last executing test programs: 1m47.674080404s ago: executing program 1 (id=46): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x641, 0x0) flock(r1, 0x2) fcntl$lock(r1, 0x5, &(0x7f0000000a80)={0x1, 0x0, 0x0, 0x8, 0xffffffffffffffff}) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x1, r2, 0x0, 0x8, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000170000000000000000000000000a28000000000a1d010000000000000000020000000900010073797a3000000000080002400000000098000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000006b00030091abc12404d0c4c731b1"], 0xfc}, 0x1, 0x0, 0x0, 0x40010}, 0x4000914) 1m47.417935729s ago: executing program 1 (id=48): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x77, 0x101301) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x800, 0x7f, 0x2, 0x40a44, 0x1, 0x0, '\x00', 0x0, r1, 0x0, 0x4, 0x3, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, 0x0, &(0x7f0000000180)}, 0x20) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r3}, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xa031, 0xffffffffffffffff, 0x0) r4 = memfd_secret(0x80000) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) readahead(r4, 0x7, 0x0) (fail_nth: 4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8080) ioctl$USBDEVFS_CONNECTINFO(r0, 0x80045503, &(0x7f0000000340)) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x6) readahead(r5, 0x0, 0x8001) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xb, 0x31, 0xffffffffffffffff, 0x24db9000) r7 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x119, 0x8, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x48241, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r9 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) 1m46.745650992s ago: executing program 1 (id=50): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) kexec_load(0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0xbfffd000, 0x800000}], 0x0) 1m46.643100104s ago: executing program 1 (id=51): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x41, &(0x7f0000000100)={[{@lazytime}, {@noload}, {@bh}, {@noquota}, {@noblock_validity}, {}, {@mblk_io_submit}, {@acl}, {@discard}], [], 0x3d}, 0x2, 0x522, &(0x7f00000007c0)="$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") r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) close(r4) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r6, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYRES64=r3], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000006000000000000000000850000000700000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x2}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9, 0x0, 0x7fff}, 0x18) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000003e000701fcf7fffffedbdf25017c00000c0004"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) 1m45.796172701s ago: executing program 1 (id=55): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xffff7ffffffffffd}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x50441, 0x14a) fallocate(r2, 0x20, 0x0, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r3 = socket(0x2a, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c00000013000100000000000000000000000002", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="1400350064756d6d7930"], 0x3c}}, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 1m45.31593368s ago: executing program 1 (id=60): syz_open_dev$tty1(0xc, 0x4, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./bus/file0\x00', 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}, {@oldalloc}, {@minixdf}, {@prjquota}]}, 0x1, 0x4bc, &(0x7f0000000a40)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0500000000"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xff}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) creat(&(0x7f00000000c0)='./bus\x00', 0xcb) 1m45.284359981s ago: executing program 32 (id=60): syz_open_dev$tty1(0xc, 0x4, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./bus/file0\x00', 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}, {@oldalloc}, {@minixdf}, {@prjquota}]}, 0x1, 0x4bc, &(0x7f0000000a40)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0500000000"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xff}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) creat(&(0x7f00000000c0)='./bus\x00', 0xcb) 1.902343793s ago: executing program 2 (id=1769): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) 1.845148934s ago: executing program 2 (id=1771): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xffff7ffffffffffd}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x50441, 0x14a) fallocate(r2, 0x20, 0x0, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r3 = socket(0x2a, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="1400350064756d6d7930"], 0x3c}}, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 1.767314735s ago: executing program 2 (id=1773): r0 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg', 0x3) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e21, @dev}, 0x10) close(r0) 1.766921845s ago: executing program 2 (id=1774): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000440)=0x3) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$poke(0x420e, r1, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x17}) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = dup(r2) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r5, &(0x7f0000004200)='t', 0x1) sendfile(r5, r4, 0x0, 0x3ffff) sendfile(r5, r4, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffefc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x10000}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000007c0)={0x2, {0x2, 0x101, 0x0, 0x101}}) io_uring_setup(0x1de8, &(0x7f00000004c0)={0x0, 0x3605, 0x80, 0xfffffffc, 0x0, 0x0, r3}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x50, 0xff, 0x0, 0xffeffffd}, {0x6, 0x5e, 0x0, 0x8}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000080000000180100002020642500000000002020207b1af8ff00000000bfa100000600000007010000f8ffffffb702000008000000b70300000800000085000000060000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x18) 1.610963468s ago: executing program 0 (id=1776): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="160000000000000004003128883c13cbf8", @ANYBLOB="562e616963edf2dc4a7cdb9f98eb45cf5ead2ca1d94472a539d9870aa85960477a4ec1133461ec470c196e02d458d887ee963b6f070caa32542af7a56721569edc563e7153ba0f2caac6c4f9fbffa247eebdb56e1d614eb5fc7a331fe83f31e6cf51f22cd3fb190b514130c1b0732b6df0ee2db56c15ec62cb042180d5e1d68e62c675a087b6308c25dfa66813acb26558d622fc198f38357108f0a3dae747252837ffd51d05511e5d6ee7166322c46cd29a42cda8dc32b72723218c089387fdf5b7053d506eb93b0ca3c0cfe24363060ad8f83bcf7caea7a75d4841397a693ce0f0a7", @ANYRESDEC], 0x50) socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18090000002300810000000000000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1, 0x0, 0x1000000000000}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x25c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) sync() bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18010000400100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002240)=""/4096) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000adc000000060a0b040000000000000000020000000900010073797a30000000000900020073797a320000000005000740c5000000a8000480a40001800e000100696d6d656469617465"], 0x104}, 0x1, 0x0, 0x0, 0x4800}, 0x40804) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r9 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x100) preadv2(r9, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x100000}], 0x2, 0x0, 0x0, 0x0) 1.468440901s ago: executing program 0 (id=1777): write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x58) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x400000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f0000008400)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)={0x20000014}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) fcntl$getown(r2, 0x9) getuid() statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x2, &(0x7f0000000340)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r4}, 0x10) getpgid(0x0) 1.334033964s ago: executing program 5 (id=1779): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1, 0x0, 0xfffffffffffffff7}, 0x18) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000280)={@remote}, 0x14) close(r2) 1.298589784s ago: executing program 5 (id=1780): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304}, "bd88818314ff7d84", "0b3ea924c47b25d7624cd362581725c7", "000400", "d5a1d50399459b68"}, 0x28) recvfrom$inet6(r5, &(0x7f0000000400)=""/217, 0xd9, 0x120, 0x0, 0x0) r6 = syz_io_uring_setup(0x9e, &(0x7f0000000640)={0x0, 0x936, 0x0, 0x0, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000240)}) io_uring_enter(r6, 0x47b6, 0x800000, 0x0, 0x0, 0x0) shutdown(r5, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="3f681a", 0x3, 0x20040845, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) shutdown(r1, 0x1) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_misc(r9, &(0x7f0000000240), 0xfffffecc) r10 = syz_open_dev$vcsa(&(0x7f0000000300), 0x1, 0x102) write$P9_RLOPEN(r10, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x1, 0x4, 0x7}, 0x3}}, 0x18) 1.243658596s ago: executing program 4 (id=1781): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) 1.182286987s ago: executing program 4 (id=1782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000004000000000000000100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000090100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x808}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020200090f000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000004d20000020300000020050005002f8000000a00000000000000ff0100"/101], 0x78}}, 0x0) 1.076111959s ago: executing program 4 (id=1783): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xffff7ffffffffffd}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x50441, 0x14a) fallocate(r2, 0x20, 0x0, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r3 = socket(0x2a, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="1400350064756d6d7930"], 0x3c}}, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 966.988961ms ago: executing program 4 (id=1784): r0 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg', 0x3) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e21, @dev}, 0x10) close(r0) 903.762602ms ago: executing program 4 (id=1785): pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000040)={0x1, 0x0, [{0x5, 0x0, 0x4, [0x1ff, 0x100, 0xa10, 0x0, 0x10000, 0x6, 0x9, 0x2]}]}) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x800) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xfb}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x80000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x8001) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r3, &(0x7f0000000340)=[{&(0x7f0000000200)=""/90, 0x5a}, {&(0x7f0000000280)=""/146, 0x92}], 0x2) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000380)={0x7724, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000003c0)=r5, 0x4) r6 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r6, 0x80487436, &(0x7f0000000400)="a9ad9f2b7a949248043be27040a890f5a23dd8c0ab70633842e461c01e88dd6e0eddd9d08527251706dcff0d6e10e0a83550ebdd1f3d4d9c89eb026829c71198164cfcf6b1c823801a3c06a899bafdf955abbf77ba0c6a20c03f4a18fc154e7e26") r7 = socket$inet6(0xa, 0x4, 0x7ff) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f00000004c0)={0x4, &(0x7f0000000480)=[{0xc2, 0x5d, 0x81, 0x54}, {0x4, 0x9, 0xc, 0x27081a1e}, {0x8, 0x0, 0x1, 0x1}, {0x8, 0x13, 0x9}]}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000500)={{0x1, 0x1, 0x5, 0x2, 0x10}, 0x446, 0x6}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000580)='veth1_vlan\x00') r8 = syz_pidfd_open(0x0, 0x0) ioctl$FS_IOC_GETFSSYSFSPATH(r8, 0x80811501, &(0x7f00000005c0)={0x80}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) getgroups(0x2, &(0x7f00000007c0)=[0xee00, 0xffffffffffffffff]) fchown(r6, r9, r10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000800)={0x1, 0x7, {0x2, 0x1, 0x80000001, 0x0, 0xfffffff9}, 0x6}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)='%pS \x00'}, 0x20) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) setresgid(r12, r10, r11) syz_io_uring_setup(0x5da2, &(0x7f00000009c0)={0x0, 0x8e2b, 0x40, 0x1, 0x372, 0x0, r1}, &(0x7f0000000a40), &(0x7f0000000a80)) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000ac0)=0x8) ioperm(0x100, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000b00)={'wlan0\x00', 0x0}) connect$packet(r1, &(0x7f0000000b40)={0x11, 0x3, r13, 0x1, 0xc, 0x6, @link_local}, 0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000b80)={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x7fffffff, 0x6, 0x0, 0x100, 0x9, 0x5, r13}) 678.340497ms ago: executing program 3 (id=1789): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r1, 0x0, 0x0, 0xfecc) (fail_nth: 9) 669.305377ms ago: executing program 2 (id=1790): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000240)='afs_cm_no_server\x00'}, 0xffffffffffffffbe) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000000980)={0x3c, r1, 0x1, 0x70bd28, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}]}, 0x3c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@resuid}, {@noblock_validity}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@grpquota}, {@inlinecrypt}]}, 0x6, 0x5fc, &(0x7f0000000300)="$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") r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf250401f2800c00180008ac0f0000000100140001"], 0x114}, {&(0x7f00000009c0)=ANY=[], 0x2cc}], 0x2, 0x0, 0x0, 0x20000001}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x1c}, 0x4e23, 0x0, 0x4e24, 0x0, 0x2, 0x80, 0x0, 0x11, 0x0, r3}, {0xe61, 0x0, 0x0, 0x2, 0x9, 0x1, 0xffd, 0xc}, {0xfffffffffffff5b9, 0x4, 0x7fffffffffffffff, 0x7}, 0x8000, 0x6e6bb5, 0x0, 0x1, 0x2, 0x3}, {{@in6=@local, 0x4d3, 0x3c}, 0xa, @in6=@remote, 0x43500, 0x0, 0x0, 0x4, 0xc, 0xd0, 0x1}}, 0xe8) r4 = getgid() r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b70300000000000055090100000000009500000000000000bf910000000000007ac9392009e770d264b7020000000000008500000085000000b700000000000000950000000000000080257306b4cf3f9f6051e56e811c12211b16523550058bc129fdafc08f9ab8915b52d54e8fdc8e22d7302f18f7855c6eb690321519a2a1fa8ae6fbed45908be392d64e31d03466291f5ad2eb477e0137555013fbbb7f1356837c07aabd8b4bca3f224364c8a3489128a4610f93f35a13bdafd97000"/221], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x8983, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) request_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='/dev/vsock\x00', 0xfffffffffffffffe) lchown(&(0x7f0000000040)='./file0\x00', r3, r4) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x84aa5000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r7 = getpid() sched_setscheduler(r7, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000bc0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @cb_func={0x18, 0x2}, @jmp={0x5, 0x1, 0xd, 0x6, 0x0, 0x30}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvfrom(r2, &(0x7f0000000c40)=""/4096, 0x1000, 0x40, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 600.107938ms ago: executing program 3 (id=1791): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1a, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="850000006c0000007b00000000000000270000000a0000009500000000000000ed5f0be3755142ae31484cd0115bab2d0589e8ab9f429b60317312f13bd708a35c0670c61fc97c4551f58ae3bbfb9f1d97582f15f3922a3c39716ebdd3c864aec6bc39f3bf389d21e614314b44d3a320471dc33ceec91a1512761160808845c885e7e75118ae8702a167ce7d0ca850e435f105f4c7702c8505fc4669acef909579390b1a6795fae716b04fba77244be06160107ab2a3a30645bbec6570170c1d362e6d6209fa0809ffbcc48bfa0175374dc3"], &(0x7f0000000040)='GPL\x00', 0x0, 0x9f, &(0x7f0000000500)=""/159, 0x0, 0x0, '\x00', r0, @fallback=0xe}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x6) r3 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x800, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x10000, {0x0, 0x0, 0x0, r4, {0x0, 0xfff2}, {0x1, 0xffff}, {0x2, 0x3}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}, 0x1, 0x0, 0x0, 0x8041}, 0x800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) 530.51532ms ago: executing program 3 (id=1792): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa1000000000000"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) 514.57614ms ago: executing program 0 (id=1793): r0 = syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file1\x00', 0x100c085, &(0x7f0000000d00)=ANY=[@ANYRES8=0x0, @ANYBLOB="c0da5b74006e9c47add458a1bd748b7ffa5628dc52f84873cbe6a43cfd29e4198255a0610d383b0e46b2b6457282a9f3caef22979e54c145e6a0ce2850a890af7c4e1fa3628453c70aae32270b0042f1532cf08030eccdca96e2c97aae42cf5d9ec5f0afa4fcc53c8f9289677038d09ae2b1bd2271e0a76e6324df3a2b01a9ed0277d7e8d6f7d463ae62692faa55bdb43dc2bea18eea4a635951fd0a220a835fa24d0700c8f8c245d1d7638b2cae5ed3bec0d2f0415ddff7884bb34ab0cb1598e9c7b92a29005e4090ede480b3412f5c33da5e7c8672bda19fd3d989f8336d69d9e70de142973e7e1f53987b2d"], 0x10, 0x7f4, &(0x7f0000000e40)="$eJzs3U9oHOfZAPBnFMl2FD5/Id9HPmMcZ2znA5s6ymqVKBU5pJvVSJ5ktSt2V8WmlMTEcjCWk5AQ0pjS1JekLS2lpx7TXEMuubUUWuih7anQHHrpoRDIpSUtLZSWUnDZ2V1r9Wcl/5HlNP39RPadfeeZd953drLPznpnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACASKqzpdJkErW8vnQ6Ha4622wsbDG/395P1xRbrDci6fwX+/bFgW7Vgf9dnX1/5+FoHOo+OxT7OsW+uHzP/fc+8T+jI/3lt+jQzToyfNbY4JMk4uudTl08u7Ky/Mpt6Mgu+taPexP7rnuRv1/tPM5n9bzVyBcq81matxrpzPR06ZFTc610Lq9lrTOtdraQVptZpd1opserJ9LJmZmpNJs401iqz89Walm/8vGHy6XSdPr0xGJWabYa9UeenmhVT+W1Wl6fL2LKpdejE/N4Z0d8Jm+n7ayykKbnL6wsT23X1U7Q5JqavWt2nEMP3fvxax/95cJyZ4cc1kjS2zHLk5Pl8uT0YzOPPV4qjZZL5bUVpXXiWkSMRHQibstOy511zyZ1o709ZsOMiKv/vTNv3nCLRnr5P2qRRz2W4nSkkcZI8bj6NxbVmI1mNGKh8/w3Y+vmb8j////IH3+11XoH838/yx9YnX0wivx/uPvs8LD8v6EXO/A3OqzV+vvd3gzWvRpvxOW4GGdjJVZiOV65mTXuWd/qbfwb2dn25iOLeuTRikbksRCVoibt1aQxE9MxHaV4Nk7FXLQijbnIoxZZtOJMtKIdWbFHVaMZWVSiHY1oRhrHoxonIo3JmImZmIo0spiIM9GIpajHfMxGpWjlfFwotvvUun7d/7XnfvTCrz9+pzN9LWhyi4EknQ9znaA/bxG0Id3fQP7vRIz09u5dyUnskn03+Kru0Ds33LqrRf4fvdPdAAAAAG6jpPj2PYmIsXigmJrLa9mX7nS3AAAAgB1U/K75UKcY60w9EEnn+L+0SeSHu943AAAAYGckxTl2SUSMx4Pdqf7pUpt9CQAAAAD8Gyr+/f9wpxiPeLOocPwPAAAAnzHfGHaN/Y/29K6x21rcm/zkT9FsjiVXFk8/lFyqdOIql+7qLtcrvnitxfbcwWR/r5GimB69fE8SEaPV7FDSv/rlP/d2y0+Kx4OrFyAcdq3/ZJsOxNYdKJ7Ft+NIN+bIuW55rj+nu5bxubyWTVQbtScmk96XI+3XXrzwlSiG/836wv4kzl9YWZ54/qWVc0VfrnRauXKpd3n4pL9URPeEii36crW3BeKBzUc8VpyI0VvveHe9pcHx964mO7L1+JPBdb4VR7sxR8e75fja8e/rrHNy4onJqFT2j7Sz0+3Xrg6MvteLydWR7+2PNrmBV+GtONaNOXb8WLfYpBflNb14cWMvyoPb//q2xXX34p0jb57+688bSTa1XS+mbrEXAHfK+eKqP6tZ6O4iC/3jalcnoa3Lu3f3l7yRd7nzq58y+ssP5LrR2JDd05vJ7m/F8W7M8e7nidGDm+SV0ibv6C9fePkXvXf0R9/7/g++fPiXH6zL6zfQi/fiRDemV8R9PxuSYztj/s66rPpuZ4l3h663VSsnr++dGku6Nx+Kyw9fuHT2heUXll8sl6emS4+WSo+VY6z4qNArhvRU5gH4z7bdPXY++Oq10GF34Uke3eao+r5rPymYiOfjpViJc3GyONsgIh7cvNXxgZ8hnNzmqHV84A4vJ7c5tlyNLa+P3XssiSGxUwNb7P++VxR/u00vCADsgqPb5OEk7u3Of/2/ekusi7grSU5uc9y9Npef6N44t390HMNz+aDf98rP3/YtAgCffVnzk2S8/XbSbOaLz07OzExW2qeytNmoPpM289n5LM3r7axZPVWpz2fpYrPRblT7Xx3PZq20tbS42Gi207lGM11stPLTxZ3f096t31vZQqXezqutxVpWaWVptVFvV6rtdDZvVdPFpadqeetU1iwWbi1m1Xwur1baeaOethpLzWo2kaatLBsIzGezejufy7OxNK+ni818odK8EhG1pYUsnc1a1Wa+2G50G+yvK6/PNZoLRbMTG4f/h93e3gDwafDqG5cvnl1ZWX7l5iZ+ez3Bd3qMAMBasjQAAAAAAAAAAAAAAHz6bTxdr1N7QycCjsVNnz746t64lbMPP3sTn3u/+7LsRIO30s7da17TPb2d5c5vnxueeO7JJy+u1iSjg5v3qTcPnPpdFv3RbdHO5v+nbHaq69v7I/b88Lvdmi8MCU5Gd3ikH0bETSx+NdkiZvffiwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgO/8KAAD//wifUTs=") stat(&(0x7f00000017c0)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000001300)='net/kcm\x00') read$char_usb(r4, &(0x7f0000000040)=""/4109, 0x100d) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x4, 0x0}, 0x8) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000049c0)={0x3, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x87}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x0, &(0x7f0000000200)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x78e8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1e, 0x27, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0xc2, 0x6, 0x1, 0x8000, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x81, &(0x7f00000000c0)=""/129, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x0, 0x6, 0x800, 0x2f6}, 0x10, r5, r6, 0x2, &(0x7f0000000400)=[r7], &(0x7f0000000440)=[{0x5, 0x4, 0xf, 0xa}, {0x1, 0x5, 0xf, 0x6}], 0x10, 0x8}, 0x94) 440.088891ms ago: executing program 0 (id=1794): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xffff7ffffffffffd}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x50441, 0x14a) fallocate(r2, 0x20, 0x0, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r3 = socket(0x2a, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="1400350064756d6d7930"], 0x3c}}, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 357.316843ms ago: executing program 5 (id=1795): r0 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg', 0x3) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e21, @dev}, 0x10) close(r0) 357.023243ms ago: executing program 3 (id=1796): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 338.025463ms ago: executing program 5 (id=1797): getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x6, 0x7ffc0002}]}) r0 = syz_open_dev$hiddev(0x0, 0x8, 0x80002) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x21c91c, &(0x7f0000000900)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000}}, {@noblock_validity}, {@mblk_io_submit}, {@jqfmt_vfsold}, {@nodelalloc}, {@nomblk_io_submit}, {@usrjquota}, {@minixdf}, {@resgid, 0x32}]}, 0x1e, 0x4ea, &(0x7f00000009c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x5c, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x5c}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x7a}]}]}, 0x5c}}, 0x4000003) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) r2 = io_uring_setup(0xd4d, &(0x7f0000001500)={0x0, 0xdb60, 0x40, 0x3, 0x211}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r2, 0xb, &(0x7f0000000480)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x11}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) quotactl_fd$Q_SYNC(r1, 0xffffffff80000100, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fcntl$getown(r0, 0x9) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) syz_emit_ethernet(0x62, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}, @void, {@ipv4={0x800, @icmp={{0xc, 0x4, 0x2, 0x0, 0x54, 0x65, 0x0, 0x81, 0x1, 0x0, @private=0xa010101, @remote, {[@noop, @timestamp={0x44, 0x14, 0x5d, 0x0, 0x0, [0x9, 0xffffffff, 0x10001, 0xfffffffc]}, @lsrr={0x83, 0x7, 0xec, [@broadcast]}]}}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x1, 0x0, 0x9, 0x65, 0x75, 0x11, 0x88, 0xe, @broadcast, @private=0xa010101}, "3b7e1ea7655955c2"}}}}}, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000080)) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6002, &(0x7f0000000000)=0x3, 0xf, 0x0) 301.062684ms ago: executing program 5 (id=1798): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="160000000000000004003128883c13cbf8", @ANYBLOB="562e616963edf2dc4a7cdb9f98eb45cf5ead2ca1d94472a539d9870aa85960477a4ec1133461ec470c196e02d458d887ee963b6f070caa32542af7a56721569edc563e7153ba0f2caac6c4f9fbffa247eebdb56e1d614eb5fc7a331fe83f31e6cf51f22cd3fb190b514130c1b0732b6df0ee2db56c15ec62cb042180d5e1d68e62c675a087b6308c25dfa66813acb26558d622fc198f38357108f0a3dae747252837ffd51d05511e5d6ee7166322c46cd29a42cda8dc32b72723218c089387fdf5b7053d506eb93b0ca3c0cfe24363060ad8f83bcf7caea7a75d4841397a693ce0f0a7", @ANYRESDEC], 0x50) socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18090000002300810000000000000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1, 0x0, 0x1000000000000}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x25c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) sync() bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18010000400100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002240)=""/4096) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$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") r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000adc000000060a0b040000000000000000020000000900010073797a30000000000900020073797a320000000005000740c5000000a8000480a40001800e000100696d6d656469617465"], 0x104}, 0x1, 0x0, 0x0, 0x4800}, 0x40804) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r9 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x100) preadv2(r9, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x100000}], 0x2, 0x0, 0x0, 0x0) 222.607986ms ago: executing program 2 (id=1799): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000440)=0x3) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$poke(0x420e, r1, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x17}) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = dup(r2) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r5, &(0x7f0000004200)='t', 0x1) sendfile(r5, r4, 0x0, 0x3ffff) sendfile(r5, r4, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffefc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x10000}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000007c0)={0x2, {0x2, 0x101, 0x0, 0x101}}) io_uring_setup(0x1de8, &(0x7f00000004c0)={0x0, 0x3605, 0x80, 0xfffffffc, 0x0, 0x0, r3}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x50, 0xff, 0x0, 0xffeffffd}, {0x6, 0x5e, 0x0, 0x8}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000080000000180100002020642500000000002020207b1af8ff00000000bfa100000600000007010000f8ffffffb702000008000000b70300000800000085000000060000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x18) 202.130876ms ago: executing program 0 (id=1800): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xb76e}, 0x223, 0x1, 0xfffffffc, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x800, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01020000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x24048011}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="140000001000010000000000000000000220000a3c000000120a09080000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000a"], 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) 201.653356ms ago: executing program 5 (id=1801): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000440)=0x3) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$poke(0x420e, r1, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x17}) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = dup(r2) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r5, &(0x7f0000004200)='t', 0x1) sendfile(r5, r4, 0x0, 0x3ffff) sendfile(r5, r4, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffefc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x10000}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000007c0)={0x2, {0x2, 0x101, 0x0, 0x101}}) io_uring_setup(0x1de8, &(0x7f00000004c0)={0x0, 0x3605, 0x80, 0xfffffffc, 0x0, 0x0, r3}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x50, 0xff, 0x0, 0xffeffffd}, {0x6, 0x5e, 0x0, 0x8}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000080000000180100002020642500000000002020207b1af8ff00000000bfa100000600000007010000f8ffffffb702000008000000b70300000800000085000000060000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x18) 180.551176ms ago: executing program 3 (id=1802): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1a, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="850000006c0000007b00000000000000270000000a0000009500000000000000ed5f0be3755142ae31484cd0115bab2d0589e8ab9f429b60317312f13bd708a35c0670c61fc97c4551f58ae3bbfb9f1d97582f15f3922a3c39716ebdd3c864aec6bc39f3bf389d21e614314b44d3a320471dc33ceec91a1512761160808845c885e7e75118ae8702a167ce7d0ca850e435f105f4c7702c8505fc4669acef909579390b1a6795fae716b04fba77244be06160107ab2a3a30645bbec6570170c1d362e6d6209fa0809ffbcc48bfa0175374dc3"], &(0x7f0000000040)='GPL\x00', 0x0, 0x9f, &(0x7f0000000500)=""/159, 0x0, 0x0, '\x00', r0, @fallback=0xe}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x6) r3 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x800, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x10000, {0x0, 0x0, 0x0, r4, {0x0, 0xfff2}, {0x1, 0xffff}, {0x2, 0x3}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}, 0x1, 0x0, 0x0, 0x8041}, 0x800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) 180.041797ms ago: executing program 0 (id=1803): write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x58) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x400000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f0000008400)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)={0x20000014}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) fcntl$getown(r2, 0x9) getuid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r5}, 0x10) getpgid(0x0) 142.326737ms ago: executing program 3 (id=1804): socket$nl_netfilter(0x10, 0x3, 0xc) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000080)="75a101010100188d9233a34871d6000000000003c1d6fe173ee8ed471cb5", 0x1e, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000440)=""/117, 0x75) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x3938700}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r3 = open(&(0x7f0000000180)='./bus\x00', 0x1c3bc2, 0x1c0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000008c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r4, 0x1, r3, 0x7, 0x80000}) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r5, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x12, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x9]}, 0x8, 0x80800) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1c, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)="fae0ca88958915f21bfa9c260bf76b5eab1fb020e6ac1d82f8e972ba7dec2521dddb7f11b790454a471c7dc41790261e98cc39cb7bb1e640b22c9da745c71988e334aed33983e65dc7c151b9730d4757db92c7c72db9bf02cf8e49dfdc160f5714a0e9b117c13a935f1ce5f9f6e191eb3ec7555e99e506422c03022d972461fefee9392f132fc43416e915a394366067de4a8a1f", 0x94, 0x1b46865ac35f676d, 0x1}) epoll_create(0x1) r6 = open(&(0x7f0000000280)='./file0\x00', 0x60842, 0x45) syz_io_uring_setup(0x891, &(0x7f0000000140)={0x0, 0x7a10, 0x80, 0x5, 0x323, 0x0, r6}, &(0x7f0000000000)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0xc, 0x0, r6, 0x0, 0x0, 0x0, 0x8000}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000700)='kfree\x00', r9}, 0x18) 0s ago: executing program 4 (id=1805): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000440)=0x3) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$poke(0x420e, r1, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x17}) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = dup(r2) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r5, &(0x7f0000004200)='t', 0x1) sendfile(r5, r4, 0x0, 0x3ffff) sendfile(r5, r4, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffefc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x10000}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000007c0)={0x2, {0x2, 0x101, 0x0, 0x101}}) io_uring_setup(0x1de8, &(0x7f00000004c0)={0x0, 0x3605, 0x80, 0xfffffffc, 0x0, 0x0, r3}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x50, 0xff, 0x0, 0xffeffffd}, {0x6, 0x5e, 0x0, 0x8}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000080000000180100002020642500000000002020207b1af8ff00000000bfa100000600000007010000f8ffffffb702000008000000b70300000800000085000000060000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x18) kernel console output (not intermixed with test programs): 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.120675][ T5536] RSP: 002b:00007f2e0c8d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 78.120702][ T5536] RAX: ffffffffffffffda RBX: 00007f2e0e0c5fa0 RCX: 00007f2e0de6eec9 [ 78.120719][ T5536] RDX: 0000000000001000 RSI: 0000200000000f80 RDI: 0000000000000003 [ 78.120766][ T5536] RBP: 00007f2e0c8d7090 R08: 0000000000000000 R09: 0000000000000000 [ 78.120784][ T5536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.120801][ T5536] R13: 00007f2e0e0c6038 R14: 00007f2e0e0c5fa0 R15: 00007ffdcb412d78 [ 78.120827][ T5536] [ 78.120837][ T5536] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 78.145850][ T29] audit: type=1326 audit(1759008101.792:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.3.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2e0de6d710 code=0x7ffc0000 [ 78.152439][ T5536] audit: out of memory in audit_log_start [ 78.162536][ T29] audit: type=1326 audit(1759008101.792:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.3.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f2e0de6d97f code=0x7ffc0000 [ 78.408468][ T29] audit: type=1326 audit(1759008101.882:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.3.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f2e0de6d8dc code=0x7ffc0000 [ 78.431747][ T29] audit: type=1326 audit(1759008101.882:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.3.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f2e0de6d97f code=0x7ffc0000 [ 78.473186][ T5538] __nla_validate_parse: 8 callbacks suppressed [ 78.473204][ T5538] netlink: 20 bytes leftover after parsing attributes in process `syz.2.639'. [ 78.525509][ T5544] netlink: 'syz.3.642': attribute type 1 has an invalid length. [ 78.533236][ T5544] netlink: 224 bytes leftover after parsing attributes in process `syz.3.642'. [ 78.722034][ T5551] netlink: 4 bytes leftover after parsing attributes in process `syz.3.644'. [ 78.725599][ T5554] wg1 speed is unknown, defaulting to 1000 [ 79.019505][ T5569] @0Ù: renamed from bond_slave_1 (while UP) [ 79.073685][ T5573] wg1 speed is unknown, defaulting to 1000 [ 79.220708][ T5579] netlink: 20 bytes leftover after parsing attributes in process `syz.4.653'. [ 79.324003][ T5584] FAULT_INJECTION: forcing a failure. [ 79.324003][ T5584] name failslab, interval 1, probability 0, space 0, times 0 [ 79.336839][ T5584] CPU: 0 UID: 0 PID: 5584 Comm: syz.0.655 Not tainted syzkaller #0 PREEMPT(voluntary) [ 79.336882][ T5584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 79.336911][ T5584] Call Trace: [ 79.336917][ T5584] [ 79.336924][ T5584] __dump_stack+0x1d/0x30 [ 79.336943][ T5584] dump_stack_lvl+0xe8/0x140 [ 79.336959][ T5584] dump_stack+0x15/0x1b [ 79.336973][ T5584] should_fail_ex+0x265/0x280 [ 79.336994][ T5584] should_failslab+0x8c/0xb0 [ 79.337096][ T5584] __kmalloc_noprof+0xa5/0x3e0 [ 79.337184][ T5584] ? mq_init+0xb9/0x380 [ 79.337231][ T5584] ? dev_ifsioc+0x44b/0xaa0 [ 79.337313][ T5584] mq_init+0xb9/0x380 [ 79.337331][ T5584] ? __pfx_noop_dequeue+0x10/0x10 [ 79.337347][ T5584] ? qdisc_alloc+0x3c3/0x440 [ 79.337362][ T5584] ? __rcu_read_unlock+0x4f/0x70 [ 79.337406][ T5584] qdisc_create_dflt+0xec/0x2d0 [ 79.337461][ T5584] ? dev_activate+0xbb/0x9e0 [ 79.337478][ T5584] dev_activate+0xde/0x9e0 [ 79.337494][ T5584] ? _raw_spin_unlock_bh+0x36/0x40 [ 79.337518][ T5584] __dev_open+0x472/0x530 [ 79.337562][ T5584] __dev_change_flags+0x163/0x400 [ 79.337613][ T5584] netif_change_flags+0x5a/0xd0 [ 79.337677][ T5584] dev_change_flags+0xce/0x180 [ 79.337704][ T5584] ? netdev_name_node_lookup+0xa4/0xd0 [ 79.337821][ T5584] dev_ifsioc+0x44b/0xaa0 [ 79.337844][ T5584] ? __rcu_read_unlock+0x4f/0x70 [ 79.337864][ T5584] dev_ioctl+0x70a/0x960 [ 79.337887][ T5584] sock_do_ioctl+0x197/0x220 [ 79.337958][ T5584] sock_ioctl+0x41b/0x610 [ 79.337991][ T5584] ? __pfx_sock_ioctl+0x10/0x10 [ 79.338031][ T5584] __se_sys_ioctl+0xce/0x140 [ 79.338055][ T5584] __x64_sys_ioctl+0x43/0x50 [ 79.338145][ T5584] x64_sys_call+0x1816/0x2ff0 [ 79.338166][ T5584] do_syscall_64+0xd2/0x200 [ 79.338204][ T5584] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 79.338285][ T5584] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 79.338337][ T5584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.338363][ T5584] RIP: 0033:0x7f67e8eeeec9 [ 79.338382][ T5584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.338483][ T5584] RSP: 002b:00007f67e7957038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 79.338549][ T5584] RAX: ffffffffffffffda RBX: 00007f67e9145fa0 RCX: 00007f67e8eeeec9 [ 79.338565][ T5584] RDX: 00002000000000c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 79.338580][ T5584] RBP: 00007f67e7957090 R08: 0000000000000000 R09: 0000000000000000 [ 79.338596][ T5584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.338652][ T5584] R13: 00007f67e9146038 R14: 00007f67e9145fa0 R15: 00007ffd8bad8698 [ 79.338674][ T5584] [ 79.338696][ T5584] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 79.613417][ T5584] syzkaller0: entered promiscuous mode [ 79.618906][ T5584] syzkaller0: entered allmulticast mode [ 79.729920][ T5588] wg1 speed is unknown, defaulting to 1000 [ 80.046926][ T5600] netlink: 144 bytes leftover after parsing attributes in process `syz.0.660'. [ 80.055958][ T5600] netlink: 144 bytes leftover after parsing attributes in process `syz.0.660'. [ 80.170019][ T5621] FAULT_INJECTION: forcing a failure. [ 80.170019][ T5621] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.183169][ T5621] CPU: 0 UID: 0 PID: 5621 Comm: syz.0.667 Not tainted syzkaller #0 PREEMPT(voluntary) [ 80.183213][ T5621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 80.183230][ T5621] Call Trace: [ 80.183236][ T5621] [ 80.183243][ T5621] __dump_stack+0x1d/0x30 [ 80.183264][ T5621] dump_stack_lvl+0xe8/0x140 [ 80.183330][ T5621] dump_stack+0x15/0x1b [ 80.183352][ T5621] should_fail_ex+0x265/0x280 [ 80.183384][ T5621] should_fail+0xb/0x20 [ 80.183410][ T5621] should_fail_usercopy+0x1a/0x20 [ 80.183498][ T5621] _copy_from_iter+0xd2/0xe80 [ 80.183535][ T5621] ? rep_movs_alternative+0x4a/0x90 [ 80.183562][ T5621] ? _copy_from_iter+0x170/0xe80 [ 80.183653][ T5621] copy_page_from_iter+0x178/0x2a0 [ 80.183740][ T5621] skb_copy_datagram_from_iter+0x232/0x490 [ 80.183774][ T5621] tun_get_user+0xafa/0x26e0 [ 80.183806][ T5621] ? ref_tracker_alloc+0x1f2/0x2f0 [ 80.183840][ T5621] ? selinux_file_permission+0x1e4/0x320 [ 80.183888][ T5621] tun_chr_write_iter+0x15e/0x210 [ 80.183914][ T5621] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 80.183936][ T5621] vfs_write+0x527/0x960 [ 80.183964][ T5621] ksys_write+0xda/0x1a0 [ 80.183991][ T5621] __x64_sys_write+0x40/0x50 [ 80.184107][ T5621] x64_sys_call+0x27fe/0x2ff0 [ 80.184130][ T5621] do_syscall_64+0xd2/0x200 [ 80.184161][ T5621] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 80.184247][ T5621] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 80.184281][ T5621] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.184306][ T5621] RIP: 0033:0x7f67e8eed97f [ 80.184324][ T5621] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 80.184342][ T5621] RSP: 002b:00007f67e7957000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 80.184360][ T5621] RAX: ffffffffffffffda RBX: 00007f67e9145fa0 RCX: 00007f67e8eed97f [ 80.184417][ T5621] RDX: 000000000000fed7 RSI: 00002000000002c0 RDI: 00000000000000c8 [ 80.184432][ T5621] RBP: 00007f67e7957090 R08: 0000000000000000 R09: 0000000000000000 [ 80.184447][ T5621] R10: 000000000000fed7 R11: 0000000000000293 R12: 0000000000000001 [ 80.184461][ T5621] R13: 00007f67e9146038 R14: 00007f67e9145fa0 R15: 00007ffd8bad8698 [ 80.184483][ T5621] [ 80.199448][ T5625] netlink: 4 bytes leftover after parsing attributes in process `syz.3.665'. [ 80.274293][ T5627] @0Ù: renamed from bond_slave_1 [ 80.522249][ T5638] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 80.530898][ T5638] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 80.582136][ T5648] 9p: Unknown Cache mode or invalid value f [ 80.783595][ T5665] batman_adv: batadv0: Adding interface: dummy0 [ 80.789886][ T5665] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 80.816267][ T5665] batman_adv: batadv0: Interface activated: dummy0 [ 80.825999][ T5665] batadv0: mtu less than device minimum [ 80.832103][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.842736][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.853634][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.864346][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.875050][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.885949][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.896664][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.907412][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.918197][ T5665] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 80.955351][ T5667] netlink: 8 bytes leftover after parsing attributes in process `syz.2.681'. [ 81.012275][ T5669] wg1 speed is unknown, defaulting to 1000 [ 81.085755][ T5672] wg1 speed is unknown, defaulting to 1000 [ 81.405620][ T5695] SELinux: Context system_u:object_r:iptables_unit_file_t:s0 is not valid (left unmapped). [ 81.419262][ T5696] netlink: 4 bytes leftover after parsing attributes in process `syz.2.692'. [ 81.487094][ T5704] wg1 speed is unknown, defaulting to 1000 [ 81.939360][ T5730] netlink: 8 bytes leftover after parsing attributes in process `syz.2.704'. [ 82.374341][ T29] kauditd_printk_skb: 297 callbacks suppressed [ 82.374358][ T29] audit: type=1400 audit(1759008106.082:2387): avc: denied { name_connect } for pid=5753 comm="syz.4.714" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 82.533722][ T29] audit: type=1400 audit(1759008106.232:2388): avc: denied { execute_no_trans } for pid=5763 comm="syz.3.719" path="/165/file1" dev="tmpfs" ino=884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 82.592808][ T5768] FAULT_INJECTION: forcing a failure. [ 82.592808][ T5768] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.606006][ T5768] CPU: 0 UID: 0 PID: 5768 Comm: syz.0.721 Not tainted syzkaller #0 PREEMPT(voluntary) [ 82.606052][ T5768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 82.606144][ T5768] Call Trace: [ 82.606194][ T5768] [ 82.606245][ T5768] __dump_stack+0x1d/0x30 [ 82.606293][ T5768] dump_stack_lvl+0xe8/0x140 [ 82.606313][ T5768] dump_stack+0x15/0x1b [ 82.606330][ T5768] should_fail_ex+0x265/0x280 [ 82.606411][ T5768] should_fail+0xb/0x20 [ 82.606432][ T5768] should_fail_usercopy+0x1a/0x20 [ 82.606459][ T5768] _copy_from_user+0x1c/0xb0 [ 82.606532][ T5768] do_sys_poll+0x149/0xbd0 [ 82.606562][ T5768] ? selinux_file_open+0x2df/0x330 [ 82.606622][ T5768] __se_sys_poll+0xdd/0x200 [ 82.606647][ T5768] __x64_sys_poll+0x43/0x50 [ 82.606721][ T5768] x64_sys_call+0x27d2/0x2ff0 [ 82.606745][ T5768] do_syscall_64+0xd2/0x200 [ 82.606777][ T5768] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 82.606804][ T5768] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 82.606883][ T5768] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.606906][ T5768] RIP: 0033:0x7f67e8eeeec9 [ 82.606923][ T5768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.606946][ T5768] RSP: 002b:00007f67e7957038 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 82.606967][ T5768] RAX: ffffffffffffffda RBX: 00007f67e9145fa0 RCX: 00007f67e8eeeec9 [ 82.606981][ T5768] RDX: 0000000000000009 RSI: 20000000000000b5 RDI: 0000200000000000 [ 82.607041][ T5768] RBP: 00007f67e7957090 R08: 0000000000000000 R09: 0000000000000000 [ 82.607099][ T5768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.607113][ T5768] R13: 00007f67e9146038 R14: 00007f67e9145fa0 R15: 00007ffd8bad8698 [ 82.607134][ T5768] [ 82.956968][ T5781] netlink: 'syz.2.725': attribute type 1 has an invalid length. [ 83.083841][ T5778] netlink: 'syz.0.724': attribute type 1 has an invalid length. [ 83.319790][ T5789] netlink: 'syz.0.728': attribute type 3 has an invalid length. [ 83.364166][ T29] audit: type=1326 audit(1759008107.072:2389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.396849][ T29] audit: type=1326 audit(1759008107.072:2390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.420372][ T29] audit: type=1326 audit(1759008107.092:2391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.444123][ T29] audit: type=1326 audit(1759008107.092:2392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.467617][ T29] audit: type=1326 audit(1759008107.092:2393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.491160][ T29] audit: type=1326 audit(1759008107.092:2394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.514698][ T29] audit: type=1326 audit(1759008107.092:2395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.538075][ T29] audit: type=1326 audit(1759008107.092:2396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5796 comm="syz.2.730" exe="/root/syz-executor" sig=0 arch=c000003e syscall=290 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 83.577741][ T5805] __nla_validate_parse: 4 callbacks suppressed [ 83.577756][ T5805] netlink: 4 bytes leftover after parsing attributes in process `syz.0.734'. [ 83.603588][ T5805] netlink: 4 bytes leftover after parsing attributes in process `syz.0.734'. [ 83.613323][ T5803] FAULT_INJECTION: forcing a failure. [ 83.613323][ T5803] name failslab, interval 1, probability 0, space 0, times 0 [ 83.615579][ T5801] wg1 speed is unknown, defaulting to 1000 [ 83.625994][ T5803] CPU: 0 UID: 0 PID: 5803 Comm: syz.2.733 Not tainted syzkaller #0 PREEMPT(voluntary) [ 83.626026][ T5803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 83.626040][ T5803] Call Trace: [ 83.626047][ T5803] [ 83.626056][ T5803] __dump_stack+0x1d/0x30 [ 83.626150][ T5803] dump_stack_lvl+0xe8/0x140 [ 83.626174][ T5803] dump_stack+0x15/0x1b [ 83.626190][ T5803] should_fail_ex+0x265/0x280 [ 83.626218][ T5803] should_failslab+0x8c/0xb0 [ 83.626283][ T5803] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 83.626361][ T5803] ? cond_bools_copy+0x30/0x80 [ 83.626402][ T5803] ? __pfx_cond_bools_destroy+0x10/0x10 [ 83.626443][ T5803] kmemdup_noprof+0x2b/0x70 [ 83.626479][ T5803] ? __pfx_cond_bools_destroy+0x10/0x10 [ 83.626525][ T5803] cond_bools_copy+0x30/0x80 [ 83.626564][ T5803] ? __pfx_cond_bools_destroy+0x10/0x10 [ 83.626602][ T5803] hashtab_duplicate+0x11e/0x360 [ 83.626632][ T5803] ? __pfx_cond_bools_copy+0x10/0x10 [ 83.626758][ T5803] cond_policydb_dup+0xd2/0x4e0 [ 83.626802][ T5803] security_set_bools+0xa0/0x340 [ 83.626841][ T5803] sel_commit_bools_write+0x1ea/0x270 [ 83.626886][ T5803] vfs_writev+0x406/0x8b0 [ 83.626928][ T5803] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 83.626978][ T5803] ? mutex_lock+0xd/0x30 [ 83.627069][ T5803] do_writev+0xe7/0x210 [ 83.627177][ T5803] __x64_sys_writev+0x45/0x50 [ 83.627233][ T5803] x64_sys_call+0x1e9a/0x2ff0 [ 83.627265][ T5803] do_syscall_64+0xd2/0x200 [ 83.627335][ T5803] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 83.627371][ T5803] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 83.627411][ T5803] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.627442][ T5803] RIP: 0033:0x7f594a2eeec9 [ 83.627465][ T5803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.627509][ T5803] RSP: 002b:00007f5948d57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 83.627537][ T5803] RAX: ffffffffffffffda RBX: 00007f594a545fa0 RCX: 00007f594a2eeec9 [ 83.627558][ T5803] RDX: 0000000000000002 RSI: 00002000000025c0 RDI: 0000000000000005 [ 83.627633][ T5803] RBP: 00007f5948d57090 R08: 0000000000000000 R09: 0000000000000000 [ 83.627658][ T5803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.627676][ T5803] R13: 00007f594a546038 R14: 00007f594a545fa0 R15: 00007fffb4144318 [ 83.627705][ T5803] [ 83.649747][ T5807] batman_adv: batadv0: Adding interface: dummy0 [ 83.876058][ T5807] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 83.903766][ T5807] batman_adv: batadv0: Interface activated: dummy0 [ 84.812219][ T5855] netlink: 4 bytes leftover after parsing attributes in process `syz.0.751'. [ 84.821437][ T5855] netlink: 4 bytes leftover after parsing attributes in process `syz.0.751'. [ 84.838504][ T5833] FAULT_INJECTION: forcing a failure. [ 84.838504][ T5833] name fail_futex, interval 1, probability 0, space 0, times 1 [ 84.851474][ T5833] CPU: 1 UID: 0 PID: 5833 Comm: syz.3.743 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.851507][ T5833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 84.851573][ T5833] Call Trace: [ 84.851579][ T5833] [ 84.851629][ T5833] __dump_stack+0x1d/0x30 [ 84.851652][ T5833] dump_stack_lvl+0xe8/0x140 [ 84.851758][ T5833] dump_stack+0x15/0x1b [ 84.851775][ T5833] should_fail_ex+0x265/0x280 [ 84.851877][ T5833] should_fail+0xb/0x20 [ 84.851899][ T5833] get_futex_key+0x130/0xbd0 [ 84.851941][ T5833] ? __pfx_autoremove_wake_function+0x10/0x10 [ 84.851981][ T5833] futex_wake+0x7d/0x360 [ 84.852011][ T5833] ? __rcu_read_unlock+0x4f/0x70 [ 84.852038][ T5833] do_futex+0x323/0x380 [ 84.852126][ T5833] mm_release+0xb2/0x1e0 [ 84.852158][ T5833] exit_mm_release+0x25/0x30 [ 84.852189][ T5833] exit_mm+0x38/0x190 [ 84.852302][ T5833] do_exit+0x417/0x15c0 [ 84.852338][ T5833] ? do_iter_readv_writev+0x4d8/0x540 [ 84.852450][ T5833] do_group_exit+0xff/0x140 [ 84.852531][ T5833] ? get_signal+0xe51/0xf70 [ 84.852558][ T5833] get_signal+0xe59/0xf70 [ 84.852585][ T5833] arch_do_signal_or_restart+0x96/0x480 [ 84.852618][ T5833] exit_to_user_mode_loop+0x7a/0x100 [ 84.852642][ T5833] do_syscall_64+0x1d6/0x200 [ 84.852702][ T5833] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 84.852727][ T5833] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 84.852823][ T5833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.852853][ T5833] RIP: 0033:0x7f2e0de6eec9 [ 84.852873][ T5833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.852896][ T5833] RSP: 002b:00007f2e0c8b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 84.852942][ T5833] RAX: fffffffffffffe00 RBX: 00007f2e0e0c6090 RCX: 00007f2e0de6eec9 [ 84.852958][ T5833] RDX: 0000000000000001 RSI: 00002000000009c0 RDI: 0000000000000003 [ 84.852974][ T5833] RBP: 00007f2e0c8b6090 R08: 0000000000000000 R09: 0000000000000000 [ 84.852989][ T5833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.853004][ T5833] R13: 00007f2e0e0c6128 R14: 00007f2e0e0c6090 R15: 00007ffdcb412d78 [ 84.853029][ T5833] [ 85.130140][ T5857] wg1 speed is unknown, defaulting to 1000 [ 85.277724][ T5879] netlink: 4 bytes leftover after parsing attributes in process `syz.5.761'. [ 85.359288][ T5879] batman_adv: batadv0: Interface deactivated: dummy0 [ 85.366191][ T5879] batman_adv: batadv0: Removing interface: dummy0 [ 85.460625][ T5885] netlink: 144 bytes leftover after parsing attributes in process `syz.4.762'. [ 85.469741][ T5885] netlink: 144 bytes leftover after parsing attributes in process `syz.4.762'. [ 85.530927][ T5895] syz.5.765 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 85.552163][ T5895] tipc: Enabling of bearer rejected, failed to enable media [ 85.656819][ T5914] netlink: 'syz.3.772': attribute type 1 has an invalid length. [ 85.664557][ T5914] netlink: 224 bytes leftover after parsing attributes in process `syz.3.772'. [ 85.712137][ T5918] wg1 speed is unknown, defaulting to 1000 [ 86.058047][ T5930] netlink: 144 bytes leftover after parsing attributes in process `syz.5.776'. [ 86.067242][ T5930] netlink: 144 bytes leftover after parsing attributes in process `syz.5.776'. [ 86.233595][ T5946] FAULT_INJECTION: forcing a failure. [ 86.233595][ T5946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.246723][ T5946] CPU: 0 UID: 0 PID: 5946 Comm: syz.3.781 Not tainted syzkaller #0 PREEMPT(voluntary) [ 86.246751][ T5946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 86.246806][ T5946] Call Trace: [ 86.246813][ T5946] [ 86.246822][ T5946] __dump_stack+0x1d/0x30 [ 86.246844][ T5946] dump_stack_lvl+0xe8/0x140 [ 86.246864][ T5946] dump_stack+0x15/0x1b [ 86.246884][ T5946] should_fail_ex+0x265/0x280 [ 86.246982][ T5946] should_fail+0xb/0x20 [ 86.247000][ T5946] should_fail_usercopy+0x1a/0x20 [ 86.247033][ T5946] _copy_to_user+0x20/0xa0 [ 86.247071][ T5946] simple_read_from_buffer+0xb5/0x130 [ 86.247101][ T5946] proc_fail_nth_read+0x10e/0x150 [ 86.247172][ T5946] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 86.247196][ T5946] vfs_read+0x1a5/0x770 [ 86.247271][ T5946] ? __rcu_read_unlock+0x4f/0x70 [ 86.247298][ T5946] ? __fget_files+0x184/0x1c0 [ 86.247327][ T5946] ksys_read+0xda/0x1a0 [ 86.247351][ T5946] __x64_sys_read+0x40/0x50 [ 86.247424][ T5946] x64_sys_call+0x27bc/0x2ff0 [ 86.247445][ T5946] do_syscall_64+0xd2/0x200 [ 86.247475][ T5946] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 86.247501][ T5946] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 86.247528][ T5946] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.247673][ T5946] RIP: 0033:0x7f2e0de6d8dc [ 86.247692][ T5946] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 86.247716][ T5946] RSP: 002b:00007f2e0c8d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 86.247740][ T5946] RAX: ffffffffffffffda RBX: 00007f2e0e0c5fa0 RCX: 00007f2e0de6d8dc [ 86.247756][ T5946] RDX: 000000000000000f RSI: 00007f2e0c8d70a0 RDI: 0000000000000003 [ 86.247798][ T5946] RBP: 00007f2e0c8d7090 R08: 0000000000000000 R09: 0000000000000000 [ 86.247809][ T5946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 86.247821][ T5946] R13: 00007f2e0e0c6038 R14: 00007f2e0e0c5fa0 R15: 00007ffdcb412d78 [ 86.247841][ T5946] [ 86.881764][ T5971] FAULT_INJECTION: forcing a failure. [ 86.881764][ T5971] name failslab, interval 1, probability 0, space 0, times 0 [ 86.894512][ T5971] CPU: 0 UID: 0 PID: 5971 Comm: syz.3.790 Not tainted syzkaller #0 PREEMPT(voluntary) [ 86.894540][ T5971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 86.894616][ T5971] Call Trace: [ 86.894624][ T5971] [ 86.894633][ T5971] __dump_stack+0x1d/0x30 [ 86.894660][ T5971] dump_stack_lvl+0xe8/0x140 [ 86.894739][ T5971] dump_stack+0x15/0x1b [ 86.894782][ T5971] should_fail_ex+0x265/0x280 [ 86.894812][ T5971] ? audit_log_d_path+0x8d/0x150 [ 86.894904][ T5971] should_failslab+0x8c/0xb0 [ 86.894985][ T5971] __kmalloc_cache_noprof+0x4c/0x320 [ 86.895023][ T5971] audit_log_d_path+0x8d/0x150 [ 86.895057][ T5971] audit_log_d_path_exe+0x42/0x70 [ 86.895162][ T5971] audit_log_task+0x1e9/0x250 [ 86.895196][ T5971] audit_seccomp+0x61/0x100 [ 86.895225][ T5971] ? __seccomp_filter+0x68c/0x10d0 [ 86.895248][ T5971] __seccomp_filter+0x69d/0x10d0 [ 86.895274][ T5971] ? __list_add_valid_or_report+0x38/0xe0 [ 86.895422][ T5971] ? _raw_spin_unlock+0x26/0x50 [ 86.895454][ T5971] __secure_computing+0x82/0x150 [ 86.895556][ T5971] syscall_trace_enter+0xcf/0x1e0 [ 86.895598][ T5971] do_syscall_64+0xac/0x200 [ 86.895643][ T5971] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 86.895740][ T5971] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 86.895769][ T5971] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.895797][ T5971] RIP: 0033:0x7f2e0de6d8dc [ 86.895815][ T5971] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 86.895872][ T5971] RSP: 002b:00007f2e0c8d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 86.895891][ T5971] RAX: ffffffffffffffda RBX: 00007f2e0e0c5fa0 RCX: 00007f2e0de6d8dc [ 86.895903][ T5971] RDX: 000000000000000f RSI: 00007f2e0c8d70a0 RDI: 0000000000000007 [ 86.895948][ T5971] RBP: 00007f2e0c8d7090 R08: 0000000000000000 R09: 0000000000000000 [ 86.895963][ T5971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 86.895978][ T5971] R13: 00007f2e0e0c6038 R14: 00007f2e0e0c5fa0 R15: 00007ffdcb412d78 [ 86.895998][ T5971] [ 87.136236][ T5974] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 87.143812][ T5974] net_ratelimit: 30 callbacks suppressed [ 87.143825][ T5974] batadv0: mtu less than device minimum [ 87.155565][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.166430][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.177409][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.188297][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.199068][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.209846][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.220784][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.231727][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.242480][ T5974] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 87.257577][ T5974] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 87.265481][ T5974] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 87.281967][ T5974] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 87.303251][ T5974] batman_adv: batadv0: Interface deactivated: dummy0 [ 87.310059][ T5974] batman_adv: batadv0: Removing interface: dummy0 [ 87.443962][ T29] kauditd_printk_skb: 227 callbacks suppressed [ 87.443980][ T29] audit: type=1326 audit(1759008111.152:2624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.482621][ T29] audit: type=1326 audit(1759008111.192:2625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.506039][ T29] audit: type=1326 audit(1759008111.192:2626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.529464][ T29] audit: type=1326 audit(1759008111.192:2627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.552857][ T29] audit: type=1326 audit(1759008111.192:2628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.576264][ T29] audit: type=1326 audit(1759008111.192:2629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.576302][ T29] audit: type=1326 audit(1759008111.192:2630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=290 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.576333][ T29] audit: type=1326 audit(1759008111.192:2631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5989 comm="syz.0.797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 87.708586][ T6009] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(8) [ 87.715155][ T6009] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 87.722598][ T6009] vhci_hcd vhci_hcd.0: Device attached [ 87.769771][ T6010] vhci_hcd: connection closed [ 87.769973][ T376] vhci_hcd: stop threads [ 87.779070][ T376] vhci_hcd: release socket [ 87.783594][ T376] vhci_hcd: disconnect device [ 87.884704][ T6022] netlink: 'syz.5.806': attribute type 1 has an invalid length. [ 88.072934][ T29] audit: type=1326 audit(1759008111.762:2632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6028 comm="syz.5.809" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 88.096394][ T29] audit: type=1326 audit(1759008111.762:2633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6028 comm="syz.5.809" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 88.131262][ T6031] netlink: 'syz.5.810': attribute type 2 has an invalid length. [ 88.366210][ T6040] wg1 speed is unknown, defaulting to 1000 [ 88.670701][ T6056] netlink: 'syz.4.820': attribute type 1 has an invalid length. [ 88.671938][ T6059] __nla_validate_parse: 9 callbacks suppressed [ 88.671956][ T6059] netlink: 20 bytes leftover after parsing attributes in process `syz.0.821'. [ 88.678438][ T6056] netlink: 224 bytes leftover after parsing attributes in process `syz.4.820'. [ 88.790116][ T6060] netlink: 144 bytes leftover after parsing attributes in process `syz.2.822'. [ 88.799228][ T6060] netlink: 144 bytes leftover after parsing attributes in process `syz.2.822'. [ 88.889234][ T6077] netlink: 'syz.0.828': attribute type 10 has an invalid length. [ 88.899668][ T6077] team0: Device hsr_slave_0 failed to register rx_handler [ 88.995980][ T6089] @0Ù: renamed from bond_slave_1 (while UP) [ 89.016887][ T6088] wg1 speed is unknown, defaulting to 1000 [ 89.199024][ T6101] netlink: 20 bytes leftover after parsing attributes in process `syz.3.836'. [ 89.228767][ T6103] netlink: 'syz.0.837': attribute type 1 has an invalid length. [ 89.236512][ T6103] netlink: 224 bytes leftover after parsing attributes in process `syz.0.837'. [ 89.798780][ T6142] netlink: 'syz.2.852': attribute type 1 has an invalid length. [ 89.806526][ T6142] netlink: 224 bytes leftover after parsing attributes in process `syz.2.852'. [ 89.929715][ T6147] netlink: 4 bytes leftover after parsing attributes in process `syz.4.854'. [ 89.997140][ T6153] random: crng reseeded on system resumption [ 90.030375][ T6156] smc: net device bond0 applied user defined pnetid SYZ0 [ 90.044815][ T6153] netlink: 464 bytes leftover after parsing attributes in process `syz.2.855'. [ 90.186712][ T6169] netlink: 4 bytes leftover after parsing attributes in process `syz.3.860'. [ 90.235288][ T6176] @0Ù: renamed from bond_slave_1 [ 90.467426][ T6190] netlink: 'syz.3.866': attribute type 1 has an invalid length. [ 91.023683][ T6208] wg1 speed is unknown, defaulting to 1000 [ 91.356039][ T6230] wg1 speed is unknown, defaulting to 1000 [ 92.720414][ T6268] wg1 speed is unknown, defaulting to 1000 [ 92.910102][ T6274] netlink: 'syz.5.891': attribute type 1 has an invalid length. [ 93.174154][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 93.174170][ T29] audit: type=1400 audit(1759008116.882:2782): avc: denied { connect } for pid=6296 comm="syz.4.900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 93.228633][ T6301] wg1 speed is unknown, defaulting to 1000 [ 93.423443][ T29] audit: type=1326 audit(1759008117.132:2783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 93.448082][ T29] audit: type=1326 audit(1759008117.132:2784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 93.471496][ T29] audit: type=1326 audit(1759008117.132:2785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 93.494865][ T29] audit: type=1326 audit(1759008117.132:2786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f27fd33ef03 code=0x7ffc0000 [ 93.518095][ T29] audit: type=1326 audit(1759008117.132:2787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f27fd33d97f code=0x7ffc0000 [ 93.541269][ T29] audit: type=1326 audit(1759008117.132:2788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f27fd33ef57 code=0x7ffc0000 [ 93.566217][ T29] audit: type=1326 audit(1759008117.192:2789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f27fd33d710 code=0x7ffc0000 [ 93.589608][ T29] audit: type=1326 audit(1759008117.192:2790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f27fd33db2a code=0x7ffc0000 [ 93.612821][ T29] audit: type=1326 audit(1759008117.202:2791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6309 comm="syz.4.903" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 93.898172][ T6318] __nla_validate_parse: 13 callbacks suppressed [ 93.898188][ T6318] netlink: 4 bytes leftover after parsing attributes in process `syz.0.906'. [ 94.150673][ T6332] sch_tbf: burst 2 is lower than device batadv_slave_1 mtu (1514) ! [ 94.216072][ T6334] wg1 speed is unknown, defaulting to 1000 [ 95.156861][ T6377] wg1 speed is unknown, defaulting to 1000 [ 95.172458][ T6379] netlink: 'syz.2.929': attribute type 1 has an invalid length. [ 95.180198][ T6379] netlink: 224 bytes leftover after parsing attributes in process `syz.2.929'. [ 95.499063][ T6400] wg1 speed is unknown, defaulting to 1000 [ 95.514848][ T6402] netlink: 4 bytes leftover after parsing attributes in process `syz.5.934'. [ 95.720114][ T6419] netlink: 4 bytes leftover after parsing attributes in process `syz.5.942'. [ 95.729784][ T6419] netlink: 4 bytes leftover after parsing attributes in process `syz.5.942'. [ 95.817114][ T6425] netlink: 'syz.0.944': attribute type 1 has an invalid length. [ 95.824994][ T6425] netlink: 224 bytes leftover after parsing attributes in process `syz.0.944'. [ 96.096217][ T6447] netlink: 4 bytes leftover after parsing attributes in process `syz.3.950'. [ 96.165278][ T6463] netlink: 'syz.0.956': attribute type 1 has an invalid length. [ 96.173017][ T6463] netlink: 224 bytes leftover after parsing attributes in process `syz.0.956'. [ 96.364183][ T6484] FAULT_INJECTION: forcing a failure. [ 96.364183][ T6484] name failslab, interval 1, probability 0, space 0, times 0 [ 96.376897][ T6484] CPU: 0 UID: 0 PID: 6484 Comm: syz.2.963 Not tainted syzkaller #0 PREEMPT(voluntary) [ 96.377002][ T6484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 96.377019][ T6484] Call Trace: [ 96.377027][ T6484] [ 96.377037][ T6484] __dump_stack+0x1d/0x30 [ 96.377064][ T6484] dump_stack_lvl+0xe8/0x140 [ 96.377143][ T6484] dump_stack+0x15/0x1b [ 96.377166][ T6484] should_fail_ex+0x265/0x280 [ 96.377235][ T6484] should_failslab+0x8c/0xb0 [ 96.377268][ T6484] __kmalloc_node_noprof+0xa9/0x410 [ 96.377307][ T6484] ? get_callchain_buffers+0x19c/0x2f0 [ 96.377341][ T6484] get_callchain_buffers+0x19c/0x2f0 [ 96.377374][ T6484] stack_map_alloc+0x247/0x2b0 [ 96.377482][ T6484] map_create+0x843/0xca0 [ 96.377545][ T6484] ? security_bpf+0x2b/0x90 [ 96.377571][ T6484] __sys_bpf+0x545/0x7b0 [ 96.377617][ T6484] __x64_sys_bpf+0x41/0x50 [ 96.377693][ T6484] x64_sys_call+0x2aea/0x2ff0 [ 96.377722][ T6484] do_syscall_64+0xd2/0x200 [ 96.377874][ T6484] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 96.377908][ T6484] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 96.377946][ T6484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.377980][ T6484] RIP: 0033:0x7f594a2eeec9 [ 96.378000][ T6484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.378092][ T6484] RSP: 002b:00007f5948d57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 96.378118][ T6484] RAX: ffffffffffffffda RBX: 00007f594a545fa0 RCX: 00007f594a2eeec9 [ 96.378135][ T6484] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 0000000000000000 [ 96.378153][ T6484] RBP: 00007f5948d57090 R08: 0000000000000000 R09: 0000000000000000 [ 96.378170][ T6484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.378186][ T6484] R13: 00007f594a546038 R14: 00007f594a545fa0 R15: 00007fffb4144318 [ 96.378225][ T6484] [ 96.657636][ T6488] wg1 speed is unknown, defaulting to 1000 [ 96.719931][ T6497] netlink: 4 bytes leftover after parsing attributes in process `syz.5.969'. [ 97.392286][ T6534] netlink: 'syz.3.982': attribute type 10 has an invalid length. [ 97.400340][ T6534] dummy0: left allmulticast mode [ 97.407594][ T6534] dummy0: entered allmulticast mode [ 97.413577][ T6534] team0: Port device dummy0 added [ 97.423901][ T6534] netlink: 'syz.3.982': attribute type 10 has an invalid length. [ 97.432351][ T6534] dummy0: left allmulticast mode [ 97.438433][ T6534] team0: Port device dummy0 removed [ 97.445974][ T6534] dummy0: entered allmulticast mode [ 97.451405][ T6534] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 97.508850][ T6540] wg1 speed is unknown, defaulting to 1000 [ 97.779225][ T6559] netlink: 63503 bytes leftover after parsing attributes in process `syz.0.987'. [ 97.916621][ T6568] netdevsim netdevsim4: Direct firmware load for ./file0/file1 failed with error -2 [ 98.259623][ T6610] wireguard0: entered promiscuous mode [ 98.265301][ T6610] wireguard0: entered allmulticast mode [ 98.275722][ T6616] FAULT_INJECTION: forcing a failure. [ 98.275722][ T6616] name failslab, interval 1, probability 0, space 0, times 0 [ 98.288402][ T6616] CPU: 0 UID: 0 PID: 6616 Comm: syz.4.1006 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.288470][ T6616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 98.288537][ T6616] Call Trace: [ 98.288545][ T6616] [ 98.288554][ T6616] __dump_stack+0x1d/0x30 [ 98.288579][ T6616] dump_stack_lvl+0xe8/0x140 [ 98.288604][ T6616] dump_stack+0x15/0x1b [ 98.288656][ T6616] should_fail_ex+0x265/0x280 [ 98.288680][ T6616] ? nd_alloc_stack+0x50/0xa0 [ 98.288710][ T6616] should_failslab+0x8c/0xb0 [ 98.288806][ T6616] __kmalloc_cache_noprof+0x4c/0x320 [ 98.288847][ T6616] nd_alloc_stack+0x50/0xa0 [ 98.288882][ T6616] pick_link+0x78e/0x830 [ 98.288911][ T6616] ? __d_lookup_rcu+0x248/0x2a0 [ 98.288961][ T6616] step_into+0x7b6/0x820 [ 98.289006][ T6616] ? inode_permission+0x106/0x310 [ 98.289056][ T6616] link_path_walk+0x571/0x900 [ 98.289137][ T6616] path_lookupat+0x63/0x2a0 [ 98.289178][ T6616] filename_lookup+0x147/0x340 [ 98.289245][ T6616] ? __pfx_page_put_link+0x10/0x10 [ 98.289280][ T6616] ? __pfx_page_put_link+0x10/0x10 [ 98.289316][ T6616] do_readlinkat+0x7d/0x320 [ 98.289378][ T6616] __x64_sys_readlinkat+0x51/0x60 [ 98.289431][ T6616] x64_sys_call+0x16b4/0x2ff0 [ 98.289454][ T6616] do_syscall_64+0xd2/0x200 [ 98.289508][ T6616] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.289541][ T6616] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 98.289642][ T6616] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.289670][ T6616] RIP: 0033:0x7f27fd33eec9 [ 98.289717][ T6616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.289768][ T6616] RSP: 002b:00007f27fbd9f038 EFLAGS: 00000246 ORIG_RAX: 000000000000010b [ 98.289791][ T6616] RAX: ffffffffffffffda RBX: 00007f27fd595fa0 RCX: 00007f27fd33eec9 [ 98.289807][ T6616] RDX: 0000200000000780 RSI: 00002000000001c0 RDI: 0000000000000004 [ 98.289824][ T6616] RBP: 00007f27fbd9f090 R08: 0000000000000000 R09: 0000000000000000 [ 98.289839][ T6616] R10: 00000000000000c6 R11: 0000000000000246 R12: 0000000000000001 [ 98.289852][ T6616] R13: 00007f27fd596038 R14: 00007f27fd595fa0 R15: 00007ffc44bfad78 [ 98.289871][ T6616] [ 98.292617][ T6615] batadv_slave_1: entered promiscuous mode [ 98.318630][ T6617] netlink: 'syz.3.1005': attribute type 3 has an invalid length. [ 98.335404][ T6614] batadv_slave_1: left promiscuous mode [ 98.341456][ T6617] siw: device registration error -23 [ 98.342484][ T29] kauditd_printk_skb: 208 callbacks suppressed [ 98.342501][ T29] audit: type=1400 audit(1759008122.042:3000): avc: denied { write } for pid=6614 comm="syz.2.1007" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 98.828688][ T29] audit: type=1400 audit(1759008122.532:3001): avc: denied { ioctl } for pid=6653 comm="syz.2.1019" path="time:[4026531834]" dev="nsfs" ino=4026531834 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 98.874832][ T6662] FAULT_INJECTION: forcing a failure. [ 98.874832][ T6662] name failslab, interval 1, probability 0, space 0, times 0 [ 98.887529][ T6662] CPU: 1 UID: 0 PID: 6662 Comm: syz.5.1023 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.887558][ T6662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 98.887571][ T6662] Call Trace: [ 98.887577][ T6662] [ 98.887585][ T6662] __dump_stack+0x1d/0x30 [ 98.887606][ T6662] dump_stack_lvl+0xe8/0x140 [ 98.887685][ T6662] dump_stack+0x15/0x1b [ 98.887702][ T6662] should_fail_ex+0x265/0x280 [ 98.887728][ T6662] should_failslab+0x8c/0xb0 [ 98.887788][ T6662] kmem_cache_alloc_noprof+0x50/0x310 [ 98.887818][ T6662] ? getname_flags+0x80/0x3b0 [ 98.887865][ T6662] getname_flags+0x80/0x3b0 [ 98.887895][ T6662] user_path_at+0x28/0x130 [ 98.887931][ T6662] __x64_sys_umount+0x85/0xe0 [ 98.887966][ T6662] x64_sys_call+0xdd2/0x2ff0 [ 98.888049][ T6662] do_syscall_64+0xd2/0x200 [ 98.888107][ T6662] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.888141][ T6662] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 98.888175][ T6662] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.888198][ T6662] RIP: 0033:0x7f1ac470eec9 [ 98.888267][ T6662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.888287][ T6662] RSP: 002b:00007f1ac3177038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 98.888306][ T6662] RAX: ffffffffffffffda RBX: 00007f1ac4965fa0 RCX: 00007f1ac470eec9 [ 98.888319][ T6662] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000200000000580 [ 98.888384][ T6662] RBP: 00007f1ac3177090 R08: 0000000000000000 R09: 0000000000000000 [ 98.888397][ T6662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.888409][ T6662] R13: 00007f1ac4966038 R14: 00007f1ac4965fa0 R15: 00007ffc8a5550f8 [ 98.888430][ T6662] [ 98.894343][ T29] audit: type=1326 audit(1759008122.562:3002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.042261][ T6667] __nla_validate_parse: 8 callbacks suppressed [ 99.042281][ T6667] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1024'. [ 99.049769][ T29] audit: type=1326 audit(1759008122.562:3003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.057886][ T6667] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1024'. [ 99.065905][ T29] audit: type=1326 audit(1759008122.562:3004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.163671][ T29] audit: type=1326 audit(1759008122.562:3005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.187251][ T29] audit: type=1326 audit(1759008122.562:3006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.210855][ T29] audit: type=1326 audit(1759008122.562:3007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.234432][ T29] audit: type=1326 audit(1759008122.572:3008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.257982][ T29] audit: type=1326 audit(1759008122.572:3009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.2.1019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 99.355169][ T6683] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1031'. [ 99.430028][ T6688] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1033'. [ 99.444427][ T6694] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1035'. [ 99.454846][ T6694] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1035'. [ 99.515134][ T6698] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1037'. [ 99.524409][ T6698] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1037'. [ 99.582066][ T6707] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1040'. [ 99.959685][ T6732] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1049'. [ 100.170725][ T6741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=6741 comm=syz.2.1053 [ 100.677765][ T6768] FAULT_INJECTION: forcing a failure. [ 100.677765][ T6768] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.690889][ T6768] CPU: 1 UID: 0 PID: 6768 Comm: syz.3.1064 Not tainted syzkaller #0 PREEMPT(voluntary) [ 100.690949][ T6768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 100.690962][ T6768] Call Trace: [ 100.691000][ T6768] [ 100.691009][ T6768] __dump_stack+0x1d/0x30 [ 100.691036][ T6768] dump_stack_lvl+0xe8/0x140 [ 100.691060][ T6768] dump_stack+0x15/0x1b [ 100.691080][ T6768] should_fail_ex+0x265/0x280 [ 100.691108][ T6768] should_fail+0xb/0x20 [ 100.691188][ T6768] should_fail_usercopy+0x1a/0x20 [ 100.691275][ T6768] _copy_from_user+0x1c/0xb0 [ 100.691308][ T6768] get_nodes+0x104/0x290 [ 100.691331][ T6768] __x64_sys_set_mempolicy+0x10d/0x170 [ 100.691468][ T6768] x64_sys_call+0x165a/0x2ff0 [ 100.691488][ T6768] do_syscall_64+0xd2/0x200 [ 100.691517][ T6768] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 100.691618][ T6768] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 100.691645][ T6768] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.691723][ T6768] RIP: 0033:0x7f2e0de6eec9 [ 100.691737][ T6768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.691781][ T6768] RSP: 002b:00007f2e0c8d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ee [ 100.691800][ T6768] RAX: ffffffffffffffda RBX: 00007f2e0e0c5fa0 RCX: 00007f2e0de6eec9 [ 100.691812][ T6768] RDX: 00000000000000e0 RSI: 00002000000003c0 RDI: 0000000000000006 [ 100.691824][ T6768] RBP: 00007f2e0c8d7090 R08: 0000000000000000 R09: 0000000000000000 [ 100.691835][ T6768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.691847][ T6768] R13: 00007f2e0e0c6038 R14: 00007f2e0e0c5fa0 R15: 00007ffdcb412d78 [ 100.691950][ T6768] [ 101.201272][ T6790] 9pnet: p9_errstr2errno: server reported unknown error [ 101.402232][ T6795] FAULT_INJECTION: forcing a failure. [ 101.402232][ T6795] name failslab, interval 1, probability 0, space 0, times 0 [ 101.415038][ T6795] CPU: 1 UID: 0 PID: 6795 Comm: syz.5.1073 Not tainted syzkaller #0 PREEMPT(voluntary) [ 101.415086][ T6795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 101.415139][ T6795] Call Trace: [ 101.415148][ T6795] [ 101.415158][ T6795] __dump_stack+0x1d/0x30 [ 101.415211][ T6795] dump_stack_lvl+0xe8/0x140 [ 101.415237][ T6795] dump_stack+0x15/0x1b [ 101.415291][ T6795] should_fail_ex+0x265/0x280 [ 101.415394][ T6795] should_failslab+0x8c/0xb0 [ 101.415428][ T6795] kmem_cache_alloc_noprof+0x50/0x310 [ 101.415526][ T6795] ? alloc_empty_file+0x76/0x200 [ 101.415570][ T6795] alloc_empty_file+0x76/0x200 [ 101.415629][ T6795] alloc_file_pseudo+0xc6/0x160 [ 101.415689][ T6795] hugetlb_file_setup+0x2a6/0x3d0 [ 101.415799][ T6795] ksys_mmap_pgoff+0x157/0x310 [ 101.415821][ T6795] x64_sys_call+0x14a3/0x2ff0 [ 101.415847][ T6795] do_syscall_64+0xd2/0x200 [ 101.415888][ T6795] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 101.415927][ T6795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.415956][ T6795] RIP: 0033:0x7f1ac470eec9 [ 101.416002][ T6795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.416042][ T6795] RSP: 002b:00007f1ac3177038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 101.416069][ T6795] RAX: ffffffffffffffda RBX: 00007f1ac4965fa0 RCX: 00007f1ac470eec9 [ 101.416086][ T6795] RDX: 000000000300000c RSI: 0000000000c00000 RDI: 0000200000400000 [ 101.416139][ T6795] RBP: 00007f1ac3177090 R08: ffffffffffffffff R09: 0000000000000000 [ 101.416154][ T6795] R10: 0000000000051031 R11: 0000000000000246 R12: 0000000000000001 [ 101.416169][ T6795] R13: 00007f1ac4966038 R14: 00007f1ac4965fa0 R15: 00007ffc8a5550f8 [ 101.416192][ T6795] [ 101.621380][ T6800] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 101.687172][ T6806] net_ratelimit: 30 callbacks suppressed [ 101.687193][ T6806] IPv4: Oversized IP packet from 127.202.26.0 [ 101.774095][ T6809] wg1 speed is unknown, defaulting to 1000 [ 102.140017][ T6821] SELinux: failed to load policy [ 102.255232][ T6844] netlink: 'syz.2.1091': attribute type 1 has an invalid length. [ 102.432327][ T6851] wg1 speed is unknown, defaulting to 1000 [ 102.548703][ T6856] wg1 speed is unknown, defaulting to 1000 [ 103.073414][ T6898] wg1 speed is unknown, defaulting to 1000 [ 103.247277][ T6912] FAULT_INJECTION: forcing a failure. [ 103.247277][ T6912] name failslab, interval 1, probability 0, space 0, times 0 [ 103.260048][ T6912] CPU: 0 UID: 0 PID: 6912 Comm: syz.5.1115 Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.260083][ T6912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 103.260115][ T6912] Call Trace: [ 103.260121][ T6912] [ 103.260205][ T6912] __dump_stack+0x1d/0x30 [ 103.260307][ T6912] dump_stack_lvl+0xe8/0x140 [ 103.260332][ T6912] dump_stack+0x15/0x1b [ 103.260353][ T6912] should_fail_ex+0x265/0x280 [ 103.260459][ T6912] should_failslab+0x8c/0xb0 [ 103.260491][ T6912] kmem_cache_alloc_noprof+0x50/0x310 [ 103.260526][ T6912] ? alloc_empty_file+0x76/0x200 [ 103.260560][ T6912] alloc_empty_file+0x76/0x200 [ 103.260594][ T6912] alloc_file_pseudo+0xc6/0x160 [ 103.260637][ T6912] __shmem_file_setup+0x1de/0x210 [ 103.260667][ T6912] shmem_file_setup+0x3b/0x50 [ 103.260789][ T6912] __se_sys_memfd_create+0x2c3/0x590 [ 103.260811][ T6912] __x64_sys_memfd_create+0x31/0x40 [ 103.260829][ T6912] x64_sys_call+0x2abe/0x2ff0 [ 103.260848][ T6912] do_syscall_64+0xd2/0x200 [ 103.261002][ T6912] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.261023][ T6912] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.261136][ T6912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.261157][ T6912] RIP: 0033:0x7f1ac470eec9 [ 103.261169][ T6912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.261184][ T6912] RSP: 002b:00007f1ac3176e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 103.261199][ T6912] RAX: ffffffffffffffda RBX: 00000000000005b7 RCX: 00007f1ac470eec9 [ 103.261209][ T6912] RDX: 00007f1ac3176ef0 RSI: 0000000000000000 RDI: 00007f1ac4792960 [ 103.261219][ T6912] RBP: 00002000000011c0 R08: 00007f1ac3176bb7 R09: 00007f1ac3176e40 [ 103.261255][ T6912] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 103.261264][ T6912] R13: 00007f1ac3176ef0 R14: 00007f1ac3176eb0 R15: 0000200000000140 [ 103.261280][ T6912] [ 103.466939][ T29] kauditd_printk_skb: 452 callbacks suppressed [ 103.466957][ T29] audit: type=1326 audit(1759008127.172:3462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.472021][ T6915] FAULT_INJECTION: forcing a failure. [ 103.472021][ T6915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.474007][ T29] audit: type=1326 audit(1759008127.172:3463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.496744][ T6915] CPU: 1 UID: 0 PID: 6915 Comm: syz.5.1116 Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.496777][ T6915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 103.496826][ T6915] Call Trace: [ 103.496836][ T6915] [ 103.496849][ T6915] __dump_stack+0x1d/0x30 [ 103.496950][ T6915] dump_stack_lvl+0xe8/0x140 [ 103.496980][ T6915] dump_stack+0x15/0x1b [ 103.497003][ T6915] should_fail_ex+0x265/0x280 [ 103.497115][ T6915] should_fail+0xb/0x20 [ 103.497145][ T6915] should_fail_usercopy+0x1a/0x20 [ 103.497182][ T6915] strncpy_from_user+0x25/0x230 [ 103.497284][ T6915] strncpy_from_user_nofault+0x68/0xf0 [ 103.497319][ T6915] bpf_probe_read_compat_str+0xb4/0x130 [ 103.497368][ T6915] bpf_prog_e42f6260c1b72fb3+0x3e/0x44 [ 103.497393][ T6915] bpf_trace_run3+0x10c/0x1d0 [ 103.497451][ T6915] ? audit_log_end+0x1d7/0x1f0 [ 103.497499][ T6915] ? audit_log_end+0x1d7/0x1f0 [ 103.497568][ T6915] kmem_cache_free+0x257/0x300 [ 103.497661][ T6915] audit_log_end+0x1d7/0x1f0 [ 103.497738][ T6915] audit_seccomp+0xdc/0x100 [ 103.497879][ T6915] __seccomp_filter+0x69d/0x10d0 [ 103.497911][ T6915] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 103.498047][ T6915] ? vfs_write+0x7e8/0x960 [ 103.498078][ T6915] ? __rcu_read_unlock+0x4f/0x70 [ 103.498179][ T6915] ? __fget_files+0x184/0x1c0 [ 103.498252][ T6915] __secure_computing+0x82/0x150 [ 103.498286][ T6915] syscall_trace_enter+0xcf/0x1e0 [ 103.498322][ T6915] do_syscall_64+0xac/0x200 [ 103.498418][ T6915] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.498453][ T6915] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.498492][ T6915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.498524][ T6915] RIP: 0033:0x7f1ac470eec9 [ 103.498602][ T6915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.498677][ T6915] RSP: 002b:00007f1ac3177038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 103.498704][ T6915] RAX: ffffffffffffffda RBX: 00007f1ac4965fa0 RCX: 00007f1ac470eec9 [ 103.498731][ T6915] RDX: 0000000000000040 RSI: 0000000035431846 RDI: 000000000000000f [ 103.498749][ T6915] RBP: 00007f1ac3177090 R08: 0000000000000000 R09: 0000000000000000 [ 103.498768][ T6915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.498786][ T6915] R13: 00007f1ac4966038 R14: 00007f1ac4965fa0 R15: 00007ffc8a5550f8 [ 103.498813][ T6915] [ 103.768806][ T29] audit: type=1326 audit(1759008127.172:3464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=22 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.792113][ T29] audit: type=1326 audit(1759008127.172:3465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.815596][ T29] audit: type=1326 audit(1759008127.172:3466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.838993][ T29] audit: type=1326 audit(1759008127.172:3467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.862443][ T29] audit: type=1326 audit(1759008127.172:3468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=209 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.885983][ T29] audit: type=1326 audit(1759008127.172:3469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.909395][ T29] audit: type=1326 audit(1759008127.172:3470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 103.932903][ T29] audit: type=1326 audit(1759008127.172:3471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6914 comm="syz.5.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 104.102359][ T6938] __nla_validate_parse: 18 callbacks suppressed [ 104.102379][ T6938] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1125'. [ 104.122311][ T6938] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1125'. [ 104.253339][ T6955] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1132'. [ 104.372218][ T6957] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1133'. [ 104.381364][ T6957] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1133'. [ 104.411580][ T6953] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1131'. [ 104.420768][ T6953] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1131'. [ 104.494679][ T6975] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1140'. [ 104.511091][ T6975] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1140'. [ 104.594470][ T6979] netlink: 9 bytes leftover after parsing attributes in process `syz.5.1138'. [ 104.615698][ T6979] gretap0: entered promiscuous mode [ 104.633886][ T6976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6976 comm=syz.5.1138 [ 104.646782][ T6977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6977 comm=syz.5.1138 [ 104.698526][ T6989] FAULT_INJECTION: forcing a failure. [ 104.698526][ T6989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 104.711815][ T6989] CPU: 1 UID: 0 PID: 6989 Comm: syz.4.1144 Not tainted syzkaller #0 PREEMPT(voluntary) [ 104.711849][ T6989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 104.711866][ T6989] Call Trace: [ 104.711875][ T6989] [ 104.711885][ T6989] __dump_stack+0x1d/0x30 [ 104.711963][ T6989] dump_stack_lvl+0xe8/0x140 [ 104.711989][ T6989] dump_stack+0x15/0x1b [ 104.712012][ T6989] should_fail_ex+0x265/0x280 [ 104.712052][ T6989] should_fail+0xb/0x20 [ 104.712081][ T6989] should_fail_usercopy+0x1a/0x20 [ 104.712108][ T6989] copy_to_user_nofault+0x7f/0x120 [ 104.712209][ T6989] bpf_probe_write_user+0x83/0xc0 [ 104.712270][ T6989] bpf_prog_19072b5a3fcf5d64+0x41/0x49 [ 104.712293][ T6989] bpf_trace_run3+0x10c/0x1d0 [ 104.712334][ T6989] ? audit_log_end+0x1d7/0x1f0 [ 104.712423][ T6989] ? audit_log_end+0x1d7/0x1f0 [ 104.712462][ T6989] kmem_cache_free+0x257/0x300 [ 104.712536][ T6989] audit_log_end+0x1d7/0x1f0 [ 104.712579][ T6989] audit_seccomp+0xdc/0x100 [ 104.712611][ T6989] __seccomp_filter+0x69d/0x10d0 [ 104.712681][ T6989] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 104.712780][ T6989] ? vfs_write+0x7e8/0x960 [ 104.712809][ T6989] ? __rcu_read_unlock+0x4f/0x70 [ 104.712841][ T6989] ? __fget_files+0x184/0x1c0 [ 104.712876][ T6989] __secure_computing+0x82/0x150 [ 104.712902][ T6989] syscall_trace_enter+0xcf/0x1e0 [ 104.712934][ T6989] do_syscall_64+0xac/0x200 [ 104.713102][ T6989] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 104.713178][ T6989] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 104.713207][ T6989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.713287][ T6989] RIP: 0033:0x7f27fd33eec9 [ 104.713301][ T6989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.713326][ T6989] RSP: 002b:00007f27fbd9f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 104.713346][ T6989] RAX: ffffffffffffffda RBX: 00007f27fd595fa0 RCX: 00007f27fd33eec9 [ 104.713359][ T6989] RDX: 0000000000000040 RSI: 0000000037f7e77c RDI: 000000000000000f [ 104.713372][ T6989] RBP: 00007f27fbd9f090 R08: 0000000000000000 R09: 0000000000000000 [ 104.713448][ T6989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.713460][ T6989] R13: 00007f27fd596038 R14: 00007f27fd595fa0 R15: 00007ffc44bfad78 [ 104.713480][ T6989] [ 107.838884][ T7150] FAULT_INJECTION: forcing a failure. [ 107.838884][ T7150] name failslab, interval 1, probability 0, space 0, times 0 [ 107.851655][ T7150] CPU: 0 UID: 0 PID: 7150 Comm: syz.2.1202 Not tainted syzkaller #0 PREEMPT(voluntary) [ 107.851690][ T7150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 107.851705][ T7150] Call Trace: [ 107.851712][ T7150] [ 107.851721][ T7150] __dump_stack+0x1d/0x30 [ 107.851742][ T7150] dump_stack_lvl+0xe8/0x140 [ 107.851783][ T7150] dump_stack+0x15/0x1b [ 107.851834][ T7150] should_fail_ex+0x265/0x280 [ 107.851864][ T7150] should_failslab+0x8c/0xb0 [ 107.851890][ T7150] kmem_cache_alloc_noprof+0x50/0x310 [ 107.851920][ T7150] ? ep_insert+0x2cf/0xdb0 [ 107.852026][ T7150] ep_insert+0x2cf/0xdb0 [ 107.852069][ T7150] ? security_capable+0x83/0x90 [ 107.852101][ T7150] do_epoll_ctl+0x686/0x8a0 [ 107.852206][ T7150] __x64_sys_epoll_ctl+0xcb/0x100 [ 107.852238][ T7150] x64_sys_call+0x706/0x2ff0 [ 107.852265][ T7150] do_syscall_64+0xd2/0x200 [ 107.852342][ T7150] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 107.852368][ T7150] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 107.852434][ T7150] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.852462][ T7150] RIP: 0033:0x7f594a2eeec9 [ 107.852480][ T7150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.852503][ T7150] RSP: 002b:00007f5948d57038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 107.852527][ T7150] RAX: ffffffffffffffda RBX: 00007f594a545fa0 RCX: 00007f594a2eeec9 [ 107.852543][ T7150] RDX: 0000000000000003 RSI: 0000000000000001 RDI: 0000000000000004 [ 107.852607][ T7150] RBP: 00007f5948d57090 R08: 0000000000000000 R09: 0000000000000000 [ 107.852622][ T7150] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.852683][ T7150] R13: 00007f594a546038 R14: 00007f594a545fa0 R15: 00007fffb4144318 [ 107.852705][ T7150] [ 108.103555][ T7159] wg1 speed is unknown, defaulting to 1000 [ 108.208343][ T7173] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=7173 comm=syz.4.1210 [ 108.329063][ T7183] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 108.362418][ T7185] batman_adv: batadv0: Interface deactivated: dummy0 [ 108.369226][ T7185] batman_adv: batadv0: Removing interface: dummy0 [ 108.381142][ T7185] bridge_slave_0: left allmulticast mode [ 108.386949][ T7185] bridge_slave_0: left promiscuous mode [ 108.392644][ T7185] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.402564][ T7185] bridge_slave_1: left allmulticast mode [ 108.408388][ T7185] bridge_slave_1: left promiscuous mode [ 108.413197][ T7188] netlink: 'syz.2.1215': attribute type 10 has an invalid length. [ 108.414133][ T7185] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.431736][ T7185] bond0: (slave bond_slave_0): Releasing backup interface [ 108.441488][ T7185] bond0: (slave 4@0Ù): Releasing backup interface [ 108.452604][ T7185] team0: Port device team_slave_0 removed [ 108.461273][ T7185] team0: Port device team_slave_1 removed [ 108.468879][ T7185] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 108.476494][ T7185] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 108.487631][ T7185] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 108.495102][ T7185] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 108.517103][ T7188] batman_adv: batadv0: Adding interface: veth1_vlan [ 108.523756][ T7188] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.549835][ T7188] batman_adv: batadv0: Interface activated: veth1_vlan [ 109.126188][ T29] kauditd_printk_skb: 823 callbacks suppressed [ 109.126243][ T29] audit: type=1326 audit(1759008132.832:4295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 109.161059][ T29] audit: type=1326 audit(1759008132.862:4296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 109.184628][ T29] audit: type=1326 audit(1759008132.862:4297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 109.208054][ T29] audit: type=1326 audit(1759008132.862:4298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 109.231583][ T29] audit: type=1326 audit(1759008132.862:4299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f2e0de6ef03 code=0x7ffc0000 [ 109.254949][ T29] audit: type=1326 audit(1759008132.862:4300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f2e0de6d97f code=0x7ffc0000 [ 109.278260][ T29] audit: type=1326 audit(1759008132.862:4301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f2e0de6ef57 code=0x7ffc0000 [ 109.301685][ T29] audit: type=1326 audit(1759008132.862:4302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2e0de6d710 code=0x7ffc0000 [ 109.325260][ T29] audit: type=1326 audit(1759008132.862:4303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f2e0de6db2a code=0x7ffc0000 [ 109.348507][ T29] audit: type=1326 audit(1759008132.862:4304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.3.1220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 109.492434][ T7215] wg1 speed is unknown, defaulting to 1000 [ 109.498847][ T7217] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 110.018777][ T7255] netlink: 'syz.3.1239': attribute type 1 has an invalid length. [ 110.026646][ T7255] __nla_validate_parse: 20 callbacks suppressed [ 110.026664][ T7255] netlink: 224 bytes leftover after parsing attributes in process `syz.3.1239'. [ 110.159236][ T7257] FAULT_INJECTION: forcing a failure. [ 110.159236][ T7257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.172379][ T7257] CPU: 1 UID: 0 PID: 7257 Comm: syz.2.1240 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.172415][ T7257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.172433][ T7257] Call Trace: [ 110.172441][ T7257] [ 110.172452][ T7257] __dump_stack+0x1d/0x30 [ 110.172568][ T7257] dump_stack_lvl+0xe8/0x140 [ 110.172588][ T7257] dump_stack+0x15/0x1b [ 110.172604][ T7257] should_fail_ex+0x265/0x280 [ 110.172643][ T7257] should_fail+0xb/0x20 [ 110.172672][ T7257] should_fail_usercopy+0x1a/0x20 [ 110.172763][ T7257] _copy_from_user+0x1c/0xb0 [ 110.172804][ T7257] ___sys_sendmsg+0xc1/0x1d0 [ 110.172861][ T7257] __sys_sendmmsg+0x178/0x300 [ 110.172983][ T7257] __x64_sys_sendmmsg+0x57/0x70 [ 110.173019][ T7257] x64_sys_call+0x1c4a/0x2ff0 [ 110.173049][ T7257] do_syscall_64+0xd2/0x200 [ 110.173091][ T7257] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.173150][ T7257] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 110.173200][ T7257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.173231][ T7257] RIP: 0033:0x7f594a2eeec9 [ 110.173263][ T7257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.173281][ T7257] RSP: 002b:00007f5948d57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 110.173318][ T7257] RAX: ffffffffffffffda RBX: 00007f594a545fa0 RCX: 00007f594a2eeec9 [ 110.173336][ T7257] RDX: 0400000000000235 RSI: 0000200000000000 RDI: 0000000000000003 [ 110.173353][ T7257] RBP: 00007f5948d57090 R08: 0000000000000000 R09: 0000000000000000 [ 110.173370][ T7257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.173386][ T7257] R13: 00007f594a546038 R14: 00007f594a545fa0 R15: 00007fffb4144318 [ 110.173451][ T7257] [ 110.388773][ T7259] wg1 speed is unknown, defaulting to 1000 [ 110.671560][ T7280] FAULT_INJECTION: forcing a failure. [ 110.671560][ T7280] name failslab, interval 1, probability 0, space 0, times 0 [ 110.684302][ T7280] CPU: 1 UID: 0 PID: 7280 Comm: syz.2.1248 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.684329][ T7280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.684342][ T7280] Call Trace: [ 110.684347][ T7280] [ 110.684395][ T7280] __dump_stack+0x1d/0x30 [ 110.684416][ T7280] dump_stack_lvl+0xe8/0x140 [ 110.684434][ T7280] dump_stack+0x15/0x1b [ 110.684497][ T7280] should_fail_ex+0x265/0x280 [ 110.684521][ T7280] should_failslab+0x8c/0xb0 [ 110.684545][ T7280] kmem_cache_alloc_node_noprof+0x57/0x320 [ 110.684574][ T7280] ? __alloc_skb+0x101/0x320 [ 110.684597][ T7280] ? selinux_socket_sock_rcv_skb+0x219/0x620 [ 110.684629][ T7280] __alloc_skb+0x101/0x320 [ 110.684649][ T7280] alloc_skb_with_frags+0x7d/0x470 [ 110.684670][ T7280] ? avc_has_perm+0xf7/0x180 [ 110.684755][ T7280] sock_alloc_send_pskb+0x43a/0x4f0 [ 110.684788][ T7280] unix_dgram_sendmsg+0x380/0xfe0 [ 110.684816][ T7280] ? selinux_socket_sendmsg+0x175/0x1b0 [ 110.684870][ T7280] ? __pfx_unix_dgram_sendmsg+0x10/0x10 [ 110.684899][ T7280] __sock_sendmsg+0x145/0x180 [ 110.684938][ T7280] ____sys_sendmsg+0x345/0x4e0 [ 110.685028][ T7280] ___sys_sendmsg+0x17b/0x1d0 [ 110.685068][ T7280] __sys_sendmmsg+0x178/0x300 [ 110.685104][ T7280] __x64_sys_sendmmsg+0x57/0x70 [ 110.685136][ T7280] x64_sys_call+0x1c4a/0x2ff0 [ 110.685158][ T7280] do_syscall_64+0xd2/0x200 [ 110.685193][ T7280] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.685355][ T7280] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 110.685385][ T7280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.685408][ T7280] RIP: 0033:0x7f594a2eeec9 [ 110.685423][ T7280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.685523][ T7280] RSP: 002b:00007f5948d57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 110.685543][ T7280] RAX: ffffffffffffffda RBX: 00007f594a545fa0 RCX: 00007f594a2eeec9 [ 110.685561][ T7280] RDX: 0000000000000651 RSI: 0000200000000000 RDI: 0000000000000004 [ 110.685574][ T7280] RBP: 00007f5948d57090 R08: 0000000000000000 R09: 0000000000000000 [ 110.685587][ T7280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.685665][ T7280] R13: 00007f594a546038 R14: 00007f594a545fa0 R15: 00007fffb4144318 [ 110.685685][ T7280] [ 110.686753][ T7288] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=7288 comm=syz.4.1250 [ 110.998426][ T7291] netlink: 'syz.4.1251': attribute type 1 has an invalid length. [ 111.006318][ T7291] netlink: 224 bytes leftover after parsing attributes in process `syz.4.1251'. [ 111.180193][ T7296] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1253'. [ 111.394048][ T7303] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1255'. [ 111.403660][ T7303] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1255'. [ 111.515163][ T7314] wg1 speed is unknown, defaulting to 1000 [ 112.269552][ T7326] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1264'. [ 112.325743][ T7332] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1267'. [ 112.335075][ T7332] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1267'. [ 112.397362][ T7328] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1265'. [ 112.406553][ T7328] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1265'. [ 112.678806][ T7368] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 112.760338][ T7373] wg1 speed is unknown, defaulting to 1000 [ 113.046385][ T7380] netlink: 'syz.4.1287': attribute type 1 has an invalid length. [ 113.243772][ T7385] netlink: 'syz.4.1289': attribute type 1 has an invalid length. [ 113.437485][ T7399] ALSA: seq fatal error: cannot create timer (-22) [ 113.563777][ T7412] netlink: 'syz.0.1299': attribute type 1 has an invalid length. [ 113.871029][ T7439] netlink: 'syz.3.1305': attribute type 10 has an invalid length. [ 113.892951][ T7439] bond0: (slave dummy0): Releasing backup interface [ 113.901298][ T7439] dummy0: left allmulticast mode [ 113.910218][ T7439] dummy0: entered allmulticast mode [ 113.915881][ T7439] team0: Port device dummy0 added [ 113.921459][ T7441] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 113.934531][ T7439] netlink: 'syz.3.1305': attribute type 10 has an invalid length. [ 113.944915][ T7439] dummy0: left allmulticast mode [ 113.951438][ T7439] team0: Port device dummy0 removed [ 113.960162][ T7439] dummy0: entered allmulticast mode [ 113.965907][ T7439] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 114.002862][ T7451] netlink: 'syz.2.1313': attribute type 1 has an invalid length. [ 114.026186][ T7455] capability: warning: `syz.4.1315' uses 32-bit capabilities (legacy support in use) [ 114.208852][ T7466] wg1 speed is unknown, defaulting to 1000 [ 114.468893][ T7477] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 114.584251][ T7492] netlink: 'syz.4.1329': attribute type 1 has an invalid length. [ 114.607667][ T7494] wg1 speed is unknown, defaulting to 1000 [ 114.801446][ T7510] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 114.817660][ T7508] wg1 speed is unknown, defaulting to 1000 [ 114.875706][ T29] kauditd_printk_skb: 286 callbacks suppressed [ 114.875723][ T29] audit: type=1326 audit(1759008138.582:4591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 114.904928][ T29] audit: type=1326 audit(1759008138.582:4592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 114.969478][ T29] audit: type=1326 audit(1759008138.582:4593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=79 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 114.992421][ T29] audit: type=1326 audit(1759008138.582:4594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 115.015424][ T29] audit: type=1326 audit(1759008138.582:4595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 115.038411][ T29] audit: type=1326 audit(1759008138.582:4596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2e0de6d710 code=0x7ffc0000 [ 115.061317][ T29] audit: type=1326 audit(1759008138.582:4597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f2e0de706f7 code=0x7ffc0000 [ 115.084304][ T29] audit: type=1326 audit(1759008138.582:4598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 115.107186][ T29] audit: type=1326 audit(1759008138.582:4599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f2e0de706f7 code=0x7ffc0000 [ 115.130121][ T29] audit: type=1326 audit(1759008138.582:4600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7512 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f2e0de6db2a code=0x7ffc0000 [ 115.253224][ T7529] __nla_validate_parse: 15 callbacks suppressed [ 115.253241][ T7529] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1339'. [ 115.526051][ T7551] tipc: Started in network mode [ 115.531057][ T7551] tipc: Node identity ac14140f, cluster identity 4711 [ 115.545422][ T7551] tipc: New replicast peer: 255.255.255.255 [ 115.551517][ T7551] tipc: Enabled bearer , priority 10 [ 115.991639][ T7554] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1348'. [ 116.000804][ T7554] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1348'. [ 116.317737][ T7582] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1354'. [ 116.397049][ T7590] netlink: 'syz.5.1361': attribute type 1 has an invalid length. [ 116.481028][ T7602] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 116.663052][ T1036] tipc: Node number set to 2886997007 [ 116.957141][ T7623] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1375'. [ 117.035820][ T7634] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1379'. [ 117.153924][ T7652] FAULT_INJECTION: forcing a failure. [ 117.153924][ T7652] name failslab, interval 1, probability 0, space 0, times 0 [ 117.166689][ T7652] CPU: 1 UID: 0 PID: 7652 Comm: syz.0.1386 Not tainted syzkaller #0 PREEMPT(voluntary) [ 117.166723][ T7652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 117.166794][ T7652] Call Trace: [ 117.166801][ T7652] [ 117.166808][ T7652] __dump_stack+0x1d/0x30 [ 117.166871][ T7652] dump_stack_lvl+0xe8/0x140 [ 117.166897][ T7652] dump_stack+0x15/0x1b [ 117.166936][ T7652] should_fail_ex+0x265/0x280 [ 117.166969][ T7652] should_failslab+0x8c/0xb0 [ 117.167003][ T7652] __kmalloc_noprof+0xa5/0x3e0 [ 117.167038][ T7652] ? context_struct_to_string+0x24d/0x3a0 [ 117.167108][ T7652] context_struct_to_string+0x24d/0x3a0 [ 117.167161][ T7652] security_sid_to_context_core+0x215/0x2e0 [ 117.167272][ T7652] security_sid_to_context+0x27/0x40 [ 117.167302][ T7652] avc_audit_post_callback+0x10f/0x520 [ 117.167340][ T7652] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 117.167440][ T7652] common_lsm_audit+0x1bb/0x230 [ 117.167546][ T7652] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 117.167586][ T7652] slow_avc_audit+0x104/0x140 [ 117.167625][ T7652] avc_has_perm+0x13a/0x180 [ 117.167655][ T7652] file_has_perm+0x324/0x370 [ 117.167708][ T7652] file_map_prot_check+0x110/0x210 [ 117.167806][ T7652] selinux_mmap_file+0x190/0x1d0 [ 117.167909][ T7652] security_mmap_file+0x175/0x1c0 [ 117.167958][ T7652] vm_mmap_pgoff+0x90/0x2e0 [ 117.168001][ T7652] ksys_mmap_pgoff+0x2d0/0x310 [ 117.168023][ T7652] x64_sys_call+0x14a3/0x2ff0 [ 117.168101][ T7652] do_syscall_64+0xd2/0x200 [ 117.168139][ T7652] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 117.168173][ T7652] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 117.168253][ T7652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.168279][ T7652] RIP: 0033:0x7f67e8eeeec9 [ 117.168312][ T7652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.168337][ T7652] RSP: 002b:00007f67e7957038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 117.168363][ T7652] RAX: ffffffffffffffda RBX: 00007f67e9145fa0 RCX: 00007f67e8eeeec9 [ 117.168454][ T7652] RDX: 000000000300000c RSI: 0000000000c00000 RDI: 0000200000400000 [ 117.168472][ T7652] RBP: 00007f67e7957090 R08: ffffffffffffffff R09: 0000000000000000 [ 117.168490][ T7652] R10: 0000000000051031 R11: 0000000000000246 R12: 0000000000000002 [ 117.168505][ T7652] R13: 00007f67e9146038 R14: 00007f67e9145fa0 R15: 00007ffd8bad8698 [ 117.168523][ T7652] [ 117.503982][ T7664] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1391'. [ 117.554851][ T7656] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1388'. [ 117.564001][ T7656] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1388'. [ 117.583643][ T7666] tipc: New replicast peer: 255.255.255.255 [ 117.589754][ T7666] tipc: Enabled bearer , priority 10 [ 117.792451][ T7672] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1393'. [ 118.003479][ T7703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48388 sclass=netlink_route_socket pid=7703 comm=syz.3.1407 [ 118.723182][ T10] tipc: Node number set to 3571290650 [ 118.987864][ T7736] team_slave_0: entered promiscuous mode [ 118.993588][ T7736] team_slave_1: entered promiscuous mode [ 120.257986][ T7830] wg1 speed is unknown, defaulting to 1000 [ 120.441676][ T29] kauditd_printk_skb: 758 callbacks suppressed [ 120.441720][ T29] audit: type=1326 audit(1759008144.142:5359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 120.543029][ T29] audit: type=1326 audit(1759008144.182:5360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 120.558583][ T7846] __nla_validate_parse: 21 callbacks suppressed [ 120.558603][ T7846] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1460'. [ 120.566520][ T29] audit: type=1326 audit(1759008144.182:5361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 120.605045][ T29] audit: type=1326 audit(1759008144.182:5362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 120.628718][ T29] audit: type=1326 audit(1759008144.182:5363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f2e0de6ef03 code=0x7ffc0000 [ 120.652240][ T29] audit: type=1326 audit(1759008144.182:5364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f2e0de6d97f code=0x7ffc0000 [ 120.676569][ T29] audit: type=1326 audit(1759008144.182:5365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f2e0de6ef57 code=0x7ffc0000 [ 120.699954][ T29] audit: type=1326 audit(1759008144.182:5366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2e0de6d710 code=0x7ffc0000 [ 120.723481][ T29] audit: type=1326 audit(1759008144.182:5367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f2e0de6db2a code=0x7ffc0000 [ 120.734532][ T7846] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1460'. [ 120.746998][ T29] audit: type=1326 audit(1759008144.182:5368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7843 comm="syz.3.1459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e0de6eec9 code=0x7ffc0000 [ 120.795945][ T7849] wg1 speed is unknown, defaulting to 1000 [ 121.014628][ T7852] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1462'. [ 121.023761][ T7852] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1462'. [ 122.098383][ T7890] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1475'. [ 122.294995][ T7907] wg1 speed is unknown, defaulting to 1000 [ 122.964048][ T7940] wg1 speed is unknown, defaulting to 1000 [ 123.559579][ T7973] FAULT_INJECTION: forcing a failure. [ 123.559579][ T7973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.572765][ T7973] CPU: 0 UID: 0 PID: 7973 Comm: syz.5.1505 Not tainted syzkaller #0 PREEMPT(voluntary) [ 123.572800][ T7973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 123.572823][ T7973] Call Trace: [ 123.572832][ T7973] [ 123.572841][ T7973] __dump_stack+0x1d/0x30 [ 123.572870][ T7973] dump_stack_lvl+0xe8/0x140 [ 123.572904][ T7973] dump_stack+0x15/0x1b [ 123.572924][ T7973] should_fail_ex+0x265/0x280 [ 123.572964][ T7973] should_fail+0xb/0x20 [ 123.573042][ T7973] should_fail_usercopy+0x1a/0x20 [ 123.573076][ T7973] _copy_to_iter+0x387/0xe70 [ 123.573119][ T7973] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 123.573178][ T7973] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 123.573214][ T7973] __skb_datagram_iter+0xc6/0x690 [ 123.573267][ T7973] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 123.573301][ T7973] skb_copy_datagram_iter+0x3d/0x110 [ 123.573380][ T7973] netlink_recvmsg+0x1a8/0x550 [ 123.573418][ T7973] ? __pfx_netlink_recvmsg+0x10/0x10 [ 123.573453][ T7973] sock_recvmsg+0x139/0x170 [ 123.573516][ T7973] ____sys_recvmsg+0xf5/0x280 [ 123.573569][ T7973] ___sys_recvmsg+0x11f/0x370 [ 123.573661][ T7973] do_recvmmsg+0x1ef/0x540 [ 123.573703][ T7973] ? get_timespec64+0xc9/0x100 [ 123.573732][ T7973] __x64_sys_recvmmsg+0xfb/0x170 [ 123.573792][ T7973] x64_sys_call+0x27a6/0x2ff0 [ 123.573822][ T7973] do_syscall_64+0xd2/0x200 [ 123.573863][ T7973] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 123.573952][ T7973] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 123.573986][ T7973] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.574080][ T7973] RIP: 0033:0x7f1ac470eec9 [ 123.574100][ T7973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.574125][ T7973] RSP: 002b:00007f1ac3177038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 123.574152][ T7973] RAX: ffffffffffffffda RBX: 00007f1ac4965fa0 RCX: 00007f1ac470eec9 [ 123.574169][ T7973] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 123.574265][ T7973] RBP: 00007f1ac3177090 R08: 0000200000003700 R09: 0000000000000000 [ 123.574283][ T7973] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 123.574300][ T7973] R13: 00007f1ac4966038 R14: 00007f1ac4965fa0 R15: 00007ffc8a5550f8 [ 123.574326][ T7973] [ 123.831836][ T7975] FAULT_INJECTION: forcing a failure. [ 123.831836][ T7975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.845076][ T7975] CPU: 1 UID: 0 PID: 7975 Comm: syz.5.1506 Not tainted syzkaller #0 PREEMPT(voluntary) [ 123.845107][ T7975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 123.845124][ T7975] Call Trace: [ 123.845131][ T7975] [ 123.845140][ T7975] __dump_stack+0x1d/0x30 [ 123.845167][ T7975] dump_stack_lvl+0xe8/0x140 [ 123.845211][ T7975] dump_stack+0x15/0x1b [ 123.845234][ T7975] should_fail_ex+0x265/0x280 [ 123.845277][ T7975] should_fail+0xb/0x20 [ 123.845299][ T7975] should_fail_usercopy+0x1a/0x20 [ 123.845333][ T7975] _copy_to_user+0x20/0xa0 [ 123.845424][ T7975] simple_read_from_buffer+0xb5/0x130 [ 123.845456][ T7975] proc_fail_nth_read+0x10e/0x150 [ 123.845500][ T7975] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 123.845547][ T7975] vfs_read+0x1a5/0x770 [ 123.845576][ T7975] ? __rcu_read_unlock+0x4f/0x70 [ 123.845606][ T7975] ? __fget_files+0x184/0x1c0 [ 123.845837][ T7975] ksys_read+0xda/0x1a0 [ 123.845878][ T7975] __x64_sys_read+0x40/0x50 [ 123.845910][ T7975] x64_sys_call+0x27bc/0x2ff0 [ 123.845958][ T7975] do_syscall_64+0xd2/0x200 [ 123.846000][ T7975] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 123.846033][ T7975] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 123.846089][ T7975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.846143][ T7975] RIP: 0033:0x7f1ac470d8dc [ 123.846163][ T7975] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 123.846187][ T7975] RSP: 002b:00007f1ac3177030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 123.846210][ T7975] RAX: ffffffffffffffda RBX: 00007f1ac4965fa0 RCX: 00007f1ac470d8dc [ 123.846274][ T7975] RDX: 000000000000000f RSI: 00007f1ac31770a0 RDI: 0000000000000007 [ 123.846291][ T7975] RBP: 00007f1ac3177090 R08: 0000000000000000 R09: 0000000000000000 [ 123.846308][ T7975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.846325][ T7975] R13: 00007f1ac4966038 R14: 00007f1ac4965fa0 R15: 00007ffc8a5550f8 [ 123.846350][ T7975] [ 124.132136][ T7983] wg1 speed is unknown, defaulting to 1000 [ 124.300722][ T7992] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1512'. [ 124.373732][ T7993] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1512'. [ 125.086947][ T8012] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1520'. [ 125.096061][ T8012] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1520'. [ 125.217077][ T8021] wg1 speed is unknown, defaulting to 1000 [ 125.258061][ T8024] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 125.928497][ T8049] wg1 speed is unknown, defaulting to 1000 [ 126.051784][ T29] kauditd_printk_skb: 200 callbacks suppressed [ 126.051802][ T29] audit: type=1400 audit(1759008149.752:5569): avc: denied { mount } for pid=8052 comm="syz.2.1533" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 126.243302][ T8063] wg1 speed is unknown, defaulting to 1000 [ 126.524579][ T29] audit: type=1400 audit(1759008150.222:5570): avc: denied { read } for pid=8059 comm="syz.3.1536" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 126.547398][ T29] audit: type=1400 audit(1759008150.222:5571): avc: denied { open } for pid=8059 comm="syz.3.1536" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 126.610116][ T8071] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1538'. [ 126.672788][ T29] audit: type=1326 audit(1759008150.372:5572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 126.696401][ T29] audit: type=1326 audit(1759008150.372:5573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 126.720464][ T29] audit: type=1326 audit(1759008150.372:5574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f1ac470eec9 code=0x7ffc0000 [ 126.743912][ T29] audit: type=1326 audit(1759008150.372:5575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f1ac470ef03 code=0x7ffc0000 [ 126.767166][ T29] audit: type=1326 audit(1759008150.372:5576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f1ac470d97f code=0x7ffc0000 [ 126.790514][ T29] audit: type=1326 audit(1759008150.372:5577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f1ac470ef57 code=0x7ffc0000 [ 126.813928][ T29] audit: type=1326 audit(1759008150.372:5578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8072 comm="syz.5.1540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1ac470d710 code=0x7ffc0000 [ 127.796812][ T8100] wg1 speed is unknown, defaulting to 1000 [ 128.113899][ T8112] FAULT_INJECTION: forcing a failure. [ 128.113899][ T8112] name failslab, interval 1, probability 0, space 0, times 0 [ 128.126612][ T8112] CPU: 1 UID: 0 PID: 8112 Comm: syz.5.1552 Not tainted syzkaller #0 PREEMPT(voluntary) [ 128.126638][ T8112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 128.126709][ T8112] Call Trace: [ 128.126717][ T8112] [ 128.126726][ T8112] __dump_stack+0x1d/0x30 [ 128.126749][ T8112] dump_stack_lvl+0xe8/0x140 [ 128.126827][ T8112] dump_stack+0x15/0x1b [ 128.126848][ T8112] should_fail_ex+0x265/0x280 [ 128.126880][ T8112] should_failslab+0x8c/0xb0 [ 128.126964][ T8112] kmem_cache_alloc_noprof+0x50/0x310 [ 128.127001][ T8112] ? security_file_alloc+0x32/0x100 [ 128.127124][ T8112] security_file_alloc+0x32/0x100 [ 128.127171][ T8112] init_file+0x5c/0x1d0 [ 128.127218][ T8112] alloc_empty_file+0x8b/0x200 [ 128.127285][ T8112] path_openat+0x68/0x2170 [ 128.127310][ T8112] ? mntput+0x4b/0x80 [ 128.127346][ T8112] ? terminate_walk+0x27f/0x2a0 [ 128.127381][ T8112] ? path_openat+0x1bf8/0x2170 [ 128.127406][ T8112] ? _parse_integer_limit+0x170/0x190 [ 128.127500][ T8112] do_filp_open+0x109/0x230 [ 128.127539][ T8112] do_open_execat+0xd8/0x260 [ 128.127638][ T8112] alloc_bprm+0x25/0x350 [ 128.127666][ T8112] do_execveat_common+0x12e/0x750 [ 128.127697][ T8112] ? getname_flags+0x154/0x3b0 [ 128.127736][ T8112] __x64_sys_execveat+0x73/0x90 [ 128.127772][ T8112] x64_sys_call+0x1fec/0x2ff0 [ 128.127799][ T8112] do_syscall_64+0xd2/0x200 [ 128.127839][ T8112] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 128.127868][ T8112] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 128.127900][ T8112] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.127921][ T8112] RIP: 0033:0x7f1ac470eec9 [ 128.127938][ T8112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.127961][ T8112] RSP: 002b:00007f1ac3177038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 128.127985][ T8112] RAX: ffffffffffffffda RBX: 00007f1ac4965fa0 RCX: 00007f1ac470eec9 [ 128.128002][ T8112] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 128.128036][ T8112] RBP: 00007f1ac3177090 R08: 0000000000001000 R09: 0000000000000000 [ 128.128052][ T8112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.128113][ T8112] R13: 00007f1ac4966038 R14: 00007f1ac4965fa0 R15: 00007ffc8a5550f8 [ 128.128139][ T8112] [ 128.391202][ T8121] FAULT_INJECTION: forcing a failure. [ 128.391202][ T8121] name failslab, interval 1, probability 0, space 0, times 0 [ 128.404420][ T8121] CPU: 1 UID: 0 PID: 8121 Comm: syz.0.1554 Not tainted syzkaller #0 PREEMPT(voluntary) [ 128.404450][ T8121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 128.404466][ T8121] Call Trace: [ 128.404474][ T8121] [ 128.404483][ T8121] __dump_stack+0x1d/0x30 [ 128.404518][ T8121] dump_stack_lvl+0xe8/0x140 [ 128.404543][ T8121] dump_stack+0x15/0x1b [ 128.404566][ T8121] should_fail_ex+0x265/0x280 [ 128.404591][ T8121] ? __pfx_cond_bools_destroy+0x10/0x10 [ 128.404627][ T8121] should_failslab+0x8c/0xb0 [ 128.404680][ T8121] kmem_cache_alloc_noprof+0x50/0x310 [ 128.404716][ T8121] ? hashtab_duplicate+0xfe/0x360 [ 128.404741][ T8121] ? __pfx_cond_bools_destroy+0x10/0x10 [ 128.404841][ T8121] hashtab_duplicate+0xfe/0x360 [ 128.404865][ T8121] ? __pfx_cond_bools_copy+0x10/0x10 [ 128.404967][ T8121] cond_policydb_dup+0xd2/0x4e0 [ 128.405022][ T8121] security_set_bools+0xa0/0x340 [ 128.405057][ T8121] sel_commit_bools_write+0x1ea/0x270 [ 128.405094][ T8121] vfs_writev+0x406/0x8b0 [ 128.405138][ T8121] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 128.405224][ T8121] ? mutex_lock+0xd/0x30 [ 128.405248][ T8121] do_writev+0xe7/0x210 [ 128.405280][ T8121] __x64_sys_writev+0x45/0x50 [ 128.405387][ T8121] x64_sys_call+0x1e9a/0x2ff0 [ 128.405411][ T8121] do_syscall_64+0xd2/0x200 [ 128.405449][ T8121] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 128.405490][ T8121] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 128.405526][ T8121] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.405554][ T8121] RIP: 0033:0x7f67e8eeeec9 [ 128.405578][ T8121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.405596][ T8121] RSP: 002b:00007f67e7957038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 128.405640][ T8121] RAX: ffffffffffffffda RBX: 00007f67e9145fa0 RCX: 00007f67e8eeeec9 [ 128.405657][ T8121] RDX: 0000000000000002 RSI: 00002000000025c0 RDI: 0000000000000006 [ 128.405673][ T8121] RBP: 00007f67e7957090 R08: 0000000000000000 R09: 0000000000000000 [ 128.405688][ T8121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.405703][ T8121] R13: 00007f67e9146038 R14: 00007f67e9145fa0 R15: 00007ffd8bad8698 [ 128.405726][ T8121] [ 128.730594][ T8131] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1558'. [ 129.041883][ T8141] hub 6-0:1.0: USB hub found [ 129.046646][ T8141] hub 6-0:1.0: 8 ports detected [ 129.495473][ T8146] wg1 speed is unknown, defaulting to 1000 [ 130.236588][ T8169] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1569'. [ 130.664701][ T8182] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1573'. [ 130.810026][ T8188] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1574'. [ 130.836903][ T8188] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1574'. [ 130.914491][ T8190] wg1 speed is unknown, defaulting to 1000 [ 131.165737][ T8194] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1576'. [ 131.175162][ T8194] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1576'. [ 131.206384][ T8198] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1578'. [ 131.216044][ T8198] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1578'. [ 131.296720][ T8204] wg1 speed is unknown, defaulting to 1000 [ 131.497469][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 131.497488][ T29] audit: type=1326 audit(1759008155.202:5742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 131.527642][ T29] audit: type=1326 audit(1759008155.202:5743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 131.551275][ T29] audit: type=1326 audit(1759008155.202:5744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 131.574719][ T29] audit: type=1326 audit(1759008155.202:5745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 131.598260][ T29] audit: type=1326 audit(1759008155.202:5746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f27fd33ef03 code=0x7ffc0000 [ 131.621509][ T29] audit: type=1326 audit(1759008155.212:5747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f27fd33d97f code=0x7ffc0000 [ 131.644810][ T29] audit: type=1326 audit(1759008155.212:5748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f27fd33ef57 code=0x7ffc0000 [ 131.668136][ T29] audit: type=1326 audit(1759008155.232:5749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f27fd33d710 code=0x7ffc0000 [ 131.726229][ T8229] wg1 speed is unknown, defaulting to 1000 [ 131.754456][ T29] audit: type=1326 audit(1759008155.232:5750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f27fd33db2a code=0x7ffc0000 [ 131.777802][ T29] audit: type=1326 audit(1759008155.232:5751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8226 comm="syz.4.1590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f27fd33eec9 code=0x7ffc0000 [ 131.886010][ T8238] __nla_validate_parse: 4 callbacks suppressed [ 131.886027][ T8238] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1594'. [ 131.913435][ T8238] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1594'. [ 132.027398][ T8244] wg1 speed is unknown, defaulting to 1000 [ 132.224709][ T8263] FAULT_INJECTION: forcing a failure. [ 132.224709][ T8263] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.237820][ T8263] CPU: 1 UID: 0 PID: 8263 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 132.237849][ T8263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 132.237874][ T8263] Call Trace: [ 132.237880][ T8263] [ 132.237887][ T8263] __dump_stack+0x1d/0x30 [ 132.237912][ T8263] dump_stack_lvl+0xe8/0x140 [ 132.237937][ T8263] dump_stack+0x15/0x1b [ 132.237958][ T8263] should_fail_ex+0x265/0x280 [ 132.237985][ T8263] should_fail+0xb/0x20 [ 132.238039][ T8263] should_fail_usercopy+0x1a/0x20 [ 132.238142][ T8263] strncpy_from_user+0x25/0x230 [ 132.238193][ T8263] ? kmem_cache_alloc_noprof+0x186/0x310 [ 132.238227][ T8263] ? getname_flags+0x80/0x3b0 [ 132.238263][ T8263] getname_flags+0xae/0x3b0 [ 132.238296][ T8263] do_sys_openat2+0x60/0x110 [ 132.238363][ T8263] __x64_sys_openat+0xf2/0x120 [ 132.238447][ T8263] x64_sys_call+0x2e9c/0x2ff0 [ 132.238487][ T8263] do_syscall_64+0xd2/0x200 [ 132.238518][ T8263] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 132.238540][ T8263] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 132.238644][ T8263] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.238663][ T8263] RIP: 0033:0x7f27fd33eec9 [ 132.238677][ T8263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.238699][ T8263] RSP: 002b:00007f27fbd5d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 132.238722][ T8263] RAX: ffffffffffffffda RBX: 00007f27fd596180 RCX: 00007f27fd33eec9 [ 132.238737][ T8263] RDX: 0000000000005400 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 132.238779][ T8263] RBP: 00007f27fbd5d090 R08: 0000000000000000 R09: 0000000000000000 [ 132.238793][ T8263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.238804][ T8263] R13: 00007f27fd596218 R14: 00007f27fd596180 R15: 00007ffc44bfad78 [ 132.238821][ T8263] [ 132.615558][ T8269] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1605'. [ 132.651450][ T8269] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1605'. [ 132.725674][ T8267] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1603'. [ 132.984035][ T8276] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1608'. [ 132.993326][ T8276] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1608'. [ 133.069247][ T8286] SELinux: Context system_u:object is not valid (left unmapped). [ 133.136035][ T8293] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1614'. [ 133.574608][ T8307] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1619'. [ 133.593302][ T8307] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1619'. [ 133.635293][ T8309] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 133.851062][ T8317] tmpfs: Unknown parameter 'siz ' [ 133.940880][ T8319] wg1 speed is unknown, defaulting to 1000 [ 134.270321][ T8334] netlink: 'syz.5.1630': attribute type 1 has an invalid length. [ 134.635192][ T8345] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 134.778705][ T8350] wg1 speed is unknown, defaulting to 1000 [ 135.036549][ T8365] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 135.038829][ T8362] wg1 speed is unknown, defaulting to 1000 [ 135.111410][ T8372] wg1 speed is unknown, defaulting to 1000 [ 135.346449][ T8386] wg1 speed is unknown, defaulting to 1000 [ 135.773709][ T8418] wg1 speed is unknown, defaulting to 1000 [ 136.541533][ T29] kauditd_printk_skb: 303 callbacks suppressed [ 136.541559][ T29] audit: type=1326 audit(1759008160.242:6055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.572214][ T29] audit: type=1326 audit(1759008160.282:6056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.595885][ T29] audit: type=1326 audit(1759008160.282:6057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.619708][ T29] audit: type=1326 audit(1759008160.282:6058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.643137][ T29] audit: type=1326 audit(1759008160.282:6059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.666710][ T29] audit: type=1326 audit(1759008160.282:6060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.690233][ T29] audit: type=1326 audit(1759008160.282:6061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.733889][ T29] audit: type=1326 audit(1759008160.442:6062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.757614][ T29] audit: type=1326 audit(1759008160.442:6063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.781086][ T29] audit: type=1326 audit(1759008160.442:6064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.1669" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 136.844756][ T8449] batman_adv: batadv0: Interface deactivated: veth1_vlan [ 136.851938][ T8449] batman_adv: batadv0: Removing interface: veth1_vlan [ 136.932336][ T8463] wg1 speed is unknown, defaulting to 1000 [ 137.097756][ T8472] FAULT_INJECTION: forcing a failure. [ 137.097756][ T8472] name failslab, interval 1, probability 0, space 0, times 0 [ 137.110493][ T8472] CPU: 0 UID: 0 PID: 8472 Comm: syz.4.1681 Not tainted syzkaller #0 PREEMPT(voluntary) [ 137.110534][ T8472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 137.110551][ T8472] Call Trace: [ 137.110556][ T8472] [ 137.110562][ T8472] __dump_stack+0x1d/0x30 [ 137.110673][ T8472] dump_stack_lvl+0xe8/0x140 [ 137.110689][ T8472] dump_stack+0x15/0x1b [ 137.110703][ T8472] should_fail_ex+0x265/0x280 [ 137.110768][ T8472] should_failslab+0x8c/0xb0 [ 137.110789][ T8472] kmem_cache_alloc_noprof+0x50/0x310 [ 137.110812][ T8472] ? security_inode_alloc+0x37/0x100 [ 137.110837][ T8472] security_inode_alloc+0x37/0x100 [ 137.110918][ T8472] inode_init_always_gfp+0x4b7/0x500 [ 137.110940][ T8472] alloc_inode+0x58/0x170 [ 137.110966][ T8472] create_pipe_files+0x41/0x440 [ 137.111010][ T8472] __do_pipe_flags+0x44/0x150 [ 137.111031][ T8472] do_pipe2+0x61/0x130 [ 137.111050][ T8472] ? ksys_write+0x192/0x1a0 [ 137.111123][ T8472] __x64_sys_pipe2+0x30/0x40 [ 137.111142][ T8472] x64_sys_call+0x2624/0x2ff0 [ 137.111226][ T8472] do_syscall_64+0xd2/0x200 [ 137.111252][ T8472] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 137.111274][ T8472] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 137.111299][ T8472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.111366][ T8472] RIP: 0033:0x7f27fd33eec9 [ 137.111379][ T8472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.111394][ T8472] RSP: 002b:00007f27fbd9f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000125 [ 137.111410][ T8472] RAX: ffffffffffffffda RBX: 00007f27fd595fa0 RCX: 00007f27fd33eec9 [ 137.111420][ T8472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 137.111430][ T8472] RBP: 00007f27fbd9f090 R08: 0000000000000000 R09: 0000000000000000 [ 137.111508][ T8472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.111519][ T8472] R13: 00007f27fd596038 R14: 00007f27fd595fa0 R15: 00007ffc44bfad78 [ 137.111537][ T8472] [ 137.388725][ T8478] __nla_validate_parse: 22 callbacks suppressed [ 137.388740][ T8478] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1684'. [ 137.404264][ T8478] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1684'. [ 137.745757][ T8492] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1689'. [ 137.774409][ T8492] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1689'. [ 137.822648][ T8494] wg1 speed is unknown, defaulting to 1000 [ 138.221059][ T8506] netlink: 'syz.5.1695': attribute type 1 has an invalid length. [ 138.228885][ T8506] netlink: 224 bytes leftover after parsing attributes in process `syz.5.1695'. [ 138.374621][ T8509] can0: slcan on ttyS3. [ 138.503590][ T8509] can0 (unregistered): slcan off ttyS3. [ 138.641359][ T8538] wg1 speed is unknown, defaulting to 1000 [ 139.027254][ T8569] wg1 speed is unknown, defaulting to 1000 [ 139.989371][ T8599] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1711'. [ 139.998597][ T8599] hsr_slave_0: left promiscuous mode [ 140.005092][ T8599] hsr_slave_1: left promiscuous mode [ 140.230438][ T8604] wg1 speed is unknown, defaulting to 1000 [ 140.289665][ T8610] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1719'. [ 140.982986][ T8639] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1730'. [ 141.128885][ T8660] wg1 speed is unknown, defaulting to 1000 [ 141.135131][ T8662] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1736'. [ 141.147997][ T8662] IPv6: Can't replace route, no match found [ 141.785443][ T8681] netlink: 'syz.2.1744': attribute type 1 has an invalid length. [ 141.793270][ T8681] netlink: 'syz.2.1744': attribute type 2 has an invalid length. [ 141.802041][ T8681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8681 comm=syz.2.1744 [ 141.836844][ T29] kauditd_printk_skb: 176 callbacks suppressed [ 141.836861][ T29] audit: type=1326 audit(1759008165.542:6241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 141.888396][ T29] audit: type=1326 audit(1759008165.542:6242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 141.912750][ T29] audit: type=1326 audit(1759008165.542:6243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 141.936394][ T29] audit: type=1326 audit(1759008165.542:6244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 141.937882][ T8690] wg1 speed is unknown, defaulting to 1000 [ 141.960125][ T29] audit: type=1326 audit(1759008165.542:6245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 141.989350][ T29] audit: type=1326 audit(1759008165.542:6246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 142.012794][ T29] audit: type=1326 audit(1759008165.542:6247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 142.051360][ T8697] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1748'. [ 142.064955][ T29] audit: type=1326 audit(1759008165.772:6248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 142.088529][ T29] audit: type=1326 audit(1759008165.772:6249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.2.1748" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f594a2eeec9 code=0x7ffc0000 [ 142.135270][ T8692] wg1 speed is unknown, defaulting to 1000 [ 142.340898][ T8701] IPv6: Can't replace route, no match found [ 143.017204][ T29] audit: type=1326 audit(1759008166.722:6250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8736 comm="syz.0.1762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f67e8eeeec9 code=0x7ffc0000 [ 143.075152][ T8739] __nla_validate_parse: 2 callbacks suppressed [ 143.075174][ T8739] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1763'. [ 143.101845][ T8739] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1763'. [ 143.153356][ T8737] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1762'. [ 143.162449][ T8737] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1762'. [ 143.257359][ T8751] wg1 speed is unknown, defaulting to 1000 [ 143.833442][ T8782] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1776'. [ 143.842554][ T8782] netlink: 144 bytes leftover after parsing attributes in process `syz.0.1776'. [ 144.622429][ T8818] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1787'. [ 144.622464][ T8818] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1787'. [ 144.696810][ T8823] FAULT_INJECTION: forcing a failure. [ 144.696810][ T8823] name failslab, interval 1, probability 0, space 0, times 0 [ 144.696845][ T8823] CPU: 1 UID: 0 PID: 8823 Comm: syz.3.1789 Not tainted syzkaller #0 PREEMPT(voluntary) [ 144.696876][ T8823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 144.696893][ T8823] Call Trace: [ 144.696900][ T8823] [ 144.696909][ T8823] __dump_stack+0x1d/0x30 [ 144.696933][ T8823] dump_stack_lvl+0xe8/0x140 [ 144.696955][ T8823] dump_stack+0x15/0x1b [ 144.696975][ T8823] should_fail_ex+0x265/0x280 [ 144.697112][ T8823] should_failslab+0x8c/0xb0 [ 144.697208][ T8823] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 144.697282][ T8823] ? sidtab_sid2str_get+0xa0/0x130 [ 144.697314][ T8823] kmemdup_noprof+0x2b/0x70 [ 144.697349][ T8823] sidtab_sid2str_get+0xa0/0x130 [ 144.697456][ T8823] security_sid_to_context_core+0x1eb/0x2e0 [ 144.697528][ T8823] security_sid_to_context+0x27/0x40 [ 144.697595][ T8823] selinux_lsmprop_to_secctx+0x67/0xf0 [ 144.697662][ T8823] security_lsmprop_to_secctx+0x43/0x80 [ 144.697700][ T8823] audit_log_task_context+0x77/0x190 [ 144.697831][ T8823] audit_log_task+0xf4/0x250 [ 144.697871][ T8823] audit_seccomp+0x61/0x100 [ 144.697904][ T8823] ? __seccomp_filter+0x68c/0x10d0 [ 144.697954][ T8823] __seccomp_filter+0x69d/0x10d0 [ 144.697984][ T8823] ? up_write+0x18/0x60 [ 144.698009][ T8823] ? shmem_file_write_iter+0xd0/0xf0 [ 144.698042][ T8823] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 144.698141][ T8823] ? vfs_write+0x7e8/0x960 [ 144.698179][ T8823] __secure_computing+0x82/0x150 [ 144.698224][ T8823] syscall_trace_enter+0xcf/0x1e0 [ 144.698258][ T8823] do_syscall_64+0xac/0x200 [ 144.698298][ T8823] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 144.698378][ T8823] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 144.698416][ T8823] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.698457][ T8823] RIP: 0033:0x7f2e0de6d8dc [ 144.698477][ T8823] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 144.698501][ T8823] RSP: 002b:00007f2e0c8d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 144.698526][ T8823] RAX: ffffffffffffffda RBX: 00007f2e0e0c5fa0 RCX: 00007f2e0de6d8dc [ 144.698570][ T8823] RDX: 000000000000000f RSI: 00007f2e0c8d70a0 RDI: 0000000000000006 [ 144.698627][ T8823] RBP: 00007f2e0c8d7090 R08: 0000000000000000 R09: 0000000000000000 [ 144.698643][ T8823] R10: 000000000000fecc R11: 0000000000000246 R12: 0000000000000001 [ 144.698660][ T8823] R13: 00007f2e0e0c6038 R14: 00007f2e0e0c5fa0 R15: 00007ffdcb412d78 [ 144.698756][ T8823] [ 144.745694][ T8825] netlink: 'syz.2.1790': attribute type 1 has an invalid length. [ 144.968955][ T8825] netlink: 224 bytes leftover after parsing attributes in process `syz.2.1790'. [ 145.134780][ T8843] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1798'. [ 145.462970][ T8862] ================================================================== [ 145.471099][ T8862] BUG: KCSAN: data-race in touch_atime / touch_atime [ 145.477810][ T8862] [ 145.480137][ T8862] write to 0xffff88811a183b10 of 4 bytes by task 8849 on cpu 1: [ 145.487771][ T8862] touch_atime+0x1e8/0x340 [ 145.492220][ T8862] shmem_file_read_iter+0x477/0x540 [ 145.497427][ T8862] copy_splice_read+0x43f/0x660 [ 145.502299][ T8862] splice_direct_to_actor+0x290/0x680 [ 145.507700][ T8862] do_splice_direct+0xda/0x150 [ 145.512478][ T8862] do_sendfile+0x380/0x650 [ 145.516933][ T8862] __x64_sys_sendfile64+0x105/0x150 [ 145.522152][ T8862] x64_sys_call+0x2bb0/0x2ff0 [ 145.526853][ T8862] do_syscall_64+0xd2/0x200 [ 145.531385][ T8862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.537313][ T8862] [ 145.539651][ T8862] read to 0xffff88811a183b10 of 4 bytes by task 8862 on cpu 0: [ 145.547205][ T8862] touch_atime+0x194/0x340 [ 145.551654][ T8862] shmem_file_read_iter+0x477/0x540 [ 145.556873][ T8862] copy_splice_read+0x43f/0x660 [ 145.561767][ T8862] splice_direct_to_actor+0x290/0x680 [ 145.567147][ T8862] do_splice_direct+0xda/0x150 [ 145.571929][ T8862] do_sendfile+0x380/0x650 [ 145.576377][ T8862] __x64_sys_sendfile64+0x105/0x150 [ 145.581595][ T8862] x64_sys_call+0x2bb0/0x2ff0 [ 145.586297][ T8862] do_syscall_64+0xd2/0x200 [ 145.590835][ T8862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.596756][ T8862] [ 145.599088][ T8862] value changed: 0x09ab7d8e -> 0x0a44140e [ 145.604830][ T8862] [ 145.607157][ T8862] Reported by Kernel Concurrency Sanitizer on: [ 145.613321][ T8862] CPU: 0 UID: 0 PID: 8862 Comm: syz.2.1799 Not tainted syzkaller #0 PREEMPT(voluntary) [ 145.623060][ T8862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 145.633126][ T8862] ================================================================== [ 146.973507][ T29] kauditd_printk_skb: 370 callbacks suppressed [ 146.973525][ T29] audit: type=1400 audit(1759008170.682:6620): avc: denied { egress } for pid=22 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 147.003728][ T29] audit: type=1400 audit(1759008170.682:6621): avc: denied { sendto } for pid=22 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1