last executing test programs: 3.622947295s ago: executing program 2 (id=6165): bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x8, &(0x7f0000001cc0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054dc2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5b60c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb69746679cb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d5879029a15b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fe1def93902c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69a6875e1925ff7ccbeb5191d297320abbecfbc69024fff3127a8f4755d7d15798fe83747b9cb0afb337d338c9db09"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback=0x2}, 0x94) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) sendfile(r0, r0, 0x0, 0x40000f63c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@bridge_delneigh={0x38, 0x1e, 0x1, 0x70bd27, 0x25dfdbfc, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @remote}, @NDA_SRC_VNI={0x8}]}, 0x38}}, 0x0) r6 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r6, 0x80047453, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='host1x_channel_submit_complete\x00', r4}, 0x18) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) r8 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 3.199426112s ago: executing program 3 (id=6172): bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x8, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback=0x2}, 0x94) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) sendfile(r0, r0, 0x0, 0x40000f63c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@bridge_delneigh={0x38, 0x1e, 0x1, 0x70bd27, 0x25dfdbfc, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @remote}, @NDA_SRC_VNI={0x8}]}, 0x38}}, 0x0) r7 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r7, 0x80047453, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='host1x_channel_submit_complete\x00', r5}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) r9 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 3.082714323s ago: executing program 4 (id=6176): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f0000000740)='\x00!', 0x2}], 0x1, 0xb, 0x9) 2.947437165s ago: executing program 4 (id=6178): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="500000000301010100000000000000000a0000030c0019"], 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 2.702854219s ago: executing program 4 (id=6180): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0xe3b9}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32=r4, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000140001000000000000000000020400", @ANYRES32=r4, @ANYBLOB="08000200ac1414aa"], 0x20}}, 0x0) r5 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r5, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x4) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x7400, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x24}}, 0x0) 2.522730982s ago: executing program 2 (id=6186): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x18, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='kfree\x00', r0}, 0x18) (async) unshare(0x42000000) socket$xdp(0x2c, 0x3, 0x0) (async) syz_usb_disconnect(0xffffffffffffffff) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r4) r5 = gettid() clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000140)={0x77359400}, 0x0) (async) rt_sigqueueinfo(r5, 0x21, &(0x7f0000002d00)={0x0, 0x0, 0xffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB='&'], 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) io_uring_register$IORING_REGISTER_SYNC_CANCEL(0xffffffffffffffff, 0x18, 0x0, 0x1) (async) close_range(r1, 0xffffffffffffffff, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r8, 0x0, 0x487, &(0x7f00000004c0)={{0x1d, @multicast2, 0x4e23, 0x4, 'fo\x00', 0x12, 0x5, 0x38}, {@local, 0x4e23, 0x1, 0x9, 0x4, 0x800}}, 0x44) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) close_range(r9, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)={[&(0x7f0000000080)='kfree\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='kfree\x00', &(0x7f00000001c0)='.)+\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='GPL\x00']}, &(0x7f0000000480)={[&(0x7f0000000340)='\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='GPL\x00', &(0x7f0000000400)='kfree\x00', &(0x7f0000000440)='GPL\x00']}) 2.435347203s ago: executing program 4 (id=6187): setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000280)={0xffffffff}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000004200010a00000000640578473d"], 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r0 = gettid() timer_create(0x2, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x5, 0x200000a, 0x1, 0x8, 0xffffffffdffffffe}) syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/pid\x00') 2.312726145s ago: executing program 3 (id=6190): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x800000000000, 0x0, 0x0, 0x751, 0x7, 0x200000000080], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000200000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) 2.293473845s ago: executing program 3 (id=6192): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x18) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r1, 0xa, 0x13) fcntl$setlease(r1, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r1, 0x400, 0x2) 2.181176557s ago: executing program 3 (id=6196): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) r2 = timerfd_create(0x9, 0x80000) timerfd_gettime(r2, &(0x7f00000007c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r6, &(0x7f00000002c0)={0x2c, 0x4, r8}, 0x10) write$binfmt_elf64(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) r11 = syz_clone3(&(0x7f0000000580)={0x200, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000003c0), {0x35}, &(0x7f0000000400)=""/124, 0x7c, &(0x7f0000000480)=""/65, &(0x7f0000000500)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x9, {r5}}, 0x58) ptrace(0x420f, r11) 2.069575129s ago: executing program 2 (id=6199): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) utime(0x0, 0x0) (fail_nth: 2) 2.048618759s ago: executing program 0 (id=6200): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x20000004) 1.870929071s ago: executing program 2 (id=6201): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote}, {@in6=@remote, 0x4d3, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) 1.798496553s ago: executing program 0 (id=6203): syz_io_uring_setup(0x9e, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) fstat(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x100, 0x200, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x4000, 0x400, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRESDEC=r6, @ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="040007000017000008000200", @ANYRES16=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYRES16, @ANYBLOB="10000400000000002000010000000000", @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB='\b\x00', @ANYRES16=0x0, @ANYBLOB="ecff0087", @ANYRES32=r9, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r10, @ANYRESHEX=r7], 0x6c, 0x2) 1.795770503s ago: executing program 2 (id=6204): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f0000000740)='\x00!', 0x2}], 0x1, 0xb, 0x9) 1.709356374s ago: executing program 0 (id=6205): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote}, {@in6=@remote, 0x4d3, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) (fail_nth: 1) 1.708644114s ago: executing program 3 (id=6206): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f00000005c0)={[{@delalloc}, {@nodelalloc}, {@barrier_val={'barrier', 0x3d, 0x6}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x571, &(0x7f0000000f00)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300000004000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vlan0\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x36, 0x0, &(0x7f0000000540)={0xc9, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)=0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r8, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x4048004) 1.685246265s ago: executing program 0 (id=6207): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) mkdirat(0xffffffffffffffff, &(0x7f0000002040)='./file0\x00', 0x42) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000001c0), 0x0, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x46) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\a', @ANYRES16=r4, @ANYBLOB="070002000000fddbdf2505000000180001801400020073797a5f74756e0000000000000000000800050010270000"], 0x34}, 0x1, 0x300}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={r5, 0x6}, &(0x7f0000000200)=0xfffffffffffffe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000)=@assoc_value={r6, 0x1}, 0x8) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r7}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="980008005500e501000080de01000000070000000e7338cc0cd6f2a8f22e077c132d71eb87f899d737da37b0e8866e1b57a273d13ee17cd7755276143c42f2430dca1de8c562e97bf8262d1b715f5950a4b0b92834b01a48e43dd252", @ANYRESDEC=r8, @ANYRESHEX=r1, @ANYRES64=0x0, @ANYRES32=r2], 0x98}}, 0x24044851) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000000cea000000000004"], 0x48) mknod$loop(&(0x7f0000000300)='./file0/../file0\x00', 0x800, 0x1) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x18) semget$private(0x0, 0x207, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x5d0, &(0x7f0000000440)={0x0, 0xc845, 0x100, 0x3, 0x34f}, 0x0, 0x0) r11 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f0000000680)={'syztnl1\x00', 0x0}) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="38010000100013070000000000000000ac1e0101000000000000000000001400fe8000000000000000000000000000bb000000006037fa0f16f7a36f00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb000004d332000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200636263286165732900"/240], 0x138}}, 0x0) 1.562972116s ago: executing program 4 (id=6208): creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffff"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 1.466152618s ago: executing program 2 (id=6209): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r0, 0xa, 0x13) fcntl$setlease(r0, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) 1.462228828s ago: executing program 4 (id=6210): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC=r1, @ANYRESHEX=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703006a233a04e85a2700e14d21d4e57ce3360008000000b70400000000000085020000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000000), 0xffffff6a) fallocate(r4, 0x0, 0x0, 0x2c2) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 1.36042657s ago: executing program 1 (id=6214): mlock2(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x0, 0x3, 0x7d, &(0x7f0000000240)=""/125, 0x40f00, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0x7, 0xc, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0x1, r0, 0x1], &(0x7f00000004c0)=[{0x4, 0x5, 0x8, 0x5}, {0x0, 0x3, 0x0, 0x4}, {0x2, 0x3, 0x7, 0x7}, {0x3, 0x2, 0xa, 0xc}], 0x10, 0x2}, 0x94) creat(&(0x7f00000000c0)='./file0\x00', 0xce) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1ff, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0xfffffffd, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xa) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff530000008003950323030302e75"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001980)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) 1.29745952s ago: executing program 1 (id=6215): syz_io_uring_setup(0x9e, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) fstat(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x100, 0x200, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x4000, 0x400, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRESDEC=r6, @ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="040007000017000008000200", @ANYRES16=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYRES16, @ANYBLOB="10000400000000002000010000000000", @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB='\b\x00\a', @ANYRES16=0x0, @ANYBLOB="ecff0087", @ANYRES32=r9, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r10, @ANYRESHEX=r7], 0x6c, 0x2) 1.231760361s ago: executing program 1 (id=6216): r0 = socket(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a14"], 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x2c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x401, @mcast1, 0xffff}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000080)=0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x8}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) 1.212762452s ago: executing program 1 (id=6217): socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000010000800000000000000000184400000800000000000000000000009d00000000000000"], &(0x7f0000000040)='GPL\x00', 0x100, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fsopen(0x0, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) r4 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r4, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c00000010000304200000", @ANYRES32=0x0, @ANYBLOB="000000000080000014001280090001007665746800000000040002800800200001000000"], 0x3c}}, 0x0) socket$tipc(0x1e, 0x5, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x4, 0xfffffffd}}, 0xc) r6 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r6, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x4}}, 0x10) bind$tipc(r6, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42, 0x2}}}, 0x10) r7 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r7, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x10) r8 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r8, &(0x7f0000000380)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x4, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000884}, 0x4) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x40000) 845.240517ms ago: executing program 3 (id=6218): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x40241, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="02070005020000002dbd7000fedbdf25e99cef370b3231b1d15418813003944a332e29d6b0f5c281013adb5be5709bc50a5ad07c690d2c8684b75f873c3c6eaf13fb5b5ef5b4dfa746ff44176ee6721b33350a2a2d88d61c1a4e861e6bf6f252cdec8ad08094881d675e164391160b4909427c524d435a4c2a629bc397bfb0d2734a2963d560fe7a328abf5754363aafaf3f7721363a9dc2b599e8e0bf917eb1fe16822aff3992b8af67535f7601800000e0"], 0x10}}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = open$dir(&(0x7f00000000c0)='./file1\x00', 0x402001, 0x78) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x143142, 0x40) pwritev2(r6, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000000)={0x0, 'batadv0\x00', {0x1}, 0x563}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000300)={'erspan0\x00', 0x0, 0x700, 0x8, 0x90a, 0x19800000, {{0x10, 0x4, 0x3, 0x36, 0x40, 0x65, 0x0, 0x0, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @loopback, {[@end, @noop, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x8, 0xcd, 0x0, 0x6, [0x4]}, @timestamp_addr={0x44, 0x1c, 0x94, 0x1, 0x4, [{@remote, 0xff}, {@private=0xa010102, 0x92}, {@empty}]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="6600000000000000b703000000000000850000e920b76300b7000000000001000100a2169634085c126fcbf20169a69f75c24314f5d72098a23d60c618295c0685ed1b14ee936de3f89765f735ec68b4e5f8b326542cb50b652eabd455e63bf41679c9b2443cb354e9028cf131861336900d8703e339b998012faaf1b670948b1ccf9888a20074cbfb7a000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r10, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', 0xffffffffffffffff, 0x0, 0x34f}, 0x18) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x1000000, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {0x39, 0x0, 0x5}, {0xfffe}, {0x0, 0x1, 0x0, 0xfffffffc}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x7c}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0xf0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000001000370400000000ffffffff1f000000", @ANYRES32=r2, @ANYBLOB="0b12050000000000240012800b00010069703667726500001400028008000100", @ANYRES32=r2, @ANYBLOB="08000c0000ffffff"], 0x44}, 0x1, 0x0, 0x0, 0x48800}, 0x4000010) sendmmsg$inet(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @multicast1}}}], 0x20}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000600)="fec1314690c23c23bfe9f3", 0xb}, {0xfffffffffffffffd}, {&(0x7f0000000980)="420be68cb9fbcdf18c328cbf7724210630b811534cd03cb57a0b741edd2c33646ca83c6cb399dde2889a584f12c18369e00dcc0be5b56f5da0cd8af8b62e8f984c77265c7cd683dd8e114c1f427905205894f5376176036bc3dc4e27994e49fe35cb2a1412702a47ddda5a50a4cf9e491565de2ff0cfaa692eab611d695d5ae69faa7f06f8751fc801ef424b0e709d879111215aee5f97629efc7d8a1ae85a8a702d28dd066a583453dad74196a2f44ff7d8d71167834e298b15ef42c51d6d1b5cff42419808441d3f2a01cd638adcf1a380a25880b66d94a6", 0xd9}, {&(0x7f0000000640)="531562eeefce21e3b1eb530c3d88b2a8ec9cb654fc97f7187c176c678f2d57ddaef61d2daefe46a5f603b439d1c0594877", 0x31}, {&(0x7f0000000a80)="9149d2d6dbd337c3d66c4762ff6b15c04e18b8f1bd1a447ae2d0a3b5cd44cd3e8b2f33d120ed525efdf6b62d09cbc01dbd4347ce78cb0d", 0x37}], 0x5, &(0x7f0000000b40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}], 0x48}}], 0x2, 0x0) 795.926298ms ago: executing program 0 (id=6219): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f0000000740)='\x00!', 0x2}], 0x1, 0xb, 0x9) 693.781999ms ago: executing program 0 (id=6220): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000085}, 0x20008000) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f00000001c0), 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open_tree(0xffffffffffffffff, 0x0, 0x1001) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a6d, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x9, 0x7, 0x0, 0x0, 0xfffffffe, {0x4, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x20000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x2}}}}]}]}, 0x88c}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000011500002c000280060002004e2000000800090010000000060002004e210000080007000101000006000f000700000008000400ff7fffff1400028008000600020000000800090008000000080004000200000060000180080009005600000007000600666f00000c0007002000000002000000080008000100000008000b00736970000600010002000000080005"], 0xc4}}, 0x4008800) sendto$inet6(r5, &(0x7f00000001c0)="12339d48aee4c99e3be56d957109a766a5034a15a12a", 0x16, 0x800, &(0x7f0000000200)={0xa, 0x4e23, 0x100000, @private0, 0x7}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = dup(r5) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) acct(0xfffffffffffffffe) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x80, 0xf, 0x2, 0x10, 0xce, 0x0, 0x0, 0x82000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200d, 0x3, @perf_bp={&(0x7f0000000280), 0xc}, 0x6040, 0x10, 0x10, 0x5, 0x4, 0x1000, 0x5, 0x0, 0x6, 0x0, 0x9}, r7, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setpriority(0x1, 0x0, 0x5) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) signalfd4(r6, &(0x7f0000000440)={[0x3]}, 0x8, 0x80800) bind$inet(r10, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 274.721816ms ago: executing program 1 (id=6221): socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x4000800) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@delchain={0x3c, 0x64, 0xf31, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0xfff3, 0xffff}, {0x0, 0xd}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x44044) 0s ago: executing program 1 (id=6222): socket$kcm(0x10, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000002040)=@newqdisc={0xc4c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, 0x0, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0xc20, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x9, 0x8f, 0x5, 0x5, 0x2, 0x2, 0x3, 0x7, 0xffffffff, 0x7, 0x1, 0x8, 0xfffdfffc, 0x8, 0xc, 0x0, 0x8, 0xb, 0xffffff62, 0x2, 0x5, 0xffff, 0x7, 0xf, 0x7, 0x0, 0xd7, 0x3, 0x7e9, 0x7, 0x5bad, 0x6, 0x20000000, 0x2, 0x2, 0xfffffffa, 0x0, 0x7fff, 0x4, 0x80000000, 0x2a66, 0x0, 0x7, 0x0, 0x4, 0x80, 0x7, 0x81, 0x5c0, 0x9, 0x2, 0x6, 0x7eedd475, 0x3, 0x5, 0x2, 0x10001, 0x4, 0x80000000, 0x1, 0x0, 0x0, 0x905, 0x2, 0x7, 0x6, 0x9, 0xff, 0x5, 0x3ff, 0x80, 0x9a4a, 0x2, 0x1, 0xcf5c54b, 0x7, 0x8, 0x5, 0x1, 0x35, 0xa, 0x7, 0x40, 0xd, 0x4bf9, 0x2, 0x2, 0x7, 0x8005, 0x510a, 0x6, 0x2, 0x7fff, 0x80, 0x0, 0x9, 0x50c, 0xffff, 0x1, 0xb, 0x6, 0x3, 0x1, 0x1, 0x107, 0x9, 0x4, 0xb4b5, 0x10, 0x1, 0x3ff, 0x8, 0x9, 0x81, 0x10000, 0xdbe, 0xd5, 0xfffffff9, 0xfffffff9, 0x80000001, 0x81, 0x6, 0x2, 0x80000000, 0x0, 0x1, 0x5, 0x0, 0x4, 0xfffffffc, 0xff, 0x7, 0x1, 0xe, 0x2, 0x5, 0x3, 0x2, 0x6000000, 0x6, 0x3, 0x1, 0x3ff, 0x4, 0x0, 0xbde, 0x4, 0x9, 0x8, 0x5, 0x5, 0x2, 0x4b7, 0x4, 0x4, 0x4, 0x80000000, 0x81, 0x5, 0x5, 0x9, 0x8001, 0x74ca0e7e, 0x9, 0x81, 0x9, 0x3003, 0x384, 0x5, 0xfffffffe, 0x200, 0xe, 0x400, 0x3, 0x0, 0x5, 0x8, 0xfffffffb, 0xac7d, 0xffffffff, 0xf, 0x2, 0xcce, 0x7, 0x5a, 0xfffff2d4, 0x0, 0xffff0000, 0x80000000, 0x400, 0x0, 0x6, 0xa00000, 0xe, 0x6, 0xeb, 0x6, 0x1, 0xa6, 0x3, 0x3, 0x84, 0x7, 0x4, 0x1, 0x4, 0x7, 0x9, 0x3, 0x7, 0x375, 0x800, 0x2, 0x4, 0x5d494424, 0x8000, 0x0, 0x6, 0xb72c, 0xdab, 0xb0, 0xfff, 0x3, 0x401, 0x28998c3e, 0x2, 0x10001, 0x10001, 0x7f1, 0x9, 0x6, 0x3ff, 0x5, 0x80, 0xffff38bf, 0x9, 0x3, 0x7, 0x200, 0xb, 0xc, 0x3ff, 0xa, 0x9, 0x4df, 0x0, 0x10000, 0x1, 0x663, 0x4, 0xffffffff, 0x6, 0x8, 0x0, 0x10, 0x8000]}, @TCA_TBF_PBURST={0x8, 0x7, 0x1473}, @TCA_TBF_PTAB={0x404, 0x3, [0xdda, 0x3, 0x3, 0x9, 0xffffffff, 0x9, 0x48, 0x10000, 0x6, 0x3, 0x8001, 0x13, 0x3, 0x3, 0x3, 0x8001, 0x1, 0x3, 0x879, 0x3c73, 0x1, 0x6, 0xfffffff7, 0x5, 0xcdf, 0x40, 0x8, 0x1, 0x7, 0x4bf, 0x10, 0x355, 0xff, 0x0, 0x7, 0x401, 0x3, 0x3, 0x7ff, 0xffffe614, 0x7, 0x1, 0x3, 0xc, 0x8001, 0x5, 0x7, 0x5, 0xd, 0x9, 0x5, 0x6, 0x5, 0x0, 0x2, 0x10000, 0xfff, 0x5, 0x8, 0xffffffff, 0x1, 0xfffffffe, 0x8, 0x8, 0x7, 0x1000, 0x47, 0x1, 0x7, 0x56d, 0x9, 0x960, 0x6, 0xf, 0xfffffffb, 0x7, 0x401, 0x1, 0x9, 0x1, 0x1, 0x9, 0x8001, 0x4, 0x9, 0x7, 0xb, 0x4, 0x81, 0x6d3, 0x0, 0x0, 0x6e, 0x3, 0x9, 0xfff, 0x3, 0x0, 0x1000, 0xffffffff, 0x439efcce, 0x2, 0xb251, 0x9, 0xffffffff, 0x1, 0x4, 0x5, 0x1, 0x2, 0xffffffc0, 0x9, 0xfb65, 0x7f, 0x81, 0xff, 0x2, 0x7, 0x0, 0x6, 0x6, 0xf, 0x2, 0xfffffffe, 0x6a62, 0x9, 0x7, 0x3, 0x2, 0xfffffff7, 0x6, 0x4, 0x10, 0x0, 0x2, 0xfffffffb, 0x8, 0x8, 0x8, 0x0, 0x81f, 0x6, 0x2, 0xf0, 0xfffffffc, 0x1, 0x31, 0xfff, 0xfffffffb, 0x401, 0x7fffffff, 0x10000, 0x653, 0x2, 0x8, 0x7, 0x7fff, 0x9, 0x0, 0xff, 0xfff, 0xff, 0x850f, 0x7, 0x80000000, 0x9, 0x9, 0x4, 0x9, 0x7, 0x9, 0x1, 0x80000001, 0xc, 0x1000, 0x3, 0x1, 0x9, 0x401, 0x8001, 0x6, 0x3, 0x0, 0x8000, 0x8, 0x2, 0xa, 0x0, 0x7, 0x9, 0xc0, 0xffffff0d, 0x6, 0x10000, 0x9, 0x3800, 0xdd5, 0xa, 0xfffffff7, 0x6, 0x9, 0x1, 0x40, 0x9, 0xd39, 0x3, 0x0, 0xfffffff9, 0x2, 0x279c, 0x8, 0x0, 0x2, 0x47, 0x9, 0x2, 0xffff, 0x3, 0x8, 0x5, 0x100, 0x80000000, 0xfffff112, 0x6, 0x8, 0x81, 0x198, 0xe0, 0x2, 0x4, 0x80, 0x8000, 0x114, 0x7, 0xe7e, 0x5, 0x4, 0x7, 0x800000, 0x6, 0x9, 0x6514, 0x3, 0x8, 0x4, 0xfffffff9, 0x1000100, 0x2, 0x10000, 0x1023, 0x8, 0x6, 0x8, 0x400, 0x5, 0x9]}, @TCA_TBF_PTAB={0x404, 0x3, [0x8, 0x2, 0x6, 0x7fffffff, 0x6, 0xf051, 0x1, 0x7fff, 0x4, 0x3, 0xff, 0xfff, 0x9, 0x47, 0xa, 0x4, 0xc92, 0xf, 0x8, 0xffffffc0, 0x759, 0x1, 0x2e, 0x8, 0x5, 0x800, 0x0, 0x7fff, 0x5, 0x2, 0x61ee, 0x164d, 0x8, 0xa, 0x8, 0x0, 0x1, 0x2, 0x9, 0x5, 0x8, 0x0, 0x6, 0x812, 0x3, 0x9, 0x7f, 0x84, 0x5, 0x6, 0x400, 0x6, 0x5, 0x1cf, 0xffc00, 0xffff, 0x401, 0xfffffff9, 0xfffffffa, 0x5, 0x3ff, 0x0, 0x5, 0xffff, 0x2, 0xffff, 0x4, 0x3, 0x10, 0x47, 0x800, 0xbcc8, 0xfffffffc, 0x7, 0x2, 0x6, 0x401, 0x3ff, 0x10001, 0x4, 0x0, 0xc9, 0x9, 0x80000000, 0x0, 0x7, 0x2, 0x200, 0xffffffff, 0x9, 0x1, 0x8c28, 0x6, 0xa50a, 0xf42, 0x1, 0x1, 0x2, 0x7fff, 0x7, 0x202f, 0xfffffffb, 0x5dba6416, 0x0, 0x3, 0x80000000, 0x4, 0x6, 0x3, 0x3, 0x1000, 0x8, 0x9, 0x100, 0x4, 0xffffffff, 0x2, 0x6, 0x9, 0xab00, 0x4, 0x0, 0xff, 0x5, 0x8e7, 0x5, 0x4, 0x8, 0x5, 0x1, 0x5, 0x5, 0x6, 0x200, 0x4, 0x3fc, 0x6, 0x5, 0x0, 0x8, 0x6, 0x9, 0x9, 0x8, 0x2, 0x6, 0x9db, 0x2025, 0xffff, 0x4, 0x9, 0x6, 0xfffffff1, 0x25, 0x2, 0x2, 0x3, 0x9, 0x6, 0x1, 0x6, 0x9, 0x2, 0xd5, 0x5, 0x0, 0x5, 0x3ff, 0x1, 0x1, 0x7fffffff, 0x7, 0x1, 0x3, 0x1, 0xd7, 0x8, 0x48, 0x2, 0x101, 0x7, 0x8, 0x1, 0x800, 0x8, 0x8, 0x2, 0x5c16, 0xfffffff8, 0x6, 0xbb, 0x6, 0x6, 0x3, 0x1, 0x6, 0x3, 0x2, 0x4, 0xff, 0x2, 0xffffffff, 0x0, 0x4, 0x7, 0x5, 0x9, 0x9, 0x3, 0x101, 0x3, 0x8000, 0xc5c2, 0x6, 0xff, 0x400, 0x92, 0x2, 0x9, 0x1, 0x5, 0xb585, 0x101, 0xe, 0x950f, 0x806, 0x10001, 0x2, 0xd, 0x7fffffff, 0x4, 0x1, 0x9, 0x6, 0x1, 0xba4, 0x101, 0x9, 0x2, 0xaf8b, 0x5, 0x9, 0x6, 0x96b, 0xf, 0x7, 0x6, 0x5, 0x401, 0x3, 0x3, 0x8, 0x20000000, 0x3, 0x5]}, @TCA_TBF_PBURST={0x8, 0x7, 0x18b3}]}}]}, 0xc4c}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r2, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '\t\t'}]}, 0xe) close(r2) pipe2$watch_queue(&(0x7f0000000080), 0x80) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r3 = socket(0x25, 0x1, 0x0) setsockopt$MRT6_INIT(r3, 0x29, 0xc8, &(0x7f0000000100), 0x4) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) socket$inet(0x2, 0x2, 0x1) r4 = socket$packet(0x11, 0x2, 0x300) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r6, 0x0, 0x4ab}, 0x18) ioctl(r7, 0x0, &(0x7f0000000400)="c201094af69fd1c304b6638e98da93c0") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000900)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7020000010000008500000086000000955229539604cd2eba4ba6531f73e54fc980dcdf15bdcd7b118f3de658a33da7da78c48f566570f705ab10b1a4cf21611b400307e84dbb17725867a51ff0a80b0d913002bae4df7380bbbc6732c4ebc072c9ced932100b73dca329a18557a4b99cbbda80f6cc7cdcf569017bdae43c732b2a24015bdd9b07d519c75a8a508966f7ee5033feb11660c84cb1f0917b6964273d66d69ea4930f820391a54bcd90b5378fa0f0005f75367419f4fec14227eebab6c7b6cb7147"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000140)=0x89c, 0x4) readv(r4, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/171, 0xab}], 0x1) syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="d78829bd7000ffdb9f2501000000080002000100000014000100fe8000faf800000000000000000000bb080002000200000005000500030000000400040004000400"], 0x48}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) ioctl$FS_IOC_GETFSUUID(r5, 0x80111500, &(0x7f00000003c0)) r8 = syz_io_uring_setup(0x239, &(0x7f0000000680)={0x0, 0x405e5, 0x10100}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000500)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r8, 0x0, 0x0, 0x0, {0x101}, 0x1}) kernel console output (not intermixed with test programs): ot:sysadm_r:sysadm_t pid=24131 comm="syz.4.5612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 319.613744][ T29] audit: type=1326 audit(2000000218.353:6787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24131 comm="syz.4.5612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 319.637325][ T29] audit: type=1326 audit(2000000218.353:6788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24131 comm="syz.4.5612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 319.660917][ T29] audit: type=1326 audit(2000000218.353:6789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24131 comm="syz.4.5612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 319.780287][T24167] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5617'. [ 319.795293][T24167] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5617'. [ 319.809567][T24164] wireguard0: entered promiscuous mode [ 319.820869][T24167] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5617'. [ 320.165804][T24213] netlink: 'syz.3.5622': attribute type 10 has an invalid length. [ 320.272877][T24247] xt_TPROXY: Can be used only with -p tcp or -p udp [ 320.346088][T24254] ip6gre9: entered allmulticast mode [ 320.358289][T24257] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5630'. [ 320.380280][T24247] wireguard0: entered promiscuous mode [ 320.410953][T24272] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5630'. [ 320.426874][T24273] ip6gre2: entered allmulticast mode [ 320.440269][T24274] siw: device registration error -23 [ 320.703895][T24306] block device autoloading is deprecated and will be removed. [ 320.748821][T24318] xt_TPROXY: Can be used only with -p tcp or -p udp [ 320.799926][T24318] wireguard0: entered promiscuous mode [ 321.426468][T24415] wireguard0: entered promiscuous mode [ 321.447355][ T29] audit: type=1400 audit(2000000220.255:6790): avc: denied { listen } for pid=24421 comm="syz.1.5647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 321.538840][T24436] block device autoloading is deprecated and will be removed. [ 321.582417][T24441] netlink: 'syz.2.5651': attribute type 10 has an invalid length. [ 321.605373][T24444] xt_TPROXY: Can be used only with -p tcp or -p udp [ 321.651936][T24446] ip6gre20: entered allmulticast mode [ 321.716746][T24444] wireguard0: entered promiscuous mode [ 321.753013][T24465] ip6gre15: entered allmulticast mode [ 321.766476][T24467] siw: device registration error -23 [ 321.830481][T24478] block device autoloading is deprecated and will be removed. [ 322.300964][T24531] xt_TPROXY: Can be used only with -p tcp or -p udp [ 322.328590][T24533] block device autoloading is deprecated and will be removed. [ 322.417411][T24542] wireguard0: entered promiscuous mode [ 322.448343][T24531] siw: device registration error -23 [ 322.449480][T24550] netlink: 'syz.3.5663': attribute type 10 has an invalid length. [ 322.464649][T24558] xt_TPROXY: Can be used only with -p tcp or -p udp [ 322.564059][T24583] wireguard0: entered promiscuous mode [ 322.683003][T24558] siw: device registration error -23 [ 322.726060][T24597] block device autoloading is deprecated and will be removed. [ 322.846293][T24609] wireguard0: entered promiscuous mode [ 323.215018][T24621] xt_TPROXY: Can be used only with -p tcp or -p udp [ 323.249053][ T29] audit: type=1326 audit(2000000222.056:6791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24622 comm="syz.3.5673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 323.274531][T24625] FAULT_INJECTION: forcing a failure. [ 323.274531][T24625] name failslab, interval 1, probability 0, space 0, times 0 [ 323.287290][T24625] CPU: 1 UID: 0 PID: 24625 Comm: syz.1.5674 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 323.287333][T24625] Tainted: [W]=WARN [ 323.287342][T24625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.287355][T24625] Call Trace: [ 323.287364][T24625] [ 323.287374][T24625] __dump_stack+0x1d/0x30 [ 323.287407][T24625] dump_stack_lvl+0xe8/0x140 [ 323.287431][T24625] dump_stack+0x15/0x1b [ 323.287465][T24625] should_fail_ex+0x265/0x280 [ 323.287495][T24625] should_failslab+0x8c/0xb0 [ 323.287520][T24625] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 323.287554][T24625] ? __d_alloc+0x3d/0x350 [ 323.287632][T24625] __d_alloc+0x3d/0x350 [ 323.287656][T24625] d_alloc_parallel+0x53/0xc40 [ 323.287712][T24625] ? selinux_inode_permission+0x532/0x620 [ 323.287737][T24625] ? make_vfsuid+0x49/0xa0 [ 323.287826][T24625] ? lockref_get_not_dead+0x120/0x1c0 [ 323.287851][T24625] ? __rcu_read_unlock+0x4f/0x70 [ 323.287878][T24625] __lookup_slow+0x8c/0x250 [ 323.287931][T24625] lookup_slow+0x3c/0x60 [ 323.287961][T24625] walk_component+0x1ec/0x220 [ 323.287997][T24625] path_lookupat+0xfe/0x2a0 [ 323.288028][T24625] filename_lookup+0x147/0x340 [ 323.288071][T24625] user_path_at+0x3e/0x130 [ 323.288118][T24625] do_fchownat+0xb0/0x210 [ 323.288142][T24625] __x64_sys_chown+0x47/0x60 [ 323.288205][T24625] x64_sys_call+0x800/0x2fb0 [ 323.288311][T24625] do_syscall_64+0xd2/0x200 [ 323.288370][T24625] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 323.288401][T24625] ? clear_bhb_loop+0x40/0x90 [ 323.288427][T24625] ? clear_bhb_loop+0x40/0x90 [ 323.288453][T24625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.288484][T24625] RIP: 0033:0x7f099479e929 [ 323.288499][T24625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.288517][T24625] RSP: 002b:00007f0992e07038 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 323.288538][T24625] RAX: ffffffffffffffda RBX: 00007f09949c5fa0 RCX: 00007f099479e929 [ 323.288553][T24625] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000100 [ 323.288568][T24625] RBP: 00007f0992e07090 R08: 0000000000000000 R09: 0000000000000000 [ 323.288630][T24625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.288641][T24625] R13: 0000000000000000 R14: 00007f09949c5fa0 R15: 00007ffd516cbdb8 [ 323.288696][T24625] [ 323.310668][ T29] audit: type=1326 audit(2000000222.056:6792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24622 comm="syz.3.5673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 323.488216][T24626] siw: device registration error -23 [ 323.494361][ T29] audit: type=1326 audit(2000000222.056:6793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24622 comm="syz.3.5673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 323.494410][ T29] audit: type=1326 audit(2000000222.056:6794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24622 comm="syz.3.5673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 323.618570][T24628] wireguard0: entered promiscuous mode [ 323.688290][T24642] ip6gre10: entered allmulticast mode [ 323.822549][T24672] block device autoloading is deprecated and will be removed. [ 323.922069][T24685] xt_TPROXY: Can be used only with -p tcp or -p udp [ 323.968285][T24685] wireguard0: entered promiscuous mode [ 324.108370][T24705] __nla_validate_parse: 7 callbacks suppressed [ 324.108391][T24705] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 324.153985][T24721] block device autoloading is deprecated and will be removed. [ 324.272556][T24742] xt_TPROXY: Can be used only with -p tcp or -p udp [ 324.419008][T24742] wireguard0: entered promiscuous mode [ 324.436849][T24775] IPVS: set_ctl: invalid protocol: 50 255.255.255.255:20001 [ 324.466275][T24778] siw: device registration error -23 [ 324.715423][T24796] block device autoloading is deprecated and will be removed. [ 324.756346][T24796] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5692'. [ 324.774632][T24805] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5695'. [ 324.827591][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 324.827606][ T29] audit: type=1326 audit(2000000223.637:6797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24807 comm="syz.2.5697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 324.861813][ T29] audit: type=1326 audit(2000000223.677:6798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24802 comm="syz.1.5695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f099479e929 code=0x7ffc0000 [ 324.885389][ T29] audit: type=1326 audit(2000000223.677:6799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24802 comm="syz.1.5695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=8 compat=0 ip=0x7f099479e929 code=0x7ffc0000 [ 324.908802][ T29] audit: type=1326 audit(2000000223.677:6800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24802 comm="syz.1.5695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f099479e929 code=0x7ffc0000 [ 324.932377][ T29] audit: type=1326 audit(2000000223.677:6801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24802 comm="syz.1.5695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f099479e929 code=0x7ffc0000 [ 324.966569][ T29] audit: type=1326 audit(2000000223.747:6802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24807 comm="syz.2.5697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 324.973202][T24811] FAULT_INJECTION: forcing a failure. [ 324.973202][T24811] name failslab, interval 1, probability 0, space 0, times 0 [ 324.990234][ T29] audit: type=1326 audit(2000000223.747:6803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24807 comm="syz.2.5697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 325.002711][T24811] CPU: 0 UID: 0 PID: 24811 Comm: syz.4.5696 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 325.002754][T24811] Tainted: [W]=WARN [ 325.002796][T24811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 325.002815][T24811] Call Trace: [ 325.002825][T24811] [ 325.002836][T24811] __dump_stack+0x1d/0x30 [ 325.002940][T24811] dump_stack_lvl+0xe8/0x140 [ 325.002967][T24811] dump_stack+0x15/0x1b [ 325.002987][T24811] should_fail_ex+0x265/0x280 [ 325.003022][T24811] should_failslab+0x8c/0xb0 [ 325.003055][T24811] kmem_cache_alloc_node_noprof+0x57/0x320 [ 325.003107][T24811] ? __alloc_skb+0x101/0x320 [ 325.003186][T24811] ? tcp_chrono_stop+0x19d/0x210 [ 325.003233][T24811] __alloc_skb+0x101/0x320 [ 325.003275][T24811] tcp_stream_alloc_skb+0x2d/0x1d0 [ 325.003312][T24811] tcp_connect+0xce9/0x2290 [ 325.003390][T24811] ? tcp_fastopen_defer_connect+0x69/0x1e0 [ 325.003430][T24811] tcp_v6_connect+0xb50/0xc10 [ 325.003479][T24811] __inet_stream_connect+0x166/0x7e0 [ 325.003526][T24811] ? tcp_sendmsg_fastopen+0x172/0x520 [ 325.003639][T24811] ? should_failslab+0x8c/0xb0 [ 325.003687][T24811] ? __kmalloc_cache_noprof+0x189/0x320 [ 325.003798][T24811] tcp_sendmsg_fastopen+0x43a/0x520 [ 325.003838][T24811] tcp_sendmsg_locked+0x27be/0x2cc0 [ 325.003876][T24811] ? mntput_no_expire+0x6f/0x3c0 [ 325.003945][T24811] ? mntput+0x4b/0x80 [ 325.003979][T24811] ? __rcu_read_unlock+0x4f/0x70 [ 325.004010][T24811] ? avc_has_perm_noaudit+0x1b1/0x200 [ 325.004117][T24811] ? avc_has_perm+0xd3/0x150 [ 325.004157][T24811] ? _raw_spin_unlock_bh+0x36/0x40 [ 325.004217][T24811] ? __pfx_tcp_sendmsg+0x10/0x10 [ 325.004301][T24811] tcp_sendmsg+0x2f/0x50 [ 325.004337][T24811] inet6_sendmsg+0x76/0xd0 [ 325.004453][T24811] __sock_sendmsg+0x8b/0x180 [ 325.004488][T24811] __sys_sendto+0x268/0x330 [ 325.004536][T24811] __x64_sys_sendto+0x76/0x90 [ 325.004579][T24811] x64_sys_call+0x2eb6/0x2fb0 [ 325.004684][T24811] do_syscall_64+0xd2/0x200 [ 325.004798][T24811] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 325.004836][T24811] ? clear_bhb_loop+0x40/0x90 [ 325.004867][T24811] ? clear_bhb_loop+0x40/0x90 [ 325.004898][T24811] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.005004][T24811] RIP: 0033:0x7ff42760e929 [ 325.005026][T24811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.005117][T24811] RSP: 002b:00007ff425c77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 325.005144][T24811] RAX: ffffffffffffffda RBX: 00007ff427835fa0 RCX: 00007ff42760e929 [ 325.005162][T24811] RDX: 0000000000000001 RSI: 0000200000000200 RDI: 0000000000000003 [ 325.005181][T24811] RBP: 00007ff425c77090 R08: 0000200000b63fe4 R09: 000000000000001c [ 325.005199][T24811] R10: 0000000020004002 R11: 0000000000000246 R12: 0000000000000001 [ 325.005218][T24811] R13: 0000000000000000 R14: 00007ff427835fa0 R15: 00007ffdadb56d68 [ 325.005245][T24811] [ 325.022903][T24812] random: crng reseeded on system resumption [ 325.026235][ T29] audit: type=1326 audit(2000000223.747:6804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24807 comm="syz.2.5697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 325.096899][T24814] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=24814 comm=syz.4.5698 [ 325.098850][ T29] audit: type=1326 audit(2000000223.747:6805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24807 comm="syz.2.5697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 325.098879][ T29] audit: type=1326 audit(2000000223.747:6806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24807 comm="syz.2.5697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 325.103404][T24814] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24814 comm=syz.4.5698 [ 325.191999][T24817] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5698'. [ 325.435143][T24814] netlink: 'syz.4.5698': attribute type 4 has an invalid length. [ 325.528417][T24837] xt_TPROXY: Can be used only with -p tcp or -p udp [ 325.621015][T24837] wireguard0: entered promiscuous mode [ 325.631616][T24848] FAULT_INJECTION: forcing a failure. [ 325.631616][T24848] name failslab, interval 1, probability 0, space 0, times 0 [ 325.644363][T24848] CPU: 0 UID: 0 PID: 24848 Comm: syz.0.5708 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 325.644476][T24848] Tainted: [W]=WARN [ 325.644485][T24848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 325.644502][T24848] Call Trace: [ 325.644510][T24848] [ 325.644520][T24848] __dump_stack+0x1d/0x30 [ 325.644544][T24848] dump_stack_lvl+0xe8/0x140 [ 325.644565][T24848] dump_stack+0x15/0x1b [ 325.644607][T24848] should_fail_ex+0x265/0x280 [ 325.644655][T24848] should_failslab+0x8c/0xb0 [ 325.644684][T24848] kmem_cache_alloc_noprof+0x50/0x310 [ 325.644719][T24848] ? getname_flags+0x80/0x3b0 [ 325.644790][T24848] getname_flags+0x80/0x3b0 [ 325.644835][T24848] getname_uflags+0x21/0x30 [ 325.644860][T24848] __x64_sys_execveat+0x5d/0x90 [ 325.644917][T24848] x64_sys_call+0x2dae/0x2fb0 [ 325.644970][T24848] do_syscall_64+0xd2/0x200 [ 325.645010][T24848] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 325.645037][T24848] ? clear_bhb_loop+0x40/0x90 [ 325.645130][T24848] ? clear_bhb_loop+0x40/0x90 [ 325.645159][T24848] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.645187][T24848] RIP: 0033:0x7f903e83e929 [ 325.645212][T24848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.645230][T24848] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 325.645249][T24848] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 325.645265][T24848] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 325.645282][T24848] RBP: 00007f903cea7090 R08: 0000000000001000 R09: 0000000000000000 [ 325.645328][T24848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.645345][T24848] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 325.645370][T24848] [ 325.887980][T24860] wireguard0: entered promiscuous mode [ 325.950167][T24861] siw: device registration error -23 [ 326.204736][T24887] wireguard0: entered promiscuous mode [ 326.340115][T24896] FAULT_INJECTION: forcing a failure. [ 326.340115][T24896] name failslab, interval 1, probability 0, space 0, times 0 [ 326.352829][T24896] CPU: 0 UID: 0 PID: 24896 Comm: syz.2.5718 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 326.352990][T24896] Tainted: [W]=WARN [ 326.352999][T24896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.353016][T24896] Call Trace: [ 326.353024][T24896] [ 326.353032][T24896] __dump_stack+0x1d/0x30 [ 326.353058][T24896] dump_stack_lvl+0xe8/0x140 [ 326.353083][T24896] dump_stack+0x15/0x1b [ 326.353103][T24896] should_fail_ex+0x265/0x280 [ 326.353173][T24896] should_failslab+0x8c/0xb0 [ 326.353195][T24896] kmem_cache_alloc_noprof+0x50/0x310 [ 326.353266][T24896] ? audit_log_start+0x365/0x6c0 [ 326.353297][T24896] audit_log_start+0x365/0x6c0 [ 326.353337][T24896] audit_seccomp+0x48/0x100 [ 326.353413][T24896] ? __seccomp_filter+0x68c/0x10d0 [ 326.353463][T24896] __seccomp_filter+0x69d/0x10d0 [ 326.353491][T24896] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 326.353532][T24896] ? vfs_write+0x75e/0x8e0 [ 326.353599][T24896] ? __rcu_read_unlock+0x4f/0x70 [ 326.353626][T24896] ? __fget_files+0x184/0x1c0 [ 326.353654][T24896] __secure_computing+0x82/0x150 [ 326.353733][T24896] syscall_trace_enter+0xcf/0x1e0 [ 326.353765][T24896] do_syscall_64+0xac/0x200 [ 326.353861][T24896] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 326.353887][T24896] ? clear_bhb_loop+0x40/0x90 [ 326.353923][T24896] ? clear_bhb_loop+0x40/0x90 [ 326.354060][T24896] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.354086][T24896] RIP: 0033:0x7f5f940ee929 [ 326.354103][T24896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.354127][T24896] RSP: 002b:00007f5f92757038 EFLAGS: 00000246 ORIG_RAX: 000000000000003f [ 326.354232][T24896] RAX: ffffffffffffffda RBX: 00007f5f94315fa0 RCX: 00007f5f940ee929 [ 326.354291][T24896] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001240 [ 326.354306][T24896] RBP: 00007f5f92757090 R08: 0000000000000000 R09: 0000000000000000 [ 326.354321][T24896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.354334][T24896] R13: 0000000000000000 R14: 00007f5f94315fa0 R15: 00007ffdc092ca88 [ 326.354354][T24896] [ 326.625039][T24906] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5720'. [ 326.641595][T24906] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5720'. [ 326.655682][T24911] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5719'. [ 326.740032][T24921] xt_TPROXY: Can be used only with -p tcp or -p udp [ 326.806768][T24930] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=24930 comm=syz.3.5725 [ 326.819464][T24930] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24930 comm=syz.3.5725 [ 326.837432][T24930] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5725'. [ 326.853664][T24930] netlink: 'syz.3.5725': attribute type 4 has an invalid length. [ 326.861645][T24933] wireguard0: entered promiscuous mode [ 326.866012][T24942] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5727'. [ 326.889218][T24921] siw: device registration error -23 [ 326.979632][T24951] xt_TPROXY: Can be used only with -p tcp or -p udp [ 327.022165][T24951] wireguard0: entered promiscuous mode [ 327.546270][T24965] block device autoloading is deprecated and will be removed. [ 327.704044][T24978] wireguard0: entered promiscuous mode [ 327.738312][T24992] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5736'. [ 327.804133][T24999] block device autoloading is deprecated and will be removed. [ 327.991298][T25025] block device autoloading is deprecated and will be removed. [ 328.025823][T25031] ip6gre20: entered allmulticast mode [ 328.165946][T25054] ip6gre21: entered allmulticast mode [ 328.250340][T25068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=25068 comm=syz.3.5747 [ 328.262978][T25068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25068 comm=syz.3.5747 [ 328.331617][T25077] netlink: 'syz.3.5747': attribute type 4 has an invalid length. [ 328.982492][T25207] rdma_rxe: rxe_newlink: failed to add veth0_to_bond [ 329.059384][T25212] wireguard0: entered promiscuous mode [ 329.073108][T25224] ip6gre21: entered allmulticast mode [ 329.174688][T25243] ip6gre3: entered allmulticast mode [ 329.203139][T25241] __nla_validate_parse: 11 callbacks suppressed [ 329.203156][T25241] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 329.489796][T25249] Set syz1 is full, maxelem 65536 reached [ 329.697064][T25303] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5777'. [ 329.724005][T25303] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5777'. [ 329.782061][T25308] ip6gre16: entered allmulticast mode [ 329.986923][T25375] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5780'. [ 330.008323][T25376] xt_TPROXY: Can be used only with -p tcp or -p udp [ 330.057095][ T29] kauditd_printk_skb: 136 callbacks suppressed [ 330.057115][ T29] audit: type=1326 audit(2000000228.871:6941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.088621][T25379] netlink: 'syz.2.5783': attribute type 8 has an invalid length. [ 330.110383][ T29] audit: type=1326 audit(2000000228.901:6942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.126780][T25386] xt_TPROXY: Can be used only with -p tcp or -p udp [ 330.133957][ T29] audit: type=1326 audit(2000000228.901:6943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.164068][ T29] audit: type=1326 audit(2000000228.901:6944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.187685][ T29] audit: type=1326 audit(2000000228.901:6945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.211213][ T29] audit: type=1326 audit(2000000228.901:6946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.235774][ T29] audit: type=1326 audit(2000000228.901:6947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.260202][ T29] audit: type=1326 audit(2000000228.901:6948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.283650][ T29] audit: type=1326 audit(2000000228.901:6949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.298592][T25390] siw: device registration error -23 [ 330.307151][ T29] audit: type=1326 audit(2000000228.901:6950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25378 comm="syz.2.5783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5f940ee929 code=0x7ffc0000 [ 330.337121][T25392] mmap: syz.2.5783 (25392): VmData 167620608 exceed data ulimit 67108945. Update limits or use boot option ignore_rlimit_data. [ 330.824718][T25386] wireguard0: entered promiscuous mode [ 330.897874][T25391] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 330.937073][T25421] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5790'. [ 330.978046][T25409] wireguard0: entered promiscuous mode [ 331.029425][T25421] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5790'. [ 331.129425][T25444] ip6gre22: entered allmulticast mode [ 331.141207][T25447] ip6gre22: entered allmulticast mode [ 331.372107][T25465] netlink: 68 bytes leftover after parsing attributes in process `syz.3.5796'. [ 331.807067][T25548] xt_TPROXY: Can be used only with -p tcp or -p udp [ 331.859973][T25548] wireguard0: entered promiscuous mode [ 331.954123][T25577] siw: device registration error -23 [ 332.000621][T25580] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5807'. [ 332.081987][T25580] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5807'. [ 332.465568][T25616] wireguard0: entered promiscuous mode [ 332.727668][T25613] Set syz1 is full, maxelem 65536 reached [ 332.821277][T25634] ip6gre23: entered allmulticast mode [ 332.834763][T25633] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5820'. [ 333.258649][T25669] xt_TPROXY: Can be used only with -p tcp or -p udp [ 333.317125][T25673] ip6gre23: entered allmulticast mode [ 333.387455][T25669] wireguard0: entered promiscuous mode [ 333.428594][T25685] siw: device registration error -23 [ 333.610174][T25709] wireguard0: entered promiscuous mode [ 333.896532][T25734] ip6gre24: entered allmulticast mode [ 334.440570][T25775] ip6gre24: entered allmulticast mode [ 334.536230][T25749] hub 6-0:1.0: USB hub found [ 334.544542][T25749] hub 6-0:1.0: 8 ports detected [ 334.551822][T25785] xt_TPROXY: Can be used only with -p tcp or -p udp [ 334.573284][T25749] __nla_validate_parse: 5 callbacks suppressed [ 334.573304][T25749] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5846'. [ 334.631834][T25767] Set syz1 is full, maxelem 65536 reached [ 334.781182][T25785] wireguard0: entered promiscuous mode [ 334.948809][T25787] siw: device registration error -23 [ 335.248949][T25801] kthread_run failed with err -4 [ 335.307132][T25799] lo speed is unknown, defaulting to 1000 [ 335.512508][T25833] wireguard0: entered promiscuous mode [ 335.536730][T25843] ip6gre25: entered allmulticast mode [ 335.750033][T25851] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5868'. [ 335.760425][T25851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=25851 comm=syz.0.5868 [ 335.881309][T25881] FAULT_INJECTION: forcing a failure. [ 335.881309][T25881] name failslab, interval 1, probability 0, space 0, times 0 [ 335.894187][T25881] CPU: 1 UID: 0 PID: 25881 Comm: syz.0.5872 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 335.894241][T25881] Tainted: [W]=WARN [ 335.894249][T25881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 335.894262][T25881] Call Trace: [ 335.894268][T25881] [ 335.894336][T25881] __dump_stack+0x1d/0x30 [ 335.894358][T25881] dump_stack_lvl+0xe8/0x140 [ 335.894377][T25881] dump_stack+0x15/0x1b [ 335.894396][T25881] should_fail_ex+0x265/0x280 [ 335.894435][T25881] should_failslab+0x8c/0xb0 [ 335.894488][T25881] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 335.894517][T25881] ? v9fs_session_init+0x4b/0xde0 [ 335.894552][T25881] kstrdup+0x3e/0xd0 [ 335.894579][T25881] v9fs_session_init+0x4b/0xde0 [ 335.894634][T25881] ? obj_cgroup_charge_account+0x122/0x1a0 [ 335.894665][T25881] ? __rcu_read_unlock+0x4f/0x70 [ 335.894690][T25881] ? should_fail_ex+0xdb/0x280 [ 335.894719][T25881] ? v9fs_mount+0x51/0x590 [ 335.894754][T25881] ? should_failslab+0x8c/0xb0 [ 335.894776][T25881] ? __kmalloc_cache_noprof+0x189/0x320 [ 335.894923][T25881] v9fs_mount+0x67/0x590 [ 335.894953][T25881] ? __pfx_v9fs_mount+0x10/0x10 [ 335.895008][T25881] legacy_get_tree+0x78/0xd0 [ 335.895040][T25881] vfs_get_tree+0x54/0x1d0 [ 335.895103][T25881] do_new_mount+0x207/0x680 [ 335.895137][T25881] path_mount+0x4a4/0xb20 [ 335.895181][T25881] ? user_path_at+0x109/0x130 [ 335.895339][T25881] __se_sys_mount+0x28f/0x2e0 [ 335.895378][T25881] ? fput+0x8f/0xc0 [ 335.895408][T25881] __x64_sys_mount+0x67/0x80 [ 335.895509][T25881] x64_sys_call+0xd36/0x2fb0 [ 335.895585][T25881] do_syscall_64+0xd2/0x200 [ 335.895622][T25881] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 335.895648][T25881] ? clear_bhb_loop+0x40/0x90 [ 335.895668][T25881] ? clear_bhb_loop+0x40/0x90 [ 335.895772][T25881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.895794][T25881] RIP: 0033:0x7f903e83e929 [ 335.895808][T25881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.895826][T25881] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 335.895906][T25881] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 335.895947][T25881] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 335.895962][T25881] RBP: 00007f903cea7090 R08: 0000200000000280 R09: 0000000000000000 [ 335.895977][T25881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 335.895996][T25881] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 335.896041][T25881] [ 336.235748][T25888] FAULT_INJECTION: forcing a failure. [ 336.235748][T25888] name failslab, interval 1, probability 0, space 0, times 0 [ 336.248433][T25888] CPU: 0 UID: 0 PID: 25888 Comm: syz.0.5875 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 336.248507][T25888] Tainted: [W]=WARN [ 336.248516][T25888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 336.248533][T25888] Call Trace: [ 336.248541][T25888] [ 336.248551][T25888] __dump_stack+0x1d/0x30 [ 336.248573][T25888] dump_stack_lvl+0xe8/0x140 [ 336.248595][T25888] dump_stack+0x15/0x1b [ 336.248643][T25888] should_fail_ex+0x265/0x280 [ 336.248677][T25888] should_failslab+0x8c/0xb0 [ 336.248699][T25888] kmem_cache_alloc_noprof+0x50/0x310 [ 336.248760][T25888] ? skb_clone+0x151/0x1f0 [ 336.248799][T25888] ? skb_clone+0x4d/0x1f0 [ 336.248873][T25888] skb_clone+0x151/0x1f0 [ 336.248988][T25888] dev_queue_xmit_nit+0x146/0x680 [ 336.249044][T25888] dev_hard_start_xmit+0xd3/0x3e0 [ 336.249077][T25888] ? validate_xmit_skb+0x746/0x910 [ 336.249120][T25888] __dev_queue_xmit+0x10b9/0x1fb0 [ 336.249160][T25888] ? __dev_queue_xmit+0x182/0x1fb0 [ 336.249200][T25888] ? selinux_ip_postroute+0x1b7/0xb50 [ 336.249282][T25888] ip_finish_output2+0x77f/0x8b0 [ 336.249313][T25888] ? __rcu_read_unlock+0x4f/0x70 [ 336.249344][T25888] ip_finish_output+0x112/0x290 [ 336.249374][T25888] ip_output+0xad/0x170 [ 336.249435][T25888] ? __pfx_ip_finish_output+0x10/0x10 [ 336.249462][T25888] ? __pfx_ip_output+0x10/0x10 [ 336.249509][T25888] ip_send_skb+0x11d/0x140 [ 336.249532][T25888] udp_send_skb+0x6e3/0xa40 [ 336.249554][T25888] ? ip_make_skb+0x197/0x2c0 [ 336.249588][T25888] udp_sendmsg+0x1050/0x13b0 [ 336.249616][T25888] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 336.249732][T25888] udpv6_sendmsg+0x7e9/0x1580 [ 336.249775][T25888] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 336.249811][T25888] inet6_sendmsg+0xac/0xd0 [ 336.249858][T25888] __sock_sendmsg+0x8b/0x180 [ 336.249889][T25888] ____sys_sendmsg+0x345/0x4e0 [ 336.249992][T25888] ___sys_sendmsg+0x17b/0x1d0 [ 336.250036][T25888] __sys_sendmmsg+0x178/0x300 [ 336.250098][T25888] __x64_sys_sendmmsg+0x57/0x70 [ 336.250134][T25888] x64_sys_call+0x2f2f/0x2fb0 [ 336.250169][T25888] do_syscall_64+0xd2/0x200 [ 336.250210][T25888] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 336.250248][T25888] ? clear_bhb_loop+0x40/0x90 [ 336.250269][T25888] ? clear_bhb_loop+0x40/0x90 [ 336.250368][T25888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.250388][T25888] RIP: 0033:0x7f903e83e929 [ 336.250473][T25888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.250496][T25888] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 336.250514][T25888] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 336.250529][T25888] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000003 [ 336.250541][T25888] RBP: 00007f903cea7090 R08: 0000000000000000 R09: 0000000000000000 [ 336.250552][T25888] R10: 0000000004001c00 R11: 0000000000000246 R12: 0000000000000001 [ 336.250564][T25888] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 336.250624][T25888] [ 336.625346][T25898] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 336.646275][T25904] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5878'. [ 336.667129][T25904] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5878'. [ 336.755747][T25910] ip6gre26: entered allmulticast mode [ 336.767165][T25917] xt_TPROXY: Can be used only with -p tcp or -p udp [ 336.788965][T25917] siw: device registration error -23 [ 337.114833][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 337.114851][ T29] audit: type=1400 audit(2000000235.925:7010): avc: denied { nlmsg_read } for pid=25930 comm="syz.4.5885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 337.542309][T25938] wireguard0: entered promiscuous mode [ 337.780687][ T29] audit: type=1400 audit(2000000236.595:7011): avc: denied { recv } for pid=25935 comm="syz.4.5886" saddr=10.128.0.163 src=30036 daddr=10.128.1.68 dest=39484 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 337.813196][T25960] bridge0: port 3(bond0) entered blocking state [ 337.819522][T25960] bridge0: port 3(bond0) entered disabled state [ 337.861271][T25960] bond0: entered allmulticast mode [ 337.866458][T25960] bond_slave_0: entered allmulticast mode [ 337.872235][T25960] bond_slave_1: entered allmulticast mode [ 337.894016][T25960] dummy0: entered allmulticast mode [ 337.922902][T25960] bond0: entered promiscuous mode [ 337.928027][T25960] bond_slave_0: entered promiscuous mode [ 337.933880][T25960] bond_slave_1: entered promiscuous mode [ 337.963045][T25960] dummy0: entered promiscuous mode [ 337.970165][T25960] bridge0: port 3(bond0) entered blocking state [ 337.976492][T25960] bridge0: port 3(bond0) entered forwarding state [ 338.055185][T25966] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 338.126065][T25975] ip6gre4: entered allmulticast mode [ 338.260958][T25999] xt_TPROXY: Can be used only with -p tcp or -p udp [ 338.312543][T26000] xt_TPROXY: Can be used only with -p tcp or -p udp [ 338.323865][T26000] wireguard0: entered promiscuous mode [ 338.376488][T26007] siw: device registration error -23 [ 338.403211][T25999] siw: device registration error -23 [ 338.425037][T25997] netlink: 68 bytes leftover after parsing attributes in process `syz.4.5901'. [ 338.872368][T26016] netlink: 27 bytes leftover after parsing attributes in process `syz.0.5902'. [ 338.965151][T26019] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 339.032411][ T29] audit: type=1401 audit(2000000237.856:7012): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 339.085235][T26030] FAULT_INJECTION: forcing a failure. [ 339.085235][T26030] name failslab, interval 1, probability 0, space 0, times 0 [ 339.097960][T26030] CPU: 1 UID: 0 PID: 26030 Comm: syz.0.5906 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 339.098063][T26030] Tainted: [W]=WARN [ 339.098072][T26030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 339.098087][T26030] Call Trace: [ 339.098094][T26030] [ 339.098104][T26030] __dump_stack+0x1d/0x30 [ 339.098181][T26030] dump_stack_lvl+0xe8/0x140 [ 339.098205][T26030] dump_stack+0x15/0x1b [ 339.098227][T26030] should_fail_ex+0x265/0x280 [ 339.098321][T26030] ? resv_map_alloc+0x32/0x190 [ 339.098449][T26030] should_failslab+0x8c/0xb0 [ 339.098493][T26030] __kmalloc_cache_noprof+0x4c/0x320 [ 339.098525][T26030] ? vfs_write+0x75e/0x8e0 [ 339.098563][T26030] resv_map_alloc+0x32/0x190 [ 339.098593][T26030] hugetlbfs_get_inode+0x67/0x370 [ 339.098637][T26030] hugetlb_file_setup+0x192/0x3d0 [ 339.098686][T26030] ksys_mmap_pgoff+0x157/0x310 [ 339.098725][T26030] x64_sys_call+0x1602/0x2fb0 [ 339.098755][T26030] do_syscall_64+0xd2/0x200 [ 339.098794][T26030] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 339.098854][T26030] ? clear_bhb_loop+0x40/0x90 [ 339.098879][T26030] ? clear_bhb_loop+0x40/0x90 [ 339.098905][T26030] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.098932][T26030] RIP: 0033:0x7f903e83e929 [ 339.098982][T26030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.099059][T26030] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 339.099079][T26030] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 339.099122][T26030] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 339.099138][T26030] RBP: 00007f903cea7090 R08: ffffffffffffffff R09: 0000000000000000 [ 339.099154][T26030] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000001 [ 339.099170][T26030] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 339.099191][T26030] [ 339.105686][T26027] lo speed is unknown, defaulting to 1000 [ 339.388019][ T29] audit: type=1326 audit(2000000238.196:7013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 339.411682][ T29] audit: type=1326 audit(2000000238.206:7014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 339.435318][ T29] audit: type=1326 audit(2000000238.206:7015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f81624be963 code=0x7ffc0000 [ 339.458841][ T29] audit: type=1326 audit(2000000238.206:7016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f81624bd3df code=0x7ffc0000 [ 339.482329][ T29] audit: type=1326 audit(2000000238.206:7017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f81624be9b7 code=0x7ffc0000 [ 339.505802][ T29] audit: type=1326 audit(2000000238.206:7018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f81624bd290 code=0x7ffc0000 [ 339.529398][ T29] audit: type=1326 audit(2000000238.206:7019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26063 comm="syz.3.5911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f81624bd58a code=0x7ffc0000 [ 339.597085][T26064] netlink: 10 bytes leftover after parsing attributes in process `syz.3.5911'. [ 339.610618][T26067] netlink: 'syz.1.5907': attribute type 16 has an invalid length. [ 339.618491][T26067] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5907'. [ 339.672891][T26071] FAULT_INJECTION: forcing a failure. [ 339.672891][T26071] name failslab, interval 1, probability 0, space 0, times 0 [ 339.685618][T26071] CPU: 0 UID: 0 PID: 26071 Comm: syz.3.5913 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 339.685683][T26071] Tainted: [W]=WARN [ 339.685692][T26071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 339.685751][T26071] Call Trace: [ 339.685758][T26071] [ 339.685765][T26071] __dump_stack+0x1d/0x30 [ 339.685794][T26071] dump_stack_lvl+0xe8/0x140 [ 339.685814][T26071] dump_stack+0x15/0x1b [ 339.685832][T26071] should_fail_ex+0x265/0x280 [ 339.685893][T26071] should_failslab+0x8c/0xb0 [ 339.685921][T26071] kmem_cache_alloc_noprof+0x50/0x310 [ 339.686024][T26071] ? skb_clone+0x151/0x1f0 [ 339.686116][T26071] skb_clone+0x151/0x1f0 [ 339.686153][T26071] __netlink_deliver_tap+0x2c9/0x500 [ 339.686229][T26071] netlink_unicast+0x64c/0x670 [ 339.686261][T26071] netlink_sendmsg+0x58b/0x6b0 [ 339.686314][T26071] ? __pfx_netlink_sendmsg+0x10/0x10 [ 339.686417][T26071] __sock_sendmsg+0x142/0x180 [ 339.686445][T26071] sock_write_iter+0x165/0x1b0 [ 339.686522][T26071] ? __pfx_sock_write_iter+0x10/0x10 [ 339.686548][T26071] vfs_write+0x4a0/0x8e0 [ 339.686587][T26071] ksys_write+0xda/0x1a0 [ 339.686739][T26071] __x64_sys_write+0x40/0x50 [ 339.686774][T26071] x64_sys_call+0x2cdd/0x2fb0 [ 339.686809][T26071] do_syscall_64+0xd2/0x200 [ 339.686841][T26071] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 339.686891][T26071] ? clear_bhb_loop+0x40/0x90 [ 339.686912][T26071] ? clear_bhb_loop+0x40/0x90 [ 339.686951][T26071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.686973][T26071] RIP: 0033:0x7f81624be929 [ 339.687007][T26071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.687028][T26071] RSP: 002b:00007f8160b27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.687046][T26071] RAX: ffffffffffffffda RBX: 00007f81626e5fa0 RCX: 00007f81624be929 [ 339.687059][T26071] RDX: 0000000000000020 RSI: 0000200000000000 RDI: 0000000000000003 [ 339.687138][T26071] RBP: 00007f8160b27090 R08: 0000000000000000 R09: 0000000000000000 [ 339.687150][T26071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.687229][T26071] R13: 0000000000000000 R14: 00007f81626e5fa0 R15: 00007ffe39e718a8 [ 339.687252][T26071] [ 339.687868][T26071] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5913'. [ 340.015788][T26075] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 340.139867][T26087] xt_TPROXY: Can be used only with -p tcp or -p udp [ 340.163750][T26092] xt_TPROXY: Can be used only with -p tcp or -p udp [ 340.176747][T26092] wireguard0: entered promiscuous mode [ 340.187919][T26087] siw: device registration error -23 [ 340.229719][T26099] siw: device registration error -23 [ 340.962071][T26113] ip6gre25: entered allmulticast mode [ 341.082383][T26141] ip6gre11: entered allmulticast mode [ 341.357124][T26187] xt_TPROXY: Can be used only with -p tcp or -p udp [ 341.381137][T26191] xt_TPROXY: Can be used only with -p tcp or -p udp [ 341.409213][T26187] siw: device registration error -23 [ 341.468057][T26204] xt_TPROXY: Can be used only with -p tcp or -p udp [ 341.494836][T26191] wireguard0: entered promiscuous mode [ 341.611322][T26222] wireguard0: entered promiscuous mode [ 341.631536][T26204] siw: device registration error -23 [ 341.846526][T26257] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5938'. [ 341.888437][T26257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26257 comm=syz.0.5938 [ 342.204358][T26275] FAULT_INJECTION: forcing a failure. [ 342.204358][T26275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.217583][T26275] CPU: 1 UID: 0 PID: 26275 Comm: syz.1.5941 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 342.217693][T26275] Tainted: [W]=WARN [ 342.217702][T26275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 342.217719][T26275] Call Trace: [ 342.217727][T26275] [ 342.217737][T26275] __dump_stack+0x1d/0x30 [ 342.217763][T26275] dump_stack_lvl+0xe8/0x140 [ 342.217782][T26275] dump_stack+0x15/0x1b [ 342.217798][T26275] should_fail_ex+0x265/0x280 [ 342.217828][T26275] should_fail+0xb/0x20 [ 342.217943][T26275] should_fail_usercopy+0x1a/0x20 [ 342.218063][T26275] strncpy_from_user+0x25/0x230 [ 342.218093][T26275] ? __fget_files+0x184/0x1c0 [ 342.218119][T26275] __se_sys_add_key+0x86/0x350 [ 342.218152][T26275] __x64_sys_add_key+0x67/0x80 [ 342.218178][T26275] x64_sys_call+0x1d0d/0x2fb0 [ 342.218229][T26275] do_syscall_64+0xd2/0x200 [ 342.218266][T26275] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 342.218344][T26275] ? clear_bhb_loop+0x40/0x90 [ 342.218370][T26275] ? clear_bhb_loop+0x40/0x90 [ 342.218399][T26275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.218427][T26275] RIP: 0033:0x7f099479e929 [ 342.218447][T26275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.218479][T26275] RSP: 002b:00007f0992e07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 342.218509][T26275] RAX: ffffffffffffffda RBX: 00007f09949c5fa0 RCX: 00007f099479e929 [ 342.218525][T26275] RDX: 00002000000000c0 RSI: 0000200000000040 RDI: 0000200000000000 [ 342.218540][T26275] RBP: 00007f0992e07090 R08: ffffffffffffffff R09: 0000000000000000 [ 342.218556][T26275] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 342.218571][T26275] R13: 0000000000000000 R14: 00007f09949c5fa0 R15: 00007ffd516cbdb8 [ 342.218631][T26275] [ 342.469367][T26286] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26286 comm=syz.1.5943 [ 342.482037][T26286] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26286 comm=syz.1.5943 [ 342.509905][T26286] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5943'. [ 342.538888][T26290] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5946'. [ 342.582000][T26290] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5946'. [ 342.619920][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 342.619940][ T29] audit: type=1326 audit(2000000241.428:7093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.649792][ T29] audit: type=1326 audit(2000000241.428:7094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.673255][ T29] audit: type=1326 audit(2000000241.428:7095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.696949][ T29] audit: type=1326 audit(2000000241.428:7096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.720753][ T29] audit: type=1326 audit(2000000241.428:7097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.744506][ T29] audit: type=1326 audit(2000000241.428:7098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.768151][ T29] audit: type=1326 audit(2000000241.428:7099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.791837][ T29] audit: type=1326 audit(2000000241.428:7100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.815364][ T29] audit: type=1326 audit(2000000241.428:7101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.838918][ T29] audit: type=1326 audit(2000000241.438:7102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26300 comm="syz.3.5949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 342.895307][T26312] ip6gre12: entered allmulticast mode [ 342.933790][T26349] FAULT_INJECTION: forcing a failure. [ 342.933790][T26349] name failslab, interval 1, probability 0, space 0, times 0 [ 342.946510][T26349] CPU: 1 UID: 0 PID: 26349 Comm: syz.0.5951 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 342.946578][T26349] Tainted: [W]=WARN [ 342.946587][T26349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 342.946605][T26349] Call Trace: [ 342.946614][T26349] [ 342.946624][T26349] __dump_stack+0x1d/0x30 [ 342.946740][T26349] dump_stack_lvl+0xe8/0x140 [ 342.946768][T26349] dump_stack+0x15/0x1b [ 342.946791][T26349] should_fail_ex+0x265/0x280 [ 342.946831][T26349] should_failslab+0x8c/0xb0 [ 342.946861][T26349] kmem_cache_alloc_noprof+0x50/0x310 [ 342.946930][T26349] ? fib6_add_1+0x558/0xa80 [ 342.947055][T26349] fib6_add_1+0x558/0xa80 [ 342.947104][T26349] fib6_add+0xff/0xe00 [ 342.947225][T26349] ? should_fail_ex+0xdb/0x280 [ 342.947264][T26349] ip6_ins_rt+0x73/0xb0 [ 342.947376][T26349] __ipv6_dev_ac_inc+0x535/0x6c0 [ 342.947400][T26349] ipv6_sock_ac_join+0x334/0x3f0 [ 342.947496][T26349] do_ipv6_setsockopt+0x1a92/0x22e0 [ 342.947528][T26349] ? kstrtoull+0x111/0x140 [ 342.947562][T26349] ? avc_has_perm_noaudit+0x1b1/0x200 [ 342.947670][T26349] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 342.947745][T26349] ipv6_setsockopt+0x59/0x130 [ 342.947777][T26349] udpv6_setsockopt+0x99/0xb0 [ 342.947820][T26349] sock_common_setsockopt+0x69/0x80 [ 342.947854][T26349] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 342.947918][T26349] __sys_setsockopt+0x184/0x200 [ 342.947958][T26349] __x64_sys_setsockopt+0x64/0x80 [ 342.947996][T26349] x64_sys_call+0x2bd5/0x2fb0 [ 342.948090][T26349] do_syscall_64+0xd2/0x200 [ 342.948131][T26349] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 342.948246][T26349] ? clear_bhb_loop+0x40/0x90 [ 342.948273][T26349] ? clear_bhb_loop+0x40/0x90 [ 342.948299][T26349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.948325][T26349] RIP: 0033:0x7f903e83e929 [ 342.948404][T26349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.948430][T26349] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 342.948455][T26349] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 342.948471][T26349] RDX: 000000000000001b RSI: 0000000000000029 RDI: 0000000000000003 [ 342.948487][T26349] RBP: 00007f903cea7090 R08: 0000000000000014 R09: 0000000000000000 [ 342.948579][T26349] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000002 [ 342.948596][T26349] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 342.948622][T26349] [ 343.260206][T26361] xt_TPROXY: Can be used only with -p tcp or -p udp [ 343.274023][ T7585] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.318412][T26361] siw: device registration error -23 [ 343.324221][T26302] lo speed is unknown, defaulting to 1000 [ 343.335813][ T7585] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.391435][ T7585] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.402785][T26396] xt_TPROXY: Can be used only with -p tcp or -p udp [ 343.473548][ T7585] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.546281][T26440] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5957'. [ 343.556176][T26396] wireguard0: entered promiscuous mode [ 343.571706][T26440] xt_TPROXY: Can be used only with -p tcp or -p udp [ 343.591435][T26443] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26443 comm=syz.0.5958 [ 343.604037][T26443] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26443 comm=syz.0.5958 [ 343.689847][T26443] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5958'. [ 344.058687][T26535] ip6gre13: entered allmulticast mode [ 344.085852][T26302] chnl_net:caif_netlink_parms(): no params data found [ 344.103300][ T7585] bridge_slave_1: left allmulticast mode [ 344.109102][ T7585] bridge_slave_1: left promiscuous mode [ 344.114808][ T7585] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.150722][ T7585] bridge_slave_0: left allmulticast mode [ 344.156463][ T7585] bridge_slave_0: left promiscuous mode [ 344.162278][ T7585] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.177342][T26550] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 344.256654][ T7585] team0: Port device geneve1 removed [ 344.349961][ T7585] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 344.387320][ T7585] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 344.398563][ T7585] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 344.407473][ T7585] bond0 (unregistering): Released all slaves [ 344.694682][T26546] syz_tun: entered promiscuous mode [ 344.708939][T26546] syz_tun: left promiscuous mode [ 344.846355][T26550] netlink: 'syz.4.5964': attribute type 1 has an invalid length. [ 344.903722][ T7585] tipc: Disabling bearer [ 344.908841][ T7585] tipc: Left network mode [ 344.957749][T26302] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.964900][T26302] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.975906][T26302] bridge_slave_0: entered allmulticast mode [ 344.982703][T26302] bridge_slave_0: entered promiscuous mode [ 344.991610][ T7585] macvlan0: left promiscuous mode [ 345.000371][ T7585] hsr_slave_0: left promiscuous mode [ 345.000349][T26625] netlink: 'syz.4.5966': attribute type 2 has an invalid length. [ 345.000397][T26625] netlink: 'syz.4.5966': attribute type 9 has an invalid length. [ 345.021375][T26625] __nla_validate_parse: 2 callbacks suppressed [ 345.021391][T26625] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.5966'. [ 345.038467][ T7585] hsr_slave_1: left promiscuous mode [ 345.045724][ T7585] veth1_vlan: left allmulticast mode [ 345.051179][ T7585] veth1_vlan: left promiscuous mode [ 345.057456][ T7585] veth0_vlan: left promiscuous mode [ 345.124875][ T7585] team0 (unregistering): Port device team_slave_1 removed [ 345.136034][ T7585] team0 (unregistering): Port device team_slave_0 removed [ 345.146401][T26634] netlink: 'syz.4.5966': attribute type 3 has an invalid length. [ 345.179285][T26302] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.186573][T26302] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.194437][T26302] bridge_slave_1: entered allmulticast mode [ 345.201925][T26302] bridge_slave_1: entered promiscuous mode [ 345.232252][T26302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 345.255779][T26302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.277869][T26664] ip6gre14: entered allmulticast mode [ 345.292633][T26302] team0: Port device team_slave_0 added [ 345.307449][T26302] team0: Port device team_slave_1 added [ 345.338163][T26302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 345.345166][T26302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 345.371394][T26302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 345.402978][T26719] xt_TPROXY: Can be used only with -p tcp or -p udp [ 345.417128][T26302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 345.424131][T26302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 345.450213][T26302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 345.522374][T26719] siw: device registration error -23 [ 345.530914][T26302] hsr_slave_0: entered promiscuous mode [ 345.537765][T26302] hsr_slave_1: entered promiscuous mode [ 345.600155][T26772] ip6gre5: entered allmulticast mode [ 345.729127][T26823] xt_TPROXY: Can be used only with -p tcp or -p udp [ 345.750956][T26829] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26829 comm=syz.4.5975 [ 345.752403][T26827] netlink: 'syz.0.5974': attribute type 7 has an invalid length. [ 345.763580][T26829] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26829 comm=syz.4.5975 [ 345.817987][T26829] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5975'. [ 345.968572][T26823] wireguard0: entered promiscuous mode [ 345.987364][T26839] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 345.998156][T26839] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5976'. [ 346.058912][T26302] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 346.090100][T26865] siw: device registration error -23 [ 346.106199][T26302] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 346.124539][T26868] FAULT_INJECTION: forcing a failure. [ 346.124539][T26868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.137905][T26868] CPU: 0 UID: 0 PID: 26868 Comm: syz.4.5978 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 346.137970][T26868] Tainted: [W]=WARN [ 346.137978][T26868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 346.137993][T26868] Call Trace: [ 346.138002][T26868] [ 346.138011][T26868] __dump_stack+0x1d/0x30 [ 346.138033][T26868] dump_stack_lvl+0xe8/0x140 [ 346.138053][T26868] dump_stack+0x15/0x1b [ 346.138069][T26868] should_fail_ex+0x265/0x280 [ 346.138162][T26868] should_fail+0xb/0x20 [ 346.138261][T26868] should_fail_usercopy+0x1a/0x20 [ 346.138319][T26868] _copy_from_user+0x1c/0xb0 [ 346.138344][T26868] kcmp_epoll_target+0x4f/0x190 [ 346.138381][T26868] __se_sys_kcmp+0x3c5/0x740 [ 346.138428][T26868] __x64_sys_kcmp+0x67/0x80 [ 346.138458][T26868] x64_sys_call+0x29ba/0x2fb0 [ 346.138484][T26868] do_syscall_64+0xd2/0x200 [ 346.138577][T26868] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 346.138608][T26868] ? clear_bhb_loop+0x40/0x90 [ 346.138691][T26868] ? clear_bhb_loop+0x40/0x90 [ 346.138718][T26868] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.138741][T26868] RIP: 0033:0x7ff42760e929 [ 346.138756][T26868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.138776][T26868] RSP: 002b:00007ff425c77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000138 [ 346.138796][T26868] RAX: ffffffffffffffda RBX: 00007ff427835fa0 RCX: 00007ff42760e929 [ 346.138809][T26868] RDX: 0000000000000007 RSI: 000000000000056a RDI: 000000000000056a [ 346.138825][T26868] RBP: 00007ff425c77090 R08: 0000200000000200 R09: 0000000000000000 [ 346.138841][T26868] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 346.138856][T26868] R13: 0000000000000000 R14: 00007ff427835fa0 R15: 00007ffdadb56d68 [ 346.138879][T26868] [ 346.385797][T26302] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 346.402068][T26302] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 346.501213][T26302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.512900][T26302] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.518940][T26871] netlink: 68 bytes leftover after parsing attributes in process `syz.4.5979'. [ 346.531613][ T7589] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.538750][ T7589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.553936][ T7589] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.561106][ T7589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.645937][T26915] ip6gre6: entered allmulticast mode [ 346.661202][T26302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 346.685282][T26922] xt_TPROXY: Can be used only with -p tcp or -p udp [ 346.772833][T26302] veth0_vlan: entered promiscuous mode [ 346.790578][T26302] veth1_vlan: entered promiscuous mode [ 346.810822][T26922] wireguard0: entered promiscuous mode [ 346.842803][T26302] veth0_macvtap: entered promiscuous mode [ 346.854810][T26302] veth1_macvtap: entered promiscuous mode [ 346.861131][T26952] siw: device registration error -23 [ 346.882017][T26302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 346.898615][T26302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 346.911073][T26302] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.919976][T26302] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.928793][T26302] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.937599][T26302] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.061595][T26960] @: renamed from vlan0 (while UP) [ 347.372705][T27007] raw_sendmsg: syz.1.5989 forgot to set AF_INET. Fix it! [ 347.580645][T27045] FAULT_INJECTION: forcing a failure. [ 347.580645][T27045] name failslab, interval 1, probability 0, space 0, times 0 [ 347.593441][T27045] CPU: 1 UID: 0 PID: 27045 Comm: syz.0.5993 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 347.593528][T27045] Tainted: [W]=WARN [ 347.593535][T27045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 347.593547][T27045] Call Trace: [ 347.593554][T27045] [ 347.593563][T27045] __dump_stack+0x1d/0x30 [ 347.593585][T27045] dump_stack_lvl+0xe8/0x140 [ 347.593608][T27045] dump_stack+0x15/0x1b [ 347.593699][T27045] should_fail_ex+0x265/0x280 [ 347.593736][T27045] ? sctp_association_new+0x71/0x1200 [ 347.593832][T27045] should_failslab+0x8c/0xb0 [ 347.593858][T27045] __kmalloc_cache_noprof+0x4c/0x320 [ 347.593889][T27045] sctp_association_new+0x71/0x1200 [ 347.593926][T27045] ? sctp_has_association+0x7a/0xa0 [ 347.593981][T27045] ? sctp_v4_scope+0x140/0x150 [ 347.594002][T27045] sctp_connect_new_asoc+0x1a8/0x3a0 [ 347.594042][T27045] ? __rcu_read_unlock+0x4f/0x70 [ 347.594062][T27045] __sctp_connect+0x424/0x7a0 [ 347.594084][T27045] ? release_sock+0x116/0x150 [ 347.594110][T27045] sctp_inet_connect+0xe8/0x110 [ 347.594199][T27045] ? __pfx_sctp_inet_connect+0x10/0x10 [ 347.594219][T27045] __sys_connect+0x1ef/0x2b0 [ 347.594343][T27045] __x64_sys_connect+0x3f/0x50 [ 347.594433][T27045] x64_sys_call+0x1daa/0x2fb0 [ 347.594462][T27045] do_syscall_64+0xd2/0x200 [ 347.594491][T27045] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 347.594514][T27045] ? clear_bhb_loop+0x40/0x90 [ 347.594533][T27045] ? clear_bhb_loop+0x40/0x90 [ 347.594576][T27045] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.594624][T27045] RIP: 0033:0x7f903e83e929 [ 347.594637][T27045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.594653][T27045] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 347.594704][T27045] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 347.594716][T27045] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000004 [ 347.594726][T27045] RBP: 00007f903cea7090 R08: 0000000000000000 R09: 0000000000000000 [ 347.594737][T27045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.594748][T27045] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 347.594764][T27045] [ 347.868979][T27052] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5996'. [ 347.885184][T27052] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5996'. [ 347.898118][T27052] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5996'. [ 347.909790][T27055] xt_TPROXY: Can be used only with -p tcp or -p udp [ 347.971106][T27055] wireguard0: entered promiscuous mode [ 348.025036][T27069] siw: device registration error -23 [ 348.380249][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 348.380268][ T29] audit: type=1326 audit(2000000247.201:7118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.385966][T27091] FAULT_INJECTION: forcing a failure. [ 348.385966][T27091] name failslab, interval 1, probability 0, space 0, times 0 [ 348.387387][ T29] audit: type=1326 audit(2000000247.201:7119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.410123][T27091] CPU: 1 UID: 0 PID: 27091 Comm: syz.3.6003 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 348.410253][T27091] Tainted: [W]=WARN [ 348.410262][T27091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 348.410281][T27091] Call Trace: [ 348.410289][T27091] [ 348.410301][T27091] __dump_stack+0x1d/0x30 [ 348.410333][T27091] dump_stack_lvl+0xe8/0x140 [ 348.410379][T27091] dump_stack+0x15/0x1b [ 348.410404][T27091] should_fail_ex+0x265/0x280 [ 348.410520][T27091] should_failslab+0x8c/0xb0 [ 348.410552][T27091] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 348.410673][T27091] ? sidtab_sid2str_get+0xa0/0x130 [ 348.410708][T27091] kmemdup_noprof+0x2b/0x70 [ 348.410741][T27091] sidtab_sid2str_get+0xa0/0x130 [ 348.410833][T27091] security_sid_to_context_core+0x1eb/0x2e0 [ 348.410877][T27091] security_sid_to_context+0x27/0x40 [ 348.410907][T27091] selinux_lsmprop_to_secctx+0x67/0xf0 [ 348.410940][T27091] security_lsmprop_to_secctx+0x43/0x80 [ 348.411013][T27091] audit_log_task_context+0x77/0x190 [ 348.411058][T27091] audit_log_task+0xf4/0x250 [ 348.411156][T27091] audit_seccomp+0x61/0x100 [ 348.411193][T27091] ? __seccomp_filter+0x68c/0x10d0 [ 348.411224][T27091] __seccomp_filter+0x69d/0x10d0 [ 348.411341][T27091] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 348.411389][T27091] ? vfs_write+0x75e/0x8e0 [ 348.411433][T27091] ? __rcu_read_unlock+0x4f/0x70 [ 348.411531][T27091] ? __fget_files+0x184/0x1c0 [ 348.411563][T27091] __secure_computing+0x82/0x150 [ 348.411598][T27091] syscall_trace_enter+0xcf/0x1e0 [ 348.411642][T27091] do_syscall_64+0xac/0x200 [ 348.411750][T27091] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 348.411787][T27091] ? clear_bhb_loop+0x40/0x90 [ 348.411817][T27091] ? clear_bhb_loop+0x40/0x90 [ 348.411850][T27091] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.411974][T27091] RIP: 0033:0x7f81624be929 [ 348.411995][T27091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 348.412023][T27091] RSP: 002b:00007f8160b27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.412050][T27091] RAX: ffffffffffffffda RBX: 00007f81626e5fa0 RCX: 00007f81624be929 [ 348.412069][T27091] RDX: 0000200000000000 RSI: 00000000c0105512 RDI: 0000000000000007 [ 348.412087][T27091] RBP: 00007f8160b27090 R08: 0000000000000000 R09: 0000000000000000 [ 348.412137][T27091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 348.412155][T27091] R13: 0000000000000000 R14: 00007f81626e5fa0 R15: 00007ffe39e718a8 [ 348.412181][T27091] [ 348.412193][T27091] audit: error in audit_log_task_context [ 348.422822][ T29] audit: type=1326 audit(2000000247.201:7120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.461973][T27091] hub 9-0:1.0: USB hub found [ 348.464345][ T29] audit: type=1326 audit(2000000247.201:7121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.485366][T27091] hub 9-0:1.0: 8 ports detected [ 348.489718][ T29] audit: type=1326 audit(2000000247.201:7122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.489752][ T29] audit: type=1326 audit(2000000247.201:7123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f81624bd290 code=0x7ffc0000 [ 348.736861][T27098] sit0: entered promiscuous mode [ 348.736968][ T29] audit: type=1326 audit(2000000247.201:7124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.766117][T27098] netlink: 'syz.1.6004': attribute type 1 has an invalid length. [ 348.789277][ T29] audit: type=1326 audit(2000000247.201:7125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.812756][T27098] netlink: 1 bytes leftover after parsing attributes in process `syz.1.6004'. [ 348.881827][ T29] audit: type=1326 audit(2000000247.211:7126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27090 comm="syz.3.6003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f81624be929 code=0x7ffc0000 [ 348.986360][T27111] 9pnet_virtio: no channels available for device 127.0.0.1 [ 348.994567][T27111] netlink: 88 bytes leftover after parsing attributes in process `syz.1.6009'. [ 349.043063][T27120] FAULT_INJECTION: forcing a failure. [ 349.043063][T27120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.056290][T27120] CPU: 0 UID: 0 PID: 27120 Comm: syz.0.6012 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 349.056334][T27120] Tainted: [W]=WARN [ 349.056343][T27120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 349.056359][T27120] Call Trace: [ 349.056368][T27120] [ 349.056384][T27120] __dump_stack+0x1d/0x30 [ 349.056410][T27120] dump_stack_lvl+0xe8/0x140 [ 349.056435][T27120] dump_stack+0x15/0x1b [ 349.056456][T27120] should_fail_ex+0x265/0x280 [ 349.056531][T27120] should_fail+0xb/0x20 [ 349.056599][T27120] should_fail_usercopy+0x1a/0x20 [ 349.056636][T27120] _copy_from_user+0x1c/0xb0 [ 349.056655][T27120] ___sys_sendmsg+0xc1/0x1d0 [ 349.056769][T27120] __sys_sendmmsg+0x178/0x300 [ 349.056847][T27120] __x64_sys_sendmmsg+0x57/0x70 [ 349.056885][T27120] x64_sys_call+0x2f2f/0x2fb0 [ 349.056912][T27120] do_syscall_64+0xd2/0x200 [ 349.056995][T27120] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 349.057027][T27120] ? clear_bhb_loop+0x40/0x90 [ 349.057077][T27120] ? clear_bhb_loop+0x40/0x90 [ 349.057121][T27120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.057143][T27120] RIP: 0033:0x7f903e83e929 [ 349.057162][T27120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.057206][T27120] RSP: 002b:00007f903cea7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 349.057230][T27120] RAX: ffffffffffffffda RBX: 00007f903ea65fa0 RCX: 00007f903e83e929 [ 349.057248][T27120] RDX: 0000000000000002 RSI: 0000200000000940 RDI: 0000000000000003 [ 349.057313][T27120] RBP: 00007f903cea7090 R08: 0000000000000000 R09: 0000000000000000 [ 349.057341][T27120] R10: 000000002600c054 R11: 0000000000000246 R12: 0000000000000001 [ 349.057354][T27120] R13: 0000000000000000 R14: 00007f903ea65fa0 R15: 00007ffd3613b8b8 [ 349.057375][T27120] [ 349.148659][T27127] xt_TPROXY: Can be used only with -p tcp or -p udp [ 349.220318][T27128] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=27128 comm=syz.2.6016 [ 349.269016][T27128] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27128 comm=syz.2.6016 [ 349.286716][T27128] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6016'. [ 349.368081][T27130] wireguard0: entered promiscuous mode [ 349.417653][T27127] siw: device registration error -23 [ 349.480017][T27161] netlink: 'syz.0.6022': attribute type 7 has an invalid length. [ 350.342185][T27190] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=27190 comm=syz.4.6030 [ 350.354945][T27190] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27190 comm=syz.4.6030 [ 350.396660][T27180] netlink: 68 bytes leftover after parsing attributes in process `syz.1.6029'. [ 350.405265][T27190] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6030'. [ 350.630077][T27200] xt_TPROXY: Can be used only with -p tcp or -p udp [ 350.669495][T27176] Set syz1 is full, maxelem 65536 reached [ 350.809620][T27200] wireguard0: entered promiscuous mode [ 350.868405][T27218] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6036'. [ 350.980405][T27226] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6040'. [ 351.010494][T27226] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6040'. [ 351.052585][T27226] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6040'. [ 351.187406][T27251] FAULT_INJECTION: forcing a failure. [ 351.187406][T27251] name failslab, interval 1, probability 0, space 0, times 0 [ 351.200175][T27251] CPU: 0 UID: 0 PID: 27251 Comm: syz.3.6048 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 351.200271][T27251] Tainted: [W]=WARN [ 351.200280][T27251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 351.200346][T27251] Call Trace: [ 351.200352][T27251] [ 351.200360][T27251] __dump_stack+0x1d/0x30 [ 351.200481][T27251] dump_stack_lvl+0xe8/0x140 [ 351.200587][T27251] dump_stack+0x15/0x1b [ 351.200610][T27251] should_fail_ex+0x265/0x280 [ 351.200761][T27251] ? legacy_init_fs_context+0x31/0x80 [ 351.200804][T27251] should_failslab+0x8c/0xb0 [ 351.200833][T27251] __kmalloc_cache_noprof+0x4c/0x320 [ 351.200872][T27251] legacy_init_fs_context+0x31/0x80 [ 351.201014][T27251] alloc_fs_context+0x3ef/0x4e0 [ 351.201103][T27251] fs_context_for_mount+0x22/0x30 [ 351.201149][T27251] do_new_mount+0xe9/0x680 [ 351.201241][T27251] path_mount+0x4a4/0xb20 [ 351.201281][T27251] ? user_path_at+0x109/0x130 [ 351.201313][T27251] __se_sys_mount+0x28f/0x2e0 [ 351.201358][T27251] ? fput+0x8f/0xc0 [ 351.201391][T27251] __x64_sys_mount+0x67/0x80 [ 351.201432][T27251] x64_sys_call+0xd36/0x2fb0 [ 351.201516][T27251] do_syscall_64+0xd2/0x200 [ 351.201560][T27251] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 351.201626][T27251] ? clear_bhb_loop+0x40/0x90 [ 351.201652][T27251] ? clear_bhb_loop+0x40/0x90 [ 351.201681][T27251] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.201707][T27251] RIP: 0033:0x7f81624be929 [ 351.201728][T27251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.201801][T27251] RSP: 002b:00007f8160b27038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 351.201827][T27251] RAX: ffffffffffffffda RBX: 00007f81626e5fa0 RCX: 00007f81624be929 [ 351.201906][T27251] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 351.201919][T27251] RBP: 00007f8160b27090 R08: 0000200000000240 R09: 0000000000000000 [ 351.201931][T27251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 351.201944][T27251] R13: 0000000000000000 R14: 00007f81626e5fa0 R15: 00007ffe39e718a8 [ 351.201967][T27251] [ 352.074354][T27276] xt_TPROXY: Can be used only with -p tcp or -p udp [ 352.126280][T27276] siw: device registration error -23 [ 352.164249][T27284] ip6gre26: entered allmulticast mode [ 352.355226][T27306] lo speed is unknown, defaulting to 1000 [ 352.431634][T27306] netlink: 'syz.3.6062': attribute type 1 has an invalid length. [ 352.439573][T27306] netlink: 224 bytes leftover after parsing attributes in process `syz.3.6062'. [ 352.599828][T27337] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6065'. [ 352.620322][T27340] ip6gre27: entered allmulticast mode [ 352.903087][T27371] ip6gre7: entered allmulticast mode [ 353.105606][T27404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=27404 comm=syz.2.6071 [ 353.118532][T27404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27404 comm=syz.2.6071 [ 353.156944][T27409] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6071'. [ 353.247799][T27415] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6072'. [ 353.509048][T27472] FAULT_INJECTION: forcing a failure. [ 353.509048][T27472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.522218][T27472] CPU: 0 UID: 0 PID: 27472 Comm: syz.2.6080 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 353.522262][T27472] Tainted: [W]=WARN [ 353.522270][T27472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 353.522407][T27472] Call Trace: [ 353.522416][T27472] [ 353.522495][T27472] __dump_stack+0x1d/0x30 [ 353.522523][T27472] dump_stack_lvl+0xe8/0x140 [ 353.522544][T27472] dump_stack+0x15/0x1b [ 353.522562][T27472] should_fail_ex+0x265/0x280 [ 353.522610][T27472] should_fail+0xb/0x20 [ 353.522642][T27472] should_fail_usercopy+0x1a/0x20 [ 353.522716][T27472] _copy_from_user+0x1c/0xb0 [ 353.522744][T27472] __copy_msghdr+0x244/0x300 [ 353.522785][T27472] ___sys_sendmsg+0x109/0x1d0 [ 353.522852][T27472] __sys_sendmmsg+0x178/0x300 [ 353.522958][T27472] __x64_sys_sendmmsg+0x57/0x70 [ 353.522998][T27472] x64_sys_call+0x2f2f/0x2fb0 [ 353.523025][T27472] do_syscall_64+0xd2/0x200 [ 353.523101][T27472] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 353.523136][T27472] ? clear_bhb_loop+0x40/0x90 [ 353.523163][T27472] ? clear_bhb_loop+0x40/0x90 [ 353.523197][T27472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.523271][T27472] RIP: 0033:0x7f5d9018e929 [ 353.523289][T27472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.523313][T27472] RSP: 002b:00007f5d8e7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 353.523336][T27472] RAX: ffffffffffffffda RBX: 00007f5d903b5fa0 RCX: 00007f5d9018e929 [ 353.523352][T27472] RDX: 0000000000000003 RSI: 0000200000004540 RDI: 0000000000000003 [ 353.523367][T27472] RBP: 00007f5d8e7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 353.523382][T27472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.523398][T27472] R13: 0000000000000000 R14: 00007f5d903b5fa0 R15: 00007fff5d556d38 [ 353.523473][T27472] [ 353.754401][T27436] lo speed is unknown, defaulting to 1000 [ 353.806115][T27515] can0: slcan on ttyS3. [ 353.862069][T27515] can0 (unregistered): slcan off ttyS3. [ 353.903256][T27537] netlink: 'syz.3.6086': attribute type 7 has an invalid length. [ 353.905683][T27436] chnl_net:caif_netlink_parms(): no params data found [ 353.932942][T27614] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=27614 comm=syz.1.6087 [ 353.945588][T27614] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27614 comm=syz.1.6087 [ 354.026935][T27436] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.034207][T27436] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.060330][T27436] bridge_slave_0: entered allmulticast mode [ 354.069246][T27436] bridge_slave_0: entered promiscuous mode [ 354.089077][T27436] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.096373][T27436] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.104794][T27436] bridge_slave_1: entered allmulticast mode [ 354.114796][T27436] bridge_slave_1: entered promiscuous mode [ 354.165761][T27436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 354.187558][T27436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 354.192636][T27721] FAULT_INJECTION: forcing a failure. [ 354.192636][T27721] name failslab, interval 1, probability 0, space 0, times 0 [ 354.209343][T27721] CPU: 0 UID: 0 PID: 27721 Comm: syz.2.6097 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 354.209433][T27721] Tainted: [W]=WARN [ 354.209442][T27721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 354.209458][T27721] Call Trace: [ 354.209467][T27721] [ 354.209478][T27721] __dump_stack+0x1d/0x30 [ 354.209527][T27721] dump_stack_lvl+0xe8/0x140 [ 354.209553][T27721] dump_stack+0x15/0x1b [ 354.209574][T27721] should_fail_ex+0x265/0x280 [ 354.209613][T27721] should_failslab+0x8c/0xb0 [ 354.209702][T27721] __kmalloc_noprof+0xa5/0x3e0 [ 354.209734][T27721] ? iovec_from_user+0x84/0x210 [ 354.209812][T27721] iovec_from_user+0x84/0x210 [ 354.209842][T27721] __import_iovec+0xf3/0x540 [ 354.209913][T27721] ? mntput_no_expire+0x6f/0x3c0 [ 354.209951][T27721] import_iovec+0x61/0x80 [ 354.209972][T27721] ___sys_sendmsg+0x146/0x1d0 [ 354.210021][T27721] __sys_sendmmsg+0x178/0x300 [ 354.210179][T27721] __x64_sys_sendmmsg+0x57/0x70 [ 354.210218][T27721] x64_sys_call+0x2f2f/0x2fb0 [ 354.210247][T27721] do_syscall_64+0xd2/0x200 [ 354.210334][T27721] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 354.210368][T27721] ? clear_bhb_loop+0x40/0x90 [ 354.210394][T27721] ? clear_bhb_loop+0x40/0x90 [ 354.210423][T27721] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 354.210449][T27721] RIP: 0033:0x7f5d9018e929 [ 354.210487][T27721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.210586][T27721] RSP: 002b:00007f5d8e7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 354.210609][T27721] RAX: ffffffffffffffda RBX: 00007f5d903b5fa0 RCX: 00007f5d9018e929 [ 354.210658][T27721] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000003 [ 354.210674][T27721] RBP: 00007f5d8e7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 354.210729][T27721] R10: 0000000004001c00 R11: 0000000000000246 R12: 0000000000000001 [ 354.210745][T27721] R13: 0000000000000000 R14: 00007f5d903b5fa0 R15: 00007fff5d556d38 [ 354.210770][T27721] [ 354.437454][T27436] team0: Port device team_slave_0 added [ 354.444598][T27436] team0: Port device team_slave_1 added [ 354.467230][T27436] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 354.474308][T27436] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 354.500335][T27436] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 354.513959][T27436] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 354.520978][T27436] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 354.547407][T27436] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 354.655632][T27436] hsr_slave_0: entered promiscuous mode [ 354.669906][T27436] hsr_slave_1: entered promiscuous mode [ 354.683019][T27821] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=27821 comm=syz.1.6103 [ 354.693944][T27436] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 354.695777][T27821] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27821 comm=syz.1.6103 [ 354.721633][T27436] Cannot create hsr debugfs directory [ 354.744638][T27833] xt_TPROXY: Can be used only with -p tcp or -p udp [ 354.826430][T27833] wireguard0: entered promiscuous mode [ 354.879058][T27854] siw: device registration error -23 [ 354.989557][T27889] ip6gre15: entered allmulticast mode [ 355.064420][T27436] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.108945][T27933] xt_TPROXY: Can be used only with -p tcp or -p udp [ 355.134325][T27436] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.186549][T27948] netlink: 'syz.4.6112': attribute type 7 has an invalid length. [ 355.206632][T27436] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.308649][T27961] siw: device registration error -23 [ 355.583254][T27950] wireguard0: entered promiscuous mode [ 355.611907][T27436] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.651837][T27986] __nla_validate_parse: 8 callbacks suppressed [ 355.651858][T27986] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6116'. [ 355.674334][T27986] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6116'. [ 355.684568][T27986] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6116'. [ 355.717696][T27995] FAULT_INJECTION: forcing a failure. [ 355.717696][T27995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.730934][T27995] CPU: 1 UID: 0 PID: 27995 Comm: syz.1.6117 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 355.731028][T27995] Tainted: [W]=WARN [ 355.731037][T27995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 355.731053][T27995] Call Trace: [ 355.731060][T27995] [ 355.731069][T27995] __dump_stack+0x1d/0x30 [ 355.731135][T27995] dump_stack_lvl+0xe8/0x140 [ 355.731156][T27995] dump_stack+0x15/0x1b [ 355.731223][T27995] should_fail_ex+0x265/0x280 [ 355.731260][T27995] should_fail+0xb/0x20 [ 355.731341][T27995] should_fail_usercopy+0x1a/0x20 [ 355.731513][T27995] _copy_to_user+0x20/0xa0 [ 355.731588][T27995] simple_read_from_buffer+0xb5/0x130 [ 355.731626][T27995] proc_fail_nth_read+0x100/0x140 [ 355.731659][T27995] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 355.731707][T27995] vfs_read+0x1a0/0x6f0 [ 355.731753][T27995] ? __rcu_read_unlock+0x4f/0x70 [ 355.731774][T27995] ? __fget_files+0x184/0x1c0 [ 355.731798][T27995] ksys_read+0xda/0x1a0 [ 355.731844][T27995] __x64_sys_read+0x40/0x50 [ 355.731934][T27995] x64_sys_call+0x2d77/0x2fb0 [ 355.731961][T27995] do_syscall_64+0xd2/0x200 [ 355.732000][T27995] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 355.732032][T27995] ? clear_bhb_loop+0x40/0x90 [ 355.732083][T27995] ? clear_bhb_loop+0x40/0x90 [ 355.732105][T27995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 355.732129][T27995] RIP: 0033:0x7f099479d33c [ 355.732187][T27995] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 355.732269][T27995] RSP: 002b:00007f0992e07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 355.732291][T27995] RAX: ffffffffffffffda RBX: 00007f09949c5fa0 RCX: 00007f099479d33c [ 355.732304][T27995] RDX: 000000000000000f RSI: 00007f0992e070a0 RDI: 0000000000000003 [ 355.732316][T27995] RBP: 00007f0992e07090 R08: 0000000000000000 R09: 0000000000000000 [ 355.732327][T27995] R10: 0000000000000009 R11: 0000000000000246 R12: 0000000000000001 [ 355.732340][T27995] R13: 0000000000000001 R14: 00007f09949c5fa0 R15: 00007ffd516cbdb8 [ 355.732416][T27995] [ 355.991828][ T7605] bridge_slave_1: left allmulticast mode [ 355.997621][ T7605] bridge_slave_1: left promiscuous mode [ 356.003575][ T7605] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.029574][ T7605] bridge_slave_0: left allmulticast mode [ 356.035464][ T7605] bridge_slave_0: left promiscuous mode [ 356.041231][ T7605] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.058589][T28022] smc: net device bond0 erased user defined pnetid SYZ2 [ 356.215791][ T7605] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 356.225875][ T7605] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 356.236432][ T7605] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 356.245980][ T7605] bond0 (unregistering): Released all slaves [ 356.298097][T28047] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6120'. [ 356.335324][T28047] netlink: 'syz.3.6120': attribute type 3 has an invalid length. [ 356.343238][T28047] netlink: 1 bytes leftover after parsing attributes in process `syz.3.6120'. [ 356.357712][T28035] wireguard0: entered promiscuous mode [ 356.374962][T28057] xt_TPROXY: Can be used only with -p tcp or -p udp [ 356.464697][ T7605] hsr_slave_0: left promiscuous mode [ 356.470724][ T7605] hsr_slave_1: left promiscuous mode [ 356.483152][ T7605] veth1_macvtap: left promiscuous mode [ 356.488834][ T7605] veth0_macvtap: left promiscuous mode [ 356.497671][T28064] netlink: 'syz.2.6125': attribute type 7 has an invalid length. [ 356.670467][ T7605] veth1_vlan: left promiscuous mode [ 356.675842][ T7605] veth0_vlan: left promiscuous mode [ 356.784244][ T7605] team0 (unregistering): Port device team_slave_1 removed [ 356.876431][ T7605] team0 (unregistering): Port device team_slave_0 removed [ 356.945826][T28057] wireguard0: entered promiscuous mode [ 357.018358][T27436] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 357.034251][T27436] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 357.053287][T28082] netlink: 'syz.3.6126': attribute type 6 has an invalid length. [ 357.054721][T27436] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 357.078141][T27436] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 357.108548][T28082] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 357.119744][T28082] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 357.187924][T27436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.238448][T27436] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.252472][T28115] xt_TPROXY: Can be used only with -p tcp or -p udp [ 357.260566][T28114] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=28114 comm=syz.4.6132 [ 357.273251][T28114] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28114 comm=syz.4.6132 [ 357.285533][T27436] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 357.296111][T27436] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 357.315702][ T7593] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.323018][ T7593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.332483][ T7593] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.339590][ T7593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.366674][T28114] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6132'. [ 357.410188][T28115] wireguard0: entered promiscuous mode [ 357.433836][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 357.433855][ T29] audit: type=1326 audit(2000000256.266:7227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.465523][T28133] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6133'. [ 357.484645][T28125] siw: device registration error -23 [ 357.490096][ T29] audit: type=1326 audit(2000000256.266:7228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.513775][ T29] audit: type=1326 audit(2000000256.266:7229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.537373][ T29] audit: type=1326 audit(2000000256.266:7230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.560937][ T29] audit: type=1326 audit(2000000256.266:7231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.584562][ T29] audit: type=1326 audit(2000000256.266:7232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.608087][ T29] audit: type=1326 audit(2000000256.266:7233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.631693][ T29] audit: type=1326 audit(2000000256.266:7234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.640349][T28137] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6135'. [ 357.655251][ T29] audit: type=1326 audit(2000000256.296:7235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.655332][ T29] audit: type=1326 audit(2000000256.296:7236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28131 comm="syz.4.6136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff42760e929 code=0x7ffc0000 [ 357.789223][T27436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.807068][T28168] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6137'. [ 357.896369][T28182] FAULT_INJECTION: forcing a failure. [ 357.896369][T28182] name failslab, interval 1, probability 0, space 0, times 0 [ 357.901058][T27436] veth0_vlan: entered promiscuous mode [ 357.909077][T28182] CPU: 0 UID: 0 PID: 28182 Comm: syz.4.6139 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 357.909183][T28182] Tainted: [W]=WARN [ 357.909193][T28182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 357.909278][T28182] Call Trace: [ 357.909287][T28182] [ 357.909297][T28182] __dump_stack+0x1d/0x30 [ 357.909326][T28182] dump_stack_lvl+0xe8/0x140 [ 357.909421][T28182] dump_stack+0x15/0x1b [ 357.909445][T28182] should_fail_ex+0x265/0x280 [ 357.909487][T28182] should_failslab+0x8c/0xb0 [ 357.909609][T28182] kmem_cache_alloc_node_noprof+0x57/0x320 [ 357.909656][T28182] ? __alloc_skb+0x101/0x320 [ 357.909697][T28182] __alloc_skb+0x101/0x320 [ 357.909741][T28182] netlink_alloc_large_skb+0xba/0xf0 [ 357.909840][T28182] netlink_sendmsg+0x3cf/0x6b0 [ 357.909971][T28182] ? __pfx_netlink_sendmsg+0x10/0x10 [ 357.910021][T28182] __sock_sendmsg+0x142/0x180 [ 357.910055][T28182] ____sys_sendmsg+0x31e/0x4e0 [ 357.910135][T28182] ___sys_sendmsg+0x17b/0x1d0 [ 357.910298][T28182] __x64_sys_sendmsg+0xd4/0x160 [ 357.910406][T28182] x64_sys_call+0x2999/0x2fb0 [ 357.910490][T28182] do_syscall_64+0xd2/0x200 [ 357.910536][T28182] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 357.910575][T28182] ? clear_bhb_loop+0x40/0x90 [ 357.910674][T28182] ? clear_bhb_loop+0x40/0x90 [ 357.910704][T28182] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 357.910735][T28182] RIP: 0033:0x7ff42760e929 [ 357.910760][T28182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 357.910786][T28182] RSP: 002b:00007ff425c77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.910812][T28182] RAX: ffffffffffffffda RBX: 00007ff427835fa0 RCX: 00007ff42760e929 [ 357.910830][T28182] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 357.910847][T28182] RBP: 00007ff425c77090 R08: 0000000000000000 R09: 0000000000000000 [ 357.910864][T28182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.910879][T28182] R13: 0000000000000000 R14: 00007ff427835fa0 R15: 00007ffdadb56d68 [ 357.910978][T28182] [ 358.132574][T27436] veth1_vlan: entered promiscuous mode [ 358.139460][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x4 [ 358.147242][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x2 [ 358.168853][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.176688][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.184533][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.192264][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.199970][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.201325][T27436] veth0_macvtap: entered promiscuous mode [ 358.207632][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.221474][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.229182][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.232657][T27436] veth1_macvtap: entered promiscuous mode [ 358.236939][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.250380][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.258076][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.265812][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.268868][T27436] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 358.273516][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.273553][ T3388] hid-generic 0000:3000000:0000.0028: unknown main item tag 0x0 [ 358.299008][T28194] xt_TPROXY: Can be used only with -p tcp or -p udp [ 358.313439][ T3388] hid-generic 0000:3000000:0000.0028: hidraw0: HID v0.00 Device [sy] on syz0 [ 358.332196][T27436] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 358.359189][T28194] wireguard0: entered promiscuous mode [ 358.387981][T28212] FAULT_INJECTION: forcing a failure. [ 358.387981][T28212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 358.390456][T28200] fido_id[28200]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 358.401188][T28212] CPU: 0 UID: 0 PID: 28212 Comm: syz.3.6147 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 358.401297][T28212] Tainted: [W]=WARN [ 358.401306][T28212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 358.401326][T28212] Call Trace: [ 358.401336][T28212] [ 358.401346][T28212] __dump_stack+0x1d/0x30 [ 358.401379][T28212] dump_stack_lvl+0xe8/0x140 [ 358.401406][T28212] dump_stack+0x15/0x1b [ 358.401428][T28212] should_fail_ex+0x265/0x280 [ 358.401470][T28212] should_fail+0xb/0x20 [ 358.401587][T28212] should_fail_usercopy+0x1a/0x20 [ 358.401692][T28212] _copy_from_user+0x1c/0xb0 [ 358.401722][T28212] sctp_setsockopt+0x154/0xe30 [ 358.401821][T28212] sock_common_setsockopt+0x69/0x80 [ 358.401856][T28212] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 358.401891][T28212] __sys_setsockopt+0x184/0x200 [ 358.401977][T28212] __x64_sys_setsockopt+0x64/0x80 [ 358.402020][T28212] x64_sys_call+0x2bd5/0x2fb0 [ 358.402052][T28212] do_syscall_64+0xd2/0x200 [ 358.402137][T28212] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 358.402179][T28212] ? clear_bhb_loop+0x40/0x90 [ 358.402280][T28212] ? clear_bhb_loop+0x40/0x90 [ 358.402313][T28212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 358.402343][T28212] RIP: 0033:0x7f81624be929 [ 358.402366][T28212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 358.402391][T28212] RSP: 002b:00007f8160b27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 358.402435][T28212] RAX: ffffffffffffffda RBX: 00007f81626e5fa0 RCX: 00007f81624be929 [ 358.402454][T28212] RDX: 0000000000000025 RSI: 0000000000000084 RDI: 0000000000000004 [ 358.402472][T28212] RBP: 00007f8160b27090 R08: 0000000020000010 R09: 0000000000000000 [ 358.402490][T28212] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 358.402508][T28212] R13: 0000000000000000 R14: 00007f81626e5fa0 R15: 00007ffe39e718a8 [ 358.402534][T28212] [ 358.639868][T27436] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.648640][T27436] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.657409][T27436] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.666167][T27436] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.812529][T28246] xt_TPROXY: Can be used only with -p tcp or -p udp [ 359.054541][T28246] wireguard0: entered promiscuous mode [ 359.080433][T28266] siw: device registration error -23 [ 359.342841][T28244] Set syz1 is full, maxelem 65536 reached [ 359.527240][T28286] FAULT_INJECTION: forcing a failure. [ 359.527240][T28286] name failslab, interval 1, probability 0, space 0, times 0 [ 359.540242][T28286] CPU: 1 UID: 0 PID: 28286 Comm: syz.0.6161 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 359.540279][T28286] Tainted: [W]=WARN [ 359.540287][T28286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 359.540304][T28286] Call Trace: [ 359.540313][T28286] [ 359.540322][T28286] __dump_stack+0x1d/0x30 [ 359.540345][T28286] dump_stack_lvl+0xe8/0x140 [ 359.540430][T28286] dump_stack+0x15/0x1b [ 359.540483][T28286] should_fail_ex+0x265/0x280 [ 359.540555][T28286] should_failslab+0x8c/0xb0 [ 359.540584][T28286] __kmalloc_noprof+0xa5/0x3e0 [ 359.540611][T28286] ? security_sk_alloc+0x52/0x120 [ 359.540678][T28286] security_sk_alloc+0x52/0x120 [ 359.540749][T28286] sk_prot_alloc+0xc2/0x190 [ 359.540780][T28286] sk_alloc+0x34/0x360 [ 359.540814][T28286] inet6_create+0x3bd/0x870 [ 359.540836][T28286] __sock_create+0x2ec/0x5b0 [ 359.540887][T28286] sock_create_kern+0x38/0x50 [ 359.540916][T28286] mptcp_subflow_create_socket+0x84/0x630 [ 359.540951][T28286] ? avc_has_perm_noaudit+0x1b1/0x200 [ 359.540987][T28286] __mptcp_nmpc_sk+0xb3/0x3b0 [ 359.541044][T28286] mptcp_connect+0x58/0x7e0 [ 359.541068][T28286] __inet_stream_connect+0x166/0x7e0 [ 359.541100][T28286] ? _raw_spin_unlock_bh+0x36/0x40 [ 359.541122][T28286] ? release_sock+0x116/0x150 [ 359.541150][T28286] ? _raw_spin_unlock_bh+0x36/0x40 [ 359.541253][T28286] ? lock_sock_nested+0x112/0x140 [ 359.541278][T28286] ? selinux_netlbl_socket_connect+0x115/0x130 [ 359.541315][T28286] inet_stream_connect+0x44/0x70 [ 359.541422][T28286] ? __pfx_inet_stream_connect+0x10/0x10 [ 359.541456][T28286] __sys_connect+0x1ef/0x2b0 [ 359.541566][T28286] __x64_sys_connect+0x3f/0x50 [ 359.541686][T28286] x64_sys_call+0x1daa/0x2fb0 [ 359.541707][T28286] do_syscall_64+0xd2/0x200 [ 359.541745][T28286] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 359.541857][T28286] ? clear_bhb_loop+0x40/0x90 [ 359.541883][T28286] ? clear_bhb_loop+0x40/0x90 [ 359.541905][T28286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.541998][T28286] RIP: 0033:0x7fa196d9e929 [ 359.542016][T28286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.542040][T28286] RSP: 002b:00007fa195407038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 359.542063][T28286] RAX: ffffffffffffffda RBX: 00007fa196fc5fa0 RCX: 00007fa196d9e929 [ 359.542077][T28286] RDX: 000000000000001c RSI: 0000200000000180 RDI: 0000000000000003 [ 359.542089][T28286] RBP: 00007fa195407090 R08: 0000000000000000 R09: 0000000000000000 [ 359.542131][T28286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.542210][T28286] R13: 0000000000000000 R14: 00007fa196fc5fa0 R15: 00007fffbc834598 [ 359.542230][T28286] [ 359.989111][T28307] FAULT_INJECTION: forcing a failure. [ 359.989111][T28307] name failslab, interval 1, probability 0, space 0, times 0 [ 360.001905][T28307] CPU: 1 UID: 0 PID: 28307 Comm: syz.0.6167 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 360.001943][T28307] Tainted: [W]=WARN [ 360.001949][T28307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 360.001962][T28307] Call Trace: [ 360.001967][T28307] [ 360.001974][T28307] __dump_stack+0x1d/0x30 [ 360.001994][T28307] dump_stack_lvl+0xe8/0x140 [ 360.002083][T28307] dump_stack+0x15/0x1b [ 360.002175][T28307] should_fail_ex+0x265/0x280 [ 360.002213][T28307] should_failslab+0x8c/0xb0 [ 360.002259][T28307] kmem_cache_alloc_noprof+0x50/0x310 [ 360.002291][T28307] ? getname_flags+0x80/0x3b0 [ 360.002350][T28307] getname_flags+0x80/0x3b0 [ 360.002373][T28307] __x64_sys_symlinkat+0x4d/0x70 [ 360.002409][T28307] x64_sys_call+0x1558/0x2fb0 [ 360.002443][T28307] do_syscall_64+0xd2/0x200 [ 360.002605][T28307] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 360.002633][T28307] ? clear_bhb_loop+0x40/0x90 [ 360.002659][T28307] ? clear_bhb_loop+0x40/0x90 [ 360.002686][T28307] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.002766][T28307] RIP: 0033:0x7fa196d9e929 [ 360.002788][T28307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.002812][T28307] RSP: 002b:00007fa195407038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 360.002834][T28307] RAX: ffffffffffffffda RBX: 00007fa196fc5fa0 RCX: 00007fa196d9e929 [ 360.002913][T28307] RDX: 0000200000000640 RSI: ffffffffffffff9c RDI: 0000200000001040 [ 360.002925][T28307] RBP: 00007fa195407090 R08: 0000000000000000 R09: 0000000000000000 [ 360.002938][T28307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.002950][T28307] R13: 0000000000000000 R14: 00007fa196fc5fa0 R15: 00007fffbc834598 [ 360.002970][T28307] [ 360.003352][T28308] xt_TPROXY: Can be used only with -p tcp or -p udp [ 360.196798][T28318] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6170'. [ 360.232184][T28312] wireguard0: entered promiscuous mode [ 360.244089][T28311] siw: device registration error -23 [ 360.274012][T28321] lo speed is unknown, defaulting to 1000 [ 360.420504][T28372] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.440241][T28386] xt_TPROXY: Can be used only with -p tcp or -p udp [ 360.484312][T28372] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.572432][T28386] wireguard0: entered promiscuous mode [ 360.619259][T28401] siw: device registration error -23 [ 360.635261][T28422] FAULT_INJECTION: forcing a failure. [ 360.635261][T28422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.648608][T28422] CPU: 0 UID: 0 PID: 28422 Comm: syz.0.6179 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 360.648669][T28422] Tainted: [W]=WARN [ 360.648676][T28422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 360.648692][T28422] Call Trace: [ 360.648698][T28422] [ 360.648707][T28422] __dump_stack+0x1d/0x30 [ 360.648733][T28422] dump_stack_lvl+0xe8/0x140 [ 360.648768][T28422] dump_stack+0x15/0x1b [ 360.648785][T28422] should_fail_ex+0x265/0x280 [ 360.648853][T28422] should_fail+0xb/0x20 [ 360.649008][T28422] should_fail_usercopy+0x1a/0x20 [ 360.649068][T28422] _copy_from_user+0x1c/0xb0 [ 360.649092][T28422] ___sys_sendmsg+0xc1/0x1d0 [ 360.649171][T28422] __x64_sys_sendmsg+0xd4/0x160 [ 360.649265][T28422] x64_sys_call+0x2999/0x2fb0 [ 360.649288][T28422] do_syscall_64+0xd2/0x200 [ 360.649324][T28422] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 360.649352][T28422] ? clear_bhb_loop+0x40/0x90 [ 360.649450][T28422] ? clear_bhb_loop+0x40/0x90 [ 360.649489][T28422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.649511][T28422] RIP: 0033:0x7fa196d9e929 [ 360.649529][T28422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.649551][T28422] RSP: 002b:00007fa195407038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.649574][T28422] RAX: ffffffffffffffda RBX: 00007fa196fc5fa0 RCX: 00007fa196d9e929 [ 360.649595][T28422] RDX: 0000000004000800 RSI: 00002000000002c0 RDI: 0000000000000006 [ 360.649628][T28422] RBP: 00007fa195407090 R08: 0000000000000000 R09: 0000000000000000 [ 360.649640][T28422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.649651][T28422] R13: 0000000000000000 R14: 00007fa196fc5fa0 R15: 00007fffbc834598 [ 360.649671][T28422] [ 360.868555][T28426] __nla_validate_parse: 1 callbacks suppressed [ 360.868574][T28426] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6182'. [ 360.884473][T28424] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6180'. [ 360.901638][T28372] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.932756][T28424] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6180'. [ 360.951918][T28372] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.968150][T28424] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6180'. [ 361.062106][T28442] lo speed is unknown, defaulting to 1000 [ 361.080089][T28372] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.153395][T28372] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.181248][T28372] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.235401][T28372] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.269351][T28507] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=28507 comm=syz.1.6191 [ 361.282117][T28507] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28507 comm=syz.1.6191 [ 361.317944][T28512] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6193'. [ 361.451389][T28514] Invalid option length (1045493) for dns_resolver key [ 361.495043][T28514] Invalid option length (1045493) for dns_resolver key [ 361.510159][T28528] FAULT_INJECTION: forcing a failure. [ 361.510159][T28528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.523296][T28528] CPU: 1 UID: 0 PID: 28528 Comm: syz.2.6199 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 361.523340][T28528] Tainted: [W]=WARN [ 361.523347][T28528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 361.523360][T28528] Call Trace: [ 361.523368][T28528] [ 361.523378][T28528] __dump_stack+0x1d/0x30 [ 361.523416][T28528] dump_stack_lvl+0xe8/0x140 [ 361.523529][T28528] dump_stack+0x15/0x1b [ 361.523545][T28528] should_fail_ex+0x265/0x280 [ 361.523615][T28528] should_fail+0xb/0x20 [ 361.523726][T28528] should_fail_usercopy+0x1a/0x20 [ 361.523759][T28528] strncpy_from_user+0x25/0x230 [ 361.523876][T28528] ? kmem_cache_alloc_noprof+0x186/0x310 [ 361.523910][T28528] ? getname_flags+0x80/0x3b0 [ 361.523936][T28528] getname_flags+0xae/0x3b0 [ 361.523959][T28528] user_path_at+0x28/0x130 [ 361.523986][T28528] do_utimes+0xd9/0x210 [ 361.524081][T28528] __x64_sys_utime+0xbc/0x140 [ 361.524103][T28528] x64_sys_call+0x2e1c/0x2fb0 [ 361.524128][T28528] do_syscall_64+0xd2/0x200 [ 361.524206][T28528] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 361.524308][T28528] ? clear_bhb_loop+0x40/0x90 [ 361.524334][T28528] ? clear_bhb_loop+0x40/0x90 [ 361.524363][T28528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.524389][T28528] RIP: 0033:0x7f5d9018e929 [ 361.524404][T28528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.524543][T28528] RSP: 002b:00007f5d8e7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000084 [ 361.524563][T28528] RAX: ffffffffffffffda RBX: 00007f5d903b5fa0 RCX: 00007f5d9018e929 [ 361.524576][T28528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 361.524588][T28528] RBP: 00007f5d8e7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 361.524663][T28528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.524675][T28528] R13: 0000000000000000 R14: 00007f5d903b5fa0 R15: 00007fff5d556d38 [ 361.524699][T28528] [ 361.540809][T28514] Invalid option length (1045493) for dns_resolver key [ 361.768766][T28545] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.778031][T28545] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.785171][T28545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.803456][T28554] FAULT_INJECTION: forcing a failure. [ 361.803456][T28554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.816604][T28554] CPU: 0 UID: 0 PID: 28554 Comm: syz.0.6205 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 361.816707][T28554] Tainted: [W]=WARN [ 361.816715][T28554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 361.816732][T28554] Call Trace: [ 361.816740][T28554] [ 361.816749][T28554] __dump_stack+0x1d/0x30 [ 361.816777][T28554] dump_stack_lvl+0xe8/0x140 [ 361.816866][T28554] dump_stack+0x15/0x1b [ 361.816887][T28554] should_fail_ex+0x265/0x280 [ 361.816956][T28554] should_fail+0xb/0x20 [ 361.816988][T28554] should_fail_usercopy+0x1a/0x20 [ 361.817027][T28554] _copy_from_user+0x1c/0xb0 [ 361.817051][T28554] ___sys_sendmsg+0xc1/0x1d0 [ 361.817187][T28554] __x64_sys_sendmsg+0xd4/0x160 [ 361.817232][T28554] x64_sys_call+0x2999/0x2fb0 [ 361.817259][T28554] do_syscall_64+0xd2/0x200 [ 361.817358][T28554] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 361.817391][T28554] ? clear_bhb_loop+0x40/0x90 [ 361.817417][T28554] ? clear_bhb_loop+0x40/0x90 [ 361.817486][T28554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.817551][T28554] RIP: 0033:0x7fa196d9e929 [ 361.817569][T28554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.817592][T28554] RSP: 002b:00007fa195407038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.817616][T28554] RAX: ffffffffffffffda RBX: 00007fa196fc5fa0 RCX: 00007fa196d9e929 [ 361.817668][T28554] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000005 [ 361.817683][T28554] RBP: 00007fa195407090 R08: 0000000000000000 R09: 0000000000000000 [ 361.817709][T28554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.817724][T28554] R13: 0000000000000000 R14: 00007fa196fc5fa0 R15: 00007fffbc834598 [ 361.817748][T28554] [ 361.838778][T28545] netlink: 'syz.1.6202': attribute type 16 has an invalid length. [ 362.007898][T28545] netlink: 'syz.1.6202': attribute type 17 has an invalid length. [ 362.023679][T28545] 0ªX¹¦D: left allmulticast mode [ 362.034223][T28545] sit0: left promiscuous mode [ 362.085417][T28545] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 362.101773][ T36] lo speed is unknown, defaulting to 1000 [ 362.286707][T28601] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=28601 comm=syz.1.6216 [ 362.299380][T28601] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28601 comm=syz.1.6216 [ 362.483319][T28605] lo speed is unknown, defaulting to 1000 [ 362.555865][T28605] chnl_net:caif_netlink_parms(): no params data found [ 362.572267][ T7593] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.616260][ T7593] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.629495][T28605] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.632660][T28627] hub 6-0:1.0: USB hub found [ 362.636588][T28605] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.638589][T28605] bridge_slave_0: entered allmulticast mode [ 362.641974][T28627] hub 6-0:1.0: 8 ports detected [ 362.650500][T28605] bridge_slave_0: entered promiscuous mode [ 362.668619][T28605] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.675949][T28605] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.677974][T28627] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6217'. [ 362.683311][T28605] bridge_slave_1: entered allmulticast mode [ 362.699292][T28605] bridge_slave_1: entered promiscuous mode [ 362.732603][T28605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 362.747448][ T7593] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.764067][T28605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 362.785471][T28810] ip6gre8: entered allmulticast mode [ 362.804779][T28605] team0: Port device team_slave_0 added [ 362.813348][T28605] team0: Port device team_slave_1 added [ 362.832095][ T7593] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.873332][T28605] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 362.880558][T28605] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 362.906660][T28605] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 362.949957][T28605] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 362.957019][T28605] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 362.983257][T28605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 363.002494][T28896] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6220'. [ 363.004026][ T7593] bridge_slave_0: left allmulticast mode [ 363.017437][ T7593] bridge_slave_0: left promiscuous mode [ 363.022029][ T36] IPVS: starting estimator thread 0... [ 363.023183][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.036136][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 363.036152][ T29] audit: type=1326 audit(2000000261.869:7271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.065852][ T29] audit: type=1326 audit(2000000261.869:7272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.089648][ T29] audit: type=1326 audit(2000000261.869:7273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.113712][ T29] audit: type=1326 audit(2000000261.869:7274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.117183][T28904] IPVS: using max 2304 ests per chain, 115200 per kthread [ 363.137357][ T29] audit: type=1326 audit(2000000261.869:7275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.137420][ T29] audit: type=1326 audit(2000000261.869:7276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.191701][ T29] audit: type=1326 audit(2000000261.869:7277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.215273][ T29] audit: type=1326 audit(2000000261.869:7278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.238921][ T29] audit: type=1326 audit(2000000261.869:7279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.262545][ T29] audit: type=1326 audit(2000000261.869:7280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28865 comm="syz.0.6220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa196d9e929 code=0x7ffc0000 [ 363.479531][ T7593] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 363.492148][ T7593] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 363.502868][ T7593] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 363.512005][ T7593] bond0 (unregistering): Released all slaves [ 363.521658][ T7593] bond1 (unregistering): Released all slaves [ 363.533900][T28874] lo speed is unknown, defaulting to 1000 [ 363.585927][ T7593] hsr_slave_0: left promiscuous mode [ 363.593056][ T7602] ================================================================== [ 363.601177][ T7602] BUG: KCSAN: data-race in alloc_pid / copy_process [ 363.607781][ T7602] [ 363.610110][ T7602] read-write to 0xffffffff868608e0 of 4 bytes by task 7607 on cpu 0: [ 363.618183][ T7602] alloc_pid+0x539/0x720 [ 363.622437][ T7602] copy_process+0xe0e/0x1f90 [ 363.627048][ T7602] kernel_clone+0x16c/0x5b0 [ 363.631571][ T7602] user_mode_thread+0x7d/0xb0 [ 363.636291][ T7602] call_usermodehelper_exec_work+0x7a/0x160 [ 363.642226][ T7602] process_scheduled_works+0x4cb/0x9d0 [ 363.647726][ T7602] worker_thread+0x582/0x770 [ 363.652337][ T7602] kthread+0x489/0x510 [ 363.656418][ T7602] ret_from_fork+0xda/0x150 [ 363.660933][ T7602] ret_from_fork_asm+0x1a/0x30 [ 363.665715][ T7602] [ 363.668049][ T7602] read to 0xffffffff868608e0 of 4 bytes by task 7602 on cpu 1: [ 363.675598][ T7602] copy_process+0x1790/0x1f90 [ 363.680291][ T7602] kernel_clone+0x16c/0x5b0 [ 363.684818][ T7602] user_mode_thread+0x7d/0xb0 [ 363.689511][ T7602] call_usermodehelper_exec_work+0x7a/0x160 [ 363.695432][ T7602] process_scheduled_works+0x4cb/0x9d0 [ 363.700913][ T7602] worker_thread+0x582/0x770 [ 363.705522][ T7602] kthread+0x489/0x510 [ 363.709608][ T7602] ret_from_fork+0xda/0x150 [ 363.714119][ T7602] ret_from_fork_asm+0x1a/0x30 [ 363.718899][ T7602] [ 363.721226][ T7602] value changed: 0x80000101 -> 0x80000102 [ 363.726949][ T7602] [ 363.729274][ T7602] Reported by Kernel Concurrency Sanitizer on: [ 363.735434][ T7602] CPU: 1 UID: 0 PID: 7602 Comm: kworker/u8:39 Tainted: G W 6.16.0-rc5-syzkaller-00025-gd006330be3f7 #0 PREEMPT(voluntary) [ 363.749685][ T7602] Tainted: [W]=WARN [ 363.753492][ T7602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 363.763569][ T7602] Workqueue: events_unbound call_usermodehelper_exec_work [ 363.770712][ T7602] ================================================================== SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 363.854682][ T7593] hsr_slave_1: left promiscuous mode [ 363.863800][ T7593] veth1_macvtap: left promiscuous mode [ 363.870141][ T7593] veth0_macvtap: left promiscuous mode [ 364.034435][ T7593] team0 (unregistering): Port device team_slave_1 removed [ 364.044071][ T7593] team0 (unregistering): Port device team_slave_0 removed [ 364.092588][ T3388] infiniband syz1: ib_query_port failed (-19) [ 364.492660][ T7593] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.540221][ T7593] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.639176][ T7593] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.710876][ T7593] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.763643][ T7593] bridge_slave_1: left allmulticast mode [ 364.769421][ T7593] bridge_slave_1: left promiscuous mode [ 364.775161][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.782864][ T7593] bridge_slave_0: left allmulticast mode [ 364.788644][ T7593] bridge_slave_0: left promiscuous mode [ 364.794296][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.802423][ T7593] bridge_slave_1: left allmulticast mode [ 364.808233][ T7593] bridge_slave_1: left promiscuous mode [ 364.813912][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.821884][ T7593] bridge_slave_0: left allmulticast mode [ 364.827584][ T7593] bridge_slave_0: left promiscuous mode [ 364.833257][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.899457][ T7593] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 364.909429][ T7593] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 364.918714][ T7593] bond0 (unregistering): Released all slaves [ 364.978480][ T7593] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 364.988571][ T7593] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 364.997920][ T7593] bond0 (unregistering): Released all slaves [ 365.088781][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 365.096492][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 365.105925][ T7593] hsr_slave_0: left promiscuous mode [ 365.111774][ T7593] hsr_slave_1: left promiscuous mode [ 365.117482][ T7593] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 365.124891][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 365.132480][ T7593] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 365.139938][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 365.150399][ T7593] veth1_macvtap: left promiscuous mode [ 365.155881][ T7593] veth0_macvtap: left promiscuous mode [ 365.161513][ T7593] veth1_vlan: left promiscuous mode [ 365.166812][ T7593] veth0_vlan: left promiscuous mode [ 365.214308][ T7593] team0 (unregistering): Port device team_slave_1 removed [ 365.223890][ T7593] team0 (unregistering): Port device team_slave_0 removed [ 365.276251][ T7593] team0 (unregistering): Port device team_slave_1 removed [ 365.285389][ T7593] team0 (unregistering): Port device team_slave_0 removed [ 365.818804][ T7593] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.868571][ T7593] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.948391][ T7593] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.999205][ T7593] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.064352][ T7593] bridge_slave_1: left allmulticast mode [ 366.070107][ T7593] bridge_slave_1: left promiscuous mode [ 366.075876][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.083565][ T7593] bridge_slave_0: left allmulticast mode [ 366.089394][ T7593] bridge_slave_0: left promiscuous mode [ 366.095151][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.167815][ T7593] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 366.177916][ T7593] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 366.187425][ T7593] bond0 (unregistering): Released all slaves [ 366.239478][ T7593] hsr_slave_0: left promiscuous mode [ 366.245207][ T7593] hsr_slave_1: left promiscuous mode [ 366.250948][ T7593] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 366.258411][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 366.266081][ T7593] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 366.273565][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 366.283626][ T7593] veth1_macvtap: left promiscuous mode [ 366.289165][ T7593] veth0_macvtap: left promiscuous mode [ 366.294754][ T7593] veth1_vlan: left promiscuous mode [ 366.300031][ T7593] veth0_vlan: left promiscuous mode [ 366.361583][ T7593] team0 (unregistering): Port device team_slave_1 removed [ 366.374468][ T7593] team0 (unregistering): Port device team_slave_0 removed [ 366.647845][ T7593] IPVS: stop unused estimator thread 0... [ 366.708455][ T7593] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.766967][ T7593] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.836753][ T7593] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.886756][ T7593] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.954844][ T7593] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.997647][ T7593] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.047623][ T7593] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.087791][ T7593] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.142962][ T7593] bridge_slave_1: left allmulticast mode [ 367.148674][ T7593] bridge_slave_1: left promiscuous mode [ 367.154427][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.162306][ T7593] bridge_slave_0: left allmulticast mode [ 367.168002][ T7593] bridge_slave_0: left promiscuous mode [ 367.173740][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.181862][ T7593] bond0: left allmulticast mode [ 367.186810][ T7593] bond_slave_0: left allmulticast mode [ 367.192299][ T7593] bond_slave_1: left allmulticast mode [ 367.197855][ T7593] dummy0: left allmulticast mode [ 367.202884][ T7593] bond0: left promiscuous mode [ 367.207755][ T7593] bond_slave_0: left promiscuous mode [ 367.213272][ T7593] bond_slave_1: left promiscuous mode [ 367.218777][ T7593] dummy0: left promiscuous mode [ 367.223869][ T7593] bridge0: port 3(bond0) entered disabled state [ 367.230773][ T7593] bridge_slave_1: left allmulticast mode [ 367.236541][ T7593] bridge_slave_1: left promiscuous mode [ 367.242317][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.250215][ T7593] bridge_slave_0: left promiscuous mode [ 367.255964][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.407926][ T7593] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 367.417637][ T7593] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 367.427724][ T7593] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 367.436785][ T7593] bond0 (unregistering): Released all slaves [ 367.496876][ T7593] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 367.506616][ T7593] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 367.516477][ T7593] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 367.524957][ T7593] bond0 (unregistering): Released all slaves [ 367.558126][ T7593] tipc: Left network mode [ 367.565801][ T7593] hsr_slave_0: left promiscuous mode [ 367.571466][ T7593] hsr_slave_1: left promiscuous mode [ 367.577108][ T7593] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 367.584554][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 367.594113][ T7593] hsr_slave_0: left promiscuous mode [ 367.600799][ T7593] hsr_slave_1: left promiscuous mode [ 367.606561][ T7593] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 367.613962][ T7593] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 367.623653][ T7593] veth1_vlan: left promiscuous mode [ 367.629004][ T7593] veth0_vlan: left promiscuous mode [ 367.634701][ T7593] veth1_macvtap: left promiscuous mode [ 367.640222][ T7593] veth0_macvtap: left promiscuous mode [ 367.645835][ T7593] veth1_vlan: left promiscuous mode [ 367.651203][ T7593] veth0_vlan: left promiscuous mode [ 367.737226][ T7593] team0 (unregistering): Port device team_slave_1 removed [ 367.746746][ T7593] team0 (unregistering): Port device team_slave_0 removed [ 367.801506][ T7593] team0 (unregistering): Port device team_slave_1 removed [ 367.811037][ T7593] team0 (unregistering): Port device team_slave_0 removed [ 367.842188][ T2960] lo speed is unknown, defaulting to 1000 [ 367.848022][ T2960] infiniband syz2: ib_query_port failed (-19)