb0 [ 514.898484][T31922] kmem_cache_alloc_noprof+0x50/0x310 [ 514.898507][T31922] ? getname_flags+0x80/0x3b0 [ 514.898582][T31922] getname_flags+0x80/0x3b0 [ 514.898610][T31922] user_path_at+0x28/0x130 [ 514.898641][T31922] do_utimes+0xd9/0x210 [ 514.898661][T31922] __x64_sys_utimensat+0xc4/0x170 [ 514.898745][T31922] ? ksys_write+0x192/0x1a0 [ 514.898784][T31922] x64_sys_call+0x2fba/0x2ff0 [ 514.898805][T31922] do_syscall_64+0xd2/0x200 [ 514.898862][T31922] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 514.898884][T31922] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 514.898908][T31922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 514.898926][T31922] RIP: 0033:0x7f55c01feec9 [ 514.898980][T31922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 514.898994][T31922] RSP: 002b:00007f55bec67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000118 [ 514.899049][T31922] RAX: ffffffffffffffda RBX: 00007f55c0455fa0 RCX: 00007f55c01feec9 [ 514.899060][T31922] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: ffffffffffffffff [ 514.899071][T31922] RBP: 00007f55bec67090 R08: 0000000000000000 R09: 0000000000000000 [ 514.899082][T31922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 514.899097][T31922] R13: 00007f55c0456038 R14: 00007f55c0455fa0 R15: 00007ffcd1796778 [ 514.899119][T31922] [ 515.241053][T31934] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 515.344119][T31949] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 515.419791][T31955] netlink: 'syz.1.10480': attribute type 16 has an invalid length. [ 515.431007][T31957] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10481'. [ 515.576246][ T29] kauditd_printk_skb: 538 callbacks suppressed [ 515.576260][ T29] audit: type=1326 audit(1758763781.983:18424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31960 comm="syz.3.10483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.615507][T31976] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10488'. [ 515.626019][T31976] bridge_slave_1: left allmulticast mode [ 515.631662][T31976] bridge_slave_1: left promiscuous mode [ 515.637478][T31976] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.647829][T31976] bridge_slave_0: left allmulticast mode [ 515.648035][T31979] program syz.3.10489 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 515.653509][T31976] bridge_slave_0: left promiscuous mode [ 515.668536][T31976] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.712138][ T29] audit: type=1326 audit(1758763782.120:18425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.738121][ T29] audit: type=1326 audit(1758763782.130:18426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.761869][ T29] audit: type=1326 audit(1758763782.130:18427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.785573][ T29] audit: type=1326 audit(1758763782.130:18428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.809330][ T29] audit: type=1326 audit(1758763782.130:18429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.833248][ T29] audit: type=1326 audit(1758763782.130:18430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.857141][ T29] audit: type=1326 audit(1758763782.130:18431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.880888][ T29] audit: type=1326 audit(1758763782.130:18432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.904548][ T29] audit: type=1326 audit(1758763782.130:18433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31984 comm="syz.3.10491" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f49a744eec9 code=0x7ffc0000 [ 515.947573][T31991] ipvlan2: entered promiscuous mode [ 515.954985][T31991] bridge0: port 3(ipvlan2) entered blocking state [ 515.961991][T31991] bridge0: port 3(ipvlan2) entered disabled state [ 515.973935][T31991] ipvlan2: entered allmulticast mode [ 515.979566][T31991] bridge0: entered allmulticast mode [ 515.987005][T31991] ipvlan2: left allmulticast mode [ 515.992063][T31991] bridge0: left allmulticast mode [ 516.001731][T32004] IPv4: Oversized IP packet from 127.202.26.0 [ 516.012427][T32002] netlink: 40 bytes leftover after parsing attributes in process `syz.5.10497'. [ 516.112496][T32017] ipvlan2: entered promiscuous mode [ 516.119124][T32017] bridge0: port 3(ipvlan2) entered blocking state [ 516.126040][T32017] bridge0: port 3(ipvlan2) entered disabled state [ 516.152064][T32029] IPv4: Oversized IP packet from 127.202.26.0 [ 516.165684][T32017] ipvlan2: entered allmulticast mode [ 516.171170][T32017] bridge0: entered allmulticast mode [ 516.174018][T32033] netlink: 256 bytes leftover after parsing attributes in process `syz.0.10508'. [ 516.186361][T32017] ipvlan2: left allmulticast mode [ 516.191517][T32017] bridge0: left allmulticast mode [ 516.268761][T32049] netlink: 40 bytes leftover after parsing attributes in process `syz.0.10512'. [ 516.474571][T32074] IPv6: NLM_F_CREATE should be specified when creating new route [ 516.520753][T32076] netlink: 256 bytes leftover after parsing attributes in process `syz.0.10525'. [ 516.708041][T32093] netlink: 'syz.0.10530': attribute type 16 has an invalid length. [ 516.732816][T32093] netlink: 'syz.0.10530': attribute type 17 has an invalid length. [ 516.824460][T32105] FAULT_INJECTION: forcing a failure. [ 516.824460][T32105] name failslab, interval 1, probability 0, space 0, times 0 [ 516.837345][T32105] CPU: 1 UID: 0 PID: 32105 Comm: syz.2.10537 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 516.837379][T32105] Tainted: [W]=WARN [ 516.837385][T32105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 516.837397][T32105] Call Trace: [ 516.837403][T32105] [ 516.837411][T32105] __dump_stack+0x1d/0x30 [ 516.837433][T32105] dump_stack_lvl+0xe8/0x140 [ 516.837494][T32105] dump_stack+0x15/0x1b [ 516.837541][T32105] should_fail_ex+0x265/0x280 [ 516.837561][T32105] should_failslab+0x8c/0xb0 [ 516.837582][T32105] __kmalloc_noprof+0xa5/0x3e0 [ 516.837629][T32105] ? bio_kmalloc+0x41/0x50 [ 516.837725][T32105] bio_kmalloc+0x41/0x50 [ 516.837743][T32105] blk_rq_map_user_iov+0x58a/0x14a0 [ 516.837802][T32105] ? blk_mq_get_tag+0x4f9/0x570 [ 516.837899][T32105] ? iovec_from_user+0x179/0x210 [ 516.837929][T32105] ? import_iovec+0x61/0x80 [ 516.837962][T32105] blk_rq_map_user_io+0x20f/0x260 [ 516.838054][T32105] ? sg_link_reserve+0x117/0x140 [ 516.838072][T32105] sg_common_write+0xb06/0xc30 [ 516.838093][T32105] sg_new_write+0x7b6/0x890 [ 516.838118][T32105] ? do_vfs_ioctl+0x866/0xe10 [ 516.838190][T32105] sg_ioctl+0xb81/0x1360 [ 516.838211][T32105] ? __pfx_sg_ioctl+0x10/0x10 [ 516.838229][T32105] __se_sys_ioctl+0xce/0x140 [ 516.838249][T32105] __x64_sys_ioctl+0x43/0x50 [ 516.838274][T32105] x64_sys_call+0x1816/0x2ff0 [ 516.838292][T32105] do_syscall_64+0xd2/0x200 [ 516.838318][T32105] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 516.838338][T32105] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 516.838411][T32105] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.838433][T32105] RIP: 0033:0x7fac4094eec9 [ 516.838448][T32105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.838462][T32105] RSP: 002b:00007fac3f3af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 516.838478][T32105] RAX: ffffffffffffffda RBX: 00007fac40ba5fa0 RCX: 00007fac4094eec9 [ 516.838513][T32105] RDX: 0000200000000040 RSI: 0000000000002285 RDI: 0000000000000006 [ 516.838526][T32105] RBP: 00007fac3f3af090 R08: 0000000000000000 R09: 0000000000000000 [ 516.838580][T32105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 516.838590][T32105] R13: 00007fac40ba6038 R14: 00007fac40ba5fa0 R15: 00007ffea9c9d9f8 [ 516.838609][T32105] [ 517.088571][T32109] netlink: 256 bytes leftover after parsing attributes in process `syz.5.10538'. [ 517.114268][T32111] FAULT_INJECTION: forcing a failure. [ 517.114268][T32111] name failslab, interval 1, probability 0, space 0, times 0 [ 517.126932][T32111] CPU: 0 UID: 0 PID: 32111 Comm: syz.2.10539 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 517.126968][T32111] Tainted: [W]=WARN [ 517.126975][T32111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 517.126987][T32111] Call Trace: [ 517.126992][T32111] [ 517.126999][T32111] __dump_stack+0x1d/0x30 [ 517.127017][T32111] dump_stack_lvl+0xe8/0x140 [ 517.127058][T32111] dump_stack+0x15/0x1b [ 517.127072][T32111] should_fail_ex+0x265/0x280 [ 517.127092][T32111] should_failslab+0x8c/0xb0 [ 517.127137][T32111] kmem_cache_alloc_noprof+0x50/0x310 [ 517.127182][T32111] ? getname_kernel+0x3c/0x1f0 [ 517.127241][T32111] ? should_fail_ex+0xdb/0x280 [ 517.127309][T32111] getname_kernel+0x3c/0x1f0 [ 517.127337][T32111] kern_path+0x23/0x130 [ 517.127363][T32111] bpf_uprobe_multi_link_attach+0x231/0x910 [ 517.127401][T32111] ? __rcu_read_unlock+0x4f/0x70 [ 517.127462][T32111] ? __fget_files+0x184/0x1c0 [ 517.127484][T32111] link_create+0x680/0x6e0 [ 517.127515][T32111] __sys_bpf+0x61d/0x7b0 [ 517.127570][T32111] __x64_sys_bpf+0x41/0x50 [ 517.127664][T32111] x64_sys_call+0x2aea/0x2ff0 [ 517.127686][T32111] do_syscall_64+0xd2/0x200 [ 517.127786][T32111] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 517.127811][T32111] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 517.127837][T32111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.127932][T32111] RIP: 0033:0x7fac4094eec9 [ 517.127953][T32111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.127970][T32111] RSP: 002b:00007fac3f3af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 517.127988][T32111] RAX: ffffffffffffffda RBX: 00007fac40ba5fa0 RCX: 00007fac4094eec9 [ 517.128001][T32111] RDX: 0000000000000040 RSI: 00002000000003c0 RDI: 000000000000001c [ 517.128012][T32111] RBP: 00007fac3f3af090 R08: 0000000000000000 R09: 0000000000000000 [ 517.128024][T32111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.128209][T32111] R13: 00007fac40ba6038 R14: 00007fac40ba5fa0 R15: 00007ffea9c9d9f8 [ 517.128228][T32111] [ 517.168438][T32114] futex_wake_op: syz.3.10540 tries to shift op by 32; fix this program [ 517.373599][T32093] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 517.396134][T32119] netlink: 256 bytes leftover after parsing attributes in process `syz.2.10541'. [ 517.469386][T32129] 9pnet: Could not find request transport: fd0x0000000000000005 [ 517.601221][T32152] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10552'. [ 517.638135][T32184] futex_wake_op: syz.3.10553 tries to shift op by 32; fix this program [ 517.649179][T32152] 8021q: adding VLAN 0 to HW filter on device bond1 [ 517.661332][T32190] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10552'. [ 517.684786][T32190] bond1 (unregistering): Released all slaves [ 517.807065][T32257] loop5: detected capacity change from 0 to 764 [ 517.905700][T32262] block device autoloading is deprecated and will be removed. [ 518.670793][T32356] netlink: 'syz.0.10594': attribute type 16 has an invalid length. [ 518.685092][T32356] netlink: 'syz.0.10594': attribute type 17 has an invalid length. [ 518.767263][T32356] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 518.942616][T32379] loop5: detected capacity change from 0 to 128 [ 518.951901][T32379] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 518.965934][T32379] ext4 filesystem being mounted at /61/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 519.002639][T30869] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 519.050899][T32396] loop5: detected capacity change from 0 to 764 [ 519.182007][T32408] loop5: detected capacity change from 0 to 1024 [ 519.190816][T32408] EXT4-fs (loop5): couldn't mount as ext2 due to feature incompatibilities [ 519.243014][T32421] FAULT_INJECTION: forcing a failure. [ 519.243014][T32421] name failslab, interval 1, probability 0, space 0, times 0 [ 519.257054][T32421] CPU: 1 UID: 0 PID: 32421 Comm: syz.2.10609 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 519.257088][T32421] Tainted: [W]=WARN [ 519.257094][T32421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 519.257107][T32421] Call Trace: [ 519.257113][T32421] [ 519.257120][T32421] __dump_stack+0x1d/0x30 [ 519.257141][T32421] dump_stack_lvl+0xe8/0x140 [ 519.257191][T32421] dump_stack+0x15/0x1b [ 519.257261][T32421] should_fail_ex+0x265/0x280 [ 519.257286][T32421] should_failslab+0x8c/0xb0 [ 519.257311][T32421] kmem_cache_alloc_noprof+0x50/0x310 [ 519.257340][T32421] ? security_inode_alloc+0x37/0x100 [ 519.257475][T32421] security_inode_alloc+0x37/0x100 [ 519.257511][T32421] inode_init_always_gfp+0x4b7/0x500 [ 519.257534][T32421] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 519.257556][T32421] alloc_inode+0x58/0x170 [ 519.257599][T32421] new_inode+0x1d/0xe0 [ 519.257618][T32421] shmem_get_inode+0x244/0x750 [ 519.257637][T32421] __shmem_file_setup+0x113/0x210 [ 519.257677][T32421] shmem_file_setup+0x3b/0x50 [ 519.257694][T32421] __se_sys_memfd_create+0x2c3/0x590 [ 519.257715][T32421] __x64_sys_memfd_create+0x31/0x40 [ 519.257735][T32421] x64_sys_call+0x2abe/0x2ff0 [ 519.257788][T32421] do_syscall_64+0xd2/0x200 [ 519.257814][T32421] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 519.257906][T32421] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 519.257931][T32421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 519.257951][T32421] RIP: 0033:0x7fac4094eec9 [ 519.258012][T32421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 519.258029][T32421] RSP: 002b:00007fac3f3aed68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 519.258047][T32421] RAX: ffffffffffffffda RBX: 000000000000059d RCX: 00007fac4094eec9 [ 519.258059][T32421] RDX: 00007fac3f3aedec RSI: 0000000000000000 RDI: 00007fac409d2960 [ 519.258072][T32421] RBP: 0000200000000000 R08: 00007fac3f3aeb07 R09: 0000000000000000 [ 519.258118][T32421] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 519.258129][T32421] R13: 00007fac3f3aedec R14: 00007fac3f3aedf0 R15: 00007ffea9c9d9f8 [ 519.258147][T32421] [ 519.587262][T32440] loop1: detected capacity change from 0 to 128 [ 519.611569][T32440] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 519.628266][T32449] vhci_hcd: invalid port number 253 [ 519.633517][T32449] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 519.657550][T32440] ext4 filesystem being mounted at /311/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 519.682011][T27787] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 519.729403][T32459] netlink: 'syz.3.10625': attribute type 3 has an invalid length. [ 520.005656][T32479] FAULT_INJECTION: forcing a failure. [ 520.005656][T32479] name failslab, interval 1, probability 0, space 0, times 0 [ 520.018576][T32479] CPU: 1 UID: 0 PID: 32479 Comm: syz.3.10633 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 520.018639][T32479] Tainted: [W]=WARN [ 520.018646][T32479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 520.018660][T32479] Call Trace: [ 520.018666][T32479] [ 520.018701][T32479] __dump_stack+0x1d/0x30 [ 520.018721][T32479] dump_stack_lvl+0xe8/0x140 [ 520.018743][T32479] dump_stack+0x15/0x1b [ 520.018819][T32479] should_fail_ex+0x265/0x280 [ 520.018845][T32479] should_failslab+0x8c/0xb0 [ 520.018870][T32479] __kvmalloc_node_noprof+0x123/0x4e0 [ 520.018966][T32479] ? vmemdup_user+0x26/0xd0 [ 520.018993][T32479] ? should_fail_usercopy+0x1a/0x20 [ 520.019020][T32479] vmemdup_user+0x26/0xd0 [ 520.019043][T32479] path_setxattrat+0x1b6/0x310 [ 520.019204][T32479] __x64_sys_fsetxattr+0x6b/0x80 [ 520.019225][T32479] x64_sys_call+0x1ced/0x2ff0 [ 520.019246][T32479] do_syscall_64+0xd2/0x200 [ 520.019343][T32479] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 520.019401][T32479] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 520.019431][T32479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 520.019538][T32479] RIP: 0033:0x7f49a744eec9 [ 520.019553][T32479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 520.019567][T32479] RSP: 002b:00007f49a5eaf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 520.019584][T32479] RAX: ffffffffffffffda RBX: 00007f49a76a5fa0 RCX: 00007f49a744eec9 [ 520.019595][T32479] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000000000000004 [ 520.019653][T32479] RBP: 00007f49a5eaf090 R08: 0000000000000000 R09: 0000000000000000 [ 520.019666][T32479] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000001 [ 520.019684][T32479] R13: 00007f49a76a6038 R14: 00007f49a76a5fa0 R15: 00007ffe2bcad8d8 [ 520.019701][T32479] [ 520.250364][T32483] __nla_validate_parse: 8 callbacks suppressed [ 520.250377][T32483] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10623'. [ 520.301777][T32483] 8021q: adding VLAN 0 to HW filter on device bond1 [ 520.312607][T32525] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10623'. [ 520.331006][T32525] bond1 (unregistering): Released all slaves [ 520.389131][T32564] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10639'. [ 520.405075][T32564] 8021q: adding VLAN 0 to HW filter on device bond1 [ 520.467105][T32564] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=32564 comm=syz.3.10639 [ 520.480975][T32564] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10639'. [ 520.498077][T32564] bond1 (unregistering): Released all slaves [ 520.557998][ T29] kauditd_printk_skb: 562 callbacks suppressed [ 520.558012][ T29] audit: type=1400 audit(1758763787.212:18996): avc: denied { setopt } for pid=32599 comm="syz.2.10641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 520.590493][T32642] FAULT_INJECTION: forcing a failure. [ 520.590493][T32642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 520.604065][T32642] CPU: 0 UID: 0 PID: 32642 Comm: syz.0.10644 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 520.604123][T32642] Tainted: [W]=WARN [ 520.604131][T32642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 520.604144][T32642] Call Trace: [ 520.604150][T32642] [ 520.604156][T32642] __dump_stack+0x1d/0x30 [ 520.604252][T32642] dump_stack_lvl+0xe8/0x140 [ 520.604273][T32642] dump_stack+0x15/0x1b [ 520.604289][T32642] should_fail_ex+0x265/0x280 [ 520.604315][T32642] should_fail+0xb/0x20 [ 520.604375][T32642] should_fail_usercopy+0x1a/0x20 [ 520.604401][T32642] _copy_from_user+0x1c/0xb0 [ 520.604500][T32642] __sys_bpf+0x178/0x7b0 [ 520.604586][T32642] __x64_sys_bpf+0x41/0x50 [ 520.604606][T32642] x64_sys_call+0x2aea/0x2ff0 [ 520.604631][T32642] do_syscall_64+0xd2/0x200 [ 520.604657][T32642] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 520.604678][T32642] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 520.604773][T32642] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 520.604791][T32642] RIP: 0033:0x7fec6588eec9 [ 520.604804][T32642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 520.604889][T32642] RSP: 002b:00007fec642ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 520.604968][T32642] RAX: ffffffffffffffda RBX: 00007fec65ae5fa0 RCX: 00007fec6588eec9 [ 520.604982][T32642] RDX: 0000000000000020 RSI: 0000200000000a80 RDI: 0000000000000002 [ 520.604993][T32642] RBP: 00007fec642ef090 R08: 0000000000000000 R09: 0000000000000000 [ 520.605004][T32642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 520.605041][T32642] R13: 00007fec65ae6038 R14: 00007fec65ae5fa0 R15: 00007fffcdca5448 [ 520.605115][T32642] [ 520.894658][ T29] audit: type=1326 audit(1758763787.569:18997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 520.940974][T32667] ipvlan2: entered promiscuous mode [ 520.961983][T32667] bridge0: port 3(ipvlan2) entered blocking state [ 520.968462][T32667] bridge0: port 3(ipvlan2) entered disabled state [ 520.990450][ T29] audit: type=1326 audit(1758763787.590:18998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=316 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.002783][T32684] vhci_hcd: invalid port number 253 [ 521.014260][ T29] audit: type=1326 audit(1758763787.590:18999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.019367][T32684] vhci_hcd: default hub control req: 4016 v0303 i00fd l0 [ 521.050287][ T29] audit: type=1326 audit(1758763787.590:19000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.074060][ T29] audit: type=1326 audit(1758763787.600:19001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.097727][ T29] audit: type=1326 audit(1758763787.600:19002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.102729][T32667] ipvlan2: entered allmulticast mode [ 521.121527][ T29] audit: type=1326 audit(1758763787.600:19003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.126876][T32667] bridge0: entered allmulticast mode [ 521.150458][ T29] audit: type=1326 audit(1758763787.600:19004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.179392][ T29] audit: type=1326 audit(1758763787.600:19005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32666 comm="syz.0.10646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec6588eec9 code=0x7ffc0000 [ 521.205426][T32667] ipvlan2: left allmulticast mode [ 521.210595][T32667] bridge0: left allmulticast mode [ 521.426094][T32700] ipvlan2: entered promiscuous mode [ 521.440259][T32700] bridge0: port 3(ipvlan2) entered blocking state [ 521.446991][T32700] bridge0: port 3(ipvlan2) entered disabled state [ 521.454586][T32700] ipvlan2: entered allmulticast mode [ 521.459958][T32700] bridge0: entered allmulticast mode [ 521.469706][T32712] futex_wake_op: syz.3.10660 tries to shift op by 32; fix this program [ 521.479003][T32700] ipvlan2: left allmulticast mode [ 521.484276][T32700] bridge0: left allmulticast mode [ 521.530153][T32716] random: crng reseeded on system resumption [ 521.642951][T32723] ipvlan2: entered promiscuous mode [ 521.650560][T32723] bridge0: port 3(ipvlan2) entered blocking state [ 521.657813][T32723] bridge0: port 3(ipvlan2) entered disabled state [ 521.665059][T32723] ipvlan2: entered allmulticast mode [ 521.671269][T32723] bridge0: entered allmulticast mode [ 521.679341][T32723] ipvlan2: left allmulticast mode [ 521.684816][T32723] bridge0: left allmulticast mode [ 521.692109][T32734] IPv4: Oversized IP packet from 127.202.26.0 [ 521.704325][T32733] netlink: 256 bytes leftover after parsing attributes in process `syz.0.10668'. [ 521.758072][T32744] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10669'. [ 521.791216][T32744] tmpfs: Unknown parameter 'mpo' [ 521.839565][T32757] loop5: detected capacity change from 0 to 512 [ 521.847468][T32755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=32755 comm=syz.0.10674 [ 521.867736][T32757] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 521.878920][T32757] EXT4-fs (loop5): 1 truncate cleaned up [ 521.885693][T32757] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 521.966413][T30869] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 522.424239][ T320] loop1: detected capacity change from 0 to 512 [ 522.431220][ T320] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 522.443431][ T320] EXT4-fs (loop1): 1 truncate cleaned up [ 522.450068][ T320] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 522.545654][ T330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2825 sclass=netlink_route_socket pid=330 comm=syz.3.10688 [ 522.564236][ T333] loop5: detected capacity change from 0 to 764 [ 522.570710][ T320] ================================================================== [ 522.578801][ T320] BUG: KCSAN: data-race in xas_find_marked / xas_set_mark [ 522.585940][ T320] [ 522.588257][ T320] write to 0xffff88811a828b3c of 4 bytes by task 331 on cpu 1: [ 522.595788][ T320] xas_set_mark+0x12b/0x140 [ 522.600295][ T320] __folio_start_writeback+0x1dd/0x440 [ 522.605761][ T320] ext4_bio_write_folio+0x5ad/0x9f0 [ 522.610966][ T320] mpage_process_page_bufs+0x4a1/0x620 [ 522.616425][ T320] mpage_prepare_extent_to_map+0x786/0xc00 [ 522.622230][ T320] ext4_do_writepages+0xa05/0x2750 [ 522.627358][ T320] ext4_writepages+0x176/0x300 [ 522.632121][ T320] do_writepages+0x1c3/0x310 [ 522.636713][ T320] filemap_write_and_wait_range+0x144/0x340 [ 522.642615][ T320] filemap_invalidate_pages+0xa4/0x1a0 [ 522.648083][ T320] kiocb_invalidate_pages+0x6e/0x80 [ 522.653283][ T320] __iomap_dio_rw+0x5d4/0x1250 [ 522.658051][ T320] iomap_dio_rw+0x40/0x90 [ 522.662376][ T320] ext4_file_write_iter+0xad9/0xf00 [ 522.667585][ T320] iter_file_splice_write+0x666/0xa60 [ 522.672962][ T320] direct_splice_actor+0x156/0x2a0 [ 522.678067][ T320] splice_direct_to_actor+0x312/0x680 [ 522.683431][ T320] do_splice_direct+0xda/0x150 [ 522.688199][ T320] do_sendfile+0x380/0x650 [ 522.692620][ T320] __x64_sys_sendfile64+0x105/0x150 [ 522.697820][ T320] x64_sys_call+0x2bb0/0x2ff0 [ 522.702507][ T320] do_syscall_64+0xd2/0x200 [ 522.707026][ T320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 522.712919][ T320] [ 522.715239][ T320] read to 0xffff88811a828b3c of 4 bytes by task 320 on cpu 0: [ 522.722688][ T320] xas_find_marked+0x5dc/0x620 [ 522.727459][ T320] find_get_entry+0x5d/0x380 [ 522.732043][ T320] filemap_get_folios_tag+0x92/0x210 [ 522.737335][ T320] mpage_prepare_extent_to_map+0x320/0xc00 [ 522.743137][ T320] ext4_do_writepages+0x708/0x2750 [ 522.748257][ T320] ext4_writepages+0x176/0x300 [ 522.753022][ T320] do_writepages+0x1c3/0x310 [ 522.757611][ T320] file_write_and_wait_range+0x156/0x2c0 [ 522.763255][ T320] generic_buffers_fsync_noflush+0x45/0x120 [ 522.769143][ T320] ext4_sync_file+0x1ab/0x690 [ 522.773819][ T320] vfs_fsync_range+0x10a/0x130 [ 522.778585][ T320] ext4_buffered_write_iter+0x34f/0x3c0 [ 522.784139][ T320] ext4_file_write_iter+0xdbf/0xf00 [ 522.789346][ T320] iter_file_splice_write+0x666/0xa60 [ 522.794716][ T320] direct_splice_actor+0x156/0x2a0 [ 522.799822][ T320] splice_direct_to_actor+0x312/0x680 [ 522.805276][ T320] do_splice_direct+0xda/0x150 [ 522.810044][ T320] do_sendfile+0x380/0x650 [ 522.814470][ T320] __x64_sys_sendfile64+0x105/0x150 [ 522.819678][ T320] x64_sys_call+0x2bb0/0x2ff0 [ 522.824360][ T320] do_syscall_64+0xd2/0x200 [ 522.828889][ T320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 522.834783][ T320] [ 522.837103][ T320] value changed: 0x0a000021 -> 0x04000021 [ 522.842812][ T320] [ 522.845127][ T320] Reported by Kernel Concurrency Sanitizer on: [ 522.851268][ T320] CPU: 0 UID: 0 PID: 320 Comm: syz.1.10685 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 522.862562][ T320] Tainted: [W]=WARN [ 522.866359][ T320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 522.876412][ T320] ================================================================== [ 523.229837][T27787] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.