last executing test programs: 7.300326438s ago: executing program 4 (id=2782): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700400009"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000002c80)={&(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002bc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @remote}}}], 0x20}, 0x20000004) 7.299965968s ago: executing program 4 (id=2783): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x4008032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x88281, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@var={0x2, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x8, 0x1, 0x0, 0x4, 0x1, 0xfffffff7, [{0x6, 0x1}]}]}, {0x0, [0x0, 0x2e, 0x5f, 0x0, 0x0, 0x5f, 0x30, 0x5f]}}, 0x0, 0x4a, 0x0, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe82, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x6, 0x4, &(0x7f0000006680)) getitimer(0x0, &(0x7f0000000080)) mmap(&(0x7f00008f2000/0xf000)=nil, 0xf000, 0xe, 0x80010, 0xffffffffffffffff, 0x47ac0000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mmap(&(0x7f0000563000/0x1000)=nil, 0x1000, 0x100000b, 0x4082172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a40)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x2, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) shmget(0x3, 0x14000, 0x78000000, &(0x7f0000310000/0x14000)=nil) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="680000000101010200000000000000000a00000908001a4000010000080015400000496d0c001880080003400000397d38000e"], 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2, 0x0, 0x9}, 0x18) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 6.573377254s ago: executing program 4 (id=2792): r0 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12d010, r0, 0x70a91000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000008000000000000000800000081116f000000000095"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) 6.479706204s ago: executing program 4 (id=2796): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000127bd7000fcdbdf2514000000080008007f000000080009000900000008000f006b0f00004ffd1400080000000800060003000000080010000000000008001500280b00000800030001000000fed9e688463558ca386cd94d74727ade75278e51af87fd0940323efd0f2956575a8c6c2ad9f23d833599fe6b49c180f75619e47f21401a0913d6db6f33d02833f70c272393cab1f53dda3c4af3b5f6ec56867db991d0ca7554e92eb522a7ec31eacc2ec7489c62eb0a21869e18153207bb6b6e50647e0eab800b72277ef1e739b2ba26e3b01336645edad7ea"], 0x54}, 0x1, 0x0, 0x0, 0x4040010}, 0x20000005) creat(&(0x7f00000000c0)='./file0\x00', 0x1f) r1 = socket(0x10, 0x3, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYRES32=r4, @ANYRES16=r5], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000014001280090001007663616e000000000400028008000a"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRESHEX=r2, @ANYBLOB="00000000000080f3270012800a4976786c616e000000180000"], 0x50}}, 0x4000010) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x14, 0x2, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20044804}, 0x40040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x0, 0x0}) pipe2(&(0x7f00000000c0), 0x80000) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="980000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c0002800500010000000000080007"], 0x98}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="80000000100003043b90b568cc1a157a00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000005000128009000100766c616e000000004000028006000100000ffe00340003800c0001000ffe0000000000000c00010000217fffff0080030c00010000010000000000000c000100040000000000000008000500", @ANYRES32=r9, @ANYBLOB="080003"], 0x80}, 0x1, 0x0, 0x0, 0x20044081}, 0x8000) 5.769643959s ago: executing program 0 (id=2805): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0xb) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000009c0)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000240), 0x7, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000070000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x2, 0x53a, &(0x7f0000000c80)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x0, 0x0, 0x8000c62) pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) setxattr$incfs_metadata(&(0x7f0000000340)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1a, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x1d, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 5.520157961s ago: executing program 4 (id=2810): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0700000004000000800100000400"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x18) write$selinux_access(r2, &(0x7f0000000400)=ANY=[@ANYBLOB='system_u:object_r::ing_exec_t:s0 unconfined 0'], 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x200, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xd}, {0x0, 0xffea}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_route={{0xa}, {0xf8, 0x2, [@TCA_ROUTE4_ACT={0xf4, 0x6, [@m_vlan={0x88, 0x6, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1b6}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}]}, {0x49, 0x6, "657c8f856bb2bb5d377d3e798375b1d28aa9ff79c5750c001846426a94e358dab26224b357e0bd9c9b84cfee21ec99f48cf585ab10ae01a9ffc67e6ad19b4103524e4f4a3b"}, {0xc}, {0xc}}}, @m_ife={0x68, 0x1a, 0x0, 0x0, {{0x8}, {0x18, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_TYPE={0x6, 0x5, 0x7}]}, {0x29, 0x6, "5cf80cae43926c79f74d5b5abcda3c8569302a433fb2205af13ea1534835029ea0d077c685"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}, @filter_kind_options=@f_basic={{0xa}, {0xc4, 0x2, [@TCA_BASIC_ACT={0xc0, 0x3, [@m_ife={0xbc, 0x9, 0x0, 0x0, {{0x8}, {0x68, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_PARMS={0x1c, 0x1, {{0xffffffff, 0x2, 0x10000000, 0x0, 0x40}}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x100}, @IFE_META_TCINDEX={0x6}]}, @TCA_IFE_SMAC={0xa, 0x4, @remote}, @TCA_IFE_TYPE={0x6}, @TCA_IFE_TYPE={0x6, 0x5, 0x6}, @TCA_IFE_DMAC={0xa}]}, {0x2d, 0x6, "5bf0c575244155d2c0b90d2c93717dda1c885ca09938b8653d174c8321a63eeb67eaf0b8a03d743889"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x200}, 0x1, 0x0, 0x0, 0x4004}, 0x20000080) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x64}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000980)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f00000001c0)=""/17, 0x11}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x2040000, &(0x7f0000003700)={0x77359400}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r4, 0x0) timer_create(0x2, 0x0, &(0x7f0000000340)) 5.469731451s ago: executing program 4 (id=2811): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0xa96) socket$unix(0x1, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r3 = accept(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000001000010700930000ffffffff0a000000060001001000000008000a00", @ANYRES32=r4], 0x24}}, 0x24008000) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x49677acb447eb9ff) socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2040400) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x10004b04, &(0x7f00000000c0)={0x11, 0x86dd, 0x0, 0x1, 0x97, 0x6, @broadcast}, 0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@remote, 0x45}) fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000003c0)='afs_make_fs_calli\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1300000004000000040000002200000000000000", @ANYRES32, @ANYBLOB="0002000000000000000000000000000000000000099036cece53b59b7ea20801ac3e2730588f9a7744cfae92646c7061e398c2c06a9bd03edd0af2076eecb8d0f2f2156cb9f44ea6490c83e871a268aa14dd286305cb3b82387af09f329f857965de6183bd52f6c51b14d57c5bf5c406ddacab06ca7d676922fd27cc3fc175574c5b01d490db1eb10b6b4b0129f0e222421ca101b034e93146099ed9fe7c0e283b3a3fee4e3a8d5d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r7, 0x8) 4.19619903s ago: executing program 1 (id=2821): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0700000004000000800100000400"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x18) write$selinux_access(r2, &(0x7f0000000400)=ANY=[@ANYBLOB='system_u:object_r::ing_exec_t:s0 unconfined 0'], 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x200, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xd}, {0x0, 0xffea}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_route={{0xa}, {0xf8, 0x2, [@TCA_ROUTE4_ACT={0xf4, 0x6, [@m_vlan={0x88, 0x6, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1b6}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}]}, {0x49, 0x6, "657c8f856bb2bb5d377d3e798375b1d28aa9ff79c5750c001846426a94e358dab26224b357e0bd9c9b84cfee21ec99f48cf585ab10ae01a9ffc67e6ad19b4103524e4f4a3b"}, {0xc}, {0xc}}}, @m_ife={0x68, 0x1a, 0x0, 0x0, {{0x8}, {0x18, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_TYPE={0x6, 0x5, 0x7}]}, {0x29, 0x6, "5cf80cae43926c79f74d5b5abcda3c8569302a433fb2205af13ea1534835029ea0d077c685"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}, @filter_kind_options=@f_basic={{0xa}, {0xc4, 0x2, [@TCA_BASIC_ACT={0xc0, 0x3, [@m_ife={0xbc, 0x9, 0x0, 0x0, {{0x8}, {0x68, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_PARMS={0x1c, 0x1, {{0xffffffff, 0x2, 0x10000000, 0x0, 0x40}}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x100}, @IFE_META_TCINDEX={0x6}]}, @TCA_IFE_SMAC={0xa, 0x4, @remote}, @TCA_IFE_TYPE={0x6}, @TCA_IFE_TYPE={0x6, 0x5, 0x6}, @TCA_IFE_DMAC={0xa}]}, {0x2d, 0x6, "5bf0c575244155d2c0b90d2c93717dda1c885ca09938b8653d174c8321a63eeb67eaf0b8a03d743889"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x200}, 0x1, 0x0, 0x0, 0x4004}, 0x20000080) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x64}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000980)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f00000001c0)=""/17, 0x11}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x2040000, &(0x7f0000003700)={0x77359400}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r4, 0x0) timer_create(0x2, 0x0, &(0x7f0000000340)) 4.19512159s ago: executing program 2 (id=2822): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002e40)={0x30, r2, 0xc4fc9e906872338b, 0x70bd2e, 0x0, {{0x15}, {@void, @val={0xc, 0x99, {0x4, 0x3a}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4}]}]}]}]}, 0x30}}, 0x40000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r6 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r6, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r8}, 0x18) setsockopt$inet6_int(r6, 0x29, 0x16, &(0x7f0000000000)=0xfffffffe, 0x4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d0, 0x210, 0x940c, 0x3002, 0x210, 0x2c0, 0x300, 0x3d8, 0x3d8, 0x300, 0x3d8, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x5, 0x0}, @private2, [0xff000000, 0xff000000, 0xff000000, 0xff000000], [0xff, 0xff000000, 0xffffffff, 0xff], 'veth1_to_team\x00', 'macsec0\x00', {}, {}, 0x62, 0x61, 0x0, 0x8}, 0x0, 0x1c8, 0x210, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x1ffffc, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@unspec=@addrtype1={{0x28}, {0x2, 0x140, 0xc}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x916, {0x7c7a1f6d}}}}, {{@ipv6={@mcast1, @remote, [0xff000000, 0x0, 0xffffffff, 0xffffffff], [0xffffff00, 0x0, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'pimreg0\x00', {0xff}, {0xff}, 0x33, 0x9, 0x4, 0x10}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 4.19480671s ago: executing program 3 (id=2823): ioctl$FS_IOC_GETFSSYSFSPATH(0xffffffffffffffff, 0x80811501, &(0x7f0000000000)={0x80}) syz_open_dev$evdev(&(0x7f0000000200), 0xffffffffffff8a3e, 0x80002) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1d00000004000000020000000000000001020000", @ANYRES32, @ANYBLOB="080000000091c100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000200"/28], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r6, 0x0, 0x8000f28, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r2, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x4c67f84eea96e6c7, 0x5, 0x8, 0x6ed8, 0x50, r6, 0x4, '\x00', 0x0, r6, 0x0, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xf, 0x1d, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x2, 0x3, 0x3, 0x3, 0x0, 0x30, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @exit, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @alu={0x4, 0x1, 0x8, 0x2, 0xa, 0x6, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}]}, &(0x7f0000000340)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x37, '\x00', 0x0, @fallback=0x36, r6, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1, 0x7, &(0x7f0000000740)=[r5, r0, r2, r0, 0xffffffffffffffff, r0, r7, r5, r8, r0], &(0x7f0000000780)=[{0x1, 0x2, 0x7, 0xa}, {0x2, 0x5, 0x8, 0xc}, {0x5, 0x3, 0xb, 0x7}, {0x0, 0x3, 0xa, 0x6}, {0x3, 0x5, 0x2, 0x4}, {0x1, 0x2, 0x0, 0x4}, {0x0, 0x4, 0x8, 0x2}], 0x10, 0x2}, 0x94) r9 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r10 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r10, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RVERSION(r9, &(0x7f0000000c40)=ANY=[@ANYBLOB="a80106a355cb"], 0x13) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r11, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x5], 0x0, 0x0, 0x1}}, 0x40) socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r4, 0x0, 0x7f, 0xe) write(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) lseek(r12, 0x2004, 0x0) 3.573631515s ago: executing program 0 (id=2824): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x18) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x2, 0xffffffff}]}, 0x10) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.573161335s ago: executing program 1 (id=2825): ioctl$FS_IOC_GETFSSYSFSPATH(0xffffffffffffffff, 0x80811501, &(0x7f0000000000)={0x80}) syz_open_dev$evdev(&(0x7f0000000200), 0xffffffffffff8a3e, 0x80002) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1d00000004000000020000000000000001020000", @ANYRES32, @ANYBLOB="080000000091c100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000200"/28], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r6, 0x0, 0x8000f28, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r2, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x4c67f84eea96e6c7, 0x5, 0x8, 0x6ed8, 0x50, r6, 0x4, '\x00', 0x0, r6, 0x0, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xf, 0x1d, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x2, 0x3, 0x3, 0x3, 0x0, 0x30, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @exit, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @alu={0x4, 0x1, 0x8, 0x2, 0xa, 0x6, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}]}, &(0x7f0000000340)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x37, '\x00', 0x0, @fallback=0x36, r6, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1, 0x7, &(0x7f0000000740)=[r5, r0, r2, r0, 0xffffffffffffffff, r0, r7, r5, r8, r0], &(0x7f0000000780)=[{0x1, 0x2, 0x7, 0xa}, {0x2, 0x5, 0x8, 0xc}, {0x5, 0x3, 0xb, 0x7}, {0x0, 0x3, 0xa, 0x6}, {0x3, 0x5, 0x2, 0x4}, {0x1, 0x2, 0x0, 0x4}, {0x0, 0x4, 0x8, 0x2}], 0x10, 0x2}, 0x94) r9 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r10 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r10, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RVERSION(r9, &(0x7f0000000c40)=ANY=[@ANYBLOB="a80106a355cb"], 0x13) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r11, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x5], 0x0, 0x0, 0x1}}, 0x40) socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r4, 0x0, 0x7f, 0xe) write(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) lseek(r12, 0x2004, 0x0) 3.572602585s ago: executing program 2 (id=2826): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'macvtap0\x00', 0x0}) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x36e084fcb6392193, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4dc1}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0xff7f, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="580000001000010400004000fedbdf2501f80000", @ANYRES32=0x0, @ANYBLOB="01020400000000002800128008000100736974001c00028008000200c6120001060008001900000005000a00fd000000080004000100010008000a00fa"], 0x58}}, 0x0) 3.571784835s ago: executing program 3 (id=2827): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000de0000000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x19, &(0x7f00000018c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10b}, {}, {}, [@alu={0x4, 0x1, 0xc, 0x7, 0xb, 0x30, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f00000017c0)=ANY=[@ANYBLOB="18000000100200000000000000d25f547ddb73000000000000000000000018909740f8d4910db7e5b3c65baa4aa55b3fb3db0f1b5ea1cae4eb3ce40fd375ee5a1a18b742376dfa86c118616940090b359caa76987bc9e6f2d6922612a85f108ce14bf80a171cd2cf2aba1e87bc5998ca169deb1e4669ec3356bb0e211177333269068e4c17baa6f8c13ebf82ea54ce9f05cce8de991b0590dcacb4c147e08f4b0344b86b75d799ed1cf6c5847f57f71f91fc4b587600000000d65f07fae93eda1e3f3cd8a1630c", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x40fff, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x18) unshare(0xa000400) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001680)=ANY=[@ANYRES32=r2], 0x44}, 0x1, 0x0, 0x0, 0x40000001}, 0x24000000) socket$inet6_mptcp(0xa, 0x1, 0x106) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x49, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) r4 = socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f00000003c0)={0x1, 0x1}) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) preadv2(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/226, 0xe2}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/189, 0xbd}, {&(0x7f00000003c0)}], 0x6, 0x3ff, 0x6, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYRESDEC=r2], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r6, 0x0, 0x1}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) fcntl$lock(r7, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r7, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2c, 0x9}) fcntl$lock(r7, 0x7, &(0x7f0000000140)={0x0, 0x2, 0x2c}) 2.85275241s ago: executing program 0 (id=2828): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) pwrite64(r0, &(0x7f0000000000)='2', 0x1, 0x4fed0) (fail_nth: 10) 2.85164113s ago: executing program 1 (id=2829): syz_pidfd_open(0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)=@abs, 0x6e) shutdown(0xffffffffffffffff, 0x2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./bus\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c0048451600000000003c9e44006618c48e2b7b26957ec5f64c0c536a1cbc7c56930db4df3119566921d164724922fb031d13cea7c76240c214", @ANYRES64=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESDEC], 0x1, 0x2b8, &(0x7f00000028c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 2.84866183s ago: executing program 2 (id=2830): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffff0180c2000000080600012a0006040001bbbbbbbbbbbbac1e0001ffffffffffffac1414aa"], 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'team_slave_1\x00'}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, &(0x7f0000000340), &(0x7f0000000300)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000003c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@journal_async_commit}, {@user_xattr}, {@errors_remount}, {@nouid32}]}, 0x1, 0x448, &(0x7f0000000a80)="$eJzs3MtvG8UfAPDv2kn6S1/JryqPPoDwEhWPpElL6YELCCQOICHBoRxDklalboOaINEqgoBQOaJK3BFHJP4BOMEFASckrnBHlSqUSwsno7V3E9u13SQ42RZ/PtK2M7tjzXw9O/bMTt0A+tZY+kcSsTsifouIkXq2ucBY/a+bK0szf60szSRRrb7xZ1Ird2NlaSYvmr9uV54ZiCh9ksShNvUuXLp8brpSmbuY5ScWz787sXDp8jNnz0+fmTszd2Hq5MnjxyafOzH1bE/iTOO6cfCD+cMHXnnr6mszp66+/dPXSR5/Sxw9Mtbt4uPVao+rK9aehnQyUGBD2JByfZjGYG38j0Q51jpvJF7+uNDGAVuqWq1W7+18ebkK/IclUXQLgGLkX/Tp+jc/6meS7Zh+FO76C/UFUBr3zeyoXxmIUlZmsGV920tjEXFq+e8v0iO25jkEAECT79L5z9Pt5n+laHwutDfbQxmNiP9HxL6IOBER+yPinoha2fsi4v4N1t+6SXLr/Kd0bVOBrVM6/3s+29tqnv/ls78YLWe5PbX4B5PTZytzR7P35EgM7kjzk13q+P6lXz/rdK1x/pceaf35XDBrx7WBHc2vmZ1enP43MTe6/lHEwYF28SerOwHpSuBARBzcZB1nn/zqcKdr9fh3dIm/ix7sM1W/jHii3v/L0RJ/Lum+Pznxv6jMHZ3I74pb/fzLldc71X/7/t9aaf/vbHv/r8Y/mjTu1y5svI4rv3/afk2zd/P3/1DyZtO596cXFy9ORgwlr9Yb3Xh+qqXc1Fr5NP7h7Frr+N8Xa+/EoYhIb+IHIuLBiHgo67uHI+KRiHi0S/w/vvjYO52u3Qn9P7uh/l9LDEXrmfaJ8rkfvm2qdHQj8af9f7yWOpKdWc/n33ratbm7GQAAAO4+pYjYHUlpfDVdKo2P1/8N//7YWarMLyw+dXr+vQuz9d8IjMZgKX/SNdLwPHQyW9bn+amW/LHsufHn5eFafnxmvjJbdPDQ53Z1GP+pP8pFtw7Ycn6vBf3L+If+ZfxD/zL+oX+1Gf/DRbQD2H7tvv8/LKAdwPZrGf+2/aCPWP9D/2oc//3x3/4AOd//0JcWhuP2P5Lvg8TQndGMuygRpfUX/ia724pus8T6EwV/MAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPTIPwEAAP//O6Hf1g==") r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000f00)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r10, 0x0, 0x3}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000080)=ANY=[], 0xfe37, 0x0) r11 = socket(0x10, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000370400000000ffdbdf2500000000", @ANYRES32=r12, @ANYBLOB="01f5050000000000300012800b00010067656e6576650000200002800500040001"], 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x40004) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1, 0x1, 0x3128, 0x0, 0x0, 0xffffffffffff3bac, 0x4a80100, r12}) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000100)=0x40f5) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@deltclass={0xec, 0x29, 0x100, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r12, {0xffff, 0x3}, {0xf, 0x8}, {0x3, 0xfff1}}, [@tclass_kind_options=@c_prio={0x9}, @TCA_RATE={0x6, 0x5, {0x3, 0x9}}, @TCA_RATE={0x6, 0x5, {0x8, 0x10}}, @tclass_kind_options=@c_cbs={0x8}, @tclass_kind_options=@c_hfsc={{0x9}, {0x84, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0x1, 0xffff, 0x8}}, @TCA_HFSC_RSC={0x10, 0x1, {0x7fffffff, 0x10001, 0x4}}, @TCA_HFSC_RSC={0x10, 0x1, {0x8000, 0x6, 0x8}}, @TCA_HFSC_USC={0x10, 0x3, {0xe8a, 0x4, 0x96}}, @TCA_HFSC_RSC={0x10, 0x1, {0x8, 0x2, 0x6b}}, @TCA_HFSC_USC={0x10, 0x3, {0x283a, 0xb, 0x7fff}}, @TCA_HFSC_RSC={0x10, 0x1, {0x8, 0x2, 0x3}}, @TCA_HFSC_RSC={0x10, 0x1, {0x80000001, 0x7fff, 0x8fa0}}]}}, @tclass_kind_options=@c_ingress={0xc}, @TCA_RATE={0x6, 0x5, {0x6, 0x1}}]}, 0xec}, 0x1, 0x0, 0x0, 0x20004040}, 0xc00) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$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") 2.848011959s ago: executing program 3 (id=2831): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x9}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) recvmmsg(r5, &(0x7f0000005140)=[{{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f00000052c0)=""/235, 0xeb}, {&(0x7f0000003080)=""/4096, 0x1000}], 0x3}, 0x3}], 0x1b00, 0x0, 0x0) (fail_nth: 1) 1.977393886s ago: executing program 0 (id=2832): write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000070000000300000048"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x18) chown(0x0, 0xee00, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x802, @empty, 0xc}, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x1d}, 0xffffffff}, r0, 0xb}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x1, 0xe, 0xfa00, {&(0x7f0000000300), r0}}, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021100011800c000100636f756e746572009c0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000700003806c000080080003400000000260000b80440001800c000100636f756e746572"], 0x130}, 0x1, 0x0, 0x0, 0x8000}, 0x8880) flock(r3, 0x5) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r6, 0x2) dup3(r6, r3, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x16, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffa}, {}, {}, [@generic={0xd, 0x3, 0x7, 0x8001}, @exit, @jmp={0x5, 0x0, 0x1, 0x6, 0x0, 0x40}, @ldst={0x2, 0x3, 0x2, 0x1, 0x1, 0xffffffffffffffe0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x1000}, @call={0x85, 0x0, 0x0, 0xb7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, &(0x7f00000001c0), 0x41100, 0x7f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x7, 0x9, 0x32d}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000340)=[{0x2, 0x3, 0xf, 0x2}, {0x0, 0x4, 0x8, 0xa}, {0x2, 0x3, 0xa, 0x9}], 0x10, 0x5}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0xfffffffffffffffd}, 0x18) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x8002, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x100004, 0x2, 0x2000005, 0x4, 0x0, 0x4, 0xfffd}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000180)='cpu>=0||6') bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file1\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='percpu_free_percpu\x00', r7, 0x0, 0x5b0}, 0x18) 1.976949475s ago: executing program 1 (id=2833): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x100000000}, 0x18) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x7, &(0x7f00000001c0)=0x8, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, r2}, 0x10, &(0x7f00000005c0)={&(0x7f0000000100)=@can={{}, 0x80, 0x3, 0x4, 0x2, "07000000008000"}, 0x210}}, 0x0) 1.975568855s ago: executing program 2 (id=2834): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0700000004000000800100000400"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x18) write$selinux_access(r2, &(0x7f0000000400)=ANY=[@ANYBLOB='system_u:object_r::ing_exec_t:s0 unconfined 0'], 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x200, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xd}, {0x0, 0xffea}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_route={{0xa}, {0xf8, 0x2, [@TCA_ROUTE4_ACT={0xf4, 0x6, [@m_vlan={0x88, 0x6, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1b6}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}]}, {0x49, 0x6, "657c8f856bb2bb5d377d3e798375b1d28aa9ff79c5750c001846426a94e358dab26224b357e0bd9c9b84cfee21ec99f48cf585ab10ae01a9ffc67e6ad19b4103524e4f4a3b"}, {0xc}, {0xc}}}, @m_ife={0x68, 0x1a, 0x0, 0x0, {{0x8}, {0x18, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_TYPE={0x6, 0x5, 0x7}]}, {0x29, 0x6, "5cf80cae43926c79f74d5b5abcda3c8569302a433fb2205af13ea1534835029ea0d077c685"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}, @filter_kind_options=@f_basic={{0xa}, {0xc4, 0x2, [@TCA_BASIC_ACT={0xc0, 0x3, [@m_ife={0xbc, 0x9, 0x0, 0x0, {{0x8}, {0x68, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_PARMS={0x1c, 0x1, {{0xffffffff, 0x2, 0x10000000, 0x0, 0x40}}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x100}, @IFE_META_TCINDEX={0x6}]}, @TCA_IFE_SMAC={0xa, 0x4, @remote}, @TCA_IFE_TYPE={0x6}, @TCA_IFE_TYPE={0x6, 0x5, 0x6}, @TCA_IFE_DMAC={0xa}]}, {0x2d, 0x6, "5bf0c575244155d2c0b90d2c93717dda1c885ca09938b8653d174c8321a63eeb67eaf0b8a03d743889"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x200}, 0x1, 0x0, 0x0, 0x4004}, 0x20000080) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x64}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000980)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f00000001c0)=""/17, 0x11}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x2040000, &(0x7f0000003700)={0x77359400}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r4, 0x0) timer_create(0x2, 0x0, &(0x7f0000000340)) 1.975305466s ago: executing program 3 (id=2835): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0xb) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000009c0)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000240), 0x7, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000700000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x2, 0x53a, &(0x7f0000000c80)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x0, 0x0, 0x8000c62) pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) setxattr$incfs_metadata(&(0x7f0000000340)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1a, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x1d, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 1.031676943s ago: executing program 0 (id=2836): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x4008032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x88281, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@var={0x2, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x8, 0x1, 0x0, 0x4, 0x1, 0xfffffff7, [{0x6, 0x1}]}]}, {0x0, [0x0, 0x2e, 0x5f, 0x0, 0x0, 0x5f, 0x30, 0x5f]}}, 0x0, 0x4a, 0x0, 0x1}, 0x28) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x6, 0x4, &(0x7f0000006680)) getitimer(0x0, &(0x7f0000000080)) mmap(&(0x7f00008f2000/0xf000)=nil, 0xf000, 0xe, 0x80010, 0xffffffffffffffff, 0x47ac0000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mmap(&(0x7f0000563000/0x1000)=nil, 0x1000, 0x100000b, 0x4082172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a40)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x2, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) shmget(0x3, 0x14000, 0x78000000, &(0x7f0000310000/0x14000)=nil) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="680000000101010200000000000000000a00000908001a4000010000080015400000496d0c001880080003400000397d38000e"], 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r2, 0x0, 0x9}, 0x18) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 1.031212803s ago: executing program 1 (id=2837): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='cachefiles_ondemand_open\x00', r0, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRESOCT=r1, @ANYBLOB="d630a15bda2c1bdb204485f45c78724ca1f3fe2397a40c973fe034122111ad7bb868ad19ca6bcebc0baceb2392286904977d42494e11e8f952754142b09affbb273122c8b543c0a1cb709a65c54eefe2e10e60e6d219d67a42c32f848e5e12f9c496bf9c334938e92d3fa83617591dc48abbe51d57fb5da70d69466705d2d727", @ANYRESOCT=r3, @ANYRES32=r5, @ANYRESHEX=r2], 0x48) setrlimit(0x8, &(0x7f00000001c0)={0x5, 0x332}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[], 0x3c}}, 0x24008080) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000540)='ext4_request_inode\x00', r5}, 0x18) socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x100, 0x4}, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x118}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000073114100000000008510000002000000850000005600000095000810000000009500000500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) memfd_secret(0x80000) socket$inet_tcp(0x2, 0x1, 0x0) 1.030886063s ago: executing program 2 (id=2838): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x2000000000000216, &(0x7f00000004c0)=ANY=[@ANYBLOB="18100000000000000000000000000000850000000f00000018010000646c6c240000000000f8ff0000000072fdcac0bfa100000000000007010000f8ffffffb702000008000000e5de528d1fed9e4464b7030000000000008500000006000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=@delneigh={0x64, 0x1d, 0x1, 0x70bd2d, 0x25dfdbfd, {0xa, 0x0, 0x0, r1, 0x0, 0x8, 0x2}, [@NDA_CACHEINFO={0x14, 0x3, {0x1, 0x7, 0xffffffff, 0x97}}, @NDA_IFINDEX={0x8, 0x8, r1}, @NDA_FLAGS_EXT={0x8}, @NDA_DST_MAC={0xa, 0x1, @remote}, @NDA_LLADDR={0xa, 0x2, @random='\x00\x00\x00B\x00'}, @NDA_DST_MAC={0xa, 0x1, @remote}]}, 0x64}}, 0x24040050) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r2}, 0x10) syz_io_uring_setup(0x88f, &(0x7f0000000340)={0x0, 0x6d26, 0x2, 0x3, 0x3d3}, &(0x7f00000003c0), &(0x7f0000000300)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000540000001f0001006e657464657673696d0000000f0002fc241881394bf2a5206862664a2a006e657464657673696d302300"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x275a, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_recvmsg\x00', r7}, 0x18) r8 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r8, &(0x7f0000000340)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) recvmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 1.010356163s ago: executing program 3 (id=2839): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x18) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x2, 0xffffffff}]}, 0x10) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 9.73738ms ago: executing program 0 (id=2840): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x5a, r0, {r0}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@rand_addr=0x64010102, @multicast1, r2}, 0xc) 8.24809ms ago: executing program 1 (id=2841): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0b000000000019000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1f, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x6}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x401}]}, 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c44) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x5, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r7, 0x0) ftruncate(r7, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYBLOB="00000000000000116608000000000000180000000000000000000000000010009500000000000000360a020000000001180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6, 0x0, 0x9}, 0x18) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x9, 0x0) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) r8 = socket$inet(0xa, 0x801, 0x84) sendto$inet(r8, &(0x7f0000000080)='w', 0x34000, 0x0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) r9 = socket$netlink(0x10, 0x3, 0x4) writev(r9, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84476080ffe00600000000590000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x40b}], 0x1) recvmsg$can_j1939(r9, &(0x7f0000000280)={&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f0000000100)}, 0x21) pipe2$9p(&(0x7f00000000c0), 0x0) 4.78888ms ago: executing program 2 (id=2842): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = syz_io_uring_setup(0x8d5, &(0x7f00000000c0)={0x0, 0x5c5a, 0x400, 0x3, 0x153}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r7, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r7, 0x407, 0x7000000) ioctl$AUTOFS_IOC_FAIL(r7, 0x9361, 0x2) r8 = socket(0x2a, 0x3, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x10102) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r8, 0x89f7, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000280)={@multicast2, 0x1, 0x0, 0x10, 0x0, [{@multicast2}]}}) sendmsg$DEVLINK_CMD_TRAP_SET(r6, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[@ANYBLOB="fe1d29bccae78aa07512acb4134b98082555d6ea1f00609d858fb3f4a8224195d997bf2e02a030dae01c8038df3e9170dbf35d8b87d02cdcbfc4f28fe88966eb2fbf0bcd94e300c16961477206873713e850821d6717ec6142b88e118a0f309bee491d7bf326efb00bd796f7a77a04566ed4b3447f69c70413796b08e19d04fa60c9164e9307f5974c06ed143a0e211e893bc39e3b2064f03f193773237e70e7ca63b5ffc4d96971f8c90a39b1a82c1af732b6e6e96b991eec0a0f37c7aea4c1b3ebb30e968e692a9415b470f8ef978419c636157284d6cfcc9d1a8dc0213ed45c96e4158c2b3a365d4f903f", @ANYRES16=0x0, @ANYBLOB="020025bd7000fbdbdf253e0000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x98}, 0x1, 0x0, 0x0, 0x40008000}, 0x4000041) syz_io_uring_submit(r4, r5, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x40, 0x0, r2, 0x0, 0x0, 0x0, 0x80000, 0x1}) io_uring_enter(r3, 0x47ba, 0x3e80, 0x0, 0x0, 0x0) 0s ago: executing program 3 (id=2843): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000127bd7000fcdbdf2514000000080008007f000000080009000900000008000f006b0f00004ffd1400080000000800060003000000080010000000000008001500280b00000800030001000000fed9e688463558ca386cd94d74727ade75278e51af87fd0940323efd0f2956575a8c6c2ad9f23d833599fe6b49c180f75619e47f21401a0913d6db6f33d02833f70c272393cab1f53dda3c4af3b5f6ec56867db991d0ca7554e92eb522a7ec31eacc2ec7489c62eb0a21869e18153207bb6b6e50647e0eab800b72277ef1e739b2ba26e3b01336645edad7ea"], 0x54}, 0x1, 0x0, 0x0, 0x4040010}, 0x20000005) creat(&(0x7f00000000c0)='./file0\x00', 0x1f) r1 = socket(0x10, 0x3, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYRES32=r4, @ANYRES16=r5], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000014001280090001007663616e000000000400028008000a"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRESHEX=r2, @ANYBLOB="00000000000080f3270012800a4976786c616e000000180000"], 0x50}}, 0x4000010) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x14, 0x2, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20044804}, 0x40040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x0, 0x0}) pipe2(&(0x7f00000000c0), 0x80000) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="980000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c0002800500010000000000080007"], 0x98}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="80000000100003043b90b568cc1a157a00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000005000128009000100766c616e000000004000028006000100000ffe00340003800c0001000ffe0000000000000c00010000217fffff0080030c00010000010000000000000c000100040000000000000008000500", @ANYRES32=r9, @ANYBLOB="080003"], 0x80}, 0x1, 0x0, 0x0, 0x20044081}, 0x8000) kernel console output (not intermixed with test programs): attr_set+0x73/0x2b0 [ 164.657151][ T8751] simple_xattr_set+0x73/0x2b0 [ 164.657188][ T8751] ? strlen+0x19/0x40 [ 164.657212][ T8751] shmem_xattr_handler_set+0x12b/0x220 [ 164.657366][ T8751] ? __pfx_shmem_xattr_handler_set+0x10/0x10 [ 164.657398][ T8751] __vfs_setxattr+0x2e6/0x310 [ 164.657431][ T8751] __vfs_setxattr_noperm+0xe8/0x410 [ 164.657464][ T8751] __vfs_setxattr_locked+0x1af/0x1d0 [ 164.657570][ T8751] vfs_setxattr+0x132/0x270 [ 164.657602][ T8751] filename_setxattr+0x1ad/0x400 [ 164.657715][ T8751] path_setxattrat+0x2c9/0x310 [ 164.657765][ T8751] __x64_sys_lsetxattr+0x71/0x90 [ 164.657802][ T8751] x64_sys_call+0x287b/0x3000 [ 164.657837][ T8751] do_syscall_64+0xd2/0x200 [ 164.657856][ T8751] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 164.657886][ T8751] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 164.657968][ T8751] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 164.657995][ T8751] RIP: 0033:0x7f817ab0efc9 [ 164.658031][ T8751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.658049][ T8751] RSP: 002b:00007f817956f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 164.658068][ T8751] RAX: ffffffffffffffda RBX: 00007f817ad65fa0 RCX: 00007f817ab0efc9 [ 164.658080][ T8751] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000080 [ 164.658094][ T8751] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 164.658124][ T8751] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 164.658140][ T8751] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 164.658242][ T8751] [ 165.017091][ T8763] netlink: 'syz.2.2085': attribute type 13 has an invalid length. [ 165.025019][ T8763] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2085'. [ 165.519697][ T8786] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8786 comm=syz.3.2095 [ 165.949327][ T8803] lo speed is unknown, defaulting to 1000 [ 166.351002][ T8812] bond1: entered promiscuous mode [ 166.356164][ T8812] bond1: entered allmulticast mode [ 166.361547][ T8812] 8021q: adding VLAN 0 to HW filter on device bond1 [ 166.417160][ T8812] bond1 (unregistering): Released all slaves [ 166.502670][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 166.943538][ T29] kauditd_printk_skb: 15310 callbacks suppressed [ 166.943555][ T29] audit: type=1400 audit(1761717622.463:487716): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 166.971362][ T29] audit: type=1400 audit(1761717622.463:487717): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 166.992777][ T29] audit: type=1400 audit(1761717622.463:487718): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.014032][ T29] audit: type=1400 audit(1761717622.463:487719): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.035352][ T29] audit: type=1400 audit(1761717622.463:487720): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.050402][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.056733][ T29] audit: type=1400 audit(1761717622.463:487721): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.063447][ T3043] audit: audit_lost=48325 audit_rate_limit=0 audit_backlog_limit=64 [ 167.063464][ T3043] audit: backlog limit exceeded [ 167.065376][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.714709][ T8887] FAULT_INJECTION: forcing a failure. [ 167.714709][ T8887] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 167.728141][ T8887] CPU: 1 UID: 0 PID: 8887 Comm: syz.2.2131 Not tainted syzkaller #0 PREEMPT(voluntary) [ 167.728167][ T8887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 167.728179][ T8887] Call Trace: [ 167.728187][ T8887] [ 167.728197][ T8887] __dump_stack+0x1d/0x30 [ 167.728226][ T8887] dump_stack_lvl+0xe8/0x140 [ 167.728291][ T8887] dump_stack+0x15/0x1b [ 167.728315][ T8887] should_fail_ex+0x265/0x280 [ 167.728340][ T8887] should_fail_alloc_page+0xf2/0x100 [ 167.728376][ T8887] __alloc_frozen_pages_noprof+0xff/0x360 [ 167.728469][ T8887] alloc_pages_mpol+0xb3/0x260 [ 167.728544][ T8887] ? __rcu_read_lock+0x37/0x50 [ 167.728577][ T8887] vma_alloc_folio_noprof+0x1aa/0x300 [ 167.728608][ T8887] handle_mm_fault+0xec2/0x2be0 [ 167.728640][ T8887] ? vma_start_read+0x141/0x1f0 [ 167.728709][ T8887] do_user_addr_fault+0x630/0x1080 [ 167.728739][ T8887] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 167.728782][ T8887] exc_page_fault+0x62/0xa0 [ 167.728895][ T8887] asm_exc_page_fault+0x26/0x30 [ 167.728921][ T8887] RIP: 0033:0x7f5c18e50cb0 [ 167.728951][ T8887] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 167.728982][ T8887] RSP: 002b:00007f5c179f64a0 EFLAGS: 00010286 [ 167.729002][ T8887] RAX: 0000000000001000 RBX: 00007f5c179f6540 RCX: 0000000000000001 [ 167.729017][ T8887] RDX: 0000000000000009 RSI: 0000000000000001 RDI: 00007f5c179f65e0 [ 167.729032][ T8887] RBP: 00000000000000db R08: 00007f5c0f5d7000 R09: 00000000000000ff [ 167.729047][ T8887] R10: 0000000000000000 R11: 00007f5c179f6550 R12: 0000000000000001 [ 167.729063][ T8887] R13: 00007f5c1902dc40 R14: 0000000000000000 R15: 00007f5c179f65e0 [ 167.729084][ T8887] [ 167.729096][ T8887] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 167.908219][ T8890] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2134'. [ 167.933414][ T8892] FAULT_INJECTION: forcing a failure. [ 167.933414][ T8892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.946638][ T8892] CPU: 0 UID: 0 PID: 8892 Comm: syz.0.2133 Not tainted syzkaller #0 PREEMPT(voluntary) [ 167.946695][ T8892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 167.946714][ T8892] Call Trace: [ 167.946720][ T8892] [ 167.946791][ T8892] __dump_stack+0x1d/0x30 [ 167.946819][ T8892] dump_stack_lvl+0xe8/0x140 [ 167.946844][ T8892] dump_stack+0x15/0x1b [ 167.946860][ T8892] should_fail_ex+0x265/0x280 [ 167.946882][ T8892] should_fail+0xb/0x20 [ 167.946901][ T8892] should_fail_usercopy+0x1a/0x20 [ 167.946980][ T8892] _copy_from_user+0x1c/0xb0 [ 167.947086][ T8892] ___sys_sendmsg+0xc1/0x1d0 [ 167.947158][ T8892] __sys_sendmmsg+0x178/0x300 [ 167.947190][ T8892] __x64_sys_sendmmsg+0x57/0x70 [ 167.947208][ T8892] x64_sys_call+0x1c4a/0x3000 [ 167.947269][ T8892] do_syscall_64+0xd2/0x200 [ 167.947292][ T8892] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 167.947326][ T8892] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 167.947356][ T8892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 167.947377][ T8892] RIP: 0033:0x7ff816e8efc9 [ 167.947409][ T8892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.947450][ T8892] RSP: 002b:00007ff8158ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 167.947497][ T8892] RAX: ffffffffffffffda RBX: 00007ff8170e5fa0 RCX: 00007ff816e8efc9 [ 167.947509][ T8892] RDX: 0000000000000651 RSI: 0000200000000000 RDI: 0000000000000004 [ 167.947563][ T8892] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 167.947579][ T8892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.947593][ T8892] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 167.947615][ T8892] [ 168.202091][ T8896] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2137'. [ 169.068548][ T8925] netlink: 'syz.4.2147': attribute type 2 has an invalid length. [ 169.076368][ T8925] netlink: 'syz.4.2147': attribute type 4 has an invalid length. [ 169.084149][ T8925] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2147'. [ 169.156854][ T8929] FAULT_INJECTION: forcing a failure. [ 169.156854][ T8929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.170060][ T8929] CPU: 1 UID: 0 PID: 8929 Comm: syz.2.2149 Not tainted syzkaller #0 PREEMPT(voluntary) [ 169.170150][ T8929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 169.170170][ T8929] Call Trace: [ 169.170177][ T8929] [ 169.170184][ T8929] __dump_stack+0x1d/0x30 [ 169.170209][ T8929] dump_stack_lvl+0xe8/0x140 [ 169.170236][ T8929] dump_stack+0x15/0x1b [ 169.170257][ T8929] should_fail_ex+0x265/0x280 [ 169.170281][ T8929] should_fail+0xb/0x20 [ 169.170297][ T8929] should_fail_usercopy+0x1a/0x20 [ 169.170316][ T8929] _copy_to_user+0x20/0xa0 [ 169.170423][ T8929] simple_read_from_buffer+0xb5/0x130 [ 169.170503][ T8929] proc_fail_nth_read+0x10e/0x150 [ 169.170567][ T8929] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 169.170598][ T8929] vfs_read+0x1a8/0x770 [ 169.170624][ T8929] ? __fget_files+0x184/0x1c0 [ 169.170664][ T8929] ? __rcu_read_unlock+0x4f/0x70 [ 169.170691][ T8929] ? __fget_files+0x184/0x1c0 [ 169.170719][ T8929] ksys_read+0xda/0x1a0 [ 169.170785][ T8929] __x64_sys_read+0x40/0x50 [ 169.170875][ T8929] x64_sys_call+0x27c0/0x3000 [ 169.170904][ T8929] do_syscall_64+0xd2/0x200 [ 169.170928][ T8929] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 169.170963][ T8929] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 169.170998][ T8929] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 169.171019][ T8929] RIP: 0033:0x7f5c18f8d9dc [ 169.171033][ T8929] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 169.171056][ T8929] RSP: 002b:00007f5c179f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 169.171150][ T8929] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8d9dc [ 169.171164][ T8929] RDX: 000000000000000f RSI: 00007f5c179f70a0 RDI: 0000000000000003 [ 169.171260][ T8929] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 169.171275][ T8929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.171300][ T8929] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 169.171397][ T8929] [ 169.586771][ T8953] FAULT_INJECTION: forcing a failure. [ 169.586771][ T8953] name failslab, interval 1, probability 0, space 0, times 0 [ 169.599485][ T8953] CPU: 0 UID: 0 PID: 8953 Comm: syz.4.2159 Not tainted syzkaller #0 PREEMPT(voluntary) [ 169.599518][ T8953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 169.599544][ T8953] Call Trace: [ 169.599552][ T8953] [ 169.599562][ T8953] __dump_stack+0x1d/0x30 [ 169.599587][ T8953] dump_stack_lvl+0xe8/0x140 [ 169.599660][ T8953] dump_stack+0x15/0x1b [ 169.599683][ T8953] should_fail_ex+0x265/0x280 [ 169.599709][ T8953] should_failslab+0x8c/0xb0 [ 169.599748][ T8953] kmem_cache_alloc_noprof+0x50/0x480 [ 169.599779][ T8953] ? security_file_alloc+0x32/0x100 [ 169.599846][ T8953] security_file_alloc+0x32/0x100 [ 169.599875][ T8953] init_file+0x5c/0x1d0 [ 169.599892][ T8953] alloc_empty_file+0x8b/0x200 [ 169.599993][ T8953] alloc_file_pseudo+0xc6/0x160 [ 169.600014][ T8953] __shmem_file_setup+0x1de/0x210 [ 169.600063][ T8953] shmem_file_setup+0x3b/0x50 [ 169.600117][ T8953] __se_sys_memfd_create+0x2c3/0x590 [ 169.600155][ T8953] __x64_sys_memfd_create+0x31/0x40 [ 169.600186][ T8953] x64_sys_call+0x2ac2/0x3000 [ 169.600216][ T8953] do_syscall_64+0xd2/0x200 [ 169.600295][ T8953] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 169.600363][ T8953] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 169.600425][ T8953] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 169.600454][ T8953] RIP: 0033:0x7f78cd3eefc9 [ 169.600470][ T8953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.600489][ T8953] RSP: 002b:00007f78cbe56d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 169.600512][ T8953] RAX: ffffffffffffffda RBX: 0000000000000593 RCX: 00007f78cd3eefc9 [ 169.600528][ T8953] RDX: 00007f78cbe56dec RSI: 0000000000000000 RDI: 00007f78cd472960 [ 169.600604][ T8953] RBP: 00002000000005c0 R08: 00007f78cbe56b07 R09: 0000000000000000 [ 169.600620][ T8953] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 169.600636][ T8953] R13: 00007f78cbe56dec R14: 00007f78cbe56df0 R15: 00007ffd43e31e68 [ 169.600656][ T8953] [ 169.857390][ T8955] lo speed is unknown, defaulting to 1000 [ 170.034097][ T8967] bond2: entered promiscuous mode [ 170.039185][ T8967] bond2: entered allmulticast mode [ 170.044662][ T8967] 8021q: adding VLAN 0 to HW filter on device bond2 [ 170.057137][ T8967] bond2 (unregistering): Released all slaves [ 171.954957][ T3043] audit_log_start: 33109 callbacks suppressed [ 171.954978][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 171.967734][ T3043] audit: audit_lost=53601 audit_rate_limit=0 audit_backlog_limit=64 [ 171.975746][ T3043] audit: backlog limit exceeded [ 171.991893][ T9040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 171.998599][ T9040] audit: audit_lost=53602 audit_rate_limit=0 audit_backlog_limit=64 [ 172.006652][ T9040] audit: backlog limit exceeded [ 172.027033][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.033648][ T3043] audit: audit_lost=53603 audit_rate_limit=0 audit_backlog_limit=64 [ 172.041755][ T3043] audit: backlog limit exceeded [ 172.051668][ T9040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.079146][ T9037] FAULT_INJECTION: forcing a failure. [ 172.079146][ T9037] name failslab, interval 1, probability 0, space 0, times 0 [ 172.091854][ T9037] CPU: 0 UID: 0 PID: 9037 Comm: syz.2.2186 Not tainted syzkaller #0 PREEMPT(voluntary) [ 172.091884][ T9037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 172.091923][ T9037] Call Trace: [ 172.091967][ T9037] [ 172.091974][ T9037] __dump_stack+0x1d/0x30 [ 172.091996][ T9037] dump_stack_lvl+0xe8/0x140 [ 172.092015][ T9037] dump_stack+0x15/0x1b [ 172.092037][ T9037] should_fail_ex+0x265/0x280 [ 172.092091][ T9037] should_failslab+0x8c/0xb0 [ 172.092123][ T9037] kmem_cache_alloc_noprof+0x50/0x480 [ 172.092151][ T9037] ? audit_log_start+0x342/0x720 [ 172.092193][ T9037] audit_log_start+0x342/0x720 [ 172.092215][ T9037] audit_seccomp+0x48/0x100 [ 172.092327][ T9037] ? __seccomp_filter+0x82d/0x1250 [ 172.092354][ T9037] __seccomp_filter+0x83e/0x1250 [ 172.092382][ T9037] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 172.092465][ T9037] ? __rcu_read_unlock+0x4f/0x70 [ 172.092498][ T9037] ? __fget_files+0x184/0x1c0 [ 172.092537][ T9037] __secure_computing+0x82/0x150 [ 172.092576][ T9037] syscall_trace_enter+0xcf/0x1e0 [ 172.092604][ T9037] do_syscall_64+0xac/0x200 [ 172.092634][ T9037] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 172.092668][ T9037] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 172.092741][ T9037] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.092768][ T9037] RIP: 0033:0x7f5c18f8d9dc [ 172.092789][ T9037] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 172.092812][ T9037] RSP: 002b:00007f5c179d6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 172.092864][ T9037] RAX: ffffffffffffffda RBX: 00007f5c191e6090 RCX: 00007f5c18f8d9dc [ 172.092877][ T9037] RDX: 000000000000000f RSI: 00007f5c179d60a0 RDI: 0000000000000005 [ 172.092892][ T9037] RBP: 00007f5c179d6090 R08: 0000000000000000 R09: 0000000000000000 [ 172.092936][ T9037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.092947][ T9037] R13: 00007f5c191e6128 R14: 00007f5c191e6090 R15: 00007fff56d6f208 [ 172.092964][ T9037] [ 172.401742][ T9045] lo speed is unknown, defaulting to 1000 [ 172.558230][ T9052] FAULT_INJECTION: forcing a failure. [ 172.558230][ T9052] name failslab, interval 1, probability 0, space 0, times 0 [ 172.571017][ T9052] CPU: 0 UID: 0 PID: 9052 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 172.571109][ T9052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 172.571124][ T9052] Call Trace: [ 172.571133][ T9052] [ 172.571142][ T9052] __dump_stack+0x1d/0x30 [ 172.571164][ T9052] dump_stack_lvl+0xe8/0x140 [ 172.571241][ T9052] dump_stack+0x15/0x1b [ 172.571263][ T9052] should_fail_ex+0x265/0x280 [ 172.571286][ T9052] should_failslab+0x8c/0xb0 [ 172.571325][ T9052] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 172.571406][ T9052] ? dup_task_struct+0x70/0x6b0 [ 172.571439][ T9052] dup_task_struct+0x70/0x6b0 [ 172.571473][ T9052] ? freezing_slow_path+0xf1/0x100 [ 172.571509][ T9052] copy_process+0x399/0x2000 [ 172.571557][ T9052] ? kstrtouint+0x76/0xc0 [ 172.571662][ T9052] ? kstrtouint_from_user+0x9f/0xf0 [ 172.571687][ T9052] ? __rcu_read_unlock+0x4f/0x70 [ 172.571722][ T9052] kernel_clone+0x16c/0x5c0 [ 172.571767][ T9052] ? vfs_write+0x7e8/0x960 [ 172.571792][ T9052] __x64_sys_clone+0xe6/0x120 [ 172.571853][ T9052] x64_sys_call+0x119c/0x3000 [ 172.571880][ T9052] do_syscall_64+0xd2/0x200 [ 172.571903][ T9052] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 172.571936][ T9052] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 172.572010][ T9052] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.572030][ T9052] RIP: 0033:0x7f5c18f8efc9 [ 172.572048][ T9052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.572066][ T9052] RSP: 002b:00007f5c179f6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 172.572152][ T9052] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8efc9 [ 172.572165][ T9052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002000000 [ 172.572176][ T9052] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 172.572188][ T9052] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 172.572200][ T9052] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 172.572288][ T9052] [ 172.952305][ T9069] FAULT_INJECTION: forcing a failure. [ 172.952305][ T9069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.965538][ T9069] CPU: 0 UID: 0 PID: 9069 Comm: syz.2.2201 Not tainted syzkaller #0 PREEMPT(voluntary) [ 172.965584][ T9069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 172.965600][ T9069] Call Trace: [ 172.965674][ T9069] [ 172.965683][ T9069] __dump_stack+0x1d/0x30 [ 172.965705][ T9069] dump_stack_lvl+0xe8/0x140 [ 172.965725][ T9069] dump_stack+0x15/0x1b [ 172.965747][ T9069] should_fail_ex+0x265/0x280 [ 172.965771][ T9069] should_fail+0xb/0x20 [ 172.965790][ T9069] should_fail_usercopy+0x1a/0x20 [ 172.965867][ T9069] _copy_to_user+0x20/0xa0 [ 172.965892][ T9069] simple_read_from_buffer+0xb5/0x130 [ 172.965968][ T9069] proc_fail_nth_read+0x10e/0x150 [ 172.966063][ T9069] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 172.966183][ T9069] vfs_read+0x1a8/0x770 [ 172.966211][ T9069] ? __rcu_read_unlock+0x4f/0x70 [ 172.966336][ T9069] ? __fget_files+0x184/0x1c0 [ 172.966369][ T9069] ksys_read+0xda/0x1a0 [ 172.966520][ T9069] __x64_sys_read+0x40/0x50 [ 172.966544][ T9069] x64_sys_call+0x27c0/0x3000 [ 172.966569][ T9069] do_syscall_64+0xd2/0x200 [ 172.966592][ T9069] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 172.966618][ T9069] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 172.966698][ T9069] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.966723][ T9069] RIP: 0033:0x7f5c18f8d9dc [ 172.966738][ T9069] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 172.966805][ T9069] RSP: 002b:00007f5c179f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 172.966828][ T9069] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8d9dc [ 172.966843][ T9069] RDX: 000000000000000f RSI: 00007f5c179f70a0 RDI: 0000000000000003 [ 172.966855][ T9069] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 172.966866][ T9069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.966950][ T9069] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 172.966973][ T9069] [ 173.306751][ T9076] FAULT_INJECTION: forcing a failure. [ 173.306751][ T9076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.306811][ T9076] CPU: 1 UID: 0 PID: 9076 Comm: syz.1.2204 Not tainted syzkaller #0 PREEMPT(voluntary) [ 173.306856][ T9076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 173.306871][ T9076] Call Trace: [ 173.306879][ T9076] [ 173.306887][ T9076] __dump_stack+0x1d/0x30 [ 173.306914][ T9076] dump_stack_lvl+0xe8/0x140 [ 173.306939][ T9076] dump_stack+0x15/0x1b [ 173.306961][ T9076] should_fail_ex+0x265/0x280 [ 173.307023][ T9076] should_fail+0xb/0x20 [ 173.307043][ T9076] should_fail_usercopy+0x1a/0x20 [ 173.307094][ T9076] _copy_from_user+0x1c/0xb0 [ 173.307125][ T9076] sock_do_ioctl+0xe6/0x220 [ 173.307157][ T9076] sock_ioctl+0x41b/0x610 [ 173.307197][ T9076] ? __pfx_sock_ioctl+0x10/0x10 [ 173.307234][ T9076] __se_sys_ioctl+0xce/0x140 [ 173.307261][ T9076] __x64_sys_ioctl+0x43/0x50 [ 173.307286][ T9076] x64_sys_call+0x1816/0x3000 [ 173.307347][ T9076] do_syscall_64+0xd2/0x200 [ 173.307370][ T9076] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 173.307404][ T9076] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 173.307443][ T9076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 173.307475][ T9076] RIP: 0033:0x7f817ab0efc9 [ 173.307492][ T9076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.307514][ T9076] RSP: 002b:00007f817956f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.307532][ T9076] RAX: ffffffffffffffda RBX: 00007f817ad65fa0 RCX: 00007f817ab0efc9 [ 173.307544][ T9076] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 173.307586][ T9076] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 173.307601][ T9076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.307617][ T9076] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 173.307639][ T9076] [ 173.504708][ T9090] blkio.reset_stats is deprecated [ 173.555734][ T9099] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2212'. [ 173.750397][ T9112] FAULT_INJECTION: forcing a failure. [ 173.750397][ T9112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.750500][ T9112] CPU: 0 UID: 0 PID: 9112 Comm: syz.1.2216 Not tainted syzkaller #0 PREEMPT(voluntary) [ 173.750571][ T9112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 173.750587][ T9112] Call Trace: [ 173.750594][ T9112] [ 173.750600][ T9112] __dump_stack+0x1d/0x30 [ 173.750632][ T9112] dump_stack_lvl+0xe8/0x140 [ 173.750656][ T9112] dump_stack+0x15/0x1b [ 173.750673][ T9112] should_fail_ex+0x265/0x280 [ 173.750772][ T9112] should_fail+0xb/0x20 [ 173.750788][ T9112] should_fail_usercopy+0x1a/0x20 [ 173.750814][ T9112] _copy_from_user+0x1c/0xb0 [ 173.750862][ T9112] ___sys_sendmsg+0xc1/0x1d0 [ 173.750912][ T9112] __x64_sys_sendmsg+0xd4/0x160 [ 173.751069][ T9112] x64_sys_call+0x191e/0x3000 [ 173.751092][ T9112] do_syscall_64+0xd2/0x200 [ 173.751115][ T9112] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 173.751272][ T9112] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 173.751340][ T9112] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 173.751385][ T9112] RIP: 0033:0x7f817ab0efc9 [ 173.751403][ T9112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.751422][ T9112] RSP: 002b:00007f817956f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 173.751484][ T9112] RAX: ffffffffffffffda RBX: 00007f817ad65fa0 RCX: 00007f817ab0efc9 [ 173.751529][ T9112] RDX: 0000000000000004 RSI: 00002000000003c0 RDI: 0000000000000003 [ 173.751541][ T9112] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 173.751553][ T9112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.751566][ T9112] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 173.751609][ T9112] [ 173.857349][ T9120] lo speed is unknown, defaulting to 1000 [ 174.063399][ T9128] FAULT_INJECTION: forcing a failure. [ 174.063399][ T9128] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.219304][ T9128] CPU: 1 UID: 0 PID: 9128 Comm: syz.1.2224 Not tainted syzkaller #0 PREEMPT(voluntary) [ 174.219334][ T9128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 174.219346][ T9128] Call Trace: [ 174.219353][ T9128] [ 174.219361][ T9128] __dump_stack+0x1d/0x30 [ 174.219399][ T9128] dump_stack_lvl+0xe8/0x140 [ 174.219423][ T9128] dump_stack+0x15/0x1b [ 174.219441][ T9128] should_fail_ex+0x265/0x280 [ 174.219462][ T9128] should_fail+0xb/0x20 [ 174.219553][ T9128] should_fail_usercopy+0x1a/0x20 [ 174.219582][ T9128] _copy_to_user+0x20/0xa0 [ 174.219631][ T9128] simple_read_from_buffer+0xb5/0x130 [ 174.219708][ T9128] proc_fail_nth_read+0x10e/0x150 [ 174.219753][ T9128] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 174.219856][ T9128] vfs_read+0x1a8/0x770 [ 174.219887][ T9128] ? __fget_files+0x184/0x1c0 [ 174.219923][ T9128] ? __rcu_read_unlock+0x4f/0x70 [ 174.219958][ T9128] ? __fget_files+0x184/0x1c0 [ 174.220066][ T9128] ksys_read+0xda/0x1a0 [ 174.220100][ T9128] __x64_sys_read+0x40/0x50 [ 174.220134][ T9128] x64_sys_call+0x27c0/0x3000 [ 174.220174][ T9128] do_syscall_64+0xd2/0x200 [ 174.220195][ T9128] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 174.220272][ T9128] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 174.220316][ T9128] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.220345][ T9128] RIP: 0033:0x7f817ab0d9dc [ 174.220404][ T9128] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 174.220428][ T9128] RSP: 002b:00007f817956f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 174.220455][ T9128] RAX: ffffffffffffffda RBX: 00007f817ad65fa0 RCX: 00007f817ab0d9dc [ 174.220501][ T9128] RDX: 000000000000000f RSI: 00007f817956f0a0 RDI: 0000000000000005 [ 174.220517][ T9128] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 174.220551][ T9128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.220575][ T9128] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 174.220601][ T9128] [ 174.518711][ T9142] lo speed is unknown, defaulting to 1000 [ 174.671563][ T9147] FAULT_INJECTION: forcing a failure. [ 174.671563][ T9147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.671662][ T9147] CPU: 1 UID: 0 PID: 9147 Comm: syz.2.2231 Not tainted syzkaller #0 PREEMPT(voluntary) [ 174.671693][ T9147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 174.671773][ T9147] Call Trace: [ 174.671778][ T9147] [ 174.671786][ T9147] __dump_stack+0x1d/0x30 [ 174.671813][ T9147] dump_stack_lvl+0xe8/0x140 [ 174.671839][ T9147] dump_stack+0x15/0x1b [ 174.671861][ T9147] should_fail_ex+0x265/0x280 [ 174.671891][ T9147] should_fail+0xb/0x20 [ 174.671919][ T9147] should_fail_usercopy+0x1a/0x20 [ 174.671944][ T9147] _copy_to_user+0x20/0xa0 [ 174.672063][ T9147] simple_read_from_buffer+0xb5/0x130 [ 174.672090][ T9147] proc_fail_nth_read+0x10e/0x150 [ 174.672120][ T9147] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 174.672233][ T9147] vfs_read+0x1a8/0x770 [ 174.672255][ T9147] ? __fget_files+0x184/0x1c0 [ 174.672282][ T9147] ? __rcu_read_unlock+0x4f/0x70 [ 174.672367][ T9147] ? __fget_files+0x184/0x1c0 [ 174.672411][ T9147] ksys_read+0xda/0x1a0 [ 174.672443][ T9147] __x64_sys_read+0x40/0x50 [ 174.672478][ T9147] x64_sys_call+0x27c0/0x3000 [ 174.672579][ T9147] do_syscall_64+0xd2/0x200 [ 174.672597][ T9147] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 174.672627][ T9147] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 174.672734][ T9147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.672756][ T9147] RIP: 0033:0x7f5c18f8d9dc [ 174.672773][ T9147] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 174.672795][ T9147] RSP: 002b:00007f5c179f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 174.672831][ T9147] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8d9dc [ 174.672846][ T9147] RDX: 000000000000000f RSI: 00007f5c179f70a0 RDI: 0000000000000006 [ 174.672864][ T9147] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 174.672918][ T9147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.672932][ T9147] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 174.672954][ T9147] [ 175.123613][ T9167] FAULT_INJECTION: forcing a failure. [ 175.123613][ T9167] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.136767][ T9167] CPU: 0 UID: 0 PID: 9167 Comm: syz.0.2239 Not tainted syzkaller #0 PREEMPT(voluntary) [ 175.136800][ T9167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 175.136813][ T9167] Call Trace: [ 175.136819][ T9167] [ 175.136827][ T9167] __dump_stack+0x1d/0x30 [ 175.136925][ T9167] dump_stack_lvl+0xe8/0x140 [ 175.136945][ T9167] dump_stack+0x15/0x1b [ 175.137030][ T9167] should_fail_ex+0x265/0x280 [ 175.137061][ T9167] should_fail+0xb/0x20 [ 175.137080][ T9167] should_fail_usercopy+0x1a/0x20 [ 175.137102][ T9167] strncpy_from_user+0x25/0x230 [ 175.137169][ T9167] ? __rcu_read_unlock+0x4f/0x70 [ 175.137265][ T9167] path_removexattrat+0x82/0x570 [ 175.137370][ T9167] __x64_sys_fremovexattr+0x35/0x40 [ 175.137452][ T9167] x64_sys_call+0x4e0/0x3000 [ 175.137475][ T9167] do_syscall_64+0xd2/0x200 [ 175.137493][ T9167] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 175.137525][ T9167] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 175.137639][ T9167] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.137665][ T9167] RIP: 0033:0x7ff816e8efc9 [ 175.137681][ T9167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.137702][ T9167] RSP: 002b:00007ff8158ef038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 175.137779][ T9167] RAX: ffffffffffffffda RBX: 00007ff8170e5fa0 RCX: 00007ff816e8efc9 [ 175.137792][ T9167] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 175.137804][ T9167] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 175.137817][ T9167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.137832][ T9167] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 175.137928][ T9167] [ 175.464481][ T9174] lo speed is unknown, defaulting to 1000 [ 175.472993][ T9175] netlink: 'syz.0.2242': attribute type 10 has an invalid length. [ 175.511816][ T9175] team0: Device ipvlan0 failed to register rx_handler [ 175.774720][ T9180] FAULT_INJECTION: forcing a failure. [ 175.774720][ T9180] name failslab, interval 1, probability 0, space 0, times 0 [ 175.787424][ T9180] CPU: 0 UID: 0 PID: 9180 Comm: syz.2.2245 Not tainted syzkaller #0 PREEMPT(voluntary) [ 175.787457][ T9180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 175.787471][ T9180] Call Trace: [ 175.787477][ T9180] [ 175.787484][ T9180] __dump_stack+0x1d/0x30 [ 175.787576][ T9180] dump_stack_lvl+0xe8/0x140 [ 175.787600][ T9180] dump_stack+0x15/0x1b [ 175.787618][ T9180] should_fail_ex+0x265/0x280 [ 175.787639][ T9180] should_failslab+0x8c/0xb0 [ 175.787693][ T9180] kmem_cache_alloc_noprof+0x50/0x480 [ 175.787806][ T9180] ? getname_flags+0x80/0x3b0 [ 175.787841][ T9180] getname_flags+0x80/0x3b0 [ 175.787891][ T9180] user_path_at+0x28/0x130 [ 175.787914][ T9180] do_utimes+0xd9/0x210 [ 175.787942][ T9180] __x64_sys_utimes+0xc6/0x180 [ 175.788018][ T9180] ? syscall_trace_enter+0x102/0x1e0 [ 175.788059][ T9180] x64_sys_call+0x1e3d/0x3000 [ 175.788088][ T9180] do_syscall_64+0xd2/0x200 [ 175.788109][ T9180] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 175.788177][ T9180] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 175.788278][ T9180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.788299][ T9180] RIP: 0033:0x7f5c18f8efc9 [ 175.788318][ T9180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.788339][ T9180] RSP: 002b:00007f5c179f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000eb [ 175.788357][ T9180] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8efc9 [ 175.788389][ T9180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000340 [ 175.788401][ T9180] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 175.788412][ T9180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.788426][ T9180] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 175.788446][ T9180] [ 175.993220][ T9188] FAULT_INJECTION: forcing a failure. [ 175.993220][ T9188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.006397][ T9188] CPU: 1 UID: 0 PID: 9188 Comm: syz.3.2248 Not tainted syzkaller #0 PREEMPT(voluntary) [ 176.006432][ T9188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 176.006447][ T9188] Call Trace: [ 176.006455][ T9188] [ 176.006490][ T9188] __dump_stack+0x1d/0x30 [ 176.006518][ T9188] dump_stack_lvl+0xe8/0x140 [ 176.006544][ T9188] dump_stack+0x15/0x1b [ 176.006566][ T9188] should_fail_ex+0x265/0x280 [ 176.006589][ T9188] should_fail+0xb/0x20 [ 176.006624][ T9188] should_fail_usercopy+0x1a/0x20 [ 176.006650][ T9188] _copy_from_user+0x1c/0xb0 [ 176.006716][ T9188] ___sys_sendmsg+0xc1/0x1d0 [ 176.006769][ T9188] __sys_sendmmsg+0x178/0x300 [ 176.006882][ T9188] __x64_sys_sendmmsg+0x57/0x70 [ 176.006901][ T9188] x64_sys_call+0x1c4a/0x3000 [ 176.006923][ T9188] do_syscall_64+0xd2/0x200 [ 176.006942][ T9188] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 176.006977][ T9188] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 176.007016][ T9188] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 176.007050][ T9188] RIP: 0033:0x7fca64d5efc9 [ 176.007065][ T9188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.007183][ T9188] RSP: 002b:00007fca637bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 176.007201][ T9188] RAX: ffffffffffffffda RBX: 00007fca64fb5fa0 RCX: 00007fca64d5efc9 [ 176.007213][ T9188] RDX: 0000000000000651 RSI: 0000200000000000 RDI: 0000000000000005 [ 176.007236][ T9188] RBP: 00007fca637bf090 R08: 0000000000000000 R09: 0000000000000000 [ 176.007247][ T9188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.007259][ T9188] R13: 00007fca64fb6038 R14: 00007fca64fb5fa0 R15: 00007fffe577e948 [ 176.007305][ T9188] [ 176.009667][ T9182] lo speed is unknown, defaulting to 1000 [ 176.166139][ T9195] netlink: 'syz.2.2245': attribute type 10 has an invalid length. [ 176.166228][ T9195] ipvlan0: entered allmulticast mode [ 176.204259][ T9195] veth0_vlan: entered allmulticast mode [ 176.245559][ T9195] team0: Device ipvlan0 failed to register rx_handler [ 176.301119][ T9180] lo speed is unknown, defaulting to 1000 [ 176.447907][ T9205] netlink: 'syz.1.2254': attribute type 13 has an invalid length. [ 176.455836][ T9205] netlink: 200 bytes leftover after parsing attributes in process `syz.1.2254'. [ 176.510319][ T9212] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 176.525112][ T9212] FAULT_INJECTION: forcing a failure. [ 176.525112][ T9212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.538242][ T9212] CPU: 0 UID: 0 PID: 9212 Comm: syz.1.2258 Not tainted syzkaller #0 PREEMPT(voluntary) [ 176.538297][ T9212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 176.538312][ T9212] Call Trace: [ 176.538320][ T9212] [ 176.538329][ T9212] __dump_stack+0x1d/0x30 [ 176.538355][ T9212] dump_stack_lvl+0xe8/0x140 [ 176.538422][ T9212] dump_stack+0x15/0x1b [ 176.538444][ T9212] should_fail_ex+0x265/0x280 [ 176.538489][ T9212] should_fail+0xb/0x20 [ 176.538550][ T9212] should_fail_usercopy+0x1a/0x20 [ 176.538570][ T9212] _copy_from_user+0x1c/0xb0 [ 176.538597][ T9212] kstrtouint_from_user+0x69/0xf0 [ 176.538622][ T9212] ? 0xffffffff81000000 [ 176.538638][ T9212] ? selinux_file_permission+0x1e4/0x320 [ 176.538746][ T9212] proc_fail_nth_write+0x50/0x160 [ 176.538781][ T9212] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 176.538840][ T9212] vfs_write+0x269/0x960 [ 176.538878][ T9212] ? vfs_read+0x4e6/0x770 [ 176.538904][ T9212] ? __rcu_read_unlock+0x4f/0x70 [ 176.538930][ T9212] ? __fget_files+0x184/0x1c0 [ 176.538972][ T9212] ksys_write+0xda/0x1a0 [ 176.539020][ T9212] __x64_sys_write+0x40/0x50 [ 176.539048][ T9212] x64_sys_call+0x2802/0x3000 [ 176.539069][ T9212] do_syscall_64+0xd2/0x200 [ 176.539087][ T9212] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 176.539137][ T9212] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 176.539252][ T9212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 176.539273][ T9212] RIP: 0033:0x7f817ab0da7f [ 176.539288][ T9212] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 176.539311][ T9212] RSP: 002b:00007f817956f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 176.539406][ T9212] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f817ab0da7f [ 176.539418][ T9212] RDX: 0000000000000001 RSI: 00007f817956f0a0 RDI: 0000000000000004 [ 176.539506][ T9212] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 176.539519][ T9212] R10: 0000200000000d40 R11: 0000000000000293 R12: 0000000000000001 [ 176.539537][ T9212] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 176.539559][ T9212] [ 176.810404][ T9223] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 176.962697][ T29] kauditd_printk_skb: 10638 callbacks suppressed [ 176.962712][ T29] audit: type=1400 audit(1761717632.483:515261): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 177.006603][ T29] audit: type=1326 audit(1761717632.483:515262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9216 comm="syz.4.2260" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78cd3eefc9 code=0x7ffc0000 [ 177.030454][ T29] audit: type=1326 audit(1761717632.483:515263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9216 comm="syz.4.2260" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78cd3eefc9 code=0x7ffc0000 [ 177.042233][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 177.054349][ T29] audit: type=1400 audit(1761717632.513:515264): avc: denied { create } for pid=9234 comm="syz.2.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 177.060585][ T3043] audit: audit_lost=53733 audit_rate_limit=0 audit_backlog_limit=64 [ 177.080404][ T29] audit: type=1400 audit(1761717632.513:515265): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 177.088414][ T3043] audit: backlog limit exceeded [ 177.109612][ T29] audit: type=1400 audit(1761717632.513:515266): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 177.135775][ T29] audit: type=1400 audit(1761717632.513:515267): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 177.235210][ T9239] FAULT_INJECTION: forcing a failure. [ 177.235210][ T9239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.248431][ T9239] CPU: 0 UID: 0 PID: 9239 Comm: syz.4.2269 Not tainted syzkaller #0 PREEMPT(voluntary) [ 177.248461][ T9239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 177.248474][ T9239] Call Trace: [ 177.248550][ T9239] [ 177.248558][ T9239] __dump_stack+0x1d/0x30 [ 177.248582][ T9239] dump_stack_lvl+0xe8/0x140 [ 177.248655][ T9239] dump_stack+0x15/0x1b [ 177.248675][ T9239] should_fail_ex+0x265/0x280 [ 177.248699][ T9239] should_fail+0xb/0x20 [ 177.248779][ T9239] should_fail_usercopy+0x1a/0x20 [ 177.248803][ T9239] _copy_from_user+0x1c/0xb0 [ 177.248834][ T9239] kstrtouint_from_user+0x69/0xf0 [ 177.248991][ T9239] ? 0xffffffff81000000 [ 177.249005][ T9239] ? selinux_file_permission+0x1e4/0x320 [ 177.249045][ T9239] proc_fail_nth_write+0x50/0x160 [ 177.249139][ T9239] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 177.249240][ T9239] vfs_write+0x269/0x960 [ 177.249266][ T9239] ? vfs_read+0x4e6/0x770 [ 177.249288][ T9239] ? __rcu_read_unlock+0x4f/0x70 [ 177.249318][ T9239] ? __fget_files+0x184/0x1c0 [ 177.249422][ T9239] ksys_write+0xda/0x1a0 [ 177.249500][ T9239] __x64_sys_write+0x40/0x50 [ 177.249524][ T9239] x64_sys_call+0x2802/0x3000 [ 177.249630][ T9239] do_syscall_64+0xd2/0x200 [ 177.249648][ T9239] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 177.249675][ T9239] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 177.249707][ T9239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 177.249805][ T9239] RIP: 0033:0x7f78cd3eda7f [ 177.249819][ T9239] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 177.249836][ T9239] RSP: 002b:00007f78cbe57030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 177.249855][ T9239] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f78cd3eda7f [ 177.249871][ T9239] RDX: 0000000000000001 RSI: 00007f78cbe570a0 RDI: 0000000000000003 [ 177.249932][ T9239] RBP: 00007f78cbe57090 R08: 0000000000000000 R09: 0000000000000000 [ 177.249944][ T9239] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 177.249959][ T9239] R13: 00007f78cd646038 R14: 00007f78cd645fa0 R15: 00007ffd43e31e68 [ 177.249979][ T9239] [ 177.842849][ T9259] lo speed is unknown, defaulting to 1000 [ 178.612781][ T9287] geneve4: entered promiscuous mode [ 178.649338][ T321] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 178.663357][ T321] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 178.682418][ T321] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 178.709718][ T321] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.052286][ T9307] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2298'. [ 179.848107][ T9347] FAULT_INJECTION: forcing a failure. [ 179.848107][ T9347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.861299][ T9347] CPU: 1 UID: 0 PID: 9347 Comm: syz.2.2313 Not tainted syzkaller #0 PREEMPT(voluntary) [ 179.861398][ T9347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 179.861411][ T9347] Call Trace: [ 179.861419][ T9347] [ 179.861429][ T9347] __dump_stack+0x1d/0x30 [ 179.861452][ T9347] dump_stack_lvl+0xe8/0x140 [ 179.861472][ T9347] dump_stack+0x15/0x1b [ 179.861489][ T9347] should_fail_ex+0x265/0x280 [ 179.861537][ T9347] should_fail+0xb/0x20 [ 179.861557][ T9347] should_fail_usercopy+0x1a/0x20 [ 179.861581][ T9347] _copy_from_user+0x1c/0xb0 [ 179.861605][ T9347] kstrtouint_from_user+0x69/0xf0 [ 179.861623][ T9347] ? 0xffffffff81000000 [ 179.861640][ T9347] ? selinux_file_permission+0x1e4/0x320 [ 179.861696][ T9347] proc_fail_nth_write+0x50/0x160 [ 179.861736][ T9347] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 179.861820][ T9347] vfs_write+0x269/0x960 [ 179.861850][ T9347] ? vfs_read+0x4e6/0x770 [ 179.861875][ T9347] ? __rcu_read_unlock+0x4f/0x70 [ 179.861900][ T9347] ? __fget_files+0x184/0x1c0 [ 179.861962][ T9347] ksys_write+0xda/0x1a0 [ 179.862001][ T9347] __x64_sys_write+0x40/0x50 [ 179.862066][ T9347] x64_sys_call+0x2802/0x3000 [ 179.862095][ T9347] do_syscall_64+0xd2/0x200 [ 179.862118][ T9347] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 179.862150][ T9347] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 179.862255][ T9347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 179.862280][ T9347] RIP: 0033:0x7f5c18f8da7f [ 179.862294][ T9347] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 179.862312][ T9347] RSP: 002b:00007f5c179f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 179.862331][ T9347] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5c18f8da7f [ 179.862359][ T9347] RDX: 0000000000000001 RSI: 00007f5c179f70a0 RDI: 0000000000000003 [ 179.862373][ T9347] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 179.862384][ T9347] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 179.862398][ T9347] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 179.862415][ T9347] [ 180.283041][ T9356] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 180.405041][ T9362] FAULT_INJECTION: forcing a failure. [ 180.405041][ T9362] name failslab, interval 1, probability 0, space 0, times 0 [ 180.417843][ T9362] CPU: 0 UID: 0 PID: 9362 Comm: syz.3.2321 Not tainted syzkaller #0 PREEMPT(voluntary) [ 180.417877][ T9362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 180.417893][ T9362] Call Trace: [ 180.417910][ T9362] [ 180.417919][ T9362] __dump_stack+0x1d/0x30 [ 180.417958][ T9362] dump_stack_lvl+0xe8/0x140 [ 180.418054][ T9362] dump_stack+0x15/0x1b [ 180.418080][ T9362] should_fail_ex+0x265/0x280 [ 180.418104][ T9362] should_failslab+0x8c/0xb0 [ 180.418210][ T9362] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 180.418251][ T9362] ? security_context_to_sid_core+0x69/0x3b0 [ 180.418292][ T9362] kmemdup_nul+0x36/0xc0 [ 180.418389][ T9362] security_context_to_sid_core+0x69/0x3b0 [ 180.418503][ T9362] ? avc_has_perm_noaudit+0x1b1/0x200 [ 180.418525][ T9362] security_context_to_sid+0x2e/0x40 [ 180.418554][ T9362] selinux_inode_setxattr+0x4af/0x6e0 [ 180.418649][ T9362] security_inode_setxattr+0x13a/0x1b0 [ 180.418727][ T9362] __vfs_setxattr_locked+0x83/0x1d0 [ 180.418836][ T9362] vfs_setxattr+0x132/0x270 [ 180.418871][ T9362] filename_setxattr+0x1ad/0x400 [ 180.418915][ T9362] path_setxattrat+0x2c9/0x310 [ 180.418966][ T9362] __x64_sys_lsetxattr+0x71/0x90 [ 180.419001][ T9362] x64_sys_call+0x287b/0x3000 [ 180.419051][ T9362] do_syscall_64+0xd2/0x200 [ 180.419070][ T9362] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 180.419137][ T9362] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 180.419176][ T9362] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.419205][ T9362] RIP: 0033:0x7fca64d5efc9 [ 180.419225][ T9362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.419329][ T9362] RSP: 002b:00007fca637bf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 180.419430][ T9362] RAX: ffffffffffffffda RBX: 00007fca64fb5fa0 RCX: 00007fca64d5efc9 [ 180.419442][ T9362] RDX: 0000200000000080 RSI: 0000200000000040 RDI: 0000200000000000 [ 180.419454][ T9362] RBP: 00007fca637bf090 R08: 0000000000000001 R09: 0000000000000000 [ 180.419466][ T9362] R10: 0000000000000021 R11: 0000000000000246 R12: 0000000000000001 [ 180.419493][ T9362] R13: 00007fca64fb6038 R14: 00007fca64fb5fa0 R15: 00007fffe577e948 [ 180.419515][ T9362] [ 180.737611][ T9374] IPv6: NLM_F_CREATE should be specified when creating new route [ 180.780930][ T9381] FAULT_INJECTION: forcing a failure. [ 180.780930][ T9381] name failslab, interval 1, probability 0, space 0, times 0 [ 180.793780][ T9381] CPU: 0 UID: 0 PID: 9381 Comm: syz.1.2329 Not tainted syzkaller #0 PREEMPT(voluntary) [ 180.793864][ T9381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 180.793878][ T9381] Call Trace: [ 180.793884][ T9381] [ 180.793892][ T9381] __dump_stack+0x1d/0x30 [ 180.793948][ T9381] dump_stack_lvl+0xe8/0x140 [ 180.793973][ T9381] dump_stack+0x15/0x1b [ 180.793995][ T9381] should_fail_ex+0x265/0x280 [ 180.794018][ T9381] should_failslab+0x8c/0xb0 [ 180.794068][ T9381] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 180.794101][ T9381] ? __d_alloc+0x3d/0x340 [ 180.794148][ T9381] __d_alloc+0x3d/0x340 [ 180.794233][ T9381] d_alloc+0x2e/0x100 [ 180.794266][ T9381] lookup_one_qstr_excl+0x99/0x250 [ 180.794298][ T9381] do_renameat2+0x3b3/0x9e0 [ 180.794342][ T9381] __x64_sys_rename+0x58/0x70 [ 180.794414][ T9381] x64_sys_call+0x1f9/0x3000 [ 180.794442][ T9381] do_syscall_64+0xd2/0x200 [ 180.794466][ T9381] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 180.794559][ T9381] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 180.794598][ T9381] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.794631][ T9381] RIP: 0033:0x7f817ab0efc9 [ 180.794649][ T9381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.794721][ T9381] RSP: 002b:00007f817956f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 180.794745][ T9381] RAX: ffffffffffffffda RBX: 00007f817ad65fa0 RCX: 00007f817ab0efc9 [ 180.794760][ T9381] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000200000000000 [ 180.794782][ T9381] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 180.794798][ T9381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 180.794812][ T9381] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 180.794834][ T9381] [ 181.144108][ T9398] netlink: 'syz.3.2337': attribute type 13 has an invalid length. [ 181.196132][ T9400] FAULT_INJECTION: forcing a failure. [ 181.196132][ T9400] name failslab, interval 1, probability 0, space 0, times 0 [ 181.208848][ T9400] CPU: 1 UID: 0 PID: 9400 Comm: syz.1.2338 Not tainted syzkaller #0 PREEMPT(voluntary) [ 181.208903][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 181.208960][ T9400] Call Trace: [ 181.208969][ T9400] [ 181.208978][ T9400] __dump_stack+0x1d/0x30 [ 181.209007][ T9400] dump_stack_lvl+0xe8/0x140 [ 181.209097][ T9400] dump_stack+0x15/0x1b [ 181.209119][ T9400] should_fail_ex+0x265/0x280 [ 181.209143][ T9400] ? audit_log_d_path+0x8d/0x150 [ 181.209169][ T9400] should_failslab+0x8c/0xb0 [ 181.209258][ T9400] __kmalloc_cache_noprof+0x4c/0x4a0 [ 181.209296][ T9400] audit_log_d_path+0x8d/0x150 [ 181.209316][ T9400] audit_log_d_path_exe+0x42/0x70 [ 181.209339][ T9400] audit_log_task+0x1e9/0x250 [ 181.209491][ T9400] audit_seccomp+0x61/0x100 [ 181.209530][ T9400] ? __seccomp_filter+0x82d/0x1250 [ 181.209564][ T9400] __seccomp_filter+0x83e/0x1250 [ 181.209624][ T9400] ? up_write+0x18/0x60 [ 181.209752][ T9400] ? shmem_file_write_iter+0xd0/0xf0 [ 181.209785][ T9400] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 181.209884][ T9400] ? vfs_write+0x7e8/0x960 [ 181.209996][ T9400] __secure_computing+0x82/0x150 [ 181.210029][ T9400] syscall_trace_enter+0xcf/0x1e0 [ 181.210057][ T9400] do_syscall_64+0xac/0x200 [ 181.210075][ T9400] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 181.210156][ T9400] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 181.210196][ T9400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 181.210218][ T9400] RIP: 0033:0x7f817ab0d9dc [ 181.210233][ T9400] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 181.210294][ T9400] RSP: 002b:00007f817956f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 181.210312][ T9400] RAX: ffffffffffffffda RBX: 00007f817ad65fa0 RCX: 00007f817ab0d9dc [ 181.210324][ T9400] RDX: 000000000000000f RSI: 00007f817956f0a0 RDI: 0000000000000004 [ 181.210336][ T9400] RBP: 00007f817956f090 R08: 0000000000000000 R09: 0000000000000000 [ 181.210350][ T9400] R10: 000000000004fed0 R11: 0000000000000246 R12: 0000000000000002 [ 181.210364][ T9400] R13: 00007f817ad66038 R14: 00007f817ad65fa0 R15: 00007ffd6d1a0758 [ 181.210382][ T9400] [ 181.469832][ T9398] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 181.480619][ T9398] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 181.548227][ T321] netdevsim netdevsim3 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 181.557279][ T321] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.566255][ T321] netdevsim netdevsim3 netdevsim0: unset [1, 1] type 2 family 0 port 20000 - 0 [ 181.636584][ T321] netdevsim netdevsim3 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 181.645870][ T321] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.654912][ T321] netdevsim netdevsim3 netdevsim1: unset [1, 1] type 2 family 0 port 20000 - 0 [ 181.680522][ T321] netdevsim netdevsim3 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 181.685650][ T9408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9408 comm=syz.3.2341 [ 181.689623][ T321] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.710842][ T321] netdevsim netdevsim3 netdevsim2: unset [1, 1] type 2 family 0 port 20000 - 0 [ 181.733612][ T9408] dummy0: entered promiscuous mode [ 181.753123][ T9408] bond_slave_0: entered promiscuous mode [ 181.786944][ T9408] debugfs: 'hsr0' already exists in 'hsr' [ 181.792765][ T9408] Cannot create hsr debugfs directory [ 181.835315][ T9408] hsr0: Slave A (dummy0) is not up; please bring it up to get a fully working HSR network [ 181.845301][ T9408] hsr0: Slave B (bond_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.891520][ T9418] netlink: 'syz.4.2345': attribute type 2 has an invalid length. [ 181.898731][ T9408] hsr0: entered promiscuous mode [ 181.927371][ T321] netdevsim netdevsim3 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 181.936374][ T321] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.945310][ T321] netdevsim netdevsim3 netdevsim3: unset [1, 1] type 2 family 0 port 20000 - 0 [ 181.972615][ T29] kauditd_printk_skb: 11456 callbacks suppressed [ 181.972628][ T29] audit: type=1400 audit(1761717637.483:526487): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 182.003907][ T29] audit: type=1400 audit(1761717637.493:526488): avc: denied { map_create } for pid=9422 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 182.023363][ T29] audit: type=1400 audit(1761717637.493:526489): avc: denied { prog_load } for pid=9422 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 182.023390][ T9430] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 182.042884][ T29] audit: type=1400 audit(1761717637.493:526490): avc: denied { prog_load } for pid=9422 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 182.042916][ T29] audit: type=1400 audit(1761717637.493:526491): avc: denied { map_create } for pid=9426 comm="syz.1.2349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 182.076866][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.089929][ T29] audit: type=1400 audit(1761717637.493:526492): avc: denied { prog_load } for pid=9426 comm="syz.1.2349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 182.096550][ T3043] audit: audit_lost=53813 audit_rate_limit=0 audit_backlog_limit=64 [ 182.096568][ T3043] audit: backlog limit exceeded [ 182.097256][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.421338][ T9455] netlink: 168 bytes leftover after parsing attributes in process `syz.1.2360'. [ 182.450028][ T9455] netlink: 'syz.1.2360': attribute type 16 has an invalid length. [ 182.457980][ T9455] netlink: 156 bytes leftover after parsing attributes in process `syz.1.2360'. [ 182.764274][ T9476] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 182.826697][ T9473] lo speed is unknown, defaulting to 1000 [ 182.925893][ T9480] netlink: 'syz.1.2372': attribute type 1 has an invalid length. [ 182.941616][ T9480] 8021q: adding VLAN 0 to HW filter on device bond2 [ 182.964455][ T9480] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2372'. [ 182.984234][ T9480] bond2 (unregistering): Released all slaves [ 183.040301][ T9490] FAULT_INJECTION: forcing a failure. [ 183.040301][ T9490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.053506][ T9490] CPU: 0 UID: 0 PID: 9490 Comm: syz.2.2373 Not tainted syzkaller #0 PREEMPT(voluntary) [ 183.053540][ T9490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 183.053556][ T9490] Call Trace: [ 183.053565][ T9490] [ 183.053574][ T9490] __dump_stack+0x1d/0x30 [ 183.053602][ T9490] dump_stack_lvl+0xe8/0x140 [ 183.053622][ T9490] dump_stack+0x15/0x1b [ 183.053667][ T9490] should_fail_ex+0x265/0x280 [ 183.053692][ T9490] should_fail+0xb/0x20 [ 183.053712][ T9490] should_fail_usercopy+0x1a/0x20 [ 183.053801][ T9490] _copy_to_user+0x20/0xa0 [ 183.053826][ T9490] simple_read_from_buffer+0xb5/0x130 [ 183.053850][ T9490] proc_fail_nth_read+0x10e/0x150 [ 183.053886][ T9490] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 183.053920][ T9490] vfs_read+0x1a8/0x770 [ 183.053943][ T9490] ? __rcu_read_unlock+0x4f/0x70 [ 183.053972][ T9490] ? __fget_files+0x184/0x1c0 [ 183.054023][ T9490] ksys_read+0xda/0x1a0 [ 183.054050][ T9490] __x64_sys_read+0x40/0x50 [ 183.054091][ T9490] x64_sys_call+0x27c0/0x3000 [ 183.054117][ T9490] do_syscall_64+0xd2/0x200 [ 183.054135][ T9490] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 183.054162][ T9490] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 183.054224][ T9490] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.054265][ T9490] RIP: 0033:0x7f5c18f8d9dc [ 183.054284][ T9490] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 183.054307][ T9490] RSP: 002b:00007f5c179f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 183.054330][ T9490] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8d9dc [ 183.054410][ T9490] RDX: 000000000000000f RSI: 00007f5c179f70a0 RDI: 0000000000000003 [ 183.054426][ T9490] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 183.054439][ T9490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.054450][ T9490] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 183.054468][ T9490] [ 183.429065][ T9505] netlink: 'syz.4.2375': attribute type 4 has an invalid length. [ 183.928832][ T9534] FAULT_INJECTION: forcing a failure. [ 183.928832][ T9534] name failslab, interval 1, probability 0, space 0, times 0 [ 183.941540][ T9534] CPU: 1 UID: 0 PID: 9534 Comm: syz.0.2393 Not tainted syzkaller #0 PREEMPT(voluntary) [ 183.941574][ T9534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 183.941590][ T9534] Call Trace: [ 183.941598][ T9534] [ 183.941608][ T9534] __dump_stack+0x1d/0x30 [ 183.941636][ T9534] dump_stack_lvl+0xe8/0x140 [ 183.941750][ T9534] dump_stack+0x15/0x1b [ 183.941768][ T9534] should_fail_ex+0x265/0x280 [ 183.941814][ T9534] should_failslab+0x8c/0xb0 [ 183.941849][ T9534] kmem_cache_alloc_noprof+0x50/0x480 [ 183.941884][ T9534] ? audit_log_start+0x342/0x720 [ 183.941911][ T9534] audit_log_start+0x342/0x720 [ 183.941989][ T9534] ? kstrtouint+0x76/0xc0 [ 183.942019][ T9534] audit_seccomp+0x48/0x100 [ 183.942124][ T9534] ? __seccomp_filter+0x82d/0x1250 [ 183.942224][ T9534] __seccomp_filter+0x83e/0x1250 [ 183.942261][ T9534] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 183.942377][ T9534] ? vfs_write+0x7e8/0x960 [ 183.942400][ T9534] ? __rcu_read_unlock+0x4f/0x70 [ 183.942430][ T9534] ? __fget_files+0x184/0x1c0 [ 183.942498][ T9534] __secure_computing+0x82/0x150 [ 183.942532][ T9534] syscall_trace_enter+0xcf/0x1e0 [ 183.942645][ T9534] do_syscall_64+0xac/0x200 [ 183.942671][ T9534] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 183.942709][ T9534] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.942763][ T9534] RIP: 0033:0x7ff816e8efc9 [ 183.942781][ T9534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.942800][ T9534] RSP: 002b:00007ff8158ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 183.942818][ T9534] RAX: ffffffffffffffda RBX: 00007ff8170e5fa0 RCX: 00007ff816e8efc9 [ 183.942830][ T9534] RDX: 0000000000000004 RSI: 0000200000000080 RDI: 0000000000000022 [ 183.942843][ T9534] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 183.942858][ T9534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.942914][ T9534] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 183.942936][ T9534] [ 184.343930][ T9548] FAULT_INJECTION: forcing a failure. [ 184.343930][ T9548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 184.357273][ T9548] CPU: 1 UID: 0 PID: 9548 Comm: syz.1.2398 Not tainted syzkaller #0 PREEMPT(voluntary) [ 184.357306][ T9548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 184.357322][ T9548] Call Trace: [ 184.357331][ T9548] [ 184.357340][ T9548] __dump_stack+0x1d/0x30 [ 184.357391][ T9548] dump_stack_lvl+0xe8/0x140 [ 184.357416][ T9548] dump_stack+0x15/0x1b [ 184.357486][ T9548] should_fail_ex+0x265/0x280 [ 184.357507][ T9548] should_fail_alloc_page+0xf2/0x100 [ 184.357542][ T9548] __alloc_frozen_pages_noprof+0xff/0x360 [ 184.357580][ T9548] alloc_pages_mpol+0xb3/0x260 [ 184.357618][ T9548] alloc_pages_noprof+0x90/0x130 [ 184.357645][ T9548] pte_alloc_one+0x1e/0xd0 [ 184.357677][ T9548] __pte_alloc+0x32/0x290 [ 184.357716][ T9548] handle_mm_fault+0x1c18/0x2be0 [ 184.357772][ T9548] ? vma_start_read+0x141/0x1f0 [ 184.357809][ T9548] do_user_addr_fault+0x630/0x1080 [ 184.357832][ T9548] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 184.357991][ T9548] exc_page_fault+0x62/0xa0 [ 184.358029][ T9548] asm_exc_page_fault+0x26/0x30 [ 184.358054][ T9548] RIP: 0033:0x7f817a9d0ca6 [ 184.358072][ T9548] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 184.358091][ T9548] RSP: 002b:00007f817956e4a0 EFLAGS: 00010246 [ 184.358115][ T9548] RAX: 0000000000000001 RBX: 00007f817956e540 RCX: 0000000000000101 [ 184.358127][ T9548] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007f817956e5e0 [ 184.358139][ T9548] RBP: 0000000000000102 R08: 00007f817114f000 R09: 0000000000000000 [ 184.358150][ T9548] R10: 0000000000000000 R11: 00007f817956e550 R12: 0000000000000001 [ 184.358164][ T9548] R13: 00007f817abadc40 R14: 0000000000000000 R15: 00007f817956e5e0 [ 184.358185][ T9548] [ 184.358197][ T9548] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 185.387121][ T9588] FAULT_INJECTION: forcing a failure. [ 185.387121][ T9588] name failslab, interval 1, probability 0, space 0, times 0 [ 185.400015][ T9588] CPU: 0 UID: 0 PID: 9588 Comm: syz.2.2413 Not tainted syzkaller #0 PREEMPT(voluntary) [ 185.400045][ T9588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 185.400061][ T9588] Call Trace: [ 185.400070][ T9588] [ 185.400080][ T9588] __dump_stack+0x1d/0x30 [ 185.400108][ T9588] dump_stack_lvl+0xe8/0x140 [ 185.400130][ T9588] dump_stack+0x15/0x1b [ 185.400186][ T9588] should_fail_ex+0x265/0x280 [ 185.400207][ T9588] ? tcf_exts_init_ex+0x9a/0x340 [ 185.400306][ T9588] should_failslab+0x8c/0xb0 [ 185.400357][ T9588] __kmalloc_cache_noprof+0x4c/0x4a0 [ 185.400399][ T9588] tcf_exts_init_ex+0x9a/0x340 [ 185.400437][ T9588] flow_change+0x22d/0xc80 [ 185.400521][ T9588] ? __pfx_flow_change+0x10/0x10 [ 185.400554][ T9588] tc_new_tfilter+0xde4/0x10a0 [ 185.400577][ T9588] ? __rcu_read_unlock+0x4f/0x70 [ 185.400621][ T9588] ? ns_capable+0x7d/0xb0 [ 185.400685][ T9588] ? __pfx_tc_new_tfilter+0x10/0x10 [ 185.400709][ T9588] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 185.400743][ T9588] netlink_rcv_skb+0x123/0x220 [ 185.400791][ T9588] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 185.400826][ T9588] rtnetlink_rcv+0x1c/0x30 [ 185.400883][ T9588] netlink_unicast+0x5c0/0x690 [ 185.400916][ T9588] netlink_sendmsg+0x58b/0x6b0 [ 185.400935][ T9588] ? __pfx_netlink_sendmsg+0x10/0x10 [ 185.400953][ T9588] __sock_sendmsg+0x145/0x180 [ 185.400990][ T9588] ____sys_sendmsg+0x31e/0x4e0 [ 185.401033][ T9588] ___sys_sendmsg+0x17b/0x1d0 [ 185.401080][ T9588] __x64_sys_sendmsg+0xd4/0x160 [ 185.401177][ T9588] x64_sys_call+0x191e/0x3000 [ 185.401204][ T9588] do_syscall_64+0xd2/0x200 [ 185.401227][ T9588] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 185.401261][ T9588] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 185.401303][ T9588] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 185.401324][ T9588] RIP: 0033:0x7f5c18f8efc9 [ 185.401412][ T9588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.401444][ T9588] RSP: 002b:00007f5c179f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 185.401468][ T9588] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8efc9 [ 185.401480][ T9588] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000004 [ 185.401492][ T9588] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 185.401503][ T9588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 185.401524][ T9588] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 185.401552][ T9588] [ 185.974474][ T9621] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2424'. [ 186.022909][ T9624] netlink: 'syz.1.2425': attribute type 10 has an invalid length. [ 186.041455][ T9624] netlink: 'syz.1.2425': attribute type 10 has an invalid length. [ 186.059720][ T9621] bridge0: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 186.983189][ T29] kauditd_printk_skb: 16679 callbacks suppressed [ 186.983289][ T29] audit: type=1400 audit(1761717642.503:540726): avc: denied { prog_load } for pid=9635 comm="syz.2.2431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 187.003740][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.015749][ T3043] audit: audit_lost=54630 audit_rate_limit=0 audit_backlog_limit=64 [ 187.023853][ T3043] audit: backlog limit exceeded [ 187.073589][ T3319] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.080216][ T3319] audit: audit_lost=54631 audit_rate_limit=0 audit_backlog_limit=64 [ 187.088343][ T3319] audit: backlog limit exceeded [ 187.093847][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.100512][ T3043] audit: audit_lost=54632 audit_rate_limit=0 audit_backlog_limit=64 [ 187.108648][ T3043] audit: backlog limit exceeded [ 187.294869][ T9640] FAULT_INJECTION: forcing a failure. [ 187.294869][ T9640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.308007][ T9640] CPU: 0 UID: 0 PID: 9640 Comm: syz.2.2432 Not tainted syzkaller #0 PREEMPT(voluntary) [ 187.308079][ T9640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 187.308094][ T9640] Call Trace: [ 187.308101][ T9640] [ 187.308110][ T9640] __dump_stack+0x1d/0x30 [ 187.308139][ T9640] dump_stack_lvl+0xe8/0x140 [ 187.308163][ T9640] dump_stack+0x15/0x1b [ 187.308180][ T9640] should_fail_ex+0x265/0x280 [ 187.308247][ T9640] should_fail+0xb/0x20 [ 187.308268][ T9640] should_fail_usercopy+0x1a/0x20 [ 187.308348][ T9640] _copy_from_user+0x1c/0xb0 [ 187.308378][ T9640] kstrtouint_from_user+0x69/0xf0 [ 187.308402][ T9640] ? 0xffffffff81000000 [ 187.308419][ T9640] ? selinux_file_permission+0x1e4/0x320 [ 187.308535][ T9640] proc_fail_nth_write+0x50/0x160 [ 187.308658][ T9640] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 187.308733][ T9640] vfs_write+0x269/0x960 [ 187.308762][ T9640] ? vfs_read+0x4e6/0x770 [ 187.308791][ T9640] ? __rcu_read_unlock+0x4f/0x70 [ 187.308866][ T9640] ? __fget_files+0x184/0x1c0 [ 187.308902][ T9640] ksys_write+0xda/0x1a0 [ 187.308966][ T9640] __x64_sys_write+0x40/0x50 [ 187.308999][ T9640] x64_sys_call+0x2802/0x3000 [ 187.309028][ T9640] do_syscall_64+0xd2/0x200 [ 187.309050][ T9640] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 187.309084][ T9640] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 187.309144][ T9640] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 187.309169][ T9640] RIP: 0033:0x7f5c18f8da7f [ 187.309232][ T9640] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 187.309255][ T9640] RSP: 002b:00007f5c179f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 187.309278][ T9640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5c18f8da7f [ 187.309294][ T9640] RDX: 0000000000000001 RSI: 00007f5c179f70a0 RDI: 0000000000000003 [ 187.309310][ T9640] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 187.309325][ T9640] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 187.309340][ T9640] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 187.309365][ T9640] [ 187.597892][ T9649] netlink: 'syz.0.2436': attribute type 10 has an invalid length. [ 187.654730][ T9649] netlink: 'syz.0.2436': attribute type 10 has an invalid length. [ 187.703217][ T9649] team0: Port device dummy0 removed [ 187.721139][ T9649] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 187.770425][ T9660] FAULT_INJECTION: forcing a failure. [ 187.770425][ T9660] name failslab, interval 1, probability 0, space 0, times 0 [ 187.783140][ T9660] CPU: 1 UID: 0 PID: 9660 Comm: syz.2.2440 Not tainted syzkaller #0 PREEMPT(voluntary) [ 187.783173][ T9660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 187.783189][ T9660] Call Trace: [ 187.783197][ T9660] [ 187.783206][ T9660] __dump_stack+0x1d/0x30 [ 187.783336][ T9660] dump_stack_lvl+0xe8/0x140 [ 187.783355][ T9660] dump_stack+0x15/0x1b [ 187.783374][ T9660] should_fail_ex+0x265/0x280 [ 187.783450][ T9660] should_failslab+0x8c/0xb0 [ 187.783487][ T9660] __kvmalloc_node_noprof+0x12e/0x670 [ 187.783520][ T9660] ? simple_xattr_alloc+0x48/0x90 [ 187.783586][ T9660] simple_xattr_alloc+0x48/0x90 [ 187.783621][ T9660] shmem_initxattrs+0x18c/0x350 [ 187.783726][ T9660] security_inode_init_security+0x25c/0x330 [ 187.783780][ T9660] ? __pfx_shmem_initxattrs+0x10/0x10 [ 187.783811][ T9660] shmem_mknod+0xad/0x180 [ 187.783898][ T9660] shmem_create+0x34/0x50 [ 187.783927][ T9660] ? __pfx_shmem_create+0x10/0x10 [ 187.783957][ T9660] path_openat+0x1105/0x2170 [ 187.784015][ T9660] do_filp_open+0x109/0x230 [ 187.784100][ T9660] do_sys_openat2+0xa6/0x110 [ 187.784131][ T9660] __x64_sys_openat+0xf2/0x120 [ 187.784152][ T9660] x64_sys_call+0x2eab/0x3000 [ 187.784177][ T9660] do_syscall_64+0xd2/0x200 [ 187.784200][ T9660] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 187.784270][ T9660] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 187.784368][ T9660] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 187.784393][ T9660] RIP: 0033:0x7f5c18f8efc9 [ 187.784412][ T9660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.784464][ T9660] RSP: 002b:00007f5c179f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 187.784482][ T9660] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8efc9 [ 187.784494][ T9660] RDX: 0000000000048041 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 187.784506][ T9660] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 187.784520][ T9660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 187.784610][ T9660] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 187.784633][ T9660] [ 189.267570][ T9688] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2452'. [ 189.298721][ T9688] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2452'. [ 189.840984][ T9711] lo speed is unknown, defaulting to 1000 [ 190.536980][ T9719] FAULT_INJECTION: forcing a failure. [ 190.536980][ T9719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.550135][ T9719] CPU: 0 UID: 0 PID: 9719 Comm: syz.2.2465 Not tainted syzkaller #0 PREEMPT(voluntary) [ 190.550173][ T9719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 190.550189][ T9719] Call Trace: [ 190.550197][ T9719] [ 190.550206][ T9719] __dump_stack+0x1d/0x30 [ 190.550235][ T9719] dump_stack_lvl+0xe8/0x140 [ 190.550261][ T9719] dump_stack+0x15/0x1b [ 190.550284][ T9719] should_fail_ex+0x265/0x280 [ 190.550374][ T9719] should_fail+0xb/0x20 [ 190.550395][ T9719] should_fail_usercopy+0x1a/0x20 [ 190.550415][ T9719] _copy_from_user+0x1c/0xb0 [ 190.550440][ T9719] io_submit_one+0x52/0x11d0 [ 190.550544][ T9719] __se_sys_io_submit+0xfb/0x280 [ 190.550579][ T9719] __x64_sys_io_submit+0x43/0x50 [ 190.550608][ T9719] x64_sys_call+0x2d6c/0x3000 [ 190.550681][ T9719] do_syscall_64+0xd2/0x200 [ 190.550705][ T9719] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 190.550741][ T9719] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 190.550781][ T9719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.550842][ T9719] RIP: 0033:0x7f5c18f8efc9 [ 190.550857][ T9719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.550876][ T9719] RSP: 002b:00007f5c179f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 190.550900][ T9719] RAX: ffffffffffffffda RBX: 00007f5c191e5fa0 RCX: 00007f5c18f8efc9 [ 190.550942][ T9719] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007f5c179b3000 [ 190.550959][ T9719] RBP: 00007f5c179f7090 R08: 0000000000000000 R09: 0000000000000000 [ 190.550975][ T9719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.550991][ T9719] R13: 00007f5c191e6038 R14: 00007f5c191e5fa0 R15: 00007fff56d6f208 [ 190.551015][ T9719] [ 190.973160][ T9729] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2471'. [ 192.003651][ T29] kauditd_printk_skb: 26678 callbacks suppressed [ 192.003665][ T29] audit: type=1400 audit(1761717647.523:550224): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.031373][ T29] audit: type=1400 audit(1761717647.523:550225): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.052628][ T29] audit: type=1400 audit(1761717647.523:550226): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.073891][ T29] audit: type=1400 audit(1761717647.523:550227): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.095225][ T29] audit: type=1400 audit(1761717647.523:550228): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.116551][ T29] audit: type=1400 audit(1761717647.523:550229): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.137895][ T29] audit: type=1400 audit(1761717647.523:550230): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.159188][ T29] audit: type=1400 audit(1761717647.523:550231): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.180430][ T29] audit: type=1400 audit(1761717647.523:550232): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.199846][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.215667][ T9759] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2484'. [ 192.236958][ T9763] FAULT_INJECTION: forcing a failure. [ 192.236958][ T9763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.250146][ T9763] CPU: 0 UID: 0 PID: 9763 Comm: syz.3.2480 Not tainted syzkaller #0 PREEMPT(voluntary) [ 192.250175][ T9763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 192.250187][ T9763] Call Trace: [ 192.250230][ T9763] [ 192.250239][ T9763] __dump_stack+0x1d/0x30 [ 192.250268][ T9763] dump_stack_lvl+0xe8/0x140 [ 192.250293][ T9763] dump_stack+0x15/0x1b [ 192.250315][ T9763] should_fail_ex+0x265/0x280 [ 192.250337][ T9763] should_fail+0xb/0x20 [ 192.250375][ T9763] should_fail_usercopy+0x1a/0x20 [ 192.250402][ T9763] _copy_to_user+0x20/0xa0 [ 192.250435][ T9763] copy_siginfo_to_user+0x22/0xb0 [ 192.250467][ T9763] x64_setup_rt_frame+0x2b5/0x580 [ 192.250492][ T9763] arch_do_signal_or_restart+0x23e/0x440 [ 192.250535][ T9763] irqentry_exit_to_user_mode+0x5b/0xa0 [ 192.250569][ T9763] irqentry_exit+0x12/0x50 [ 192.250604][ T9763] asm_exc_page_fault+0x26/0x30 [ 192.250629][ T9763] RIP: 0033:0x7fca64c1eaa0 [ 192.250726][ T9763] Code: 80 00 00 31 ff c1 e6 06 e8 6d 05 14 00 8b 55 40 49 89 07 49 03 55 00 45 85 f6 74 1b 44 89 f3 31 c0 66 0f 1f 84 00 00 00 00 00 <89> 02 83 c0 01 48 83 c2 04 39 c3 75 f3 48 83 c4 28 44 89 e0 5b 5d [ 192.250746][ T9763] RSP: 002b:00007fca637befd0 EFLAGS: 00010246 [ 192.250761][ T9763] RAX: 0000000000000000 RBX: 000000000000088f RCX: 00007fca64d5f003 [ 192.250803][ T9763] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000000000000 [ 192.250819][ T9763] RBP: 0000200000000340 R08: 00000000ffffffff R09: 0000000010000000 [ 192.250835][ T9763] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 192.250850][ T9763] R13: 00002000000003c0 R14: 000000000000088f R15: 0000200000000300 [ 192.250872][ T9763] [ 192.477804][ T9767] FAULT_INJECTION: forcing a failure. [ 192.477804][ T9767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.491046][ T9767] CPU: 0 UID: 0 PID: 9767 Comm: syz.4.2487 Not tainted syzkaller #0 PREEMPT(voluntary) [ 192.491079][ T9767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 192.491095][ T9767] Call Trace: [ 192.491104][ T9767] [ 192.491115][ T9767] __dump_stack+0x1d/0x30 [ 192.491183][ T9767] dump_stack_lvl+0xe8/0x140 [ 192.491205][ T9767] dump_stack+0x15/0x1b [ 192.491222][ T9767] should_fail_ex+0x265/0x280 [ 192.491343][ T9767] should_fail+0xb/0x20 [ 192.491363][ T9767] should_fail_usercopy+0x1a/0x20 [ 192.491385][ T9767] _copy_to_user+0x20/0xa0 [ 192.491484][ T9767] simple_read_from_buffer+0xb5/0x130 [ 192.491719][ T9767] proc_fail_nth_read+0x10e/0x150 [ 192.491754][ T9767] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 192.491859][ T9767] vfs_read+0x1a8/0x770 [ 192.491889][ T9767] ? __rcu_read_unlock+0x4f/0x70 [ 192.491928][ T9767] ? __fget_files+0x184/0x1c0 [ 192.491956][ T9767] ksys_read+0xda/0x1a0 [ 192.491988][ T9767] __x64_sys_read+0x40/0x50 [ 192.492015][ T9767] x64_sys_call+0x27c0/0x3000 [ 192.492065][ T9767] do_syscall_64+0xd2/0x200 [ 192.492089][ T9767] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 192.492123][ T9767] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 192.492162][ T9767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.492256][ T9767] RIP: 0033:0x7f78cd3ed9dc [ 192.492307][ T9767] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 192.492326][ T9767] RSP: 002b:00007f78cbe57030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 192.492345][ T9767] RAX: ffffffffffffffda RBX: 00007f78cd645fa0 RCX: 00007f78cd3ed9dc [ 192.492358][ T9767] RDX: 000000000000000f RSI: 00007f78cbe570a0 RDI: 0000000000000003 [ 192.492369][ T9767] RBP: 00007f78cbe57090 R08: 0000000000000000 R09: 0000000000000000 [ 192.492381][ T9767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.492396][ T9767] R13: 00007f78cd646038 R14: 00007f78cd645fa0 R15: 00007ffd43e31e68 [ 192.492453][ T9767] [ 192.790410][ T9777] FAULT_INJECTION: forcing a failure. [ 192.790410][ T9777] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.803647][ T9777] CPU: 1 UID: 0 PID: 9777 Comm: syz.0.2490 Not tainted syzkaller #0 PREEMPT(voluntary) [ 192.803762][ T9777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 192.803779][ T9777] Call Trace: [ 192.803789][ T9777] [ 192.803799][ T9777] __dump_stack+0x1d/0x30 [ 192.803823][ T9777] dump_stack_lvl+0xe8/0x140 [ 192.803845][ T9777] dump_stack+0x15/0x1b [ 192.803906][ T9777] should_fail_ex+0x265/0x280 [ 192.803958][ T9777] should_fail+0xb/0x20 [ 192.803975][ T9777] should_fail_usercopy+0x1a/0x20 [ 192.803996][ T9777] _copy_from_user+0x1c/0xb0 [ 192.804030][ T9777] kstrtouint_from_user+0x69/0xf0 [ 192.804056][ T9777] ? 0xffffffff81000000 [ 192.804090][ T9777] ? selinux_file_permission+0x1e4/0x320 [ 192.804132][ T9777] proc_fail_nth_write+0x50/0x160 [ 192.804167][ T9777] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 192.804273][ T9777] vfs_write+0x269/0x960 [ 192.804304][ T9777] ? vfs_read+0x4e6/0x770 [ 192.804326][ T9777] ? __rcu_read_unlock+0x4f/0x70 [ 192.804387][ T9777] ? __fget_files+0x184/0x1c0 [ 192.804425][ T9777] ksys_write+0xda/0x1a0 [ 192.804451][ T9777] __x64_sys_write+0x40/0x50 [ 192.804480][ T9777] x64_sys_call+0x2802/0x3000 [ 192.804556][ T9777] do_syscall_64+0xd2/0x200 [ 192.804579][ T9777] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 192.804606][ T9777] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 192.804637][ T9777] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.804668][ T9777] RIP: 0033:0x7ff816e8da7f [ 192.804683][ T9777] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 192.804705][ T9777] RSP: 002b:00007ff8158ef030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 192.804728][ T9777] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff816e8da7f [ 192.804743][ T9777] RDX: 0000000000000001 RSI: 00007ff8158ef0a0 RDI: 0000000000000003 [ 192.804754][ T9777] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 192.804768][ T9777] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 192.804795][ T9777] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 192.804813][ T9777] [ 193.456415][ T9791] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2479'. [ 193.576647][ T9799] netlink: 'syz.2.2498': attribute type 10 has an invalid length. [ 193.810064][ T9801] FAULT_INJECTION: forcing a failure. [ 193.810064][ T9801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.823231][ T9801] CPU: 1 UID: 0 PID: 9801 Comm: syz.0.2499 Not tainted syzkaller #0 PREEMPT(voluntary) [ 193.823263][ T9801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 193.823351][ T9801] Call Trace: [ 193.823359][ T9801] [ 193.823367][ T9801] __dump_stack+0x1d/0x30 [ 193.823389][ T9801] dump_stack_lvl+0xe8/0x140 [ 193.823413][ T9801] dump_stack+0x15/0x1b [ 193.823435][ T9801] should_fail_ex+0x265/0x280 [ 193.823460][ T9801] should_fail+0xb/0x20 [ 193.823481][ T9801] should_fail_usercopy+0x1a/0x20 [ 193.823544][ T9801] _copy_from_user+0x1c/0xb0 [ 193.823577][ T9801] kstrtouint_from_user+0x69/0xf0 [ 193.823666][ T9801] ? 0xffffffff81000000 [ 193.823679][ T9801] ? selinux_file_permission+0x1e4/0x320 [ 193.823748][ T9801] proc_fail_nth_write+0x50/0x160 [ 193.823844][ T9801] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 193.823876][ T9801] vfs_write+0x269/0x960 [ 193.823907][ T9801] ? __fget_files+0x161/0x1c0 [ 193.823997][ T9801] ? __rcu_read_unlock+0x4f/0x70 [ 193.824029][ T9801] ? __fget_files+0x184/0x1c0 [ 193.824059][ T9801] ? finish_task_switch+0xad/0x2b0 [ 193.824092][ T9801] ksys_write+0xda/0x1a0 [ 193.824131][ T9801] __x64_sys_write+0x40/0x50 [ 193.824156][ T9801] x64_sys_call+0x2802/0x3000 [ 193.824180][ T9801] do_syscall_64+0xd2/0x200 [ 193.824204][ T9801] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 193.824292][ T9801] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 193.824326][ T9801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 193.824358][ T9801] RIP: 0033:0x7ff816e8da7f [ 193.824376][ T9801] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 193.824398][ T9801] RSP: 002b:00007ff8158ef030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 193.824416][ T9801] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff816e8da7f [ 193.824428][ T9801] RDX: 0000000000000001 RSI: 00007ff8158ef0a0 RDI: 0000000000000003 [ 193.824443][ T9801] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 193.824533][ T9801] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 193.824595][ T9801] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 193.824617][ T9801] [ 194.177821][ T9805] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2500'. [ 194.195995][ T9805] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2500'. [ 194.356241][ T9814] FAULT_INJECTION: forcing a failure. [ 194.356241][ T9814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 194.369447][ T9814] CPU: 1 UID: 0 PID: 9814 Comm: syz.0.2503 Not tainted syzkaller #0 PREEMPT(voluntary) [ 194.369482][ T9814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 194.369498][ T9814] Call Trace: [ 194.369507][ T9814] [ 194.369517][ T9814] __dump_stack+0x1d/0x30 [ 194.369602][ T9814] dump_stack_lvl+0xe8/0x140 [ 194.369629][ T9814] dump_stack+0x15/0x1b [ 194.369651][ T9814] should_fail_ex+0x265/0x280 [ 194.369720][ T9814] should_fail+0xb/0x20 [ 194.369736][ T9814] should_fail_usercopy+0x1a/0x20 [ 194.369756][ T9814] _copy_from_user+0x1c/0xb0 [ 194.369780][ T9814] snd_seq_ioctl+0x125/0x300 [ 194.369814][ T9814] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 194.369910][ T9814] __se_sys_ioctl+0xce/0x140 [ 194.369951][ T9814] __x64_sys_ioctl+0x43/0x50 [ 194.369977][ T9814] x64_sys_call+0x1816/0x3000 [ 194.370005][ T9814] do_syscall_64+0xd2/0x200 [ 194.370023][ T9814] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 194.370053][ T9814] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 194.370096][ T9814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.370117][ T9814] RIP: 0033:0x7ff816e8efc9 [ 194.370132][ T9814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.370154][ T9814] RSP: 002b:00007ff8158ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 194.370258][ T9814] RAX: ffffffffffffffda RBX: 00007ff8170e5fa0 RCX: 00007ff816e8efc9 [ 194.370270][ T9814] RDX: 0000200000001140 RSI: 000000004058534c RDI: 0000000000000005 [ 194.370282][ T9814] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 194.370295][ T9814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.370338][ T9814] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 194.370358][ T9814] [ 194.642629][ T9812] netlink: 48 bytes leftover after parsing attributes in process `syz.1.2502'. [ 194.800245][ T9828] netlink: 'syz.0.2508': attribute type 13 has an invalid length. [ 194.808222][ T9828] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2508'. [ 195.433281][ T9844] FAULT_INJECTION: forcing a failure. [ 195.433281][ T9844] name failslab, interval 1, probability 0, space 0, times 0 [ 195.445967][ T9844] CPU: 1 UID: 0 PID: 9844 Comm: syz.3.2514 Not tainted syzkaller #0 PREEMPT(voluntary) [ 195.445996][ T9844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 195.446009][ T9844] Call Trace: [ 195.446016][ T9844] [ 195.446024][ T9844] __dump_stack+0x1d/0x30 [ 195.446072][ T9844] dump_stack_lvl+0xe8/0x140 [ 195.446092][ T9844] dump_stack+0x15/0x1b [ 195.446153][ T9844] should_fail_ex+0x265/0x280 [ 195.446174][ T9844] ? cgroup_pidlist_start+0x495/0x840 [ 195.446203][ T9844] should_failslab+0x8c/0xb0 [ 195.446233][ T9844] __kmalloc_cache_noprof+0x4c/0x4a0 [ 195.446307][ T9844] cgroup_pidlist_start+0x495/0x840 [ 195.446341][ T9844] cgroup_seqfile_start+0x58/0x70 [ 195.446379][ T9844] kernfs_seq_start+0xb4/0x170 [ 195.446408][ T9844] seq_read_iter+0x281/0x950 [ 195.446501][ T9844] kernfs_fop_read_iter+0xc1/0x330 [ 195.446525][ T9844] ? iov_iter_bvec+0xa4/0xd0 [ 195.446556][ T9844] copy_splice_read+0x442/0x660 [ 195.446632][ T9844] ? __pfx_copy_splice_read+0x10/0x10 [ 195.446659][ T9844] splice_direct_to_actor+0x26f/0x680 [ 195.446734][ T9844] ? __pfx_direct_splice_actor+0x10/0x10 [ 195.446763][ T9844] do_splice_direct+0xda/0x150 [ 195.446797][ T9844] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 195.446844][ T9844] do_sendfile+0x380/0x650 [ 195.446881][ T9844] __x64_sys_sendfile64+0x105/0x150 [ 195.446918][ T9844] x64_sys_call+0x2bb4/0x3000 [ 195.446981][ T9844] do_syscall_64+0xd2/0x200 [ 195.447075][ T9844] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 195.447107][ T9844] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 195.447144][ T9844] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 195.447171][ T9844] RIP: 0033:0x7fca64d5efc9 [ 195.447191][ T9844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.447247][ T9844] RSP: 002b:00007fca637bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 195.447267][ T9844] RAX: ffffffffffffffda RBX: 00007fca64fb5fa0 RCX: 00007fca64d5efc9 [ 195.447280][ T9844] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 195.447291][ T9844] RBP: 00007fca637bf090 R08: 0000000000000000 R09: 0000000000000000 [ 195.447306][ T9844] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 [ 195.447321][ T9844] R13: 00007fca64fb6038 R14: 00007fca64fb5fa0 R15: 00007fffe577e948 [ 195.447343][ T9844] [ 195.827839][ T9863] FAULT_INJECTION: forcing a failure. [ 195.827839][ T9863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.841076][ T9863] CPU: 0 UID: 0 PID: 9863 Comm: syz.4.2525 Not tainted syzkaller #0 PREEMPT(voluntary) [ 195.841119][ T9863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 195.841135][ T9863] Call Trace: [ 195.841144][ T9863] [ 195.841154][ T9863] __dump_stack+0x1d/0x30 [ 195.841181][ T9863] dump_stack_lvl+0xe8/0x140 [ 195.841207][ T9863] dump_stack+0x15/0x1b [ 195.841226][ T9863] should_fail_ex+0x265/0x280 [ 195.841244][ T9863] should_fail+0xb/0x20 [ 195.841302][ T9863] should_fail_usercopy+0x1a/0x20 [ 195.841346][ T9863] _copy_from_user+0x1c/0xb0 [ 195.841376][ T9863] __x64_sys_clock_adjtime+0x67/0x1d0 [ 195.841413][ T9863] x64_sys_call+0xa33/0x3000 [ 195.841552][ T9863] do_syscall_64+0xd2/0x200 [ 195.841656][ T9863] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 195.841689][ T9863] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 195.841785][ T9863] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 195.841813][ T9863] RIP: 0033:0x7f78cd3eefc9 [ 195.841873][ T9863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.841891][ T9863] RSP: 002b:00007f78cbe57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 195.841914][ T9863] RAX: ffffffffffffffda RBX: 00007f78cd645fa0 RCX: 00007f78cd3eefc9 [ 195.841930][ T9863] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 195.841945][ T9863] RBP: 00007f78cbe57090 R08: 0000000000000000 R09: 0000000000000000 [ 195.841968][ T9863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.841980][ T9863] R13: 00007f78cd646038 R14: 00007f78cd645fa0 R15: 00007ffd43e31e68 [ 195.842001][ T9863] [ 196.078300][ T9864] netlink: 774 bytes leftover after parsing attributes in process `syz.1.2517'. [ 196.122424][ T9869] netlink: 48 bytes leftover after parsing attributes in process `syz.4.2527'. [ 196.752229][ T9879] netlink: 'syz.3.2530': attribute type 13 has an invalid length. [ 196.760278][ T9879] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2530'. [ 197.022601][ T29] kauditd_printk_skb: 10851 callbacks suppressed [ 197.022618][ T29] audit: type=1400 audit(1761717652.543:558853): avc: denied { map_create } for pid=9896 comm="syz.4.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 197.078765][ T29] audit: type=1400 audit(1761717652.563:558854): avc: denied { prog_load } for pid=9896 comm="syz.4.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 197.098088][ T29] audit: type=1400 audit(1761717652.563:558855): avc: denied { open } for pid=9896 comm="syz.4.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 197.117679][ T29] audit: type=1400 audit(1761717652.563:558856): avc: denied { prog_load } for pid=9896 comm="syz.4.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 197.136923][ T29] audit: type=1400 audit(1761717652.563:558857): avc: denied { allowed } for pid=9896 comm="syz.4.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 197.194135][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.200701][ T3043] audit: audit_lost=61104 audit_rate_limit=0 audit_backlog_limit=64 [ 197.208748][ T3043] audit: backlog limit exceeded [ 197.214533][ T3313] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.221055][ T3313] audit: audit_lost=61105 audit_rate_limit=0 audit_backlog_limit=64 [ 197.841057][ T9903] netlink: 774 bytes leftover after parsing attributes in process `syz.2.2542'. [ 197.984308][ T9911] netlink: 'syz.4.2546': attribute type 13 has an invalid length. [ 197.992328][ T9911] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2546'. [ 198.203678][ T9927] netlink: 48 bytes leftover after parsing attributes in process `syz.1.2549'. [ 198.614273][ T9941] netlink: 774 bytes leftover after parsing attributes in process `syz.0.2559'. [ 198.971198][ T9948] netlink: 'syz.3.2561': attribute type 13 has an invalid length. [ 198.979171][ T9948] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2561'. [ 199.123725][ T9962] IPv6: Can't replace route, no match found [ 199.291501][ T9976] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2573'. [ 199.308667][ T9977] netlink: 774 bytes leftover after parsing attributes in process `syz.1.2572'. [ 199.435090][ T9980] netlink: 'syz.1.2575': attribute type 13 has an invalid length. [ 199.443005][ T9980] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2575'. [ 200.142547][T10004] netlink: 'syz.2.2586': attribute type 13 has an invalid length. [ 200.150535][T10004] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2586'. [ 200.266708][T10005] netlink: 774 bytes leftover after parsing attributes in process `syz.1.2585'. [ 201.013791][T10039] netlink: 'syz.0.2602': attribute type 13 has an invalid length. [ 201.850645][T10082] netlink: 'syz.1.2618': attribute type 13 has an invalid length. [ 202.032601][ T29] kauditd_printk_skb: 14097 callbacks suppressed [ 202.032615][ T29] audit: type=1400 audit(1761717657.553:572462): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.076398][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.083145][ T3043] audit: audit_lost=61270 audit_rate_limit=0 audit_backlog_limit=64 [ 202.091153][ T3043] audit: backlog limit exceeded [ 202.112510][ T29] audit: type=1400 audit(1761717657.583:572463): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.133899][ T29] audit: type=1400 audit(1761717657.583:572464): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.136794][T10090] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.155176][ T29] audit: type=1400 audit(1761717657.583:572465): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.155212][ T29] audit: type=1400 audit(1761717657.583:572466): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.161721][T10090] audit: audit_lost=61271 audit_rate_limit=0 audit_backlog_limit=64 [ 202.622976][T10118] netlink: 'syz.1.2632': attribute type 13 has an invalid length. [ 203.107029][T10143] FAULT_INJECTION: forcing a failure. [ 203.107029][T10143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.120350][T10143] CPU: 1 UID: 0 PID: 10143 Comm: syz.0.2644 Not tainted syzkaller #0 PREEMPT(voluntary) [ 203.120384][T10143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 203.120400][T10143] Call Trace: [ 203.120409][T10143] [ 203.120419][T10143] __dump_stack+0x1d/0x30 [ 203.120492][T10143] dump_stack_lvl+0xe8/0x140 [ 203.120516][T10143] dump_stack+0x15/0x1b [ 203.120538][T10143] should_fail_ex+0x265/0x280 [ 203.120562][T10143] should_fail+0xb/0x20 [ 203.120582][T10143] should_fail_usercopy+0x1a/0x20 [ 203.120609][T10143] _copy_from_user+0x1c/0xb0 [ 203.120638][T10143] __copy_msghdr+0x244/0x300 [ 203.120676][T10143] ___sys_sendmsg+0x109/0x1d0 [ 203.120807][T10143] __sys_sendmmsg+0x178/0x300 [ 203.120839][T10143] __x64_sys_sendmmsg+0x57/0x70 [ 203.120858][T10143] x64_sys_call+0x1c4a/0x3000 [ 203.120884][T10143] do_syscall_64+0xd2/0x200 [ 203.120922][T10143] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 203.120976][T10143] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 203.121026][T10143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 203.121090][T10143] RIP: 0033:0x7ff816e8efc9 [ 203.121105][T10143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.121124][T10143] RSP: 002b:00007ff8158ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 203.121148][T10143] RAX: ffffffffffffffda RBX: 00007ff8170e5fa0 RCX: 00007ff816e8efc9 [ 203.121164][T10143] RDX: 0000000000000001 RSI: 0000200000000780 RDI: 0000000000000003 [ 203.121180][T10143] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 203.121272][T10143] R10: 0000000004000804 R11: 0000000000000246 R12: 0000000000000001 [ 203.121285][T10143] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 203.121303][T10143] [ 203.504521][T10152] netlink: 'syz.3.2646': attribute type 13 has an invalid length. [ 203.512402][T10152] __nla_validate_parse: 7 callbacks suppressed [ 203.518731][T10152] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2646'. [ 203.607941][T10157] netlink: 774 bytes leftover after parsing attributes in process `syz.1.2639'. [ 203.684084][T10162] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2650'. [ 204.550405][T10189] netlink: 'syz.4.2662': attribute type 13 has an invalid length. [ 204.558394][T10189] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2662'. [ 204.995509][T10203] netlink: 774 bytes leftover after parsing attributes in process `syz.4.2666'. [ 205.053316][T10219] netlink: 48 bytes leftover after parsing attributes in process `syz.1.2674'. [ 205.060058][T10217] IPv6: sit1: Disabled Multicast RS [ 205.096005][T10221] netlink: 'syz.4.2676': attribute type 13 has an invalid length. [ 205.103901][T10221] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2676'. [ 205.426208][T10242] netlink: 'syz.2.2687': attribute type 13 has an invalid length. [ 205.434368][T10242] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2687'. [ 206.050304][T10261] netlink: 774 bytes leftover after parsing attributes in process `syz.2.2688'. [ 206.215602][T10273] netlink: 'syz.1.2698': attribute type 13 has an invalid length. [ 206.223557][T10273] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2698'. [ 206.837836][T10297] netlink: 'syz.4.2707': attribute type 18 has an invalid length. [ 206.866954][T10297] vxlan0: entered promiscuous mode [ 206.890230][ T52] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 206.924146][ T52] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 206.952096][ T52] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 206.979960][ T52] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 207.042538][ T29] kauditd_printk_skb: 15437 callbacks suppressed [ 207.042557][ T29] audit: type=1400 audit(1761717662.563:585056): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.068135][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.076756][ T3043] audit: audit_lost=62221 audit_rate_limit=0 audit_backlog_limit=64 [ 207.084779][ T3043] audit: backlog limit exceeded [ 207.095179][ T29] audit: type=1400 audit(1761717662.563:585057): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.116571][ T29] audit: type=1400 audit(1761717662.563:585058): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.137914][ T29] audit: type=1400 audit(1761717662.563:585059): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.159331][ T29] audit: type=1400 audit(1761717662.563:585060): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.180621][ T29] audit: type=1400 audit(1761717662.563:585061): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.201885][ T29] audit: type=1400 audit(1761717662.563:585062): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.314130][T10305] netlink: 'syz.3.2711': attribute type 13 has an invalid length. [ 207.765536][T10334] netlink: 'syz.0.2723': attribute type 13 has an invalid length. [ 208.762287][T10368] netlink: 'syz.3.2735': attribute type 13 has an invalid length. [ 208.770264][T10368] __nla_validate_parse: 7 callbacks suppressed [ 208.770282][T10368] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2735'. [ 209.148725][T10362] netlink: 774 bytes leftover after parsing attributes in process `syz.2.2736'. [ 209.398636][T10397] netlink: 'syz.3.2750': attribute type 13 has an invalid length. [ 209.406594][T10397] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2750'. [ 209.969063][T10429] netlink: 'syz.2.2763': attribute type 13 has an invalid length. [ 209.976958][T10429] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2763'. [ 210.375549][T10417] netlink: 774 bytes leftover after parsing attributes in process `syz.1.2758'. [ 210.759165][T10468] netlink: 'syz.0.2775': attribute type 13 has an invalid length. [ 210.767082][T10468] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2775'. [ 210.864717][T10480] lo speed is unknown, defaulting to 1000 [ 210.908754][T10484] FAULT_INJECTION: forcing a failure. [ 210.908754][T10484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.922076][T10484] CPU: 0 UID: 0 PID: 10484 Comm: syz.0.2785 Not tainted syzkaller #0 PREEMPT(voluntary) [ 210.922116][T10484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 210.922129][T10484] Call Trace: [ 210.922137][T10484] [ 210.922147][T10484] __dump_stack+0x1d/0x30 [ 210.922176][T10484] dump_stack_lvl+0xe8/0x140 [ 210.922217][T10484] dump_stack+0x15/0x1b [ 210.922290][T10484] should_fail_ex+0x265/0x280 [ 210.922308][T10484] should_fail+0xb/0x20 [ 210.922326][T10484] should_fail_usercopy+0x1a/0x20 [ 210.922396][T10484] _copy_to_user+0x20/0xa0 [ 210.922427][T10484] simple_read_from_buffer+0xb5/0x130 [ 210.922461][T10484] proc_fail_nth_read+0x10e/0x150 [ 210.922502][T10484] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 210.922627][T10484] vfs_read+0x1a8/0x770 [ 210.922700][T10484] ? __set_next_task_fair+0x5b/0x150 [ 210.922731][T10484] ? __rcu_read_unlock+0x4f/0x70 [ 210.922759][T10484] ? __fget_files+0x184/0x1c0 [ 210.922805][T10484] ? finish_task_switch+0xad/0x2b0 [ 210.922831][T10484] ksys_read+0xda/0x1a0 [ 210.922858][T10484] __x64_sys_read+0x40/0x50 [ 210.922886][T10484] x64_sys_call+0x27c0/0x3000 [ 210.922921][T10484] do_syscall_64+0xd2/0x200 [ 210.922943][T10484] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 210.923055][T10484] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 210.923095][T10484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.923187][T10484] RIP: 0033:0x7ff816e8d9dc [ 210.923206][T10484] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 210.923228][T10484] RSP: 002b:00007ff8158ce030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 210.923247][T10484] RAX: ffffffffffffffda RBX: 00007ff8170e6090 RCX: 00007ff816e8d9dc [ 210.923259][T10484] RDX: 000000000000000f RSI: 00007ff8158ce0a0 RDI: 0000000000000005 [ 210.923285][T10484] RBP: 00007ff8158ce090 R08: 0000000000000000 R09: 0000000000000000 [ 210.923302][T10484] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 210.923317][T10484] R13: 00007ff8170e6128 R14: 00007ff8170e6090 R15: 00007ffddd543588 [ 210.923347][T10484] [ 211.415871][T10494] lo speed is unknown, defaulting to 1000 [ 211.464762][T10476] netlink: 774 bytes leftover after parsing attributes in process `syz.4.2783'. [ 211.627396][T10501] lo speed is unknown, defaulting to 1000 [ 211.655033][T10510] bridge0: port 1(macsec1) entered blocking state [ 211.661687][T10510] bridge0: port 1(macsec1) entered disabled state [ 211.677632][T10510] macsec1: entered allmulticast mode [ 211.683102][T10510] bridge0: entered allmulticast mode [ 211.696468][T10510] macsec1: left allmulticast mode [ 211.701815][T10510] bridge0: left allmulticast mode [ 211.712927][T10517] netlink: 48 bytes leftover after parsing attributes in process `syz.4.2796'. [ 211.868102][T10533] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2800'. [ 212.083257][ T29] kauditd_printk_skb: 22477 callbacks suppressed [ 212.083271][ T29] audit: type=1400 audit(1761717667.593:597628): avc: denied { create } for pid=10534 comm="syz.2.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 212.110606][ T29] audit: type=1400 audit(1761717667.593:597629): avc: denied { map_create } for pid=10534 comm="syz.2.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.130051][ T29] audit: type=1400 audit(1761717667.603:597630): avc: denied { prog_load } for pid=10534 comm="syz.2.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.149437][ T29] audit: type=1400 audit(1761717667.603:597631): avc: denied { name_bind } for pid=10534 comm="syz.2.2804" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 212.282979][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.289631][ T3043] audit: audit_lost=65526 audit_rate_limit=0 audit_backlog_limit=64 [ 212.297680][ T3043] audit: backlog limit exceeded [ 212.302907][T10537] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.309435][T10537] audit: audit_lost=65527 audit_rate_limit=0 audit_backlog_limit=64 [ 212.317475][T10537] audit: backlog limit exceeded [ 212.354797][T10532] netlink: 774 bytes leftover after parsing attributes in process `syz.1.2803'. [ 212.781278][T10554] wg1: entered promiscuous mode [ 212.786485][T10554] wg1: entered allmulticast mode [ 212.923653][T10560] netlink: 'syz.3.2815': attribute type 13 has an invalid length. [ 212.996026][T10564] FAULT_INJECTION: forcing a failure. [ 212.996026][T10564] name failslab, interval 1, probability 0, space 0, times 0 [ 213.008853][T10564] CPU: 1 UID: 0 PID: 10564 Comm: syz.3.2817 Not tainted syzkaller #0 PREEMPT(voluntary) [ 213.008883][T10564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 213.008898][T10564] Call Trace: [ 213.008906][T10564] [ 213.008916][T10564] __dump_stack+0x1d/0x30 [ 213.008940][T10564] dump_stack_lvl+0xe8/0x140 [ 213.008965][T10564] dump_stack+0x15/0x1b [ 213.008987][T10564] should_fail_ex+0x265/0x280 [ 213.009011][T10564] should_failslab+0x8c/0xb0 [ 213.009040][T10564] kmem_cache_alloc_noprof+0x50/0x480 [ 213.009068][T10564] ? mas_alloc_nodes+0x1a2/0x210 [ 213.009103][T10564] mas_alloc_nodes+0x1a2/0x210 [ 213.009135][T10564] mas_preallocate+0x2ca/0x510 [ 213.009174][T10564] mmap_region+0xbd4/0x1620 [ 213.009229][T10564] do_mmap+0x9b3/0xbe0 [ 213.009255][T10564] vm_mmap_pgoff+0x17a/0x2e0 [ 213.009295][T10564] ksys_mmap_pgoff+0xc2/0x310 [ 213.009317][T10564] ? __x64_sys_mmap+0x49/0x70 [ 213.009348][T10564] x64_sys_call+0x14a3/0x3000 [ 213.009374][T10564] do_syscall_64+0xd2/0x200 [ 213.009396][T10564] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 213.009437][T10564] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 213.009476][T10564] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.009499][T10564] RIP: 0033:0x7fca64d5f003 [ 213.009520][T10564] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 213.009542][T10564] RSP: 002b:00007fca637bee18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 213.009565][T10564] RAX: ffffffffffffffda RBX: 000000000000046d RCX: 00007fca64d5f003 [ 213.009581][T10564] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 213.009596][T10564] RBP: 0000200000000582 R08: 00000000ffffffff R09: 0000000000000000 [ 213.009612][T10564] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 213.009627][T10564] R13: 00007fca637beef0 R14: 00007fca637beeb0 R15: 0000200000000000 [ 213.009645][T10564] [ 213.320924][ T31] netdevsim netdevsim4 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 213.331281][ T31] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 213.396296][ T31] netdevsim netdevsim4 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 213.406702][ T31] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 213.458275][T10573] FAULT_INJECTION: forcing a failure. [ 213.458275][T10573] name failslab, interval 1, probability 0, space 0, times 0 [ 213.471114][T10573] CPU: 1 UID: 0 PID: 10573 Comm: syz.1.2818 Not tainted syzkaller #0 PREEMPT(voluntary) [ 213.471154][T10573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 213.471167][T10573] Call Trace: [ 213.471174][T10573] [ 213.471182][T10573] __dump_stack+0x1d/0x30 [ 213.471210][T10573] dump_stack_lvl+0xe8/0x140 [ 213.471251][T10573] dump_stack+0x15/0x1b [ 213.471306][T10573] should_fail_ex+0x265/0x280 [ 213.471373][T10573] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 213.471402][T10573] should_failslab+0x8c/0xb0 [ 213.471438][T10573] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 213.471524][T10573] ? shmem_alloc_inode+0x34/0x50 [ 213.471550][T10573] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 213.471576][T10573] shmem_alloc_inode+0x34/0x50 [ 213.471597][T10573] alloc_inode+0x40/0x170 [ 213.471693][T10573] new_inode+0x1d/0xe0 [ 213.471724][T10573] shmem_get_inode+0x244/0x750 [ 213.471830][T10573] __shmem_file_setup+0x113/0x210 [ 213.471855][T10573] shmem_file_setup+0x3b/0x50 [ 213.471913][T10573] __se_sys_memfd_create+0x2c3/0x590 [ 213.471944][T10573] __x64_sys_memfd_create+0x31/0x40 [ 213.472047][T10573] x64_sys_call+0x2ac2/0x3000 [ 213.472071][T10573] do_syscall_64+0xd2/0x200 [ 213.472122][T10573] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 213.472166][T10573] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 213.472273][T10573] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.472300][T10573] RIP: 0033:0x7f817ab0efc9 [ 213.472320][T10573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.472343][T10573] RSP: 002b:00007f817956ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 213.472367][T10573] RAX: ffffffffffffffda RBX: 00000000000002c6 RCX: 00007f817ab0efc9 [ 213.472382][T10573] RDX: 00007f817956eef0 RSI: 0000000000000000 RDI: 00007f817ab92960 [ 213.472446][T10573] RBP: 0000200000000680 R08: 00007f817956ebb7 R09: 00007f817956ee40 [ 213.472461][T10573] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000180 [ 213.472477][T10573] R13: 00007f817956eef0 R14: 00007f817956eeb0 R15: 00002000000001c0 [ 213.472499][T10573] [ 213.694213][ T31] netdevsim netdevsim4 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 213.704644][ T31] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 213.763751][ T31] netdevsim netdevsim4 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 213.774127][ T31] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 213.859203][ T31] batadv0: left allmulticast mode [ 213.864461][ T31] batadv0: left promiscuous mode [ 213.869661][ T31] bridge0: port 3(batadv0) entered disabled state [ 213.893806][ T31] bridge_slave_1: left allmulticast mode [ 213.899697][ T31] bridge_slave_1: left promiscuous mode [ 213.905448][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.945386][ T31] bridge_slave_0: left allmulticast mode [ 213.951125][ T31] bridge_slave_0: left promiscuous mode [ 213.956824][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.983065][T10579] xt_addrtype: both incoming and outgoing interface limitation cannot be selected [ 214.115520][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 214.133352][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 214.150308][ T31] bond0 (unregistering): Released all slaves [ 214.207842][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 214.219764][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 214.290920][ T31] team0 (unregistering): Port device team_slave_1 removed [ 214.545535][ T31] IPVS: stop unused estimator thread 0... [ 214.577759][T10589] macvtap0: entered promiscuous mode [ 214.594114][T10589] macvtap0: left promiscuous mode [ 214.604571][T10591] IPv6: sit2: Disabled Multicast RS [ 214.610768][T10591] sit2: entered allmulticast mode [ 215.304696][T10601] syzkaller0: entered promiscuous mode [ 215.310221][T10601] syzkaller0: entered allmulticast mode [ 215.321385][T10598] FAULT_INJECTION: forcing a failure. [ 215.321385][T10598] name failslab, interval 1, probability 0, space 0, times 0 [ 215.322714][T10601] FAULT_INJECTION: forcing a failure. [ 215.322714][T10601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.334264][T10598] CPU: 0 UID: 0 PID: 10598 Comm: syz.0.2828 Not tainted syzkaller #0 PREEMPT(voluntary) [ 215.334296][T10598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 215.334311][T10598] Call Trace: [ 215.334320][T10598] [ 215.334330][T10598] __dump_stack+0x1d/0x30 [ 215.334431][T10598] dump_stack_lvl+0xe8/0x140 [ 215.334457][T10598] dump_stack+0x15/0x1b [ 215.334483][T10598] should_fail_ex+0x265/0x280 [ 215.334511][T10598] should_failslab+0x8c/0xb0 [ 215.334551][T10598] kmem_cache_alloc_noprof+0x50/0x480 [ 215.334666][T10598] ? audit_log_start+0x342/0x720 [ 215.334696][T10598] audit_log_start+0x342/0x720 [ 215.334793][T10598] ? shmem_write_end+0x38e/0x3c0 [ 215.334824][T10598] audit_seccomp+0x48/0x100 [ 215.334867][T10598] ? __seccomp_filter+0x82d/0x1250 [ 215.334959][T10598] __seccomp_filter+0x83e/0x1250 [ 215.335116][T10598] ? up_write+0x18/0x60 [ 215.335213][T10598] ? shmem_file_write_iter+0xd0/0xf0 [ 215.335249][T10598] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 215.335283][T10598] ? vfs_write+0x7e8/0x960 [ 215.335321][T10598] __secure_computing+0x82/0x150 [ 215.335421][T10598] syscall_trace_enter+0xcf/0x1e0 [ 215.335460][T10598] do_syscall_64+0xac/0x200 [ 215.335487][T10598] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 215.335561][T10598] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 215.335605][T10598] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 215.335635][T10598] RIP: 0033:0x7ff816e8d9dc [ 215.335656][T10598] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 215.335739][T10598] RSP: 002b:00007ff8158ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 215.335766][T10598] RAX: ffffffffffffffda RBX: 00007ff8170e5fa0 RCX: 00007ff816e8d9dc [ 215.335784][T10598] RDX: 000000000000000f RSI: 00007ff8158ef0a0 RDI: 0000000000000004 [ 215.335802][T10598] RBP: 00007ff8158ef090 R08: 0000000000000000 R09: 0000000000000000 [ 215.335822][T10598] R10: 000000000004fed0 R11: 0000000000000246 R12: 0000000000000002 [ 215.335839][T10598] R13: 00007ff8170e6038 R14: 00007ff8170e5fa0 R15: 00007ffddd543588 [ 215.335881][T10598] [ 215.344359][T10604] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 215.347477][T10601] CPU: 1 UID: 0 PID: 10601 Comm: syz.3.2831 Not tainted syzkaller #0 PREEMPT(voluntary) [ 215.347517][T10601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 215.347537][T10601] Call Trace: [ 215.347547][T10601] [ 215.347556][T10601] __dump_stack+0x1d/0x30 [ 215.347608][T10601] dump_stack_lvl+0xe8/0x140 [ 215.347636][T10601] dump_stack+0x15/0x1b [ 215.347660][T10601] should_fail_ex+0x265/0x280 [ 215.347688][T10601] should_fail+0xb/0x20 [ 215.347711][T10601] should_fail_usercopy+0x1a/0x20 [ 215.347766][T10601] _copy_from_user+0x1c/0xb0 [ 215.347801][T10601] ___sys_recvmsg+0xaa/0x370 [ 215.347827][T10601] ? _parse_integer+0x27/0x40 [ 215.347881][T10601] do_recvmmsg+0x1ef/0x540 [ 215.347930][T10601] ? fput+0x8f/0xc0 [ 215.347954][T10601] __x64_sys_recvmmsg+0xe5/0x170 [ 215.347985][T10601] x64_sys_call+0x27aa/0x3000 [ 215.348016][T10601] do_syscall_64+0xd2/0x200 [ 215.348062][T10601] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 215.348101][T10601] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 215.348143][T10601] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 215.348174][T10601] RIP: 0033:0x7fca64d5efc9 [ 215.348255][T10601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.348313][T10601] RSP: 002b:00007fca637bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 215.348340][T10601] RAX: ffffffffffffffda RBX: 00007fca64fb5fa0 RCX: 00007fca64d5efc9 [ 215.348358][T10601] RDX: 0000000000001b00 RSI: 0000200000005140 RDI: 0000000000000006 [ 215.348375][T10601] RBP: 00007fca637bf090 R08: 0000000000000000 R09: 0000000000000000 [ 215.348415][T10601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.348432][T10601] R13: 00007fca64fb6038 R14: 00007fca64fb5fa0 R15: 00007fffe577e948 [ 215.348487][T10601] [ 215.533253][T10605] __nla_validate_parse: 1 callbacks suppressed [ 215.533314][T10605] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2830'. [ 215.785021][T10605] geneve3: entered promiscuous mode [ 217.092568][ T29] kauditd_printk_skb: 32164 callbacks suppressed [ 217.092587][ T29] audit: type=1400 audit(1761717672.613:624823): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.138987][ T29] audit: type=1400 audit(1761717672.613:624824): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.163566][ T29] audit: type=1400 audit(1761717672.613:624825): avc: denied { execmem } for pid=10617 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 217.183283][ T29] audit: type=1400 audit(1761717672.643:624826): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.188585][T10626] audit: audit_backlog=65 > audit_backlog_limit=64 [ 217.204601][ T29] audit: type=1400 audit(1761717672.643:624827): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.211122][T10626] audit: audit_lost=67186 audit_rate_limit=0 audit_backlog_limit=64 [ 217.232484][ T29] audit: type=1400 audit(1761717672.643:624828): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.240473][T10626] audit: backlog limit exceeded [ 217.261656][ T29] audit: type=1400 audit(1761717672.643:624829): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.425547][T10626] netlink: 774 bytes leftover after parsing attributes in process `syz.0.2836'. [ 218.140165][T10631] netlink: 'syz.1.2841': attribute type 13 has an invalid length. [ 218.148080][T10631] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2841'. [ 218.194711][T10637] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2843'. [ 218.433819][ T3043] ================================================================== [ 218.441967][ T3043] BUG: KCSAN: data-race in audit_log_start / audit_receive [ 218.449195][ T3043] [ 218.451532][ T3043] write to 0xffffffff88e8f480 of 8 bytes by task 10634 on cpu 0: [ 218.459297][ T3043] audit_receive+0x200f/0x2180 [ 218.464088][ T3043] netlink_unicast+0x5c0/0x690 [ 218.468901][ T3043] netlink_sendmsg+0x58b/0x6b0 [ 218.473680][ T3043] __sock_sendmsg+0x145/0x180 [ 218.478380][ T3043] sock_sendmsg+0xc1/0x130 [ 218.482814][ T3043] splice_to_socket+0x5f3/0x990 [ 218.487716][ T3043] direct_splice_actor+0x156/0x2a0 [ 218.492863][ T3043] splice_direct_to_actor+0x312/0x680 [ 218.498342][ T3043] do_splice_direct+0xda/0x150 [ 218.503128][ T3043] do_sendfile+0x380/0x650 [ 218.507574][ T3043] __x64_sys_sendfile64+0x105/0x150 [ 218.512802][ T3043] x64_sys_call+0x2bb4/0x3000 [ 218.517517][ T3043] do_syscall_64+0xd2/0x200 [ 218.522032][ T3043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 218.527991][ T3043] [ 218.530331][ T3043] read to 0xffffffff88e8f480 of 8 bytes by task 3043 on cpu 1: [ 218.537981][ T3043] audit_log_start+0x106/0x720 [ 218.542782][ T3043] common_lsm_audit+0x66/0x230 [ 218.547588][ T3043] slow_avc_audit+0x104/0x140 [ 218.552304][ T3043] avc_has_perm+0x13a/0x180 [ 218.556831][ T3043] selinux_socket_recvmsg+0x175/0x1b0 [ 218.562225][ T3043] security_socket_recvmsg+0x50/0x90 [ 218.567533][ T3043] sock_recvmsg+0x38/0x170 [ 218.571980][ T3043] ____sys_recvmsg+0xf5/0x280 [ 218.576673][ T3043] ___sys_recvmsg+0x11f/0x370 [ 218.581367][ T3043] __x64_sys_recvmsg+0xd1/0x160 [ 218.586499][ T3043] x64_sys_call+0x2b46/0x3000 [ 218.591213][ T3043] do_syscall_64+0xd2/0x200 [ 218.595736][ T3043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 218.601640][ T3043] [ 218.603982][ T3043] value changed: 0xffff88810c9ca100 -> 0x0000000000000000 [ 218.611093][ T3043] [ 218.613424][ T3043] Reported by Kernel Concurrency Sanitizer on: [ 218.619595][ T3043] CPU: 1 UID: 0 PID: 3043 Comm: dhcpcd Not tainted syzkaller #0 PREEMPT(voluntary) [ 218.629000][ T3043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 218.639093][ T3043] ================================================================== [ 219.834499][ T12] bond1 (unregistering): Released all slaves [ 219.844095][ T12] bond0 (unregistering): (slave wireguard0): Releasing backup interface [ 219.852952][ T12] wireguard0: left promiscuous mode [ 219.858701][ T12] bond0 (unregistering): Released all slaves [ 219.915860][ T12] dummy0: left promiscuous mode [ 219.921104][ T12] bond_slave_0: left promiscuous mode [ 219.929185][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 219.936618][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 219.987695][ T12] team0 (unregistering): Port device team_slave_1 removed [ 220.378567][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.389054][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.446197][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.456572][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.515581][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.525986][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.586003][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.596345][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.684362][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.694993][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.756249][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.766609][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.825391][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.835764][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.876123][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.886637][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 220.971104][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 221.013910][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 221.053731][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 221.113915][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 221.203256][ T12] bridge0: port 3(batadv0) entered disabled state [ 221.210657][ T12] bridge_slave_1: left allmulticast mode [ 221.216490][ T12] bridge_slave_1: left promiscuous mode [ 221.222211][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.230584][ T12] bridge_slave_0: left promiscuous mode [ 221.236449][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.245238][ T12] bridge_slave_1: left allmulticast mode [ 221.250899][ T12] bridge_slave_1: left promiscuous mode [ 221.256619][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.264957][ T12] bridge_slave_0: left allmulticast mode [ 221.270682][ T12] bridge_slave_0: left promiscuous mode [ 221.276453][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.384960][ T12] bond0 (unregistering): Released all slaves [ 221.393898][ T12] bond1 (unregistering): Released all slaves [ 221.425856][ T12] bridge0 (unregistering): left allmulticast mode [ 221.484763][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 221.494646][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 221.505037][ T12] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 221.513539][ T12] bond0 (unregistering): Released all slaves [ 221.524772][ T12] bond2 (unregistering): (slave ip6gretap1): Releasing active interface [ 221.533193][ T12] ip6gretap1 (unregistering): left allmulticast mode [ 221.615559][ T12] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 221.624521][ T12] bond0 (unregistering): Released all slaves [ 221.633417][ T12] bond1 (unregistering): (slave batadv1): Releasing active interface [ 221.641984][ T12] bond1 (unregistering): Released all slaves [ 221.651529][ T12] bond2 (unregistering): Released all slaves [ 221.703699][ T12] hsr_slave_0: left promiscuous mode [ 221.709515][ T12] hsr_slave_1: left promiscuous mode [ 221.715478][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 221.722944][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 221.730662][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 221.738206][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 221.749031][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 221.756516][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 221.764338][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 221.771815][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 221.781166][ T12] hsr_slave_0: left promiscuous mode [ 221.788825][ T12] hsr_slave_1: left promiscuous mode [ 221.799261][ T12] veth1_macvtap: left promiscuous mode [ 221.804964][ T12] veth0_macvtap: left promiscuous mode [ 221.810846][ T12] veth1_vlan: left promiscuous mode [ 221.816535][ T12] veth0_vlan: left promiscuous mode [ 221.832578][ T12] veth1_macvtap: left promiscuous mode [ 221.838109][ T12] veth0_macvtap: left promiscuous mode [ 221.843808][ T12] veth1_vlan: left promiscuous mode [ 221.849050][ T12] veth0_vlan: left promiscuous mode [ 221.946728][ T12] team0 (unregistering): Port device team_slave_1 removed [ 222.009087][ T12] team0 (unregistering): Port device team_slave_1 removed [ 222.102635][ T29] kauditd_printk_skb: 44042 callbacks suppressed [ 222.102652][ T29] audit: type=1400 audit(1761717677.623:662542): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.130585][ T29] audit: type=1400 audit(1761717677.653:662543): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.138719][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 222.158454][ T3043] audit: audit_lost=69297 audit_rate_limit=0 audit_backlog_limit=64 [ 222.158734][ T29] audit: type=1400 audit(1761717677.653:662544): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.166510][ T3043] audit: backlog limit exceeded [ 222.187753][ T29] audit: type=1400 audit(1761717677.653:662545): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.193392][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 222.213791][ T29] audit: type=1400 audit(1761717677.653:662546): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.220287][ T3043] audit: audit_lost=69298 audit_rate_limit=0 audit_backlog_limit=64 [ 222.921744][ T12] IPVS: stop unused estimator thread 0... [ 227.112523][ T29] kauditd_printk_skb: 48792 callbacks suppressed [ 227.112543][ T29] audit: type=1400 audit(1761717682.623:711338): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 227.120252][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.140469][ T29] audit: type=1400 audit(1761717682.633:711339): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 227.146716][ T3043] audit: audit_lost=69299 audit_rate_limit=0 audit_backlog_limit=64 [ 227.167918][ T29] audit: type=1400 audit(1761717682.633:711340): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 227.175931][ T3043] audit: backlog limit exceeded [ 227.176306][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.197169][ T29] audit: type=1400 audit(1761717682.633:711341): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 227.202101][ T3043] audit: audit_lost=69300 audit_rate_limit=0 audit_backlog_limit=64 [ 227.208645][ T29] audit: type=1400 audit(1761717682.633:711342): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0