last executing test programs: 8m2.304513033s ago: executing program 0 (id=3208): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x20800, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 8m2.292822893s ago: executing program 0 (id=3209): openat$binderfs(0xffffffffffffff9c, 0x0, 0x1002, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='batadv_slave_1\x00', 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x1) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 8m2.275176384s ago: executing program 0 (id=3210): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="9e", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback, 0xe}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x1fffff, 0x30}, 0xc) sendmsg$inet6(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)='h', 0x34000}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x1, 0x20}, 0xc) sendmsg$inet6(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="8c6c", 0x2}], 0x1}, 0x4010) 8m2.000460908s ago: executing program 0 (id=3214): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000), 0xfffffecc) r1 = syz_io_uring_setup(0x10e, &(0x7f0000000140)={0x0, 0x334e, 0x100, 0x4000003, 0x294}, &(0x7f00000003c0)=0x0, 0x0) syz_io_uring_setup(0x2400, &(0x7f0000000240)={0x0, 0x0, 0x10000, 0x2, 0x2be, 0x0, r1}, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r1, 0x7277, 0x0, 0x28, 0x0, 0x0) 8m1.159530921s ago: executing program 0 (id=3239): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000bc8d378048629c5f8614da10"], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040004) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r4, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000140)=ANY=[], 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), r2) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2}) timer_settime(r1, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 8m1.096315392s ago: executing program 0 (id=3242): add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01e90000ce", 0x5, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xb4}}, 0x4004) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) ptrace(0x10, 0x1) bind$packet(0xffffffffffffffff, 0x0, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, 0x0, 0x400) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0xda9917f2, &(0x7f0000000480)='\x00\xff\xff\x00\x02@qGP\xc5\x94\xa6\x8fB\xc3\x93\xe5\xc1a\x05!\x9a\x8b\xeb\xceJP\x1e\xf2\x8a\xd4\xaa\x15@>\xdb\xab\x06\x1b\xe2w\xd8\x1e\xda\xc1\x9f\xe9\xc4c\xdd\xf6^\xcb\xec\xab\x82\xcf\x14\xde\xa5\xef\x162bP\x95/\xefMs\xe0%}\xe4\xf1=\x05\xf6l7\xc1\xe9c\xc3\x7f\tg\xf56\xeasl\xbd\x02\xc1\x8a\xa9\x83\xaf\xfa\x95W+N$\x06R\x92\xe5Z\x97\xfb\xb6e}fW\x8bm\x04\'{\xaf\xe2zd\x91+-\xb1\xd8\ftK|\xb8\xd2\xb6\x7f\xf4\x84\v\x1e\xe6R\xfc\xbcg\x81\xbb\xc4\xcd\xe9\xe5.\x9b\x7f\xeb\x04\xe6,N\x00\x9a\x9d\xf8\xd1\x8aR4;\x7f\x8a\x86\xb7\xd7o\x90\xfd\xa9dJ\xd5.\x18F2\x00\x00\x00\xf2y\x99\xfd\xca\xff*\xd3;\x84F\x8f !N\x1c\xfaI\xa5\x85:\xc1\x9ed\x13\xaf\xd0/\x00\x9b\x0e\xb6\xca\xa5X\xb9]<\n\x90Tk\xa4\xb3\xc4\xa4*\xc2\xf6\x1bw\n6^\xfa\xea\r\xf1\xc1\xd0\xd8\xc7B\x1cP\x02\xcfH\x89\x82G\xcf\x1921\x9e\v4Q\xc6\x9c\xc3\xfd\xf3Z1\xef7cK\xd5\xdc\xbf\x00\xe0{\xa0\xf7\xcd\x82\xf6\x99\xcb\x1a\x17\x02\xd1\x9d(\xa2 \x85\x8e 6zL\xeeqG\t~\xafQ(\xc3\xd8\x05\xcb\xbfB\xb0\xe1b\x0f\xa8f\xe6\xb1\xe8\x9aB\x90\x00\x00\x00') sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x4c, 0x4, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0xb7}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0xc6}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_OP={0x8}]}}}]}]}], {0x14}}, 0xfc}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000400)={[0x4ad1]}, &(0x7f0000000440), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000780)=""/243}, 0x20) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m46.0984177s ago: executing program 32 (id=3242): add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01e90000ce", 0x5, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xb4}}, 0x4004) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) ptrace(0x10, 0x1) bind$packet(0xffffffffffffffff, 0x0, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, 0x0, 0x400) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0xda9917f2, &(0x7f0000000480)='\x00\xff\xff\x00\x02@qGP\xc5\x94\xa6\x8fB\xc3\x93\xe5\xc1a\x05!\x9a\x8b\xeb\xceJP\x1e\xf2\x8a\xd4\xaa\x15@>\xdb\xab\x06\x1b\xe2w\xd8\x1e\xda\xc1\x9f\xe9\xc4c\xdd\xf6^\xcb\xec\xab\x82\xcf\x14\xde\xa5\xef\x162bP\x95/\xefMs\xe0%}\xe4\xf1=\x05\xf6l7\xc1\xe9c\xc3\x7f\tg\xf56\xeasl\xbd\x02\xc1\x8a\xa9\x83\xaf\xfa\x95W+N$\x06R\x92\xe5Z\x97\xfb\xb6e}fW\x8bm\x04\'{\xaf\xe2zd\x91+-\xb1\xd8\ftK|\xb8\xd2\xb6\x7f\xf4\x84\v\x1e\xe6R\xfc\xbcg\x81\xbb\xc4\xcd\xe9\xe5.\x9b\x7f\xeb\x04\xe6,N\x00\x9a\x9d\xf8\xd1\x8aR4;\x7f\x8a\x86\xb7\xd7o\x90\xfd\xa9dJ\xd5.\x18F2\x00\x00\x00\xf2y\x99\xfd\xca\xff*\xd3;\x84F\x8f !N\x1c\xfaI\xa5\x85:\xc1\x9ed\x13\xaf\xd0/\x00\x9b\x0e\xb6\xca\xa5X\xb9]<\n\x90Tk\xa4\xb3\xc4\xa4*\xc2\xf6\x1bw\n6^\xfa\xea\r\xf1\xc1\xd0\xd8\xc7B\x1cP\x02\xcfH\x89\x82G\xcf\x1921\x9e\v4Q\xc6\x9c\xc3\xfd\xf3Z1\xef7cK\xd5\xdc\xbf\x00\xe0{\xa0\xf7\xcd\x82\xf6\x99\xcb\x1a\x17\x02\xd1\x9d(\xa2 \x85\x8e 6zL\xeeqG\t~\xafQ(\xc3\xd8\x05\xcb\xbfB\xb0\xe1b\x0f\xa8f\xe6\xb1\xe8\x9aB\x90\x00\x00\x00') sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x4c, 0x4, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0xb7}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0xc6}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_OP={0x8}]}}}]}]}], {0x14}}, 0xfc}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000400)={[0x4ad1]}, &(0x7f0000000440), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000780)=""/243}, 0x20) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m31.108536749s ago: executing program 3 (id=7490): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095"], &(0x7f00000005c0)='GPL\x00'}, 0x94) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'dummy0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0, r2, 0x25, 0x4, @void}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r5) sendmsg$NLBL_MGMT_C_ADD(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)={0x19c, r6, 0xe701ac47a3d23ecd, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x17e, 0x1, 'C\xec\xf8\xa0w\x15|\xd8\xbcs\xe1\xb93\x14\xcd\xcb\xb6\xb9\xbb\x84\xe5\xbc\xdb\x7f\x9a\xf2\xea\xcc\x91:v@\xe83-\x1d\xaagQl\x7f\tKt\fc\x1f\x17]\xd5\xd0\xf0\xa8\xeb\xd2g\x92\x04\x02\v\x00\x91d\xe6,\xd3@I\x17\xf3\xbeeI8bz\xdb\xb8s0\xad\xc6\xbf/*\xb6(o\x91t\x12\x93U6\xf4@n\xdc\xdc\x8a7y\x81FY\xbe\xbbc\xd2\xc3\x01\xa5\xe2V\x8c\xb3im~\xd2V\xdaG\xbdbF\xc8n\x86\xac\x9c\xfb\xda\xe2&\"\xb4:\x13\xe9\tc\x85\xb4\xcb\x17\xbfm\x846\xe7\x7fp\x9eCdb\xad;\xa2\xacs\xbf6\xe8\xe3Xg3&\xe2 \xd6\n\x9d=~<\x93/\xaf\x89\x06+\x96]\xb5+\xee\xff8^D*\xdb\xb8\xd8t\x80\xd4\x8fK=40\xe8R\x83p,J\xca\x85\xcb\xfa:\xdb\xda\x05\xed\xc8\xad\xa2\xfc0C\x9e3\x8e*\xae\x91\xa4\xc7)\xc0\x87\x9b\xee~\xdb\xac\x03\x90\xb1\x05\x81\xb1j\xfaO`\xa7\xa0\xeb\x83\x13 \xc8\x98\xdb\v \x95\x8eD\xc3\xc6:\xcc%\x88\xc7\xa5\xe5\xfc\xccl\x96F_\x92\xa2\xc3\xea@\"\xb1\x1b`o~B\xb4W\xd8\v\xabCBL\x81A\x92D\xd5{K\xf0\xd5\x91\n\x94\x9b\xd9\xdb2E\\\xb1\x90\xf1\xfc\xc1}\x96\xf4\xba3g\xc8\xf7j\xbc\xf1\x11\xe3\x05\xean9M\xeb&\xd2\xdf\xbe\xa1\xe8[\x91\xa5\x90uX\xd0IH!\xe3\x8a9k\x94\xc8\xde\xea\xc6^\x96\xceV\xb2\xcba\x8b\xbc\xe9'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x2}, 0x4000840) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='rxrpc_rx_packet\x00', r7, 0x0, 0x4}, 0x18) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0xf00) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'lc\x00', 0xa43531a02e0465ce, 0x56dc, 0x12}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x18) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000780)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32], 0x48}}, 0x0) 1m30.582059047s ago: executing program 3 (id=7501): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x33e, &(0x7f0000000440)=ANY=[], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x24, 0x68, 0x309, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x1}]}, 0x24}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000081, &(0x7f0000000080)=ANY=[@ANYRES8=0x0, @ANYRES8, @ANYRES64, @ANYRES8=r5], 0x0, 0x23e, &(0x7f0000000bc0)="$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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r7, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f0000000040)=0x1) 1m30.476474689s ago: executing program 3 (id=7503): close(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 1m30.39284552s ago: executing program 3 (id=7505): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2a, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='tlb_flush\x00', r1, 0x0, 0x7}, 0x18) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") 1m30.324146021s ago: executing program 3 (id=7509): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x24, &(0x7f0000000000)={0x0, 0x1, 0x1, 0x1ff, r1}) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0xa0835c, &(0x7f0000000340)={[{@nojournal_checksum}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@dioread_nolock}, {@usrjquota}, {@oldalloc}, {@sysvgroups}]}, 0x2, 0x44a, &(0x7f0000000880)="$eJzs281vFOUfAPDvzLbl9+OtFfEFRK0SY+NLSwsqBy8aTTxgNNEDHuu2EMJCDa2JECLVGLyYGBI9G48m/gXevBj1ZOJV74aEKBfQU83MzsDuslsobHcr+/kkA8+z82yf57vPPDPPzLMbwMAaz/5JIrZGxG8RMVrPNhcYr/939fLZ6t+Xz1aTWFl5688kL3fl8tlqWbR835YiM5FGpJ8kRSXNFk+fOT5bq82fKvJTSyfem1o8febZYydmj84fnT85c/Dggf3TLzw/81xX4sziurL7w4U9u15758Lr1cMX3v3p26y9W4v9jXF0y3gW+F8rudZ9T3S7sj7b1pBOhvrYENakEhFZdw3n4380KnG980bj1Y/72jhgXWXXpk2ddy+vAHexJPrdAqA/ygt9dv9bbj2aemwIl16q3wBlcV8ttvqeoUiLMsMt97fdNB4Rh5f/+SrbYp2eQwAANPqs+uWheKbd/C+N+xvKbS/WUMYi4p6I2BER90bEzoi4LyIv+0BEPLjG+luXhm6c/6QXbyuwW5TN/14s1raa53/l7C/GKkVuWx7/cHLkWG1+X/GZTMTwpiw/vUod37/y6+ed9jXO/7Itq7+cCxbtuDjU8oBubnZpNp+UdsGljyJ2D7WLP7m2EpBExK6I2L22P729TBx76ps9nQrdPP5VdGGdaeXriCfr/b8cLfGXktXXJ6f+F7X5fVPlUXGjn385/2an+u8o/i7I+n9z8/HfWmQsaVyvXVx7Hed//7TjPc3tHv8jydv5+WikeO2D2aWlU9MRI8mhPN/0+sz195b5snwW/8Te9uN/R/GeLP6HIiI7iB+OiEci4tGi7Y9FxOMRsXeV+H98ufO+jdD/c23Pf9eO/5b+X3uicvyH7zrVf2v9fyBPTRSv5Oe/m7jVBt7JZwcAAAD/FWn+HfgknbyWTtPJyfp3+HfG5rS2sLj09JGF90/O1b8rPxbDafmka7Theeh0slz8xXp+pnhWXO7fXzw3/qLy/zw/WV2ozfU5dhh0WzqM/8wflX63Dlh37dbRZkb60BCg51rHf9qcPfdGLxsD9JTfa8Pgusn4T3vVDqD3XP9hcLUb/+da8tYC4O7k+g+Dy/iHwWX8w+Ay/mEg3cnv+iUGORHphmiGxDol+n1mAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6I5/AwAA///K8u7c") r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x1ff, {0x0, 0x0, 0x0, r4, {0xfff2}, {}, {0x8, 0x10}}}, 0x24}}, 0x0) (fail_nth: 3) setsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @dev={0xac, 0x14, 0x14, 0xc}, r4}, 0xc) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x10) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x10) socket$inet(0x2, 0x2, 0x0) 1m30.226930032s ago: executing program 3 (id=7513): r0 = socket$inet6(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg$inet(r1, &(0x7f0000000500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x70}}], 0x1, 0x200080c4) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x4, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @loopback, 0x1}, 0x1c) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='kfree\x00', r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000005c0)='syz_tun\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x20000844, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x64, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x8, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x100, 0x1}]}}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) fsopen(&(0x7f0000000140)='minix\x00', 0x1) 1m15.200798221s ago: executing program 33 (id=7513): r0 = socket$inet6(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg$inet(r1, &(0x7f0000000500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x70}}], 0x1, 0x200080c4) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x4, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @loopback, 0x1}, 0x1c) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='kfree\x00', r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000005c0)='syz_tun\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x20000844, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x64, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x8, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x100, 0x1}]}}}}}}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) fsopen(&(0x7f0000000140)='minix\x00', 0x1) 2.754285707s ago: executing program 2 (id=9381): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 2.725146358s ago: executing program 2 (id=9382): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x18) ioctl$AUTOFS_IOC_FAIL(r0, 0x4c80, 0xffffffffffffffb6) rt_sigqueueinfo(0xffffffffffffffff, 0x2, &(0x7f0000000080)={0x3f, 0x3, 0x10}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000000, &(0x7f00000006c0), 0x1, 0x516, &(0x7f0000001180)="$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") 2.464227462s ago: executing program 2 (id=9385): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 2.430756722s ago: executing program 2 (id=9388): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x148, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xe}, {0x0, 0xb}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_RATE={0x6, 0x5, {0x8, 0x81}}, @filter_kind_options=@f_bpf={{0x8}, {0x10c, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0xec, 0x1, [@m_simple={0x30, 0x1f, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_ct={0xb8, 0x17, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @multicast2}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}, @TCA_CT_MARK={0x8, 0x5, 0xb3b}, @TCA_CT_ZONE={0x6, 0x4, 0x3}, @TCA_CT_ZONE={0x6, 0x4, 0x8}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @private0={0xfc, 0x0, '\x00', 0x1}}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @local}]}, {0x3d, 0x6, "0c667158e5bd4f4c7258693ff73b6255ca1d4908fac16f226d18c88d5659578dff7cbcb14a7b44cbd8f6c32df97313956ada98a747f5cd439e"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BPF_FLAGS_GEN={0x8}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x64}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000980)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f00000001c0)=""/17, 0x11}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x2040000, &(0x7f0000003700)={0x77359400}) 2.393593143s ago: executing program 2 (id=9389): open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000580)={r0, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=[0x0], 0x0, 0x5, 0x1, 0x0, r1}}, 0x40) 2.365892473s ago: executing program 1 (id=9390): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 2.352514513s ago: executing program 2 (id=9391): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_rdma(0x10, 0x3, 0x14) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x9ae) prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='gtp\x00\xe4\xaa\xae\xdf~2\xa6X\x14\x92\xdarV\xf4U\xf7\xa2\xc3l\x1b@\xaf\xf9\xc9\xa9#\xf0S\xd9=q\xd6\x14\xedt\xc8!W\xe9@\xeb\x7f~\tB0EE\x9a:\xb7\xff\xc1\xfc\x9a\x1f\xf2\xfb\x19\xda#x\xc5F\x1c~\x8c\xe1\xdf\xdc\x01k\f\xde0~\x95\r\xa2\x80\b4M\x14\xe7\xd0\t`n!g\x14\xe6\xd1\xc2\xd3\x88\xf8cVtd\xbeY\xa5\xe7\x16sD\x96}7\n\x88e\x00\xf0\xff\xff\xf0\xcb\x94\xb4S\x00\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r8, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) ptrace$ARCH_SHSTK_ENABLE(0x1e, r1, 0x0, 0x5001) sendto$packet(r9, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r10, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$nl_route_sched(r0, &(0x7f0000001500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000014c0)={&(0x7f0000002000)=@newtfilter={0x1e88, 0x2c, 0x400, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r10, {0xe, 0x1}, {0xfff3, 0x4}, {0x7, 0x9}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x61}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_RATE={0x6, 0x5, {0x3, 0xcf}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_cgroup={{0xb}, {0x1e38, 0x2, [@TCA_CGROUP_POLICE={0xc24, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x2, 0x6, 0x6, 0x3ff, 0x400, 0x6618, 0x9, 0x200, 0x9, 0x3, 0x7, 0x3ac, 0x7, 0x80000000, 0x7, 0x7, 0xfffffffc, 0x718898e0, 0x5, 0x9, 0x800, 0x8, 0x3, 0x8, 0x5, 0x6, 0x2, 0xffff, 0x10001, 0x8, 0x6, 0x8, 0x6e55, 0x57, 0x1000, 0xa7f1a422, 0x4, 0xe, 0x8, 0x0, 0x9, 0x7, 0x7, 0x7, 0x3c, 0x1000, 0x9, 0x7, 0x8, 0x1, 0xe5, 0x37, 0x1, 0x5, 0x6, 0x8, 0x7, 0x4, 0x4, 0x200, 0x8, 0x1, 0x0, 0x6fb, 0x5, 0x2, 0x4, 0x6, 0xb9, 0x5, 0xca, 0x5, 0xe, 0x7, 0x7, 0x3, 0x3, 0x0, 0x60d, 0x6, 0x9, 0x5, 0x8, 0xffff, 0x7, 0x7, 0xd, 0x0, 0x1, 0x10000, 0x40, 0x8, 0x1, 0x401, 0x8, 0x8001, 0xd, 0x5, 0x2, 0x9, 0x6, 0x1242, 0x1, 0x3, 0x98, 0x3, 0x6, 0x0, 0x6, 0xfffffff9, 0x0, 0x9, 0x8, 0xc0, 0x23, 0x8, 0x2, 0x9, 0x9, 0xfffffff9, 0x3ed, 0x1, 0x2, 0x8, 0x0, 0x2, 0x3, 0x9, 0xc, 0xfffffffa, 0x8, 0x5, 0x9, 0x2, 0xaaa9, 0x1a, 0xfba, 0x0, 0x9df, 0x5, 0x3, 0x4, 0xa, 0xe, 0x1, 0x4, 0x6, 0x0, 0xe32b, 0x2, 0xfffffffb, 0x2, 0x100, 0xf, 0x4, 0xbc39, 0x1d0b, 0x10, 0x1, 0x0, 0x5, 0x76, 0x4, 0x8, 0x0, 0xb56f, 0xa3, 0x4, 0xb2f5, 0x1, 0x4, 0xb3, 0x2, 0x6, 0x0, 0x81, 0x1, 0xfff, 0x800, 0xfffffbaa, 0x2, 0x46, 0x1, 0x0, 0x8, 0x2, 0x8, 0xaf, 0x7b3, 0x38, 0x200, 0x9, 0x9, 0x1, 0x6b15, 0x8, 0x59, 0xd370, 0xfffffffd, 0x10, 0x9, 0x8, 0x8, 0xffff8000, 0x1000, 0x80, 0x4, 0x80000000, 0x200, 0x9, 0x7, 0x5, 0x2105, 0x0, 0x2, 0xf800, 0x1, 0x3, 0x4, 0x6, 0x40, 0xc88, 0x4, 0xad, 0x41f, 0x4, 0x8, 0x59, 0x10000, 0x6, 0x4, 0x5e3, 0xe, 0xfffffff8, 0xfffffff2, 0xaa76, 0x6, 0x3, 0x7, 0x10001, 0x1ff, 0x0, 0x7ff, 0x26bd0, 0x3, 0x7, 0x6, 0x2, 0x28, 0x3db, 0x0, 0x2, 0x0, 0x1ff, 0xfffffffe]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xc36}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x1, 0x7, 0x7fff, 0x8001, 0x7fff, 0xff, 0xf9f, 0x59ef, 0x8000, 0x7f, 0x9, 0x4, 0xfffffffc, 0x7, 0x2, 0x1, 0x9, 0x8000, 0x8, 0x10000, 0x2, 0xd18b, 0x800, 0x7, 0x8, 0xfffffff5, 0x8, 0x4, 0x401, 0x2, 0x4, 0x7fff, 0x96, 0x7fffffff, 0x2, 0x3, 0x100, 0x2, 0x6, 0x1, 0x6, 0x10, 0xfffffffd, 0x1, 0x4, 0x0, 0x7fffffff, 0x2, 0xfffffffd, 0x6, 0x3, 0x5, 0x4, 0x4, 0x5, 0xfff, 0xfff, 0xfff, 0x4, 0x2, 0x3, 0x9, 0x10001, 0x9, 0x8, 0x2, 0x800, 0x5, 0x5, 0x1, 0xe0, 0x1000, 0x6, 0xbf6, 0x401, 0x80000000, 0x80000001, 0x0, 0x9, 0xec8, 0x80000001, 0x0, 0x9, 0x80000001, 0x7, 0xe7, 0x80000000, 0x5, 0x4, 0x8, 0xe55d, 0x6, 0x3, 0xfffffff9, 0x6, 0x3, 0x6, 0x1ff, 0x7fff, 0x8, 0x0, 0x17df, 0x91, 0x3, 0x8, 0x6, 0xffff, 0x4478, 0x3, 0x22, 0x1ff, 0x0, 0x2, 0xe, 0xffffffff, 0xbb5, 0x200, 0xfffffff9, 0x6, 0x9, 0x139, 0x14da, 0xfffffffa, 0x5, 0xb6, 0x3, 0x55, 0x2, 0x6, 0x2, 0xfc, 0xfffffff5, 0xe6b, 0x0, 0x100, 0xffffffff, 0x7, 0x6, 0x4, 0x10, 0x10, 0x1, 0x200, 0x80000000, 0xffffffb3, 0x6, 0x7fffffff, 0x56, 0x7ff, 0x10001, 0x3, 0x6, 0x6, 0x9, 0xf, 0x6, 0x7, 0x3, 0x401, 0xc6, 0x0, 0x6, 0x8, 0x5, 0x5, 0x6, 0x1, 0x9, 0x78f88e3, 0xffff, 0x0, 0x4, 0x7fffffff, 0xade7, 0xffffffff, 0x9, 0xffffffff, 0x3, 0x3, 0xc10, 0x639, 0x1b, 0xbb04, 0x3ff, 0x8000, 0xfffffffc, 0xffffff6b, 0x20000, 0x5, 0x7, 0x7, 0x80000001, 0x904, 0x2, 0x9, 0x80000001, 0xb69, 0x5, 0xfffffffa, 0xcc97, 0x3, 0xad0, 0x4, 0xff, 0x80000000, 0x8, 0x0, 0x36e6, 0x40, 0x2, 0x200, 0x0, 0x5, 0x9, 0x8, 0x9, 0x2e, 0x4, 0xffffbdd7, 0x1000, 0x4, 0xfff, 0x4, 0x40000000, 0x5, 0x4bd, 0x3, 0x3, 0xf4f4, 0x800000, 0x0, 0x0, 0x2, 0x6, 0x63, 0x80000000, 0x1, 0x5, 0x2, 0x3, 0x2, 0x9, 0x0, 0x10001, 0x1, 0x7, 0x4, 0x1, 0x4, 0x7, 0x2, 0xb, 0x20000, 0x4, 0xffff]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffffe92, 0xfffffff8, 0x6, 0x5, 0x0, 0xfc6f, 0x1, 0x7, 0x4bf, 0x8, 0x4, 0x5, 0x4, 0x1, 0xffff, 0x2, 0x17b, 0xfffff001, 0x10, 0x7, 0x8, 0xff800, 0x4, 0x0, 0x1, 0x10001, 0x3, 0xe, 0x9, 0x35, 0x8, 0x3, 0x10001, 0x0, 0x1, 0x7, 0x4, 0x9, 0x8, 0x80000001, 0x101, 0x8, 0x65d3, 0x8, 0x3, 0x2, 0x7, 0x9, 0x8, 0x9, 0x7ff, 0x6, 0x2, 0x80000000, 0x1ff, 0x80, 0x16, 0x3a, 0x5, 0x5, 0x4, 0x80000001, 0x2, 0x64ca, 0x6, 0x0, 0x2, 0x6ea, 0x45265d0f, 0x101, 0x4, 0x6, 0x8, 0xffff, 0x7fffffff, 0x0, 0x0, 0x5, 0x0, 0x6, 0x8, 0xffffffff, 0x2, 0x8000, 0x1, 0xffffffff, 0xd085, 0xd, 0x7, 0xffffff23, 0x1b4c, 0x5, 0xae00, 0x8, 0x0, 0x1, 0x7, 0x5, 0x5, 0x3, 0x2, 0x8, 0x4, 0x9, 0x40, 0x4, 0xf, 0x401, 0x1, 0x80, 0x7, 0x100000, 0x2, 0x9, 0x7, 0x1, 0x2, 0x5, 0x5fd, 0xdf24, 0x9, 0xc, 0x2, 0x4, 0x500, 0xfffff8a0, 0x8000, 0xfffffff7, 0x0, 0x1000, 0x8, 0x594, 0x2, 0x6, 0x400, 0x4, 0x5, 0x0, 0x8, 0x4, 0x200, 0x4, 0x4, 0x0, 0x800, 0xfff, 0x8, 0x8000, 0x4, 0x5, 0x7fff, 0x5, 0x6, 0x10, 0x9, 0x3, 0x6, 0x7, 0x1e, 0x1, 0x7fff, 0x8968, 0x212, 0x2, 0x0, 0x3, 0x18d, 0x8499, 0x800, 0x9, 0xfffffffc, 0x10000, 0xfffffff8, 0x7, 0x7, 0x0, 0x5, 0x101, 0x5, 0x1, 0x3ff, 0x7fffffff, 0xbeb, 0x1, 0xea, 0x9, 0x401, 0x3, 0x3ff, 0x1000, 0x5, 0xd9, 0xe0000, 0x80, 0x8, 0x10000, 0x6, 0x40, 0x0, 0xfff, 0x6, 0xeea, 0x4, 0x7, 0x81, 0x5, 0xffffffff, 0x7, 0x5, 0x50, 0x1, 0x200, 0x8, 0xc, 0x200, 0x5a, 0x1, 0x114, 0x7, 0x0, 0x2c07, 0x7fff, 0x3, 0x3, 0xe23, 0x6, 0x0, 0x7, 0x4, 0x6c, 0x6f, 0x9, 0x1, 0x4, 0xfffffffa, 0x5, 0xfffffff8, 0xa2ef, 0x7, 0x8, 0xb, 0x2, 0x4, 0x2, 0x2, 0x8001, 0x9, 0xfffffffd, 0xffffffff, 0x0, 0x3, 0x9, 0xc, 0x5, 0x75d, 0x4]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}]}, @TCA_CGROUP_POLICE={0x850, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x10000, 0xffffffffffffffff, 0x100, 0x101, 0x1, {0x5, 0x2, 0xe8d, 0x2, 0x9}, {0x9, 0x0, 0x6, 0x4, 0x4, 0x4}, 0x401, 0x6, 0x7f}}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x6, 0x10000, 0x3, 0x158c, 0xfffffffe, 0x200, 0x6, 0x3, 0x4, 0x4, 0x5a, 0x200, 0x3, 0xbd63, 0x6, 0xca, 0x24d85ff4, 0x92d9, 0xb, 0xff, 0x101, 0x2, 0x0, 0x5, 0xa0, 0x4, 0x4d5, 0x4, 0x5, 0x15, 0x3, 0x0, 0x5, 0x16ed, 0x0, 0x1, 0xc7, 0x2, 0x2, 0x8, 0x8, 0x4, 0x7ff, 0x5, 0xcb31, 0x86, 0xefa3, 0x4, 0x9, 0x4, 0x401, 0xe2, 0x7, 0xb0, 0x2, 0x5, 0x81, 0x6, 0x9b, 0x8000, 0x9, 0x43, 0x4df, 0x807b, 0xff, 0x3, 0x1, 0x10000, 0x4, 0xfffffffc, 0x6, 0x6, 0x9, 0x0, 0xa328, 0x8a9a, 0x100, 0x2, 0x4, 0xfffffff8, 0x8, 0x1, 0xfffffffa, 0x9, 0xff, 0x8, 0x2665, 0x100, 0x9, 0x10000, 0x7fffffff, 0x6, 0x4, 0x4, 0x6, 0x7ff, 0x4, 0x5, 0x5, 0x2, 0xd34, 0x7, 0x4, 0x800, 0x4, 0x80, 0x5498, 0xffffffff, 0x10000, 0x6, 0x2, 0xc, 0x88, 0x5, 0xaf8f, 0xe00000, 0x3, 0x4, 0x77a, 0x8, 0x1, 0x8, 0x3, 0xffff77b6, 0x8001, 0x3, 0x3, 0xc, 0x3, 0x3800000, 0x0, 0x9, 0x3, 0x6, 0xd41, 0x8, 0x8, 0x4, 0x2883e103, 0x5, 0x6, 0x5, 0x3ffc0, 0x9, 0x2, 0xfff, 0x8, 0xff, 0x40, 0x800, 0x4, 0x7, 0x0, 0xd, 0x4, 0x2, 0xa44, 0x3ff, 0x395, 0xf, 0x4, 0xa, 0x2, 0x6, 0x1, 0x4, 0x10, 0xfffffff9, 0x2, 0x10001, 0x6, 0xffffff37, 0x7, 0x3, 0x5, 0x61, 0x5, 0x6, 0x8, 0x2, 0x3, 0x6, 0x7, 0xb, 0xfffffff9, 0xfffffffb, 0x4, 0x8, 0x8000, 0x0, 0x9, 0x392ea492, 0x9, 0x6, 0x4, 0x7, 0x612005c, 0x0, 0x5, 0x4, 0x3, 0x8, 0xffff8001, 0x7, 0x0, 0x9, 0x5, 0x9, 0x0, 0x2, 0x35f, 0x4, 0xa6, 0xffff, 0x5, 0xfffffff8, 0x2, 0x21, 0x0, 0x1, 0x8, 0x8, 0x80000001, 0x6, 0x2, 0x4, 0x9, 0x9, 0xe42, 0xcd3, 0x401, 0x7, 0x116b, 0x3, 0x80, 0x7ff, 0xa, 0xfffffffe, 0x3ed1583d, 0xd665, 0x6, 0x80000000, 0x8, 0x5, 0x7aa, 0x7bbb, 0x4, 0xd, 0x53, 0xf30e, 0x7fffffff, 0x5, 0x1, 0x12f, 0x89b8]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffff809, 0x5, 0x1ff, 0x7fff, 0x8001, 0x1, 0x2, 0xffffffff, 0x800, 0xffffffff, 0x4, 0x4, 0x0, 0x0, 0x8, 0x8, 0x4, 0xb, 0x6, 0x7, 0x7ff, 0xffff7fff, 0xbcd, 0x674, 0x1, 0x0, 0x0, 0xfffff5b6, 0x1, 0x8, 0xffff5b53, 0x6, 0x7, 0x1, 0x9, 0x5, 0x0, 0x7, 0x5, 0x6, 0x7, 0x5, 0x0, 0x1491, 0x0, 0x9, 0x8, 0x4, 0x3, 0x4, 0x9, 0x9, 0x6, 0x0, 0x5, 0x3, 0x8001, 0x6, 0xfffffffd, 0x5, 0x101, 0xfffffe01, 0x6, 0x0, 0x2, 0x0, 0x293, 0xfffffffe, 0x0, 0x0, 0x40, 0x77, 0x2, 0x8, 0x5, 0x3718, 0xca6, 0x3, 0x101, 0xdf4e, 0x5648, 0x4, 0x10, 0x884, 0x10, 0xd82, 0x8, 0x58, 0xffff8001, 0xe8, 0x2, 0x2, 0x5, 0x640, 0x4, 0x6, 0x7, 0x6, 0x6, 0x5, 0x5, 0xc42, 0x6, 0x800, 0x8, 0xfffffffe, 0x3ff8000, 0x5, 0x7, 0x52c3, 0x1a, 0x56a2d40b, 0x3, 0x5, 0xab, 0x25, 0x6, 0x5, 0x99f8, 0x27, 0x2, 0x4, 0xf70, 0x6, 0x6, 0x57, 0x89, 0x1ff, 0x7, 0x4, 0x8, 0x9, 0x273e, 0x50a4d093, 0x5, 0x6, 0x7ff, 0x4, 0xd, 0xd, 0x7ae80000, 0x8, 0x1, 0x3, 0x8, 0x4, 0x10, 0x6, 0x30, 0x7fffffff, 0x5, 0x1, 0xb, 0xff, 0x9, 0x7, 0xfffffff9, 0xd8, 0x200, 0xc, 0x3310a648, 0x101, 0x3, 0x40, 0x6, 0x8, 0xf6, 0x8, 0x6, 0x4, 0x4680, 0x3, 0x0, 0x10001, 0x4, 0xffffff86, 0x7, 0x846, 0x8, 0x2, 0x4, 0x1, 0xfe44, 0x2, 0x4, 0xc, 0x0, 0x6, 0xa, 0x3, 0x5, 0x2, 0x2, 0x101, 0x5, 0xd, 0x80000000, 0xd032, 0x7, 0x5, 0x1, 0x0, 0xae9, 0x0, 0x6, 0x40, 0x83, 0x1c, 0xce13, 0x2, 0x800, 0x2, 0x300, 0x7, 0xe4f, 0x1, 0x4, 0x9, 0xa, 0x5, 0x3, 0xf, 0xffffffff, 0x7, 0x4, 0x4, 0xe8, 0x10, 0x5, 0xfffffffb, 0x6, 0x40, 0x1000, 0x1000, 0x2, 0xfffffc01, 0x9, 0x5, 0xff, 0x1, 0x1, 0x800, 0x1, 0xffffffa6, 0x6, 0x1ff, 0x8000, 0x7, 0xbfd5, 0xc, 0x1, 0xf, 0xfffffff7, 0x80000001, 0x80000000]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x81}]}, @TCA_CGROUP_EMATCHES={0x4e4, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x158, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x6, 0x1, 0x5}, {0x6, 0xf4bf, 0x2, 0x1, 0x5, 0x2, 0x2}}}, @TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0x9}, [@TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0xf72, 0x7, 0xf33}, {{0x2, 0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x5, 0x2, 0x10}, {0xfffe, 0x3, 0x1, "548619"}}}, @TCF_EM_IPT={0x14, 0x3, 0x0, 0x0, {{0xfffe, 0x9, 0x101}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x80}]}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x7, 0x3, 0x7}, {0x6, 0x5, 0x5, 0x4}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x4, 0x0, 0x1}, {0x2, 0x0, 0x1, 0x1}}}}, @TCF_EM_NBYTE={0x14, 0x2, 0x0, 0x0, {{0x4, 0x2, 0x9}, {0x0, 0x2, 0x0, "b2a0"}}}, @TCF_EM_META={0x9c, 0x1, 0x0, 0x0, {{0x8, 0x4, 0x6}, [@TCA_EM_META_LVALUE={0x12, 0x2, [@TCF_META_TYPE_VAR="0a13dc543b779725d89a", @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x5b, 0xe}, {0xd, 0x5, 0x2}}}, @TCA_EM_META_LVALUE={0x24, 0x2, [@TCF_META_TYPE_VAR="23aecbc73a7d", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="6f7889a5450a581583bf"]}, @TCA_EM_META_LVALUE={0x20, 0x2, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="f8e7c2f55e69655b90", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="4df8181850d4d7", @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x3]}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_VAR="91096ae3", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="92db655e"]}, @TCA_EM_META_LVALUE={0xf, 0x2, [@TCF_META_TYPE_VAR="65d74d", @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x3]}]}}]}, @TCA_EMATCH_TREE_LIST={0xec, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xd8, 0x1, 0x0, 0x0, {{0x95, 0x9, 0x7}, [@TCA_EM_IPT_MATCH_DATA={0xb1, 0x5, "f2ce58a9285430d9c432c57d2ba1e39fd8308bbcc49377577b465b314a52776530ef2220380d258970f2518c486ca73f4a45f778aff194e1d79f14560db63bd2259d5dc1b36f501b0d5662801c9dbdd1692ff217c5472f4fd9fc933501d527ede3b4c1e2847f1521f9cbb573e3b508d4a268d5d81a1424f3752ede671911aedf5a5f28e1d923c128d48ed4344d782f262c20e827bc2eccaaecf6a511ae67240e247e832ce3a6666b1071ffc0de"}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x2}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}]}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x8, 0x8, 0x6}, {0x0, 0x3, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8}}, @TCA_EMATCH_TREE_LIST={0x274, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x1, 0x0, 0x0, {{0x7, 0x2, 0xe7f}, {0x7, 0x1, 0x2, "aa"}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x0, 0x8, 0x2539}, {0xc, 0x0, 0x3}}}, @TCF_EM_IPT={0x118, 0x3, 0x0, 0x0, {{0x7, 0x9, 0x1}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x5}, @TCA_EM_IPT_MATCH_DATA={0x102, 0x5, "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"}]}}, @TCF_EM_CONTAINER={0xec, 0x3, 0x0, 0x0, {{0x1000, 0x0, 0xa6}, "1a0f5d5a2075ac182644d479587b8052e46702d34d1f0a0e39cb4a4a90b56a89f84aa2154b6e5d09ee30130492a46d5706499e28c6be4370b80d8dfa2347989c2712e5adcd7727b9d4b769fa6e35ed666dc48afe438ea5e9d48aa3b15754a3178c574b54206e045b66ac74f6e992d6724c2ab09c950eb3323bdd79d4a59280abd254b7916ccb204794f93b9276781040177d26987e3b26e7f84c0c7007f849a64de498b63a7076fb1e6467b0bb991606c0346c6777ec8ada450ef35bb3adc48275a683c0c6533c999d0ed1bea2815a4312d4543a84a304583e7b7ecc218b"}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7, 0x1, 0x5}, {0xd6, 0x6, 0x4, 0x4, 0x4, 0x2}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x10}, {{0x0, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0xfffd, 0x3, 0x41}, {0xe133, 0x5, 0x4, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7fff}}]}, @TCA_CGROUP_POLICE={0x4dc, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x12, 0x2, 0x1, 0x0, 0x101, {0x0, 0x2, 0x3, 0xfff8, 0x64, 0x1a}, {0x8, 0x0, 0x1, 0x1ff, 0x0, 0x2}, 0x8, 0xa120, 0xa}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x4, 0x7fffffff, 0xfffffffd, 0xfffffff8, 0x3, 0x6, 0x1, 0x2, 0x401, 0xb, 0x0, 0xffffffff, 0x8, 0x5, 0x2ce, 0x3, 0x800, 0xfc, 0xe6f, 0x3, 0x8, 0x8, 0xfff, 0x1ff, 0x4, 0x2, 0xffff7fff, 0x6, 0x1, 0x35a, 0x0, 0x3, 0x0, 0x1, 0x6, 0x7f, 0x800, 0xffff4875, 0x80000001, 0xfffffffe, 0x10, 0x4, 0x6, 0x8, 0x7, 0xfffffff9, 0xd857, 0xe3, 0x3, 0x242, 0x8, 0x1, 0x9, 0x1, 0x2, 0x6, 0x9, 0xeb, 0x2, 0x2cf2, 0x4, 0x5, 0x1, 0x4, 0x3ba, 0x401, 0x9, 0x48, 0x8, 0x10000, 0xffffff09, 0xfffffffb, 0x8, 0xfffffff7, 0x0, 0x80, 0x1, 0x2, 0x4, 0xffffffff, 0x18a, 0x2, 0x4, 0xfffffffe, 0x6, 0x40, 0x6, 0x7, 0xffffff80, 0x3, 0x8, 0xfffff800, 0x2d4f, 0xffffffff, 0x5c17, 0x4, 0x5, 0x9, 0xdf7, 0x8, 0xdff, 0x1, 0x5, 0x9, 0x4, 0x7, 0xd79, 0x6, 0x9a, 0x5, 0x5, 0x4, 0x1, 0x6cd, 0xb16d, 0x0, 0x4236a5a4, 0x4, 0xc3, 0x2, 0x91, 0x1, 0x9, 0x1, 0x8, 0x9, 0xc1, 0xfffff054, 0x8, 0x7, 0x9, 0x0, 0x5, 0x1, 0xfffffffa, 0x4, 0x18, 0x7, 0x1, 0xfffffff9, 0x1ff, 0x5, 0xc, 0x1ff, 0x0, 0x8000, 0x4, 0x6, 0x9, 0x7c, 0x5, 0x50, 0x401, 0x6, 0x1000, 0x7, 0xf935, 0xbc, 0x24e68686, 0x10, 0x1af, 0xffffff00, 0x9, 0x0, 0x10, 0xce2, 0x1ff, 0x930, 0x10001, 0x1, 0x4, 0x7, 0x2, 0xa, 0x2000000, 0x800, 0xffffffff, 0x2, 0x0, 0x0, 0x5, 0x7, 0x7, 0x2, 0x5, 0x1, 0x1, 0xe067, 0x4, 0x9, 0xd, 0xfffff800, 0x0, 0x1, 0x3, 0x0, 0x9d, 0x5, 0x8, 0x6, 0x4, 0x9, 0x91ac, 0xaf3d, 0x4, 0x100, 0x3, 0x3, 0x7db2de89, 0x9, 0x1a, 0x2, 0xff24, 0xfffffffb, 0x6, 0xfffffff7, 0x40bd, 0x7, 0x4, 0x78, 0x2754, 0x6, 0x5, 0x1, 0xb, 0x55d, 0x0, 0xf68, 0x3, 0x2e8, 0x0, 0x6, 0x9, 0x8, 0xd, 0xbfc1, 0x8, 0x7fffffff, 0x3, 0xb0, 0x1, 0x7, 0x6f4, 0x4, 0x101, 0xfffffffa, 0x1, 0xa7f8, 0x0, 0x3, 0x9a2, 0x95ad, 0x0, 0x24e, 0xbf]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xd, 0xffffffffffffffff, 0x5e, 0x5b, 0x0, {0xfc, 0x0, 0x6, 0x3, 0x8000, 0x1000}, {0xa, 0x1, 0x7, 0x3, 0x9, 0x9}, 0x0, 0x482ba89b, 0x6}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8000, 0x2, 0x4, 0x5, 0x67053cca, {0x1, 0x0, 0x7fff, 0x2, 0x2, 0x2}, {0x4, 0x1, 0x4, 0x7ff, 0x6, 0x4}, 0x4, 0xfffffffc, 0x5}}, @TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5}]}]}}]}, 0x1e88}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 2.279765474s ago: executing program 1 (id=9392): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_rdma(0x10, 0x3, 0x14) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x9ae) prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='gtp\x00\xe4\xaa\xae\xdf~2\xa6X\x14\x92\xdarV\xf4U\xf7\xa2\xc3l\x1b@\xaf\xf9\xc9\xa9#\xf0S\xd9=q\xd6\x14\xedt\xc8!W\xe9@\xeb\x7f~\tB0EE\x9a:\xb7\xff\xc1\xfc\x9a\x1f\xf2\xfb\x19\xda#x\xc5F\x1c~\x8c\xe1\xdf\xdc\x01k\f\xde0~\x95\r\xa2\x80\b4M\x14\xe7\xd0\t`n!g\x14\xe6\xd1\xc2\xd3\x88\xf8cVtd\xbeY\xa5\xe7\x16sD\x96}7\n\x88e\x00\xf0\xff\xff\xf0\xcb\x94\xb4S\x00\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r8, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) 1.422294568s ago: executing program 5 (id=9404): open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, "f1"}]}], {0x14}}, 0x5c}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1ffffffffffffce6, &(0x7f0000000080)=[{0x1, 0x0, 0x0, 0x7abd}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)=""/27, &(0x7f0000000680)=0x1b) r5 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000580)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=[0x0], 0x0, 0x5, 0x1, 0x0, r5}}, 0x40) r6 = gettid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x500, 0x0, 0x2000040}, 0xc, &(0x7f0000000240)={&(0x7f0000000800)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010028bd7000ffdbdf2514000000080001000100000008000300", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32=r6], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) 1.343134139s ago: executing program 5 (id=9406): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x18) io_setup(0x2, &(0x7f0000002400)) 1.237235101s ago: executing program 5 (id=9409): bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) epoll_create(0x9) syz_clone3(&(0x7f00000007c0)={0x104010080, &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0), {0x21}, &(0x7f0000000700)=""/45, 0x2d, &(0x7f0000000740)=""/5, &(0x7f0000000780)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000030601020000000000000000000000000500010007"], 0x1c}}, 0x0) 1.193208001s ago: executing program 5 (id=9410): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) syz_usbip_server_init(0x1) 739.314179ms ago: executing program 6 (id=9415): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVdd:\xc4e', 0x0) 710.576689ms ago: executing program 6 (id=9417): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000380), &(0x7f00000003c0), 0x500}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000040)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r3 = syz_io_uring_setup(0x497, &(0x7f0000000a40)={0x0, 0x4661, 0x800, 0x3, 0x20e}, &(0x7f0000000540)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0}) io_uring_enter(r3, 0x40f9, 0x217, 0xa5, 0x0, 0x0) close_range(r1, r2, 0x0) 626.10522ms ago: executing program 4 (id=9418): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) unshare(0x38000600) munlockall() r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='mm_page_alloc\x00', r2}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b703000008000040850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r4}, 0x10) munlock(&(0x7f00009c1000/0x3000)=nil, 0x3000) 619.952431ms ago: executing program 5 (id=9419): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x10000}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=[0x0], 0x0, 0x5, 0x1}}, 0x40) 573.120271ms ago: executing program 4 (id=9420): bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) epoll_create(0x9) syz_clone3(&(0x7f00000007c0)={0x104010080, &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0), {0x21}, &(0x7f0000000700)=""/45, 0x2d, &(0x7f0000000740)=""/5, &(0x7f0000000780)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000030601020000000000000000000000000500010007"], 0x1c}}, 0x0) 572.629931ms ago: executing program 4 (id=9421): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x148, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xe}, {0x0, 0xb}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_RATE={0x6, 0x5, {0x8, 0x81}}, @filter_kind_options=@f_bpf={{0x8}, {0x10c, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0xec, 0x1, [@m_simple={0x30, 0x1f, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_ct={0xb8, 0x17, 0x0, 0x0, {{0x7}, {0x54, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @multicast2}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}, @TCA_CT_MARK={0x8, 0x5, 0xb3b}, @TCA_CT_ZONE={0x6, 0x4, 0x3}, @TCA_CT_ZONE={0x6, 0x4, 0x8}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @private0={0xfc, 0x0, '\x00', 0x1}}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @local}]}, {0x3d, 0x6, "0c667158e5bd4f4c7258693ff73b6255ca1d4908fac16f226d18c88d5659578dff7cbcb14a7b44cbd8f6c32df97313956ada98a747f5cd439e"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BPF_FLAGS_GEN={0x8}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000980)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f00000001c0)=""/17, 0x11}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x2040000, &(0x7f0000003700)={0x77359400}) 520.287902ms ago: executing program 5 (id=9422): r0 = inotify_init1(0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x4, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2}, @func_proto={0x2, 0x0, 0x0, 0x8, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x54}, 0x20) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000001c0)="ee1ad5a475c936f5cc1b9ce2e3478d92459a6cae1f272034ae7220e8199768117e0b8f22703ff2edf4d20b26270922a18695ea3a898babcb9ea57090b8748d246061ce850343f874d2b85e0337b91ddf", &(0x7f0000000500)=""/237}, 0x20) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000080000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000800)=@mangle={'mangle\x00', 0x10, 0x6, 0x790, 0x5d0, 0x378, 0x0, 0x490, 0x378, 0x6c0, 0x6c0, 0x6c0, 0x6c0, 0x6c0, 0x6, 0x0, {[{{@uncond, 0x0, 0xf8, 0x120, 0x0, {0x7a00000000000000}, [@common=@ipv6header={{0x28}, {0x1, 0xc4, 0x1}}, @inet=@rpfilter={{0x28}, {0x3}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@uncond, 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth1_to_batadv\x00', {0x8, 0x5, 0x3c, 0x97, 0x6, 0x401, 0x4, 0x120e, 0x18, 0x40}, {0x5}}}, @common=@srh={{0x30}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0xfff7, 0x4}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv6=@mcast1}}}, {{@ipv6={@private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth1\x00', 'ip6gretap0\x00', {}, {}, 0x0, 0x2}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x2}}, @inet=@rpfilter={{0x28}, {0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local, @ipv4=@multicast1}}}, {{@ipv6={@mcast1, @mcast2, [], [], 'wg1\x00', 'vxcan1\x00', {0xff}, {}, 0x2c}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7f0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="7000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000480012800e000100697036677265746170000000340002801400060020010000000000000000000000000002060002000c00000014000700fc00000000000000000000000000000108000a0009"], 0x70}}, 0x0) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0xa4000061) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) unshare(0x4000800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000100003040200000000ddff0000000400", @ANYRES32=0x0, @ANYBLOB="0003000000000000500012800b0001006272696467650000400002800c001f000100000000000000060027000e00000005002900000000000c002e0000000000000000000c001e00a00000000000000005002a0000000000"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x8044) 496.843602ms ago: executing program 6 (id=9423): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r1 = openat$random(0xffffffffffffff9c, &(0x7f000000fe80), 0x40800, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f000000fec0)=ANY=[@ANYBLOB="04000000000010"]) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0x0, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1a, 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$ext4(&(0x7f00000007c0)='ext4\x00', &(0x7f00000006c0)='./file1\x00', 0x40, &(0x7f00000000c0)={[{@user_xattr}, {@nodioread_nolock}]}, 0x1, 0x576, &(0x7f0000000140)="$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") r6 = open(&(0x7f00000001c0)='./file1\x00', 0x20042, 0x45) r7 = open(&(0x7f0000000200)='./file2\x00', 0x100, 0x123) copy_file_range(r7, 0x0, r6, 0x0, 0x3df1, 0x0) r8 = open(&(0x7f0000000140)='./file1\x00', 0x64042, 0x169) pwritev2(r8, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) 466.659923ms ago: executing program 4 (id=9424): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400000008000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18660d00000000000000000000000000000085000000500000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000840)='powernv_throttle\x00', r1}, 0x18) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000021c0), 0x181000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) r8 = dup2(r4, r4) write$tun(r8, 0x0, 0x46) r9 = socket(0x400000000010, 0x3, 0x0) r10 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r11, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0x10}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000002200)=@newtfilter={0x884, 0x2c, 0xd27, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r11, {0xffff, 0x7}, {}, {0xa}}, [@filter_kind_options=@f_fw={{0x7}, {0x858, 0x2, [@TCA_FW_POLICE={0x420, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x3859ec0d}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x7}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1000}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x0, 0xdd, 0xbf8, 0xd, 0x1, 0x6, 0x4, 0x4b, 0x8000, 0x9, 0x5, 0x6, 0xb, 0x8, 0x8001, 0x8001, 0x24, 0xe, 0xecd, 0x3ff, 0x162c, 0x8, 0x6, 0x0, 0x3, 0x9, 0x0, 0x80000001, 0x0, 0x2ef, 0x5, 0x3, 0x65be, 0x5, 0x0, 0x1ff, 0xb7, 0xfff, 0x9, 0x1, 0xa9a, 0x3ff, 0x8, 0x7, 0x51, 0x2, 0x9, 0x4, 0x2, 0x5, 0x6, 0xa, 0x8, 0x1, 0x5, 0x1, 0xd0c8, 0x5, 0x1f, 0x2, 0x7, 0x678, 0x4, 0x6, 0x200, 0xd, 0x6d, 0x8, 0xff, 0x5, 0x0, 0x3, 0x932, 0x1, 0x2, 0x7, 0x80000000, 0x0, 0x1, 0x6, 0x8001, 0x9, 0xd3d5, 0x8, 0x3, 0x1, 0x5, 0x3ff, 0x3, 0x80, 0x40, 0x0, 0x1, 0x100, 0x78, 0x200, 0x0, 0xfff, 0x3, 0x80, 0x93e8, 0x9, 0x83f, 0xfff, 0x2, 0x9, 0x69, 0x80000000, 0x5, 0x7, 0xffffffff, 0x4, 0x80, 0x40, 0x9, 0x1ff, 0xffffffff, 0x8000, 0xe5, 0x80000001, 0x2, 0x6, 0x4, 0xffffff06, 0x7fff, 0x8001, 0xe40, 0x4, 0x3ff, 0x1, 0x6, 0xf1, 0x79f9, 0x7, 0x8, 0x76b, 0x4, 0xdf0, 0x1, 0x400, 0x2, 0x3, 0x5, 0xd3a, 0xf1, 0x9, 0x1b, 0x2, 0x8, 0xfffffff3, 0x8001, 0x840, 0xfffffffb, 0x0, 0xbd4, 0x10001, 0x1, 0x8, 0x2a, 0x8, 0x80000000, 0xffffffff, 0x8, 0x6, 0x80000000, 0x6, 0x6, 0x0, 0x6, 0x3ff, 0x5, 0xfffffffc, 0x0, 0x0, 0xd962, 0x9, 0x7fffffff, 0x8000, 0x8b5, 0x6, 0x0, 0x6, 0x4, 0x100, 0x5, 0x69a5, 0xfffffff8, 0x5, 0xfffffffc, 0x7, 0x1000, 0x80, 0xd75, 0x7, 0xffff7fff, 0x3, 0x4edd, 0x8, 0x8, 0x7, 0x10000, 0x7, 0x0, 0x6, 0x1, 0x7, 0x4, 0x5, 0x5, 0xfffffffe, 0x5, 0x9, 0x4, 0x7, 0x401, 0x4, 0x6, 0xfffeffff, 0x1, 0x2, 0xfffffffa, 0x6, 0x10000, 0x2, 0x10000, 0xc, 0x61443544, 0x10000, 0x33a8, 0x3, 0x10000000, 0xdff, 0x8, 0xb2f, 0x10001, 0x3c, 0x5, 0x7fffffff, 0x101, 0xac4, 0xfffffff9, 0xcc0, 0x7, 0x7f, 0x5, 0x800, 0x7f, 0x7, 0x5, 0x0, 0x8, 0x1, 0x401, 0x3, 0x2]}]}, @TCA_FW_POLICE={0x42c, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x95}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0xab, 0x0, 0x8, 0x8, 0xe9, 0x9, 0xfffffffc, 0xe74, 0x7, 0xffff8000, 0x1, 0x9, 0xffffffff, 0x40, 0xff, 0x4, 0xffff, 0x3, 0xfffffff6, 0x6, 0x7, 0x101, 0x7, 0x3, 0xfffffff2, 0x1, 0x2, 0x5, 0x6, 0x3, 0x7ff, 0x1ff, 0x1, 0x0, 0x1, 0x4, 0x100000, 0xffffbddf, 0x6, 0x6, 0x4, 0x8, 0x9, 0x0, 0x5, 0x6, 0xfff, 0xb596, 0xfffffffa, 0x1, 0x5, 0x2, 0x8000, 0x3, 0x3, 0x1, 0xfff, 0x10000, 0xfffffeff, 0x1, 0x5, 0x5, 0x0, 0x3, 0x7, 0xf9, 0x8, 0x3, 0xffffffff, 0x40, 0x5, 0x6, 0x5, 0x100, 0xfffffffd, 0xffff, 0x7f, 0x401, 0x3, 0xf433, 0x2, 0x7, 0x211, 0x1, 0x9, 0x3, 0x4, 0x9c2, 0x6, 0x8, 0x5, 0x5, 0x2b33, 0x967a, 0xc5ff, 0xf, 0xd, 0x3, 0x4, 0x2, 0x5, 0x8, 0x3, 0x6, 0x9, 0x7, 0x1, 0x5, 0x0, 0x8, 0xc, 0x71, 0x9, 0x9, 0x6, 0x1, 0x1, 0x2, 0x8, 0x7fff, 0x4, 0xfffffffe, 0x7ff, 0x9, 0x8, 0x3, 0x77d, 0x7fff, 0xffff8892, 0x8, 0x81, 0x7f, 0xfffffffd, 0x7, 0x400, 0x6, 0x9, 0x641, 0x1, 0x2, 0x5, 0x8, 0x3, 0x800, 0x10, 0x8, 0x175b4cff, 0x400, 0x7, 0xc7b4, 0x0, 0x87, 0x354d, 0x5, 0x7fffffff, 0x401, 0x1, 0xffff0001, 0x9, 0x2, 0x760, 0x1, 0xffffffff, 0x80000001, 0x1000, 0x7, 0x1, 0x3, 0x4, 0x0, 0xc8, 0x1, 0x2, 0x1, 0x81, 0x8, 0xf64, 0x2ec, 0x10001, 0x9833, 0x9, 0x5, 0xa42, 0x9, 0x2, 0x5, 0x9, 0x4, 0x7bb4d4fb, 0x5, 0xfffffff3, 0xf, 0x8, 0xfffffffc, 0x9, 0x6, 0x2, 0xa, 0x9, 0xffff, 0x1000000, 0x4, 0x81, 0x3, 0x7, 0x0, 0x80000000, 0x5, 0x20000000, 0x9, 0x4b0, 0x9, 0x6, 0xfffffc8a, 0x1, 0x8001, 0x3, 0x9, 0x7, 0x0, 0xfff, 0x1, 0x0, 0x8, 0x7, 0x3, 0x40, 0x7, 0x5b643608, 0x4, 0xd7b, 0x6, 0x5, 0x7, 0x4, 0xffffff48, 0x577, 0x7ff, 0x800, 0x3, 0x101, 0x8, 0x4, 0x5, 0x3, 0x3, 0x4, 0x9, 0xfffffffa, 0xa, 0x8, 0x1, 0xc, 0x80000001, 0xf3]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x44}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1}]}, @TCA_FW_MASK={0x8, 0x5, 0x7}]}}]}, 0x884}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/302, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', r11, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) r13 = memfd_create(&(0x7f0000001300)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0) r6 = epoll_create(0x9) syz_clone3(&(0x7f00000007c0)={0x104010080, &(0x7f0000000640)=0xffffffffffffffff, &(0x7f0000000680), &(0x7f00000006c0), {0x21}, &(0x7f0000000700)=""/45, 0x2d, &(0x7f0000000740)=""/5, &(0x7f0000000780)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) kcmp$KCMP_EPOLL_TFD(r5, 0x0, 0x7, r3, &(0x7f0000000840)={r6, r7, 0x14}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) socket$inet6_sctp(0xa, 0x5, 0x84) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, &(0x7f0000000580)="d05d8f83bb6d90f0086a822dd78de0fc30235d9b04c293c7c44b07b7675c305a425997aff4da6037cc52793135b48ab327d96cd684f9216a6e34bf1f25319888382a5ca90d62f9b0df679395ce72dbdc1dc28ed358a3", 0x56, 0x6, 0x0) bind$bt_hci(r9, &(0x7f0000000000)={0x1f, 0xffff, 0x3}, 0x6) close_range(r8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000006000040000000000007000000850000008900000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20c006, &(0x7f0000000380)={[{@grpjquota}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@grpquota}, {@grpquota}], [{@seclabel}]}, 0x1, 0x446, &(0x7f0000000d40)="$eJzs28tvG8UfAPDv2kn6/P1qqvLoAwgURMQjadJSeuACAokDSEhwKMeQpFWo26AmSLSKICBUjqgSd8QRib+AE1wQcELiCndUqUK5tMDFaOPdxHbttA5ONtSfj7TJzO44M1/vjj07kw2gbw2nP5KIvRHxa0Tsq2ebCwzXf91cXpz6c3lxKola7Y0/kpVyN5YXp/Ki+ev25JmBiNInSRxuU+/8pcvnJqvVmYtZfmzh/Ltj85cuPzN7fvLszNmZCxOnTp04Pv7cyYlnexJnGteNQx/MHTn4yltXX5s6ffXtH79O8vhb4uiR4fUOPl6r9bi6Yv2vIZ0MFNgQulKud9MYXOn/+6IcaydvX7z8caGNAzZVrVar3df58FINuIslUXQLgGLkX/Tp/W++bdHQY1u4/kL9BiiN+2a21Y8MRCkrM9hyf9tLwxFxeumvL9ItNmceAgCgybfp+OfpbPzXtPBTisZ5of9nayiViLgnIvZHxMmIOBAR90aslL0/Ih7osv7WRZJbxz+la13+ya6k47/ns7Wt5vFfPvqLSjni73y4XInB5MxsdeZY9p6MxOCOND++Th3fvfTLZ52ONY7/0i2tPx8LZu24NrCj+TXTkwuT/ybmRtc/ijg00C7+ZHUlIL0sDkbEoQ3WMfvkV0c6Hbt9/M2GGjM9WGeqfRnxRP38L0VL/Llk/fXJsZ1RnTk2ll8Vt/rp5yuvd6q/2/h7LT3/u9te/6vxV5LG9dr57uu48tunHe9pNnr9DyVvNu17f3Jh4eJ4xFDyar3RjfsnWspNrJVP4x852r7/74+1d+JwRKQX8YMR8VBEPJy1/ZGIeDQijq4T/w8vPvZO856ki/g3Vxr/dFfnfy0xFK172ifK577/pqnSSnQRf3r+T6ykRrI9d/L5dyft2tjVDAAAAP89pYjYG0lpdDVdKo2O1v+H/0DsLlXn5heeOjP33oXp+jMClRgs5TNd9fng+nzoeHZbn+cnWvLHs3njz8u7VvKjU3PV6aKDhz63p0P/T/1eLrp1wKbzvBb0L/0f+pf+D/1L/4f+1ab/7yqiHcDWa/f9/2EB7QC2Xkv/t+wHfcT9P/Qv/R/6l/4PfWl+V9z+Ifntmti5PZrRn4koFVd7PkNV+JtwFycK/mACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADokX8CAAD//2Ts5lU=") accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) 246.329786ms ago: executing program 1 (id=9430): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2, 0x0, 0x178}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x7, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000900)='syzkaller\x00', 0x1fffe, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x4000001}, 0x94) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)=0x0) r6 = epoll_create(0x9) syz_clone3(&(0x7f00000007c0)={0x104010080, &(0x7f0000000640)=0xffffffffffffffff, &(0x7f0000000680), &(0x7f00000006c0), {0x21}, &(0x7f0000000700)=""/45, 0x2d, &(0x7f0000000740)=""/5, &(0x7f0000000780)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) kcmp$KCMP_EPOLL_TFD(r5, 0x0, 0x7, r3, &(0x7f0000000840)={r6, r7, 0x14}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mq_timedsend(0xffffffffffffffff, &(0x7f0000000580)="d05d8f83bb6d90f0086a822dd78de0fc30235d9b04c293c7c44b07b7675c305a425997aff4da6037cc52793135b48ab327d96cd684f9216a6e34bf1f25319888382a5ca90d62f9b0df679395ce72dbdc1dc28ed358a3", 0x56, 0x6, 0x0) bind$bt_hci(r9, &(0x7f0000000000)={0x1f, 0xffff, 0x3}, 0x6) close_range(r8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="13bc", @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000006000040000000000007000000850000008900000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20c006, &(0x7f0000000380)={[{@grpjquota}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@grpquota}, {@grpquota}], [{@seclabel}]}, 0x1, 0x446, &(0x7f0000000d40)="$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") accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) 69.486379ms ago: executing program 6 (id=9431): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) unshare(0x38000600) munlockall() r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='mm_page_alloc\x00', r2}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b703000008000040850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r4}, 0x10) munlock(&(0x7f00009c1000/0x3000)=nil, 0x3000) 531.04µs ago: executing program 6 (id=9432): open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x10000}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000580)={r0, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=[0x0], 0x0, 0x5, 0x1, 0x0, r1}}, 0x40) 0s ago: executing program 6 (id=9433): socket$igmp(0x2, 0x3, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0xc000200d}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket$inet6(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000005c0)={0x6000000b}) close_range(r3, r5, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kexec_load(0x3e00, 0x0, 0x0, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r9, {0x0, 0x4}, {}, {0xfff2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0xfffffffd, 0x3ff, 0x20000008, 0x6, 0x2}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) memfd_secret(0x80000) kernel console output (not intermixed with test programs): pid=28810 comm="syz.2.8172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0caa9fe929 code=0x7ffc0000 [ 665.151683][ T29] audit: type=1326 audit(1750940149.421:31278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28810 comm="syz.2.8172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0caa9fe929 code=0x7ffc0000 [ 665.175310][ T29] audit: type=1326 audit(1750940149.421:31279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28810 comm="syz.2.8172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0caa9fe929 code=0x7ffc0000 [ 665.199002][ T29] audit: type=1326 audit(1750940149.421:31280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28810 comm="syz.2.8172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0caa9fe929 code=0x7ffc0000 [ 665.455939][T28874] wireguard0: entered promiscuous mode [ 665.552301][T28900] SELinux: syz.4.8208 (28900) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 665.970192][T28931] bridge12: entered promiscuous mode [ 665.976776][T28931] bridge12: entered allmulticast mode [ 666.057015][T28942] wireguard0: entered promiscuous mode [ 666.362669][ T23] IPVS: starting estimator thread 0... [ 666.371832][T28969] net_ratelimit: 38 callbacks suppressed [ 666.371852][T28969] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 666.455990][T28974] IPVS: using max 2304 ests per chain, 115200 per kthread [ 667.174282][T29011] __nla_validate_parse: 3 callbacks suppressed [ 667.174301][T29011] netlink: 80 bytes leftover after parsing attributes in process `syz.6.8247'. [ 667.341359][T29011] bridge3: entered promiscuous mode [ 667.350645][T29011] bridge3: entered allmulticast mode [ 668.305530][T29068] wireguard0: entered promiscuous mode [ 668.451785][T29088] serio: Serial port ptm0 [ 668.504061][T29088] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(10) [ 668.510725][T29088] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 668.518441][T29088] vhci_hcd vhci_hcd.0: Device attached [ 668.549839][T29092] vhci_hcd: connection closed [ 668.555574][ T9173] vhci_hcd: stop threads [ 668.564698][ T9173] vhci_hcd: release socket [ 668.569193][ T9173] vhci_hcd: disconnect device [ 668.821057][T29114] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 668.838913][T29114] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 668.932231][T29122] wireguard0: entered promiscuous mode [ 669.113276][T29132] syz.6.8295 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 669.428689][T29158] random: crng reseeded on system resumption [ 669.958859][T29208] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 669.982087][T29208] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8329'. [ 670.043366][T29211] wireguard0: entered promiscuous mode [ 670.265606][T29228] random: crng reseeded on system resumption [ 670.295968][T29228] FAULT_INJECTION: forcing a failure. [ 670.295968][T29228] name failslab, interval 1, probability 0, space 0, times 0 [ 670.308696][T29228] CPU: 0 UID: 0 PID: 29228 Comm: syz.2.8337 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 670.308738][T29228] Tainted: [W]=WARN [ 670.308747][T29228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 670.308764][T29228] Call Trace: [ 670.308775][T29228] [ 670.308786][T29228] __dump_stack+0x1d/0x30 [ 670.308829][T29228] dump_stack_lvl+0xe8/0x140 [ 670.308854][T29228] dump_stack+0x15/0x1b [ 670.308874][T29228] should_fail_ex+0x265/0x280 [ 670.308967][T29228] ? dev_create_fw_entry+0x43/0xf0 [ 670.309007][T29228] should_failslab+0x8c/0xb0 [ 670.309036][T29228] __kmalloc_cache_noprof+0x4c/0x320 [ 670.309160][T29228] ? __pfx_fw_name_devm_release+0x10/0x10 [ 670.309195][T29228] dev_create_fw_entry+0x43/0xf0 [ 670.309230][T29228] ? __pfx_devm_name_match+0x10/0x10 [ 670.309323][T29228] devres_for_each_res+0xff/0x160 [ 670.309351][T29228] ? __pfx_devm_name_match+0x10/0x10 [ 670.309408][T29228] ? __pfx_dev_create_fw_entry+0x10/0x10 [ 670.309513][T29228] dev_cache_fw_image+0x62/0x270 [ 670.309663][T29228] ? __pfx_dev_cache_fw_image+0x10/0x10 [ 670.309777][T29228] dpm_for_each_dev+0x5d/0xa0 [ 670.309824][T29228] ? __pfx_fw_pm_notify+0x10/0x10 [ 670.309867][T29228] fw_pm_notify+0x164/0x1a0 [ 670.309898][T29228] ? __pfx_autoremove_wake_function+0x10/0x10 [ 670.309934][T29228] notifier_call_chain_robust+0x74/0x350 [ 670.310031][T29228] blocking_notifier_call_chain_robust+0x50/0x80 [ 670.310069][T29228] pm_notifier_call_chain_robust+0x2c/0x60 [ 670.310116][T29228] snapshot_open+0x120/0x270 [ 670.310155][T29228] ? __pfx_snapshot_open+0x10/0x10 [ 670.310224][T29228] misc_open+0x1d3/0x200 [ 670.310247][T29228] chrdev_open+0x2eb/0x3a0 [ 670.310270][T29228] do_dentry_open+0x646/0xa20 [ 670.310348][T29228] ? __pfx_chrdev_open+0x10/0x10 [ 670.310373][T29228] vfs_open+0x37/0x1e0 [ 670.310399][T29228] path_openat+0x1c5e/0x2170 [ 670.310440][T29228] do_filp_open+0x109/0x230 [ 670.310545][T29228] do_sys_openat2+0xa6/0x110 [ 670.310574][T29228] __x64_sys_openat+0xf2/0x120 [ 670.310668][T29228] x64_sys_call+0x1af/0x2fb0 [ 670.310690][T29228] do_syscall_64+0xd2/0x200 [ 670.310708][T29228] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 670.310749][T29228] ? clear_bhb_loop+0x40/0x90 [ 670.310771][T29228] ? clear_bhb_loop+0x40/0x90 [ 670.310794][T29228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 670.310815][T29228] RIP: 0033:0x7f0caa9fe929 [ 670.310892][T29228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 670.310910][T29228] RSP: 002b:00007f0ca9067038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 670.310930][T29228] RAX: ffffffffffffffda RBX: 00007f0caac25fa0 RCX: 00007f0caa9fe929 [ 670.310942][T29228] RDX: 0000000000080101 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 670.311006][T29228] RBP: 00007f0ca9067090 R08: 0000000000000000 R09: 0000000000000000 [ 670.311018][T29228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 670.311031][T29228] R13: 0000000000000000 R14: 00007f0caac25fa0 R15: 00007ffe65619b58 [ 670.311050][T29228] [ 670.865872][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 670.865890][ T29] audit: type=1326 audit(1750940155.271:31477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29234 comm="syz.5.8340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 670.876158][T29233] FAULT_INJECTION: forcing a failure. [ 670.876158][T29233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 670.895778][ T29] audit: type=1326 audit(1750940155.271:31478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29234 comm="syz.5.8340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 670.908886][T29233] CPU: 1 UID: 0 PID: 29233 Comm: syz.4.8336 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 670.908976][T29233] Tainted: [W]=WARN [ 670.908987][T29233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 670.909005][T29233] Call Trace: [ 670.909025][T29233] [ 670.909037][T29233] __dump_stack+0x1d/0x30 [ 670.909068][T29233] dump_stack_lvl+0xe8/0x140 [ 670.909096][T29233] dump_stack+0x15/0x1b [ 670.909166][T29233] should_fail_ex+0x265/0x280 [ 670.909211][T29233] should_fail+0xb/0x20 [ 670.909250][T29233] should_fail_usercopy+0x1a/0x20 [ 670.909296][T29233] _copy_from_user+0x1c/0xb0 [ 670.909375][T29233] ___sys_recvmsg+0xaa/0x370 [ 670.909419][T29233] do_recvmmsg+0x1ef/0x540 [ 670.909529][T29233] ? fput+0x8f/0xc0 [ 670.909565][T29233] __x64_sys_recvmmsg+0xe5/0x170 [ 670.909595][T29233] x64_sys_call+0x1c6a/0x2fb0 [ 670.909628][T29233] do_syscall_64+0xd2/0x200 [ 670.909754][T29233] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 670.909792][T29233] ? clear_bhb_loop+0x40/0x90 [ 670.909823][T29233] ? clear_bhb_loop+0x40/0x90 [ 670.909899][T29233] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 670.909928][T29233] RIP: 0033:0x7efc1109e929 [ 670.909986][T29233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 670.910010][T29233] RSP: 002b:00007efc0f6e6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 670.910044][T29233] RAX: ffffffffffffffda RBX: 00007efc112c6080 RCX: 00007efc1109e929 [ 670.910062][T29233] RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 [ 670.910080][T29233] RBP: 00007efc0f6e6090 R08: 0000000000000000 R09: 0000000000000000 [ 670.910098][T29233] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 670.910154][T29233] R13: 0000000000000000 R14: 00007efc112c6080 R15: 00007ffea313ca88 [ 670.910182][T29233] [ 671.124039][ T29] audit: type=1326 audit(1750940155.271:31479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29234 comm="syz.5.8340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.194502][ T29] audit: type=1326 audit(1750940155.601:31480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.218563][ T29] audit: type=1326 audit(1750940155.601:31481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.242712][ T29] audit: type=1326 audit(1750940155.601:31482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=443 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.266337][ T29] audit: type=1326 audit(1750940155.601:31483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.290010][ T29] audit: type=1326 audit(1750940155.601:31484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.377335][T29245] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 671.383994][T29245] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 671.391663][T29245] vhci_hcd vhci_hcd.0: Device attached [ 671.414462][T29247] vhci_hcd: connection closed [ 671.414774][ T9173] vhci_hcd: stop threads [ 671.423852][ T9173] vhci_hcd: release socket [ 671.428350][ T9173] vhci_hcd: disconnect device [ 671.529783][ T29] audit: type=1326 audit(1750940155.731:31485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.553533][ T29] audit: type=1326 audit(1750940155.731:31486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29237 comm="syz.5.8341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 671.855478][T29274] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 671.890276][T29274] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8355'. [ 672.277789][T29304] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 672.292555][ T12] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 672.343943][T29304] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 672.385640][ T12] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 672.391595][T29314] SELinux: syz.1.8368 (29314) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 672.458590][ T12] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 672.544083][ T12] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 673.478724][ T12] bond0 (unregistering): Released all slaves [ 673.533366][ T12] hsr_slave_0: left promiscuous mode [ 673.556105][ T12] hsr_slave_1: left promiscuous mode [ 673.576478][ T12] veth1_macvtap: left promiscuous mode [ 673.599587][ T12] veth0_macvtap: left promiscuous mode [ 673.625647][ T12] veth1_vlan: left promiscuous mode [ 673.631782][ T12] veth0_vlan: left promiscuous mode [ 673.836107][T29367] wireguard0: entered promiscuous mode [ 673.842632][T29376] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8390'. [ 673.912398][T29297] chnl_net:caif_netlink_parms(): no params data found [ 674.057914][T29297] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.065063][T29297] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.083214][T29297] bridge_slave_0: entered allmulticast mode [ 674.090014][T29297] bridge_slave_0: entered promiscuous mode [ 674.097006][T29297] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.104205][T29297] bridge0: port 2(bridge_slave_1) entered disabled state [ 674.113914][T29297] bridge_slave_1: entered allmulticast mode [ 674.121932][T29297] bridge_slave_1: entered promiscuous mode [ 674.130515][T29385] netlink: 92 bytes leftover after parsing attributes in process `syz.5.8392'. [ 674.134123][ T12] IPVS: stop unused estimator thread 0... [ 674.184764][T29297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 674.196955][T29297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 674.221177][T29297] team0: Port device team_slave_0 added [ 674.228091][T29297] team0: Port device team_slave_1 added [ 674.266078][T29400] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 674.276370][T29400] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8398'. [ 674.286837][T29297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 674.293854][T29297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 674.319964][T29297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 674.334748][T29297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 674.341804][T29297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 674.367903][T29297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 674.384585][T29404] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8400'. [ 674.416589][T29297] hsr_slave_0: entered promiscuous mode [ 674.422936][T29297] hsr_slave_1: entered promiscuous mode [ 674.429229][T29297] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 674.436924][T29297] Cannot create hsr debugfs directory [ 674.456274][T29406] wireguard0: entered promiscuous mode [ 674.707681][T29297] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 674.717153][T29297] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 674.726095][T29297] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 674.737568][T29297] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 674.849818][T29297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 674.886882][T29297] 8021q: adding VLAN 0 to HW filter on device team0 [ 674.904547][ T9170] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.911693][ T9170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 674.949520][ T9170] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.956728][ T9170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 674.980330][T29442] serio: Serial port ptm0 [ 674.990608][T29297] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 675.001079][T29297] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 675.037377][T29442] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(10) [ 675.044101][T29442] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 675.051874][T29442] vhci_hcd vhci_hcd.0: Device attached [ 675.090832][T29450] vhci_hcd: connection closed [ 675.091118][ T9173] vhci_hcd: stop threads [ 675.100212][ T9173] vhci_hcd: release socket [ 675.104705][ T9173] vhci_hcd: disconnect device [ 675.202301][T29297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 675.578147][T29297] veth0_vlan: entered promiscuous mode [ 675.621382][T29297] veth1_vlan: entered promiscuous mode [ 675.677915][T29297] veth0_macvtap: entered promiscuous mode [ 675.705355][T29297] veth1_macvtap: entered promiscuous mode [ 675.732506][T29501] wireguard0: entered promiscuous mode [ 675.755796][T29297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 675.768837][T29297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 675.778621][T29297] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 675.787490][T29297] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 675.796683][T29297] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 675.805680][T29297] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 675.899178][ T29] kauditd_printk_skb: 306 callbacks suppressed [ 675.899220][ T29] audit: type=1326 audit(1750940160.301:31793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29519 comm="syz.6.8442" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 675.929198][ T29] audit: type=1326 audit(1750940160.301:31794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29519 comm="syz.6.8442" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 676.006517][ T29] audit: type=1400 audit(1750940160.391:31795): avc: denied { write } for pid=29297 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 676.033646][ T29] audit: type=1400 audit(1750940160.391:31796): avc: denied { open } for pid=29297 comm="syz-executor" path="/syzcgroup/cpu/syz4/cgroup.procs" dev="cgroup" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 676.151134][ T29] audit: type=1400 audit(1750940160.481:31797): avc: denied { read } for pid=29532 comm="syz.6.8447" name="qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 676.174247][ T29] audit: type=1400 audit(1750940160.481:31798): avc: denied { open } for pid=29532 comm="syz.6.8447" path="/dev/qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 676.197787][ T29] audit: type=1400 audit(1750940160.491:31799): avc: denied { mount } for pid=29537 comm="syz.2.8449" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 676.220269][ T29] audit: type=1400 audit(1750940160.501:31800): avc: denied { create } for pid=29537 comm="syz.2.8449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 676.240182][ T29] audit: type=1400 audit(1750940160.511:31801): avc: denied { unmount } for pid=21270 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 676.359462][T29554] bond1: entered promiscuous mode [ 676.364635][T29554] bond1: entered allmulticast mode [ 676.386627][T29554] 8021q: adding VLAN 0 to HW filter on device bond1 [ 676.436799][T29554] bond1 (unregistering): Released all slaves [ 676.505055][ T29] audit: type=1326 audit(1750940160.731:31802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29553 comm="syz.5.8456" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f638b5de929 code=0x7ffc0000 [ 676.656862][T29571] serio: Serial port ptm0 [ 676.718211][T29571] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.737451][T29571] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 676.829780][T29589] SELinux: syz.2.8470 (29589) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 676.965907][T29595] wireguard0: entered promiscuous mode [ 677.198277][T29622] SELinux: syz.4.8483 (29622) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 677.398650][T29639] wireguard0: entered promiscuous mode [ 677.428431][T29644] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 677.435411][ T23] IPVS: starting estimator thread 0... [ 677.453876][T29644] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8492'. [ 677.482283][T29646] netlink: 92 bytes leftover after parsing attributes in process `syz.1.8494'. [ 677.536254][T29650] IPVS: using max 2352 ests per chain, 117600 per kthread [ 677.563324][T29658] SELinux: syz.5.8496 (29658) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 677.792910][T29679] FAULT_INJECTION: forcing a failure. [ 677.792910][T29679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 677.806162][T29679] CPU: 1 UID: 0 PID: 29679 Comm: syz.4.8506 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 677.806205][T29679] Tainted: [W]=WARN [ 677.806213][T29679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 677.806229][T29679] Call Trace: [ 677.806236][T29679] [ 677.806244][T29679] __dump_stack+0x1d/0x30 [ 677.806265][T29679] dump_stack_lvl+0xe8/0x140 [ 677.806318][T29679] dump_stack+0x15/0x1b [ 677.806334][T29679] should_fail_ex+0x265/0x280 [ 677.806447][T29679] should_fail+0xb/0x20 [ 677.806483][T29679] should_fail_usercopy+0x1a/0x20 [ 677.806516][T29679] _copy_from_user+0x1c/0xb0 [ 677.806566][T29679] ucma_write+0xd9/0x250 [ 677.806585][T29679] ? __pfx_ucma_write+0x10/0x10 [ 677.806604][T29679] vfs_write+0x266/0x8e0 [ 677.806666][T29679] ? __rcu_read_unlock+0x4f/0x70 [ 677.806692][T29679] ? __fget_files+0x184/0x1c0 [ 677.806725][T29679] ksys_write+0xda/0x1a0 [ 677.806758][T29679] __x64_sys_write+0x40/0x50 [ 677.806814][T29679] x64_sys_call+0x2cdd/0x2fb0 [ 677.806836][T29679] do_syscall_64+0xd2/0x200 [ 677.806866][T29679] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 677.806903][T29679] ? clear_bhb_loop+0x40/0x90 [ 677.806929][T29679] ? clear_bhb_loop+0x40/0x90 [ 677.806956][T29679] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 677.806979][T29679] RIP: 0033:0x7f5dd11ce929 [ 677.806994][T29679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 677.807047][T29679] RSP: 002b:00007f5dcf837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 677.807072][T29679] RAX: ffffffffffffffda RBX: 00007f5dd13f5fa0 RCX: 00007f5dd11ce929 [ 677.807088][T29679] RDX: 0000000000000048 RSI: 0000200000000180 RDI: 0000000000000003 [ 677.807103][T29679] RBP: 00007f5dcf837090 R08: 0000000000000000 R09: 0000000000000000 [ 677.807119][T29679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 677.807134][T29679] R13: 0000000000000000 R14: 00007f5dd13f5fa0 R15: 00007fff3a00b218 [ 677.807156][T29679] [ 678.044789][T29685] SELinux: syz.2.8508 (29685) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 678.099043][T29687] bridge_slave_0: left allmulticast mode [ 678.104844][T29687] bridge_slave_0: left promiscuous mode [ 678.110785][T29687] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.123260][T29687] bridge_slave_1: left allmulticast mode [ 678.129149][T29687] bridge_slave_1: left promiscuous mode [ 678.134994][T29687] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.152061][T29687] bond0: (slave bond_slave_0): Releasing backup interface [ 678.170558][T29687] bond0: (slave bond_slave_1): Releasing backup interface [ 678.206879][T29687] team0: Port device team_slave_0 removed [ 678.218724][T29696] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(9) [ 678.225328][T29696] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 678.225559][T29687] team0: Port device team_slave_1 removed [ 678.232965][T29696] vhci_hcd vhci_hcd.0: Device attached [ 678.240600][T29687] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 678.252116][T29687] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 678.261579][T29697] vhci_hcd: connection closed [ 678.262804][ T9173] vhci_hcd: stop threads [ 678.272143][ T9173] vhci_hcd: release socket [ 678.276688][ T9173] vhci_hcd: disconnect device [ 678.283773][T29687] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 678.291360][T29687] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 679.005427][T29757] FAULT_INJECTION: forcing a failure. [ 679.005427][T29757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.018785][T29757] CPU: 1 UID: 0 PID: 29757 Comm: syz.2.8536 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 679.018892][T29757] Tainted: [W]=WARN [ 679.018901][T29757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 679.018918][T29757] Call Trace: [ 679.018927][T29757] [ 679.018938][T29757] __dump_stack+0x1d/0x30 [ 679.018964][T29757] dump_stack_lvl+0xe8/0x140 [ 679.018988][T29757] dump_stack+0x15/0x1b [ 679.019022][T29757] should_fail_ex+0x265/0x280 [ 679.019053][T29757] should_fail_alloc_page+0xf2/0x100 [ 679.019124][T29757] __alloc_frozen_pages_noprof+0xff/0x360 [ 679.019165][T29757] alloc_pages_mpol+0xb3/0x250 [ 679.019204][T29757] folio_alloc_mpol_noprof+0x39/0x80 [ 679.019275][T29757] shmem_get_folio_gfp+0x3cf/0xd60 [ 679.019319][T29757] ? simple_xattr_get+0xb9/0x120 [ 679.019351][T29757] shmem_write_begin+0xa8/0x190 [ 679.019440][T29757] generic_perform_write+0x184/0x490 [ 679.019484][T29757] shmem_file_write_iter+0xc5/0xf0 [ 679.019509][T29757] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 679.019530][T29757] vfs_write+0x4a0/0x8e0 [ 679.019569][T29757] ksys_write+0xda/0x1a0 [ 679.019654][T29757] __x64_sys_write+0x40/0x50 [ 679.019690][T29757] x64_sys_call+0x2cdd/0x2fb0 [ 679.019788][T29757] do_syscall_64+0xd2/0x200 [ 679.019811][T29757] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 679.019857][T29757] ? clear_bhb_loop+0x40/0x90 [ 679.019883][T29757] ? clear_bhb_loop+0x40/0x90 [ 679.019907][T29757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.019928][T29757] RIP: 0033:0x7f0caa9fe929 [ 679.020013][T29757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 679.020037][T29757] RSP: 002b:00007f0ca9067038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 679.020060][T29757] RAX: ffffffffffffffda RBX: 00007f0caac25fa0 RCX: 00007f0caa9fe929 [ 679.020073][T29757] RDX: 000000000208e24b RSI: 0000200000000000 RDI: 0000000000000003 [ 679.020127][T29757] RBP: 00007f0ca9067090 R08: 0000000000000000 R09: 0000000000000000 [ 679.020144][T29757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.020159][T29757] R13: 0000000000000000 R14: 00007f0caac25fa0 R15: 00007ffe65619b58 [ 679.020180][T29757] [ 679.401115][T29770] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(9) [ 679.407693][T29770] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 679.415323][T29770] vhci_hcd vhci_hcd.0: Device attached [ 679.434864][T29771] vhci_hcd: connection closed [ 679.435087][ T12] vhci_hcd: stop threads [ 679.444460][ T12] vhci_hcd: release socket [ 679.448949][ T12] vhci_hcd: disconnect device [ 679.450543][T29774] SELinux: syz.1.8543 (29774) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 679.471895][T29777] bridge_slave_0: left allmulticast mode [ 679.477795][T29777] bridge_slave_0: left promiscuous mode [ 679.483680][T29777] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.500430][T29777] bridge_slave_1: left allmulticast mode [ 679.506310][T29777] bridge_slave_1: left promiscuous mode [ 679.512028][T29777] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.530578][T29777] bond0: (slave bond_slave_0): Releasing backup interface [ 679.544740][T29777] bond0: (slave bond_slave_1): Releasing backup interface [ 679.558596][T29777] team0: Port device team_slave_0 removed [ 679.569181][T29777] team0: Port device team_slave_1 removed [ 679.576182][T29777] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 679.583642][T29777] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 679.592981][T29777] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 679.600481][T29777] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 679.972067][T29813] SELinux: syz.2.8556 (29813) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 680.611617][T29864] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 680.621991][T29864] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8576'. [ 680.661329][T29862] wireguard0: entered promiscuous mode [ 680.721091][T29868] netlink: 92 bytes leftover after parsing attributes in process `syz.1.8577'. [ 680.933037][ T29] kauditd_printk_skb: 272 callbacks suppressed [ 680.933054][ T29] audit: type=1400 audit(1750940165.341:32075): avc: denied { getopt } for pid=29881 comm="syz.1.8584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 681.074590][ T29] audit: type=1326 audit(1750940165.481:32076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.146699][ T29] audit: type=1326 audit(1750940165.511:32077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=117 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.170545][ T29] audit: type=1326 audit(1750940165.511:32078): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.194511][ T29] audit: type=1326 audit(1750940165.511:32079): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.218563][ T29] audit: type=1326 audit(1750940165.511:32080): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=251 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.242803][ T29] audit: type=1326 audit(1750940165.511:32081): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.266970][ T29] audit: type=1326 audit(1750940165.511:32082): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.1.8591" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 681.291014][ T29] audit: type=1400 audit(1750940165.561:32083): avc: denied { connect } for pid=29899 comm="syz.1.8592" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 681.319931][T29897] wireguard0: entered promiscuous mode [ 681.457739][T29911] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 681.485007][ T29] audit: type=1400 audit(1750940165.731:32084): avc: denied { write } for pid=29899 comm="syz.1.8592" path="socket:[99719]" dev="sockfs" ino=99719 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 681.537520][T29911] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8595'. [ 681.711283][T29940] serio: Serial port ptm0 [ 681.765179][T29945] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 681.796177][T29945] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 681.979428][T29961] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 681.999177][T29961] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8613'. [ 682.084992][T29967] netlink: 92 bytes leftover after parsing attributes in process `syz.6.8616'. [ 682.545218][T30002] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 682.571866][T30002] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8629'. [ 682.609731][T30007] SELinux: syz.6.8631 (30007) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 682.783556][T30013] netlink: 92 bytes leftover after parsing attributes in process `syz.4.8634'. [ 683.044704][T30028] bridge4: entered promiscuous mode [ 683.051314][T30028] bridge4: entered allmulticast mode [ 683.073057][T30032] wireguard0: entered promiscuous mode [ 683.264473][T30045] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8644'. [ 683.830660][T30083] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8661'. [ 683.960224][T30093] SELinux: syz.5.8664 (30093) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 684.060057][T30102] FAULT_INJECTION: forcing a failure. [ 684.060057][T30102] name failslab, interval 1, probability 0, space 0, times 0 [ 684.072805][T30102] CPU: 0 UID: 0 PID: 30102 Comm: syz.5.8669 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 684.072847][T30102] Tainted: [W]=WARN [ 684.072864][T30102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 684.072881][T30102] Call Trace: [ 684.072888][T30102] [ 684.072930][T30102] __dump_stack+0x1d/0x30 [ 684.072953][T30102] dump_stack_lvl+0xe8/0x140 [ 684.072972][T30102] dump_stack+0x15/0x1b [ 684.072988][T30102] should_fail_ex+0x265/0x280 [ 684.073088][T30102] should_failslab+0x8c/0xb0 [ 684.073119][T30102] kmem_cache_alloc_noprof+0x50/0x310 [ 684.073182][T30102] ? skb_clone+0x151/0x1f0 [ 684.073208][T30102] skb_clone+0x151/0x1f0 [ 684.073232][T30102] __netlink_deliver_tap+0x2c9/0x500 [ 684.073290][T30102] netlink_unicast+0x64c/0x670 [ 684.073326][T30102] netlink_sendmsg+0x58b/0x6b0 [ 684.073347][T30102] ? __pfx_netlink_sendmsg+0x10/0x10 [ 684.073396][T30102] __sock_sendmsg+0x142/0x180 [ 684.073482][T30102] ____sys_sendmsg+0x31e/0x4e0 [ 684.073525][T30102] ___sys_sendmsg+0x17b/0x1d0 [ 684.073586][T30102] __x64_sys_sendmsg+0xd4/0x160 [ 684.073623][T30102] x64_sys_call+0x2999/0x2fb0 [ 684.073689][T30102] do_syscall_64+0xd2/0x200 [ 684.073708][T30102] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 684.073735][T30102] ? clear_bhb_loop+0x40/0x90 [ 684.073837][T30102] ? clear_bhb_loop+0x40/0x90 [ 684.073871][T30102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 684.073899][T30102] RIP: 0033:0x7f638b5de929 [ 684.073919][T30102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 684.074002][T30102] RSP: 002b:00007f6389c47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 684.074021][T30102] RAX: ffffffffffffffda RBX: 00007f638b805fa0 RCX: 00007f638b5de929 [ 684.074037][T30102] RDX: 0000000000000000 RSI: 0000200000001ac0 RDI: 0000000000000006 [ 684.074053][T30102] RBP: 00007f6389c47090 R08: 0000000000000000 R09: 0000000000000000 [ 684.074070][T30102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.074084][T30102] R13: 0000000000000000 R14: 00007f638b805fa0 R15: 00007ffe52328308 [ 684.074137][T30102] [ 684.074313][T30102] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8669'. [ 684.729599][T30136] FAULT_INJECTION: forcing a failure. [ 684.729599][T30136] name failslab, interval 1, probability 0, space 0, times 0 [ 684.742467][T30136] CPU: 1 UID: 0 PID: 30136 Comm: syz.2.8683 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 684.742519][T30136] Tainted: [W]=WARN [ 684.742525][T30136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 684.742536][T30136] Call Trace: [ 684.742542][T30136] [ 684.742617][T30136] __dump_stack+0x1d/0x30 [ 684.742635][T30136] dump_stack_lvl+0xe8/0x140 [ 684.742653][T30136] dump_stack+0x15/0x1b [ 684.742735][T30136] should_fail_ex+0x265/0x280 [ 684.742763][T30136] should_failslab+0x8c/0xb0 [ 684.742869][T30136] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 684.742907][T30136] ? sidtab_sid2str_get+0xa0/0x130 [ 684.742936][T30136] kmemdup_noprof+0x2b/0x70 [ 684.743051][T30136] sidtab_sid2str_get+0xa0/0x130 [ 684.743073][T30136] security_sid_to_context_core+0x1eb/0x2e0 [ 684.743095][T30136] security_sid_to_context+0x27/0x40 [ 684.743114][T30136] selinux_lsmprop_to_secctx+0x67/0xf0 [ 684.743193][T30136] security_lsmprop_to_secctx+0x43/0x80 [ 684.743220][T30136] audit_log_task_context+0x77/0x190 [ 684.743252][T30136] audit_log_task+0xf4/0x250 [ 684.743287][T30136] audit_seccomp+0x61/0x100 [ 684.743310][T30136] ? __seccomp_filter+0x68c/0x10d0 [ 684.743353][T30136] __seccomp_filter+0x69d/0x10d0 [ 684.743374][T30136] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 684.743425][T30136] ? vfs_write+0x75e/0x8e0 [ 684.743458][T30136] __secure_computing+0x82/0x150 [ 684.743528][T30136] syscall_trace_enter+0xcf/0x1e0 [ 684.743550][T30136] do_syscall_64+0xac/0x200 [ 684.743566][T30136] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 684.743588][T30136] ? clear_bhb_loop+0x40/0x90 [ 684.743614][T30136] ? clear_bhb_loop+0x40/0x90 [ 684.743720][T30136] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 684.743740][T30136] RIP: 0033:0x7f0caa9fe929 [ 684.743754][T30136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 684.743769][T30136] RSP: 002b:00007f0ca9067038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 684.743786][T30136] RAX: ffffffffffffffda RBX: 00007f0caac25fa0 RCX: 00007f0caa9fe929 [ 684.743797][T30136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 684.743855][T30136] RBP: 00007f0ca9067090 R08: 0000000000000000 R09: 0000000000000000 [ 684.743866][T30136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.743877][T30136] R13: 0000000000000000 R14: 00007f0caac25fa0 R15: 00007ffe65619b58 [ 684.743927][T30136] [ 685.181594][T30160] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 685.191445][T30160] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 685.369995][T30166] bridge1: entered promiscuous mode [ 685.376394][T30166] bridge1: entered allmulticast mode [ 685.842182][T30189] FAULT_INJECTION: forcing a failure. [ 685.842182][T30189] name failslab, interval 1, probability 0, space 0, times 0 [ 685.855080][T30189] CPU: 1 UID: 0 PID: 30189 Comm: syz.6.8707 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 685.855122][T30189] Tainted: [W]=WARN [ 685.855131][T30189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 685.855147][T30189] Call Trace: [ 685.855155][T30189] [ 685.855165][T30189] __dump_stack+0x1d/0x30 [ 685.855192][T30189] dump_stack_lvl+0xe8/0x140 [ 685.855217][T30189] dump_stack+0x15/0x1b [ 685.855250][T30189] should_fail_ex+0x265/0x280 [ 685.855305][T30189] should_failslab+0x8c/0xb0 [ 685.855335][T30189] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 685.855374][T30189] ? sidtab_sid2str_get+0xa0/0x130 [ 685.855406][T30189] kmemdup_noprof+0x2b/0x70 [ 685.855474][T30189] sidtab_sid2str_get+0xa0/0x130 [ 685.855504][T30189] security_sid_to_context_core+0x1eb/0x2e0 [ 685.855585][T30189] security_sid_to_context+0x27/0x40 [ 685.855741][T30189] selinux_lsmprop_to_secctx+0x67/0xf0 [ 685.855767][T30189] security_lsmprop_to_secctx+0x43/0x80 [ 685.855805][T30189] audit_log_task_context+0x77/0x190 [ 685.855933][T30189] audit_log_task+0xf4/0x250 [ 685.855974][T30189] audit_seccomp+0x61/0x100 [ 685.856092][T30189] ? __seccomp_filter+0x68c/0x10d0 [ 685.856193][T30189] __seccomp_filter+0x69d/0x10d0 [ 685.856224][T30189] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 685.856270][T30189] ? vfs_write+0x75e/0x8e0 [ 685.856310][T30189] ? __rcu_read_unlock+0x4f/0x70 [ 685.856393][T30189] ? __fget_files+0x184/0x1c0 [ 685.856422][T30189] __secure_computing+0x82/0x150 [ 685.856486][T30189] syscall_trace_enter+0xcf/0x1e0 [ 685.856566][T30189] do_syscall_64+0xac/0x200 [ 685.856610][T30189] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 685.856650][T30189] ? clear_bhb_loop+0x40/0x90 [ 685.856674][T30189] ? clear_bhb_loop+0x40/0x90 [ 685.856699][T30189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 685.856739][T30189] RIP: 0033:0x7f1c299ae929 [ 685.856763][T30189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 685.856866][T30189] RSP: 002b:00007f1c28017038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 685.856891][T30189] RAX: ffffffffffffffda RBX: 00007f1c29bd5fa0 RCX: 00007f1c299ae929 [ 685.856908][T30189] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 685.856959][T30189] RBP: 00007f1c28017090 R08: 0000000000000000 R09: 0000000000000000 [ 685.856972][T30189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.856984][T30189] R13: 0000000000000000 R14: 00007f1c29bd5fa0 R15: 00007ffd6ad47588 [ 685.857007][T30189] [ 686.113158][T30189] audit_panic: 264 callbacks suppressed [ 686.113175][T30189] audit: error in audit_log_task_context [ 686.125160][ T29] audit: type=1326 audit(1750940170.251:32343): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30188 comm="syz.6.8707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=76 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 686.125218][T30194] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 686.154788][T30194] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 686.188243][ T29] audit: type=1326 audit(1750940170.561:32349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30188 comm="syz.6.8707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f1c299ad33c code=0x7ffc0000 [ 686.211860][ T29] audit: type=1326 audit(1750940170.561:32350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30188 comm="syz.6.8707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f1c299ad3df code=0x7ffc0000 [ 686.235901][ T29] audit: type=1326 audit(1750940170.561:32351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30188 comm="syz.6.8707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f1c299ad58a code=0x7ffc0000 [ 686.259653][ T29] audit: type=1326 audit(1750940170.561:32352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30188 comm="syz.6.8707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 686.283508][ T29] audit: type=1326 audit(1750940170.561:32353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30188 comm="syz.6.8707" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 686.315994][T30201] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 686.322569][T30201] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 686.330459][T30201] vhci_hcd vhci_hcd.0: Device attached [ 686.337126][T30204] vhci_hcd: connection closed [ 686.337317][ T9182] vhci_hcd: stop threads [ 686.346383][ T9182] vhci_hcd: release socket [ 686.350887][ T9182] vhci_hcd: disconnect device [ 686.353399][T30207] __nla_validate_parse: 2 callbacks suppressed [ 686.353419][T30207] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.8714'. [ 686.371303][T30207] netlink: zone id is out of range [ 686.376674][T30207] netlink: zone id is out of range [ 686.381964][T30207] netlink: zone id is out of range [ 686.388877][T30207] netlink: zone id is out of range [ 686.394268][T30207] netlink: zone id is out of range [ 686.399557][T30207] netlink: zone id is out of range [ 686.399974][ T29] audit: type=1400 audit(1750940170.811:32354): avc: denied { module_request } for pid=30208 comm="syz.6.8715" kmod="br_netfilter" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 686.404692][T30207] netlink: zone id is out of range [ 686.431952][T30207] netlink: zone id is out of range [ 686.443698][T30207] netlink: del zone limit has 8 unknown bytes [ 686.450616][ T29] audit: type=1400 audit(1750940170.851:32355): avc: denied { ioctl } for pid=30206 comm="syz.2.8714" path="socket:[100513]" dev="sockfs" ino=100513 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 686.477510][T30209] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 686.498215][T30209] netlink: 256 bytes leftover after parsing attributes in process `syz.6.8715'. [ 686.512792][ T29] audit: type=1400 audit(1750940170.921:32356): avc: denied { create } for pid=30208 comm="syz.6.8715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 686.566626][T30220] wireguard0: entered promiscuous mode [ 686.699824][T30232] bridge5: entered promiscuous mode [ 686.705136][T30232] bridge5: entered allmulticast mode [ 687.223250][T30259] wireguard0: entered promiscuous mode [ 687.355516][T30269] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 687.362114][T30269] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 687.369700][T30269] vhci_hcd vhci_hcd.0: Device attached [ 687.376448][T30270] vhci_hcd: connection closed [ 687.376737][ T9182] vhci_hcd: stop threads [ 687.385862][ T9182] vhci_hcd: release socket [ 687.390340][ T9182] vhci_hcd: disconnect device [ 687.643500][T30290] wireguard0: entered promiscuous mode [ 687.797390][T30306] bridge2: entered promiscuous mode [ 687.802700][T30306] bridge2: entered allmulticast mode [ 688.101636][T30317] FAULT_INJECTION: forcing a failure. [ 688.101636][T30317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.114869][T30317] CPU: 1 UID: 0 PID: 30317 Comm: syz.5.8757 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 688.114941][T30317] Tainted: [W]=WARN [ 688.114950][T30317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 688.114966][T30317] Call Trace: [ 688.115027][T30317] [ 688.115037][T30317] __dump_stack+0x1d/0x30 [ 688.115074][T30317] dump_stack_lvl+0xe8/0x140 [ 688.115098][T30317] dump_stack+0x15/0x1b [ 688.115182][T30317] should_fail_ex+0x265/0x280 [ 688.115223][T30317] should_fail+0xb/0x20 [ 688.115255][T30317] should_fail_usercopy+0x1a/0x20 [ 688.115286][T30317] _copy_to_user+0x20/0xa0 [ 688.115315][T30317] simple_read_from_buffer+0xb5/0x130 [ 688.115357][T30317] proc_fail_nth_read+0x100/0x140 [ 688.115403][T30317] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 688.115496][T30317] vfs_read+0x1a0/0x6f0 [ 688.115593][T30317] ? __rcu_read_unlock+0x4f/0x70 [ 688.115692][T30317] ? __fget_files+0x184/0x1c0 [ 688.115760][T30317] ? memdup_user+0x7d/0xd0 [ 688.115789][T30317] ksys_read+0xda/0x1a0 [ 688.115879][T30317] __x64_sys_read+0x40/0x50 [ 688.115921][T30317] x64_sys_call+0x2d77/0x2fb0 [ 688.115946][T30317] do_syscall_64+0xd2/0x200 [ 688.115965][T30317] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 688.116064][T30317] ? clear_bhb_loop+0x40/0x90 [ 688.116092][T30317] ? clear_bhb_loop+0x40/0x90 [ 688.116268][T30317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 688.116319][T30317] RIP: 0033:0x7f638b5dd33c [ 688.116339][T30317] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 688.116362][T30317] RSP: 002b:00007f6389c47030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 688.116418][T30317] RAX: ffffffffffffffda RBX: 00007f638b805fa0 RCX: 00007f638b5dd33c [ 688.116442][T30317] RDX: 000000000000000f RSI: 00007f6389c470a0 RDI: 0000000000000003 [ 688.116455][T30317] RBP: 00007f6389c47090 R08: 0000000000000000 R09: 0000000000000000 [ 688.116468][T30317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.116480][T30317] R13: 0000000000000000 R14: 00007f638b805fa0 R15: 00007ffe52328308 [ 688.116499][T30317] [ 688.463094][T30328] wireguard0: entered promiscuous mode [ 688.798709][T30361] bridge8: entered promiscuous mode [ 688.804050][T30361] bridge8: entered allmulticast mode [ 688.994394][T30378] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 689.043184][T30378] netlink: 256 bytes leftover after parsing attributes in process `syz.4.8780'. [ 689.496143][ T6607] SELinux: failure in sel_netif_sid_slow(), invalid network interface (13) [ 689.948459][ T9170] bond0 (unregistering): Released all slaves [ 689.975971][T30374] chnl_net:caif_netlink_parms(): no params data found [ 689.996491][T30427] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 690.029216][T30427] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8792'. [ 690.032237][ T9170] tipc: Disabling bearer [ 690.043649][ T9170] tipc: Left network mode [ 690.091827][ T9170] hsr_slave_0: left promiscuous mode [ 690.110143][ T9170] hsr_slave_1: left promiscuous mode [ 690.351175][T30374] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.358430][T30374] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.375683][T30374] bridge_slave_0: entered allmulticast mode [ 690.386520][T30374] bridge_slave_0: entered promiscuous mode [ 690.401044][T30374] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.408331][T30374] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.421696][T30374] bridge_slave_1: entered allmulticast mode [ 690.434828][T30374] bridge_slave_1: entered promiscuous mode [ 690.465531][T30374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 690.480104][T30374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 690.503893][T30374] team0: Port device team_slave_0 added [ 690.514906][T30374] team0: Port device team_slave_1 added [ 690.543585][T30374] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 690.550666][T30374] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 690.576683][T30374] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 690.598642][T30374] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 690.605640][T30374] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 690.631696][T30374] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 690.652135][ T9170] IPVS: stop unused estimator thread 0... [ 690.668001][T30467] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 690.686200][T30467] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8806'. [ 690.721985][T30374] hsr_slave_0: entered promiscuous mode [ 690.728467][T30374] hsr_slave_1: entered promiscuous mode [ 690.734472][T30374] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 690.742214][T30374] Cannot create hsr debugfs directory [ 690.923031][T30482] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 690.946007][T30482] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 691.115014][T30374] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 691.135148][T30374] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 691.172993][T30374] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 691.195903][ T29] kauditd_printk_skb: 200 callbacks suppressed [ 691.195963][ T29] audit: type=1326 audit(1750940175.601:32557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.200369][T30374] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 691.206516][ T29] audit: type=1326 audit(1750940175.611:32558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.256191][ T29] audit: type=1326 audit(1750940175.611:32559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.279932][ T29] audit: type=1326 audit(1750940175.611:32560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.314840][ T29] audit: type=1326 audit(1750940175.711:32561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.338537][ T29] audit: type=1326 audit(1750940175.711:32562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.362189][ T29] audit: type=1326 audit(1750940175.711:32563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.385860][ T29] audit: type=1326 audit(1750940175.711:32564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.409599][ T29] audit: type=1326 audit(1750940175.711:32565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.433295][ T29] audit: type=1326 audit(1750940175.711:32566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30495 comm="syz.4.8817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 691.667516][T30515] bridge9: entered promiscuous mode [ 691.673796][T30515] bridge9: entered allmulticast mode [ 691.735187][T30374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 691.797580][T30374] 8021q: adding VLAN 0 to HW filter on device team0 [ 691.828695][ T9170] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.835924][ T9170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.851079][ T9173] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.858237][ T9173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 692.032441][T30374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 692.228971][T30374] veth0_vlan: entered promiscuous mode [ 692.240432][T30374] veth1_vlan: entered promiscuous mode [ 692.290053][T30374] veth0_macvtap: entered promiscuous mode [ 692.314824][T30374] veth1_macvtap: entered promiscuous mode [ 692.331028][T30374] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 692.343878][T30374] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 692.353812][T30374] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 692.362713][T30374] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 692.371615][T30374] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 692.380438][T30374] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 692.829421][T30576] bridge10: entered promiscuous mode [ 692.835594][T30576] bridge10: entered allmulticast mode [ 692.978084][T30592] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 692.994661][T30592] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 693.088894][T30330] IPVS: starting estimator thread 0... [ 693.094684][T30596] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 693.103690][T30597] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8850'. [ 693.185944][T30598] IPVS: using max 2352 ests per chain, 117600 per kthread [ 693.819061][T30631] netlink: 24 bytes leftover after parsing attributes in process `syz.4.8865'. [ 693.941086][T30637] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8867'. [ 694.158899][T30654] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(5) [ 694.165506][T30654] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 694.173288][T30654] vhci_hcd vhci_hcd.0: Device attached [ 694.330715][T30659] vhci_hcd: connection closed [ 694.330989][ T9182] vhci_hcd: stop threads [ 694.340014][ T9182] vhci_hcd: release socket [ 694.344468][ T9182] vhci_hcd: disconnect device [ 694.376059][ T9] vhci_hcd: vhci_device speed not set [ 694.941301][T30677] nfs4: Unknown parameter '' [ 695.836346][T30706] 9pnet_fd: Insufficient options for proto=fd [ 695.863389][T30704] wireguard0: entered promiscuous mode [ 695.993337][T30718] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 696.025603][T30721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=30721 comm=syz.2.8897 [ 696.069972][T30721] netlink: 'syz.2.8897': attribute type 6 has an invalid length. [ 696.308437][T30744] wireguard0: entered promiscuous mode [ 696.338302][ T29] kauditd_printk_skb: 185 callbacks suppressed [ 696.338323][ T29] audit: type=1400 audit(1750940180.751:32752): avc: denied { write } for pid=30752 comm="syz.4.8911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 696.416504][T30750] netlink: 'syz.6.8910': attribute type 46 has an invalid length. [ 696.579039][T30763] FAULT_INJECTION: forcing a failure. [ 696.579039][T30763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 696.592200][T30763] CPU: 0 UID: 0 PID: 30763 Comm: syz.2.8914 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 696.592239][T30763] Tainted: [W]=WARN [ 696.592289][T30763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 696.592306][T30763] Call Trace: [ 696.592313][T30763] [ 696.592322][T30763] __dump_stack+0x1d/0x30 [ 696.592343][T30763] dump_stack_lvl+0xe8/0x140 [ 696.592412][T30763] dump_stack+0x15/0x1b [ 696.592429][T30763] should_fail_ex+0x265/0x280 [ 696.592537][T30763] should_fail+0xb/0x20 [ 696.592569][T30763] should_fail_usercopy+0x1a/0x20 [ 696.592607][T30763] copy_folio_from_iter_atomic+0x278/0x1170 [ 696.592773][T30763] ? shmem_write_begin+0xa8/0x190 [ 696.592932][T30763] ? shmem_write_begin+0xe1/0x190 [ 696.592974][T30763] generic_perform_write+0x2c2/0x490 [ 696.593004][T30763] shmem_file_write_iter+0xc5/0xf0 [ 696.593026][T30763] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 696.593062][T30763] vfs_write+0x4a0/0x8e0 [ 696.593113][T30763] ksys_write+0xda/0x1a0 [ 696.593154][T30763] __x64_sys_write+0x40/0x50 [ 696.593237][T30763] x64_sys_call+0x2cdd/0x2fb0 [ 696.593264][T30763] do_syscall_64+0xd2/0x200 [ 696.593285][T30763] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 696.593317][T30763] ? clear_bhb_loop+0x40/0x90 [ 696.593376][T30763] ? clear_bhb_loop+0x40/0x90 [ 696.593403][T30763] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 696.593429][T30763] RIP: 0033:0x7f08c0dbe929 [ 696.593449][T30763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 696.593472][T30763] RSP: 002b:00007f08bf427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 696.593496][T30763] RAX: ffffffffffffffda RBX: 00007f08c0fe5fa0 RCX: 00007f08c0dbe929 [ 696.593535][T30763] RDX: 00000000ffffff6a RSI: 0000200000000000 RDI: 0000000000000003 [ 696.593563][T30763] RBP: 00007f08bf427090 R08: 0000000000000000 R09: 0000000000000000 [ 696.593579][T30763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 696.593594][T30763] R13: 0000000000000000 R14: 00007f08c0fe5fa0 R15: 00007ffc60a7aab8 [ 696.593614][T30763] [ 696.810889][T30770] FAULT_INJECTION: forcing a failure. [ 696.810889][T30770] name failslab, interval 1, probability 0, space 0, times 0 [ 696.823632][T30770] CPU: 1 UID: 0 PID: 30770 Comm: syz.4.8917 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 696.823730][T30770] Tainted: [W]=WARN [ 696.823738][T30770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 696.823755][T30770] Call Trace: [ 696.823764][T30770] [ 696.823774][T30770] __dump_stack+0x1d/0x30 [ 696.823802][T30770] dump_stack_lvl+0xe8/0x140 [ 696.823827][T30770] dump_stack+0x15/0x1b [ 696.823945][T30770] should_fail_ex+0x265/0x280 [ 696.824002][T30770] should_failslab+0x8c/0xb0 [ 696.824046][T30770] kmem_cache_alloc_node_noprof+0x57/0x320 [ 696.824084][T30770] ? __alloc_skb+0x101/0x320 [ 696.824144][T30770] __alloc_skb+0x101/0x320 [ 696.824175][T30770] netlink_alloc_large_skb+0xba/0xf0 [ 696.824227][T30770] netlink_sendmsg+0x3cf/0x6b0 [ 696.824254][T30770] ? __pfx_netlink_sendmsg+0x10/0x10 [ 696.824310][T30770] __sock_sendmsg+0x142/0x180 [ 696.824335][T30770] ____sys_sendmsg+0x31e/0x4e0 [ 696.824370][T30770] ___sys_sendmsg+0x17b/0x1d0 [ 696.824501][T30770] __x64_sys_sendmsg+0xd4/0x160 [ 696.824538][T30770] x64_sys_call+0x2999/0x2fb0 [ 696.824562][T30770] do_syscall_64+0xd2/0x200 [ 696.824585][T30770] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 696.824665][T30770] ? clear_bhb_loop+0x40/0x90 [ 696.824694][T30770] ? clear_bhb_loop+0x40/0x90 [ 696.824719][T30770] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 696.824743][T30770] RIP: 0033:0x7f5dd11ce929 [ 696.824763][T30770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 696.824786][T30770] RSP: 002b:00007f5dcf837038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 696.824808][T30770] RAX: ffffffffffffffda RBX: 00007f5dd13f5fa0 RCX: 00007f5dd11ce929 [ 696.824848][T30770] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000005 [ 696.824861][T30770] RBP: 00007f5dcf837090 R08: 0000000000000000 R09: 0000000000000000 [ 696.824873][T30770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 696.824888][T30770] R13: 0000000000000000 R14: 00007f5dd13f5fa0 R15: 00007fff3a00b218 [ 696.824910][T30770] [ 697.228668][ T29] audit: type=1326 audit(1750940181.621:32753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.252370][ T29] audit: type=1326 audit(1750940181.621:32754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.276171][ T29] audit: type=1326 audit(1750940181.621:32755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=117 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.300223][ T29] audit: type=1326 audit(1750940181.621:32756): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.324247][ T29] audit: type=1326 audit(1750940181.621:32757): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.348294][ T29] audit: type=1326 audit(1750940181.621:32758): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=251 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.372422][ T29] audit: type=1326 audit(1750940181.621:32759): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.396377][ T29] audit: type=1326 audit(1750940181.621:32760): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30772 comm="syz.1.8918" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42f255e929 code=0x7ffc0000 [ 697.708609][T30783] wireguard0: entered promiscuous mode [ 697.900002][ T29] audit: type=1326 audit(1750940182.291:32761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30805 comm="syz.1.8930" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f42f255e929 code=0x0 [ 698.556810][T30824] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.647093][T30824] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.748142][T30824] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.838676][T30824] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.940688][T30845] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 698.956802][T30824] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.977052][T30845] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8944'. [ 699.001375][T30824] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 699.043826][T30824] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 699.070272][T30824] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 699.700114][T30880] IPVS: fo: UDP 224.0.0.2:0 - no destination available [ 699.718431][T30880] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8956'. [ 699.926868][T30892] netlink: 'syz.2.8960': attribute type 2 has an invalid length. [ 699.959991][T30892] netlink: 'syz.2.8960': attribute type 2 has an invalid length. [ 700.161410][T30917] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 700.196302][T30917] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 700.273119][T30921] bridge_slave_0: left allmulticast mode [ 700.278901][T30921] bridge_slave_0: left promiscuous mode [ 700.284639][T30921] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.293319][T30927] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 700.328306][T30927] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8972'. [ 700.367611][T30921] bridge_slave_1: left allmulticast mode [ 700.373341][T30921] bridge_slave_1: left promiscuous mode [ 700.379224][T30921] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.428386][T30921] bond0: (slave bond_slave_0): Releasing backup interface [ 700.451961][T30921] bond0: (slave bond_slave_1): Releasing backup interface [ 700.474736][T30921] team0: Port device team_slave_0 removed [ 700.502173][T30921] team0: Port device team_slave_1 removed [ 700.522796][T30921] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 700.530366][T30921] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 700.577405][T30921] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 700.584929][T30921] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 700.944684][T30948] IPv6: sit1: Disabled Multicast RS [ 700.974995][T30948] sit1: entered allmulticast mode [ 700.997701][T30949] netlink: 76 bytes leftover after parsing attributes in process `syz.6.8981'. [ 702.054743][T31012] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 702.061376][T31012] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 702.069048][T31012] vhci_hcd vhci_hcd.0: Device attached [ 702.143401][T31015] vhci_hcd: connection closed [ 702.144294][ T12] vhci_hcd: stop threads [ 702.153547][ T12] vhci_hcd: release socket [ 702.158085][ T12] vhci_hcd: disconnect device [ 702.403923][T31026] wireguard0: entered promiscuous mode [ 702.475316][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 702.475334][ T29] audit: type=1326 audit(1750940186.881:32834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.560644][ T29] audit: type=1326 audit(1750940186.911:32835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=117 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.584308][ T29] audit: type=1326 audit(1750940186.921:32836): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.608449][ T29] audit: type=1326 audit(1750940186.921:32837): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.632804][ T29] audit: type=1326 audit(1750940186.931:32838): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=251 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.656808][ T29] audit: type=1326 audit(1750940186.931:32839): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.681084][ T29] audit: type=1326 audit(1750940186.931:32840): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31037 comm="syz.6.9016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.886080][ T29] audit: type=1326 audit(1750940187.291:32841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31063 comm="syz.6.9029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.909759][ T29] audit: type=1326 audit(1750940187.291:32842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31063 comm="syz.6.9029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.933383][ T29] audit: type=1326 audit(1750940187.291:32843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31063 comm="syz.6.9029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=117 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 702.988848][T31071] FAULT_INJECTION: forcing a failure. [ 702.988848][T31071] name failslab, interval 1, probability 0, space 0, times 0 [ 703.001628][T31071] CPU: 1 UID: 0 PID: 31071 Comm: syz.1.9030 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 703.001717][T31071] Tainted: [W]=WARN [ 703.001726][T31071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 703.001743][T31071] Call Trace: [ 703.001752][T31071] [ 703.001763][T31071] __dump_stack+0x1d/0x30 [ 703.001811][T31071] dump_stack_lvl+0xe8/0x140 [ 703.001833][T31071] dump_stack+0x15/0x1b [ 703.001849][T31071] should_fail_ex+0x265/0x280 [ 703.001933][T31071] should_failslab+0x8c/0xb0 [ 703.001957][T31071] kmem_cache_alloc_node_noprof+0x57/0x320 [ 703.001985][T31071] ? __alloc_skb+0x101/0x320 [ 703.002025][T31071] __alloc_skb+0x101/0x320 [ 703.002080][T31071] netlink_alloc_large_skb+0xba/0xf0 [ 703.002187][T31071] netlink_sendmsg+0x3cf/0x6b0 [ 703.002275][T31071] ? __pfx_netlink_sendmsg+0x10/0x10 [ 703.002301][T31071] __sock_sendmsg+0x142/0x180 [ 703.002334][T31071] ____sys_sendmsg+0x31e/0x4e0 [ 703.002395][T31071] ___sys_sendmsg+0x17b/0x1d0 [ 703.002445][T31071] __x64_sys_sendmsg+0xd4/0x160 [ 703.002492][T31071] x64_sys_call+0x2999/0x2fb0 [ 703.002592][T31071] do_syscall_64+0xd2/0x200 [ 703.002616][T31071] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 703.002650][T31071] ? clear_bhb_loop+0x40/0x90 [ 703.002679][T31071] ? clear_bhb_loop+0x40/0x90 [ 703.002701][T31071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 703.002753][T31071] RIP: 0033:0x7f42f255e929 [ 703.002824][T31071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 703.002919][T31071] RSP: 002b:00007f42f0bc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 703.002944][T31071] RAX: ffffffffffffffda RBX: 00007f42f2785fa0 RCX: 00007f42f255e929 [ 703.002961][T31071] RDX: 000000002000c800 RSI: 00002000000002c0 RDI: 0000000000000005 [ 703.002978][T31071] RBP: 00007f42f0bc7090 R08: 0000000000000000 R09: 0000000000000000 [ 703.002994][T31071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 703.003011][T31071] R13: 0000000000000000 R14: 00007f42f2785fa0 R15: 00007ffde63193b8 [ 703.003031][T31071] [ 703.305489][T31078] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(3) [ 703.312157][T31078] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 703.319738][T31078] vhci_hcd vhci_hcd.0: Device attached [ 703.366231][T31083] vhci_hcd: connection closed [ 703.369951][ T9182] vhci_hcd: stop threads [ 703.379132][ T9182] vhci_hcd: release socket [ 703.383608][ T9182] vhci_hcd: disconnect device [ 703.458654][T31093] wireguard0: entered promiscuous mode [ 703.706647][T31122] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 703.715147][T31122] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 703.761451][ T9170] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 703.835433][ T9170] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 703.892986][ T9170] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 703.958125][ T9170] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 704.049992][T31112] chnl_net:caif_netlink_parms(): no params data found [ 704.837828][ T9170] bond0 (unregistering): Released all slaves [ 704.898791][ T9170] IPVS: stopping master sync thread 25024 ... [ 704.919035][T31164] bridge6: entered promiscuous mode [ 704.925017][T31164] bridge6: entered allmulticast mode [ 704.964006][ T9170] hsr_slave_0: left promiscuous mode [ 704.971359][ T9170] hsr_slave_1: left promiscuous mode [ 704.979944][ T9170] veth1_vlan: left promiscuous mode [ 704.985338][ T9170] veth0_vlan: left promiscuous mode [ 705.145987][T31112] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.153178][T31112] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.160577][T31112] bridge_slave_0: entered allmulticast mode [ 705.167187][T31112] bridge_slave_0: entered promiscuous mode [ 705.174310][T31112] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.181508][T31112] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.202906][T31112] bridge_slave_1: entered allmulticast mode [ 705.210102][T31112] bridge_slave_1: entered promiscuous mode [ 705.234930][T31112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 705.251451][T31112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 705.281326][T31112] team0: Port device team_slave_0 added [ 705.288901][T31207] netlink: 132 bytes leftover after parsing attributes in process `syz.5.9082'. [ 705.301765][T31112] team0: Port device team_slave_1 added [ 705.339929][T31112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 705.347067][T31112] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 705.373159][T31112] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 705.393264][T31112] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 705.400305][T31112] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 705.426326][T31112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 705.457463][ T9170] IPVS: stop unused estimator thread 0... [ 705.522055][T31112] hsr_slave_0: entered promiscuous mode [ 705.528605][T31112] hsr_slave_1: entered promiscuous mode [ 705.534852][T31112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 705.542895][T31112] Cannot create hsr debugfs directory [ 705.571439][T31222] wireguard0: entered promiscuous mode [ 705.750986][T31241] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 705.822648][T31241] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 705.851140][T31255] vxcan0: tx address claim with dest, not broadcast [ 705.867019][T31257] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 705.898748][T31241] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 705.927947][T31257] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 705.943461][T31259] wireguard0: entered promiscuous mode [ 705.966775][T31112] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 705.975639][T31112] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 705.988343][T31112] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 705.999769][T31241] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.011502][T31112] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 706.021604][T31257] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.059192][T31112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 706.072103][T31112] 8021q: adding VLAN 0 to HW filter on device team0 [ 706.081994][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.089204][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.102716][T31241] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.114681][T31241] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.126690][T31257] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.139586][ T9170] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.146863][ T9170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.162790][T31241] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.176145][T31241] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.200990][T31112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 706.225493][T31257] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.239563][T31257] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.254369][T31257] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.278096][T31257] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.316928][T31112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 706.428860][T31112] veth0_vlan: entered promiscuous mode [ 706.451513][T31112] veth1_vlan: entered promiscuous mode [ 706.477978][T31304] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.492650][T31112] veth0_macvtap: entered promiscuous mode [ 706.501155][T31112] veth1_macvtap: entered promiscuous mode [ 706.512742][T31112] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 706.540229][T31302] wireguard0: entered promiscuous mode [ 706.560842][T31304] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.588941][T31112] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 706.602569][T31112] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.611465][T31112] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.620492][T31112] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.629434][T31112] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.711086][T31315] bridge1: entered promiscuous mode [ 706.719513][T31315] bridge1: entered allmulticast mode [ 706.735376][T31304] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.789786][T31304] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.873764][T31304] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.900972][T31304] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.931216][T31304] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.944947][T31304] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 706.988499][T31341] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 706.998752][T31341] netlink: 12 bytes leftover after parsing attributes in process `syz.6.9126'. [ 707.208394][T31360] FAULT_INJECTION: forcing a failure. [ 707.208394][T31360] name failslab, interval 1, probability 0, space 0, times 0 [ 707.221253][T31360] CPU: 0 UID: 0 PID: 31360 Comm: syz.6.9134 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 707.221290][T31360] Tainted: [W]=WARN [ 707.221299][T31360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 707.221317][T31360] Call Trace: [ 707.221326][T31360] [ 707.221337][T31360] __dump_stack+0x1d/0x30 [ 707.221359][T31360] dump_stack_lvl+0xe8/0x140 [ 707.221418][T31360] dump_stack+0x15/0x1b [ 707.221436][T31360] should_fail_ex+0x265/0x280 [ 707.221551][T31360] should_failslab+0x8c/0xb0 [ 707.221582][T31360] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 707.221622][T31360] ? sidtab_sid2str_get+0xa0/0x130 [ 707.221656][T31360] kmemdup_noprof+0x2b/0x70 [ 707.221701][T31360] sidtab_sid2str_get+0xa0/0x130 [ 707.221733][T31360] security_sid_to_context_core+0x1eb/0x2e0 [ 707.221812][T31360] security_sid_to_context+0x27/0x40 [ 707.221841][T31360] selinux_lsmprop_to_secctx+0x67/0xf0 [ 707.221873][T31360] security_lsmprop_to_secctx+0x43/0x80 [ 707.221922][T31360] audit_log_task_context+0x77/0x190 [ 707.221960][T31360] audit_log_task+0xf4/0x250 [ 707.221999][T31360] audit_seccomp+0x61/0x100 [ 707.222025][T31360] ? __seccomp_filter+0x68c/0x10d0 [ 707.222069][T31360] __seccomp_filter+0x69d/0x10d0 [ 707.222092][T31360] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 707.222208][T31360] ? vfs_write+0x75e/0x8e0 [ 707.222318][T31360] __secure_computing+0x82/0x150 [ 707.222403][T31360] syscall_trace_enter+0xcf/0x1e0 [ 707.222427][T31360] do_syscall_64+0xac/0x200 [ 707.222448][T31360] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 707.222481][T31360] ? clear_bhb_loop+0x40/0x90 [ 707.222509][T31360] ? clear_bhb_loop+0x40/0x90 [ 707.222567][T31360] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 707.222589][T31360] RIP: 0033:0x7f1c299ae929 [ 707.222610][T31360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.222634][T31360] RSP: 002b:00007f1c28017038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 707.222658][T31360] RAX: ffffffffffffffda RBX: 00007f1c29bd5fa0 RCX: 00007f1c299ae929 [ 707.222729][T31360] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 707.222751][T31360] RBP: 00007f1c28017090 R08: 0000000000000000 R09: 0000000000000000 [ 707.222768][T31360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.222828][T31360] R13: 0000000000000000 R14: 00007f1c29bd5fa0 R15: 00007ffd6ad47588 [ 707.222852][T31360] [ 707.485870][ T29] kauditd_printk_skb: 273 callbacks suppressed [ 707.485953][ T29] audit: type=1326 audit(1750940191.621:33116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31359 comm="syz.6.9134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=76 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.513339][ T29] audit: type=1326 audit(1750940191.891:33117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31359 comm="syz.6.9134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f1c299ad33c code=0x7ffc0000 [ 707.536872][ T29] audit: type=1326 audit(1750940191.891:33118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31359 comm="syz.6.9134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f1c299ad3df code=0x7ffc0000 [ 707.560320][ T29] audit: type=1326 audit(1750940191.891:33119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31359 comm="syz.6.9134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f1c299ad58a code=0x7ffc0000 [ 707.583790][ T29] audit: type=1326 audit(1750940191.891:33120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31359 comm="syz.6.9134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.607441][ T29] audit: type=1326 audit(1750940191.891:33121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31359 comm="syz.6.9134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.646242][ T29] audit: type=1326 audit(1750940192.051:33122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.6.9136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.670135][ T29] audit: type=1326 audit(1750940192.051:33123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.6.9136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.693951][ T29] audit: type=1326 audit(1750940192.051:33124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.6.9136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.717777][ T29] audit: type=1326 audit(1750940192.051:33125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.6.9136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 707.756579][T31368] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.811655][T31368] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.876939][T31381] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 707.890339][T31381] netlink: 12 bytes leftover after parsing attributes in process `syz.6.9142'. [ 707.925046][T31368] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.958060][T31391] FAULT_INJECTION: forcing a failure. [ 707.958060][T31391] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 707.971363][T31391] CPU: 1 UID: 0 PID: 31391 Comm: syz.2.9147 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 707.971405][T31391] Tainted: [W]=WARN [ 707.971414][T31391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 707.971428][T31391] Call Trace: [ 707.971436][T31391] [ 707.971446][T31391] __dump_stack+0x1d/0x30 [ 707.971479][T31391] dump_stack_lvl+0xe8/0x140 [ 707.971505][T31391] dump_stack+0x15/0x1b [ 707.971526][T31391] should_fail_ex+0x265/0x280 [ 707.971563][T31391] should_fail+0xb/0x20 [ 707.971625][T31391] should_fail_usercopy+0x1a/0x20 [ 707.971681][T31391] _copy_to_user+0x20/0xa0 [ 707.971778][T31391] __x64_sys_sched_getaffinity+0x78/0xc0 [ 707.971813][T31391] x64_sys_call+0x2584/0x2fb0 [ 707.971901][T31391] do_syscall_64+0xd2/0x200 [ 707.971930][T31391] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 707.971960][T31391] ? clear_bhb_loop+0x40/0x90 [ 707.971983][T31391] ? clear_bhb_loop+0x40/0x90 [ 707.972007][T31391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 707.972155][T31391] RIP: 0033:0x7f08c0dbe929 [ 707.972223][T31391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.972246][T31391] RSP: 002b:00007f08bf427038 EFLAGS: 00000246 ORIG_RAX: 00000000000000cc [ 707.972305][T31391] RAX: ffffffffffffffda RBX: 00007f08c0fe5fa0 RCX: 00007f08c0dbe929 [ 707.972377][T31391] RDX: 0000200000000080 RSI: 0000000000000008 RDI: 00000000000000be [ 707.972390][T31391] RBP: 00007f08bf427090 R08: 0000000000000000 R09: 0000000000000000 [ 707.972402][T31391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.972416][T31391] R13: 0000000000000000 R14: 00007f08c0fe5fa0 R15: 00007ffc60a7aab8 [ 707.972436][T31391] [ 708.186956][T31368] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 708.245625][T31368] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.266419][T31368] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.282488][T31368] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.304224][T31368] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.412054][T31420] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 708.428958][T31420] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9160'. [ 708.689253][T31453] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 708.718249][T31458] FAULT_INJECTION: forcing a failure. [ 708.718249][T31458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.731523][T31458] CPU: 1 UID: 0 PID: 31458 Comm: syz.4.9176 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 708.731565][T31458] Tainted: [W]=WARN [ 708.731574][T31458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 708.731616][T31458] Call Trace: [ 708.731624][T31458] [ 708.731634][T31458] __dump_stack+0x1d/0x30 [ 708.731658][T31458] dump_stack_lvl+0xe8/0x140 [ 708.731690][T31458] dump_stack+0x15/0x1b [ 708.731726][T31458] should_fail_ex+0x265/0x280 [ 708.731767][T31458] should_fail+0xb/0x20 [ 708.731840][T31458] should_fail_usercopy+0x1a/0x20 [ 708.731893][T31458] _copy_to_user+0x20/0xa0 [ 708.731922][T31458] simple_read_from_buffer+0xb5/0x130 [ 708.731960][T31458] proc_fail_nth_read+0x100/0x140 [ 708.732004][T31458] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 708.732111][T31458] vfs_read+0x1a0/0x6f0 [ 708.732152][T31458] ? __rcu_read_unlock+0x4f/0x70 [ 708.732176][T31458] ? __fget_files+0x184/0x1c0 [ 708.732206][T31458] ksys_read+0xda/0x1a0 [ 708.732256][T31458] __x64_sys_read+0x40/0x50 [ 708.732297][T31458] x64_sys_call+0x2d77/0x2fb0 [ 708.732325][T31458] do_syscall_64+0xd2/0x200 [ 708.732411][T31458] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 708.732446][T31458] ? clear_bhb_loop+0x40/0x90 [ 708.732467][T31458] ? clear_bhb_loop+0x40/0x90 [ 708.732543][T31458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 708.732569][T31458] RIP: 0033:0x7f5dd11cd33c [ 708.732627][T31458] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 708.732664][T31458] RSP: 002b:00007f5dcf837030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 708.732697][T31458] RAX: ffffffffffffffda RBX: 00007f5dd13f5fa0 RCX: 00007f5dd11cd33c [ 708.732713][T31458] RDX: 000000000000000f RSI: 00007f5dcf8370a0 RDI: 0000000000000007 [ 708.732729][T31458] RBP: 00007f5dcf837090 R08: 0000000000000000 R09: 0000000000000000 [ 708.732798][T31458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.732815][T31458] R13: 0000000000000000 R14: 00007f5dd13f5fa0 R15: 00007fff3a00b218 [ 708.732840][T31458] [ 708.733348][T31460] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 708.835349][T31462] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9177'. [ 709.468374][T31511] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 709.474967][T31511] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 709.482662][T31511] vhci_hcd vhci_hcd.0: Device attached [ 709.491069][T31512] vhci_hcd: connection closed [ 709.491317][ T9170] vhci_hcd: stop threads [ 709.500522][ T9170] vhci_hcd: release socket [ 709.504978][ T9170] vhci_hcd: disconnect device [ 709.957815][T31550] xt_hashlimit: overflow, rate too high: 0 [ 710.275948][T31561] bridge2: entered promiscuous mode [ 710.281244][T31561] bridge2: entered allmulticast mode [ 710.555897][T31568] wireguard0: entered promiscuous mode [ 710.580118][T31453] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 710.634628][T31453] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 710.719521][T31453] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 710.766940][T31579] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 710.773586][T31579] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 710.781264][T31579] vhci_hcd vhci_hcd.0: Device attached [ 710.826123][T31580] vhci_hcd: connection closed [ 710.828463][ T9173] vhci_hcd: stop threads [ 710.837569][ T9173] vhci_hcd: release socket [ 710.842009][ T9173] vhci_hcd: disconnect device [ 710.857119][T31453] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 710.890034][T31453] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 710.915993][T31453] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 710.933774][T31453] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.151225][T31609] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 711.162034][T31609] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9234'. [ 711.255450][T31619] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 711.307802][T31619] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 711.348674][T31619] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 711.417770][T31619] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 711.469402][T31633] FAULT_INJECTION: forcing a failure. [ 711.469402][T31633] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 711.482641][T31633] CPU: 1 UID: 0 PID: 31633 Comm: syz.5.9245 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 711.482742][T31633] Tainted: [W]=WARN [ 711.482751][T31633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 711.482767][T31633] Call Trace: [ 711.482775][T31633] [ 711.482785][T31633] __dump_stack+0x1d/0x30 [ 711.482827][T31633] dump_stack_lvl+0xe8/0x140 [ 711.482851][T31633] dump_stack+0x15/0x1b [ 711.483002][T31633] should_fail_ex+0x265/0x280 [ 711.483042][T31633] should_fail+0xb/0x20 [ 711.483108][T31633] should_fail_usercopy+0x1a/0x20 [ 711.483149][T31633] strncpy_from_user+0x25/0x230 [ 711.483179][T31633] ? __kmalloc_cache_noprof+0x189/0x320 [ 711.483323][T31633] __se_sys_memfd_create+0x1ff/0x590 [ 711.483363][T31633] __x64_sys_memfd_create+0x31/0x40 [ 711.483483][T31633] x64_sys_call+0x122f/0x2fb0 [ 711.483511][T31633] do_syscall_64+0xd2/0x200 [ 711.483534][T31633] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 711.483611][T31633] ? clear_bhb_loop+0x40/0x90 [ 711.483637][T31633] ? clear_bhb_loop+0x40/0x90 [ 711.483681][T31633] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 711.483702][T31633] RIP: 0033:0x7f638b5de929 [ 711.483724][T31633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 711.483744][T31633] RSP: 002b:00007f6389c46e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 711.483768][T31633] RAX: ffffffffffffffda RBX: 00000000000005a0 RCX: 00007f638b5de929 [ 711.483784][T31633] RDX: 00007f6389c46ef0 RSI: 0000000000000000 RDI: 00007f638b6614cc [ 711.483800][T31633] RBP: 0000200000000640 R08: 00007f6389c46bb7 R09: 00007f6389c46e40 [ 711.483816][T31633] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000005c0 [ 711.483858][T31633] R13: 00007f6389c46ef0 R14: 00007f6389c46eb0 R15: 0000200000000600 [ 711.483931][T31633] [ 712.059792][T31669] netlink: 24 bytes leftover after parsing attributes in process `syz.4.9258'. [ 712.107730][T31669] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9258'. [ 712.250230][T31692] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9270'. [ 712.514995][ T29] kauditd_printk_skb: 283 callbacks suppressed [ 712.515014][ T29] audit: type=1326 audit(1750940196.921:33409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.545058][ T29] audit: type=1326 audit(1750940196.921:33410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.568699][ T29] audit: type=1326 audit(1750940196.921:33411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.592349][ T29] audit: type=1326 audit(1750940196.921:33412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.645252][ T29] audit: type=1326 audit(1750940197.031:33413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.668938][ T29] audit: type=1326 audit(1750940197.031:33414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.692613][ T29] audit: type=1326 audit(1750940197.031:33415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.716310][ T29] audit: type=1326 audit(1750940197.031:33416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.739976][ T29] audit: type=1326 audit(1750940197.031:33417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 712.763616][ T29] audit: type=1326 audit(1750940197.031:33418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31721 comm="syz.6.9281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1c299ae929 code=0x7ffc0000 [ 713.188078][T31758] bridge11: entered promiscuous mode [ 713.194602][T31758] bridge11: entered allmulticast mode [ 713.260965][T31772] FAULT_INJECTION: forcing a failure. [ 713.260965][T31772] name failslab, interval 1, probability 0, space 0, times 0 [ 713.273764][T31772] CPU: 0 UID: 0 PID: 31772 Comm: syz.4.9301 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 713.273833][T31772] Tainted: [W]=WARN [ 713.273842][T31772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 713.273857][T31772] Call Trace: [ 713.273865][T31772] [ 713.273875][T31772] __dump_stack+0x1d/0x30 [ 713.273903][T31772] dump_stack_lvl+0xe8/0x140 [ 713.274039][T31772] dump_stack+0x15/0x1b [ 713.274055][T31772] should_fail_ex+0x265/0x280 [ 713.274087][T31772] should_failslab+0x8c/0xb0 [ 713.274131][T31772] kmem_cache_alloc_node_noprof+0x57/0x320 [ 713.274160][T31772] ? __alloc_skb+0x101/0x320 [ 713.274206][T31772] __alloc_skb+0x101/0x320 [ 713.274237][T31772] ? audit_log_start+0x365/0x6c0 [ 713.274272][T31772] audit_log_start+0x380/0x6c0 [ 713.274311][T31772] audit_seccomp+0x48/0x100 [ 713.274347][T31772] ? __seccomp_filter+0x68c/0x10d0 [ 713.274424][T31772] __seccomp_filter+0x69d/0x10d0 [ 713.274449][T31772] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 713.274538][T31772] ? vfs_write+0x75e/0x8e0 [ 713.274576][T31772] __secure_computing+0x82/0x150 [ 713.274612][T31772] syscall_trace_enter+0xcf/0x1e0 [ 713.274643][T31772] do_syscall_64+0xac/0x200 [ 713.274692][T31772] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 713.274718][T31772] ? clear_bhb_loop+0x40/0x90 [ 713.274740][T31772] ? clear_bhb_loop+0x40/0x90 [ 713.274838][T31772] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 713.274864][T31772] RIP: 0033:0x7f5dd11ce929 [ 713.274882][T31772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 713.274900][T31772] RSP: 002b:00007f5dcf837038 EFLAGS: 00000246 ORIG_RAX: 000000000000011b [ 713.274919][T31772] RAX: ffffffffffffffda RBX: 00007f5dd13f5fa0 RCX: 00007f5dd11ce929 [ 713.274932][T31772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 713.274987][T31772] RBP: 00007f5dcf837090 R08: 0000000000000000 R09: 0000000000000000 [ 713.274999][T31772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 713.275011][T31772] R13: 0000000000000000 R14: 00007f5dd13f5fa0 R15: 00007fff3a00b218 [ 713.275035][T31772] [ 713.501291][T31775] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 713.510823][T31775] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9302'. [ 713.876567][T31803] dvmrp1: entered allmulticast mode [ 713.888258][T31803] FAULT_INJECTION: forcing a failure. [ 713.888258][T31803] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 713.901527][T31803] CPU: 1 UID: 0 PID: 31803 Comm: syz.5.9311 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 713.901633][T31803] Tainted: [W]=WARN [ 713.901640][T31803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 713.901733][T31803] Call Trace: [ 713.901741][T31803] [ 713.901749][T31803] __dump_stack+0x1d/0x30 [ 713.901801][T31803] dump_stack_lvl+0xe8/0x140 [ 713.901826][T31803] dump_stack+0x15/0x1b [ 713.901847][T31803] should_fail_ex+0x265/0x280 [ 713.901946][T31803] should_fail+0xb/0x20 [ 713.901983][T31803] should_fail_usercopy+0x1a/0x20 [ 713.902040][T31803] _copy_from_user+0x1c/0xb0 [ 713.902060][T31803] copy_from_sockptr+0x48/0x70 [ 713.902157][T31803] ip_mroute_setsockopt+0x4ba/0x960 [ 713.902190][T31803] do_ip_setsockopt+0xcea/0x2240 [ 713.902303][T31803] ip_setsockopt+0x58/0x110 [ 713.902369][T31803] raw_setsockopt+0xbd/0x150 [ 713.902408][T31803] sock_common_setsockopt+0x66/0x80 [ 713.902439][T31803] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 713.902475][T31803] __sys_setsockopt+0x181/0x200 [ 713.902595][T31803] __x64_sys_setsockopt+0x64/0x80 [ 713.902638][T31803] x64_sys_call+0x2bd5/0x2fb0 [ 713.902665][T31803] do_syscall_64+0xd2/0x200 [ 713.902765][T31803] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 713.902801][T31803] ? clear_bhb_loop+0x40/0x90 [ 713.902829][T31803] ? clear_bhb_loop+0x40/0x90 [ 713.902858][T31803] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 713.902881][T31803] RIP: 0033:0x7f638b5de929 [ 713.902927][T31803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 713.902949][T31803] RSP: 002b:00007f6389c47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 713.902973][T31803] RAX: ffffffffffffffda RBX: 00007f638b805fa0 RCX: 00007f638b5de929 [ 713.903060][T31803] RDX: 00000000000000d4 RSI: 0000000000000000 RDI: 0000000000000006 [ 713.903083][T31803] RBP: 00007f6389c47090 R08: 0000000000000004 R09: 0000000000000000 [ 713.903100][T31803] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 713.903114][T31803] R13: 0000000000000000 R14: 00007f638b805fa0 R15: 00007ffe52328308 [ 713.903138][T31803] [ 714.130861][T31815] FAULT_INJECTION: forcing a failure. [ 714.130861][T31815] name failslab, interval 1, probability 0, space 0, times 0 [ 714.143684][T31815] CPU: 1 UID: 0 PID: 31815 Comm: syz.2.9313 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 714.143728][T31815] Tainted: [W]=WARN [ 714.143736][T31815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 714.143752][T31815] Call Trace: [ 714.143760][T31815] [ 714.143769][T31815] __dump_stack+0x1d/0x30 [ 714.143872][T31815] dump_stack_lvl+0xe8/0x140 [ 714.143899][T31815] dump_stack+0x15/0x1b [ 714.143920][T31815] should_fail_ex+0x265/0x280 [ 714.143966][T31815] should_failslab+0x8c/0xb0 [ 714.143995][T31815] kmem_cache_alloc_noprof+0x50/0x310 [ 714.144080][T31815] ? security_file_alloc+0x32/0x100 [ 714.144108][T31815] security_file_alloc+0x32/0x100 [ 714.144172][T31815] init_file+0x5c/0x1d0 [ 714.144203][T31815] alloc_empty_file+0x8b/0x200 [ 714.144295][T31815] path_openat+0x68/0x2170 [ 714.144400][T31815] ? _parse_integer_limit+0x170/0x190 [ 714.144439][T31815] ? kstrtoull+0x111/0x140 [ 714.144474][T31815] ? kstrtouint+0x76/0xc0 [ 714.144552][T31815] do_filp_open+0x109/0x230 [ 714.144600][T31815] do_sys_openat2+0xa6/0x110 [ 714.144711][T31815] __x64_sys_openat+0xf2/0x120 [ 714.144740][T31815] x64_sys_call+0x1af/0x2fb0 [ 714.144783][T31815] do_syscall_64+0xd2/0x200 [ 714.144801][T31815] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 714.144840][T31815] ? clear_bhb_loop+0x40/0x90 [ 714.144862][T31815] ? clear_bhb_loop+0x40/0x90 [ 714.144884][T31815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 714.144906][T31815] RIP: 0033:0x7f08c0dbe929 [ 714.144921][T31815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 714.144941][T31815] RSP: 002b:00007f08bf427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 714.144961][T31815] RAX: ffffffffffffffda RBX: 00007f08c0fe5fa0 RCX: 00007f08c0dbe929 [ 714.144974][T31815] RDX: 00000000000026e1 RSI: 00002000000004c0 RDI: 0000000000000005 [ 714.144988][T31815] RBP: 00007f08bf427090 R08: 0000000000000000 R09: 0000000000000000 [ 714.145001][T31815] R10: 000003a0ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 714.145013][T31815] R13: 0000000000000000 R14: 00007f08c0fe5fa0 R15: 00007ffc60a7aab8 [ 714.145032][T31815] [ 714.579096][T31823] chnl_net:caif_netlink_parms(): no params data found [ 714.639703][ T9170] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 714.679867][T31846] bridge7: entered promiscuous mode [ 714.685136][T31846] bridge7: entered allmulticast mode [ 714.719045][ T9170] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 714.738476][T31823] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.745641][T31823] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.762371][T31823] bridge_slave_0: entered allmulticast mode [ 714.773464][T31823] bridge_slave_0: entered promiscuous mode [ 714.784889][ T9170] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 714.801478][T31823] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.808718][T31823] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.818010][T31823] bridge_slave_1: entered allmulticast mode [ 714.824685][T31823] bridge_slave_1: entered promiscuous mode [ 714.845537][T31823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 714.856859][ T9170] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 714.871014][T31823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 714.911071][T31823] team0: Port device team_slave_0 added [ 714.922786][T31823] team0: Port device team_slave_1 added [ 714.969667][T31823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 714.976681][T31823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 715.002781][T31823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 715.026183][T31823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 715.033173][T31823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 715.059416][T31823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 715.144166][ T9170] dvmrp1 (unregistering): left allmulticast mode [ 715.667659][ T9170] $Hÿ (unregistering): Released all slaves [ 715.676170][ T9170] bond0 (unregistering): Released all slaves [ 715.723175][ T9170] hsr_slave_0: left promiscuous mode [ 715.732436][ T9170] hsr_slave_1: left promiscuous mode [ 715.753729][ T9170] veth1_macvtap: left allmulticast mode [ 715.759479][ T9170] veth1_macvtap: left promiscuous mode [ 715.765064][ T9170] veth0_macvtap: left promiscuous mode [ 715.771606][ T9170] veth1_vlan: left promiscuous mode [ 715.777231][ T9170] veth0_vlan: left promiscuous mode [ 715.874117][T31891] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 715.883933][T31823] hsr_slave_0: entered promiscuous mode [ 715.890475][T31823] hsr_slave_1: entered promiscuous mode [ 715.892013][T31891] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9342'. [ 715.905677][T31619] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 715.918345][T31619] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 715.930742][T31619] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 715.952345][T31619] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.157637][T31901] netlink: 40 bytes leftover after parsing attributes in process `syz.2.9347'. [ 716.228256][T31913] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.282360][ T9170] IPVS: stop unused estimator thread 0... [ 716.307506][T31913] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.345666][T31823] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 716.356587][T31823] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 716.369539][T31913] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.380953][T31823] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 716.391870][T31823] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 716.427465][T31913] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.449089][T31823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 716.464346][T31823] 8021q: adding VLAN 0 to HW filter on device team0 [ 716.474493][ T9178] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.481713][ T9178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.495564][ T9173] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.502763][ T9173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.534849][T31913] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.550400][T31913] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.565502][T31913] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.581637][T31913] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.624797][T31823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 716.778920][T31958] netlink: 'syz.2.9362': attribute type 1 has an invalid length. [ 716.845136][T31976] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.874261][T31823] veth0_vlan: entered promiscuous mode [ 716.882999][T31823] veth1_vlan: entered promiscuous mode [ 716.905744][T31823] veth0_macvtap: entered promiscuous mode [ 716.920015][T31976] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.935166][T31823] veth1_macvtap: entered promiscuous mode [ 716.950581][T31823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 716.963535][T31823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 716.974009][T31823] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.982908][T31823] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 716.991808][T31823] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 717.000624][T31823] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 717.048018][T31976] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.120727][T31976] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.190090][T31999] bridge8: entered promiscuous mode [ 717.195359][T31999] bridge8: entered allmulticast mode [ 717.209613][T31976] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 717.224392][T31976] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 717.239089][T31976] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 717.252309][T31976] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 717.304226][T32010] FAULT_INJECTION: forcing a failure. [ 717.304226][T32010] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 717.317412][T32010] CPU: 0 UID: 0 PID: 32010 Comm: syz.1.9379 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 717.317462][T32010] Tainted: [W]=WARN [ 717.317469][T32010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 717.317556][T32010] Call Trace: [ 717.317565][T32010] [ 717.317575][T32010] __dump_stack+0x1d/0x30 [ 717.317597][T32010] dump_stack_lvl+0xe8/0x140 [ 717.317630][T32010] dump_stack+0x15/0x1b [ 717.317651][T32010] should_fail_ex+0x265/0x280 [ 717.317724][T32010] should_fail+0xb/0x20 [ 717.317751][T32010] should_fail_usercopy+0x1a/0x20 [ 717.317783][T32010] _copy_to_user+0x20/0xa0 [ 717.317813][T32010] simple_read_from_buffer+0xb5/0x130 [ 717.317846][T32010] proc_fail_nth_read+0x100/0x140 [ 717.317886][T32010] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 717.317993][T32010] vfs_read+0x1a0/0x6f0 [ 717.318045][T32010] ? __sys_setsockopt+0x18e/0x200 [ 717.318079][T32010] ? __rcu_read_unlock+0x4f/0x70 [ 717.318116][T32010] ? __fget_files+0x184/0x1c0 [ 717.318201][T32010] ksys_read+0xda/0x1a0 [ 717.318237][T32010] __x64_sys_read+0x40/0x50 [ 717.318393][T32010] x64_sys_call+0x2d77/0x2fb0 [ 717.318546][T32010] do_syscall_64+0xd2/0x200 [ 717.318566][T32010] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 717.318636][T32010] ? clear_bhb_loop+0x40/0x90 [ 717.318663][T32010] ? clear_bhb_loop+0x40/0x90 [ 717.318691][T32010] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 717.318716][T32010] RIP: 0033:0x7f77c859d33c [ 717.318732][T32010] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 717.318752][T32010] RSP: 002b:00007f77c6c07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 717.318852][T32010] RAX: ffffffffffffffda RBX: 00007f77c87c5fa0 RCX: 00007f77c859d33c [ 717.318946][T32010] RDX: 000000000000000f RSI: 00007f77c6c070a0 RDI: 0000000000000004 [ 717.318961][T32010] RBP: 00007f77c6c07090 R08: 0000000000000000 R09: 0000000000000000 [ 717.318976][T32010] R10: 00002000000006c0 R11: 0000000000000246 R12: 0000000000000001 [ 717.318991][T32010] R13: 0000000000000000 R14: 00007f77c87c5fa0 R15: 00007ffeafe34938 [ 717.319015][T32010] [ 717.746699][T32036] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.818104][T32036] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.842415][T32040] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.878880][T32036] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.918507][T32040] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.942851][T32036] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.975704][T32047] devtmpfs: Unknown parameter '¼' [ 717.978143][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 717.978215][ T29] audit: type=1400 audit(1750940202.381:33608): avc: denied { mount } for pid=32046 comm="syz.6.9394" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 717.981706][T32047] FAULT_INJECTION: forcing a failure. [ 717.981706][T32047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 717.987013][ T29] audit: type=1400 audit(1750940202.381:33609): avc: denied { remount } for pid=32046 comm="syz.6.9394" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 718.042754][T32047] CPU: 0 UID: 0 PID: 32047 Comm: syz.6.9394 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 718.042819][T32047] Tainted: [W]=WARN [ 718.042827][T32047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 718.042842][T32047] Call Trace: [ 718.042850][T32047] [ 718.042859][T32047] __dump_stack+0x1d/0x30 [ 718.042886][T32047] dump_stack_lvl+0xe8/0x140 [ 718.042915][T32047] dump_stack+0x15/0x1b [ 718.042940][T32047] should_fail_ex+0x265/0x280 [ 718.042991][T32047] should_fail+0xb/0x20 [ 718.043032][T32047] should_fail_usercopy+0x1a/0x20 [ 718.043160][T32047] _copy_from_user+0x1c/0xb0 [ 718.043185][T32047] copy_clone_args_from_user+0x14f/0x490 [ 718.043229][T32047] ? kstrtouint+0x76/0xc0 [ 718.043307][T32047] __se_sys_clone3+0x6f/0x200 [ 718.043366][T32047] __x64_sys_clone3+0x31/0x40 [ 718.043422][T32047] x64_sys_call+0x10c9/0x2fb0 [ 718.043447][T32047] do_syscall_64+0xd2/0x200 [ 718.043467][T32047] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 718.043571][T32047] ? clear_bhb_loop+0x40/0x90 [ 718.043600][T32047] ? clear_bhb_loop+0x40/0x90 [ 718.043630][T32047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 718.043704][T32047] RIP: 0033:0x7f1c299ae929 [ 718.043722][T32047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 718.043744][T32047] RSP: 002b:00007f1c28016f08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 718.043839][T32047] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f1c299ae929 [ 718.043858][T32047] RDX: 00007f1c28016f20 RSI: 0000000000000058 RDI: 00007f1c28016f20 [ 718.043876][T32047] RBP: 00007f1c28017090 R08: 0000000000000000 R09: 0000000000000058 [ 718.043894][T32047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.043912][T32047] R13: 0000000000000000 R14: 00007f1c29bd5fa0 R15: 00007ffd6ad47588 [ 718.043940][T32047] [ 718.059356][T32040] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 718.074414][ T29] audit: type=1326 audit(1750940202.451:33610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.272331][ T29] audit: type=1326 audit(1750940202.451:33611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.296043][ T29] audit: type=1400 audit(1750940202.491:33612): avc: denied { unmount } for pid=27735 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 718.324684][T32054] devtmpfs: Unknown parameter '¼' [ 718.360417][ T29] audit: type=1326 audit(1750940202.511:33613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.384290][ T29] audit: type=1326 audit(1750940202.511:33614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.408097][ T29] audit: type=1326 audit(1750940202.511:33615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.431901][ T29] audit: type=1326 audit(1750940202.511:33616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.455580][ T29] audit: type=1326 audit(1750940202.511:33617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32022 comm="syz.4.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dd11ce929 code=0x7ffc0000 [ 718.489388][T32040] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 718.907375][T32092] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 718.914013][T32092] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 718.921594][T32092] vhci_hcd vhci_hcd.0: Device attached [ 718.948506][T32093] vhci_hcd: connection closed [ 718.948690][ T9173] vhci_hcd: stop threads [ 718.957735][ T9173] vhci_hcd: release socket [ 718.962179][ T9173] vhci_hcd: disconnect device [ 719.212761][T32102] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 719.223325][T32102] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9412'. [ 719.527528][T32040] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 719.549008][T32040] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 719.570757][T32040] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 719.604242][T32040] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 719.811525][T32132] bridge1: entered promiscuous mode [ 719.830053][T32132] bridge1: entered allmulticast mode [ 720.135926][ C0] ================================================================== [ 720.144067][ C0] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 720.151099][ C0] [ 720.153421][ C0] read-write to 0xffff888237d29d24 of 4 bytes by task 23 on cpu 1: [ 720.161402][ C0] wq_worker_running+0x95/0x120 [ 720.166264][ C0] schedule_timeout+0xb7/0x170 [ 720.171033][ C0] msleep+0x50/0x90 [ 720.174851][ C0] nsim_fib_event_work+0x1ebc/0x21a0 [ 720.180145][ C0] process_scheduled_works+0x4ce/0x9d0 [ 720.185632][ C0] worker_thread+0x582/0x770 [ 720.190256][ C0] kthread+0x486/0x510 [ 720.194328][ C0] ret_from_fork+0xda/0x150 [ 720.198834][ C0] ret_from_fork_asm+0x1a/0x30 [ 720.203611][ C0] [ 720.205931][ C0] read to 0xffff888237d29d24 of 4 bytes by interrupt on cpu 0: [ 720.213491][ C0] kick_pool+0x49/0x2d0 [ 720.217652][ C0] __queue_work+0x8d6/0xb60 [ 720.222163][ C0] queue_work_on+0xd1/0x160 [ 720.226675][ C0] wg_packet_send_staged_packets+0x83d/0xab0 [ 720.232689][ C0] wg_packet_send_keepalive+0xeb/0x100 [ 720.238160][ C0] wg_expired_send_persistent_keepalive+0x3c/0x50 [ 720.244674][ C0] call_timer_fn+0x38/0x2c0 [ 720.249177][ C0] __run_timer_base+0x415/0x610 [ 720.254042][ C0] run_timer_softirq+0x31/0x70 [ 720.258825][ C0] handle_softirqs+0xba/0x290 [ 720.263532][ C0] __irq_exit_rcu+0x3a/0xc0 [ 720.268140][ C0] sysvec_apic_timer_interrupt+0x74/0x80 [ 720.273794][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 720.279786][ C0] __sanitizer_cov_trace_pc+0x5d/0x70 [ 720.285165][ C0] free_pages_and_swap_cache+0xec/0x400 [ 720.290814][ C0] tlb_flush_mmu+0x2dc/0x450 [ 720.295410][ C0] tlb_finish_mmu+0x8d/0x110 [ 720.300024][ C0] exit_mmap+0x2fe/0x6c0 [ 720.304268][ C0] __mmput+0x28/0x1c0 [ 720.308255][ C0] mmput+0x40/0x50 [ 720.311981][ C0] exit_mm+0xe4/0x190 [ 720.315972][ C0] do_exit+0x417/0x1590 [ 720.320138][ C0] do_group_exit+0xff/0x140 [ 720.324653][ C0] get_signal+0xe59/0xf70 [ 720.328997][ C0] arch_do_signal_or_restart+0x96/0x480 [ 720.334640][ C0] exit_to_user_mode_loop+0x7a/0x100 [ 720.339947][ C0] do_syscall_64+0x1d6/0x200 [ 720.344661][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.350559][ C0] [ 720.352919][ C0] value changed: 0x00000000 -> 0x00000001 [ 720.358734][ C0] [ 720.361061][ C0] Reported by Kernel Concurrency Sanitizer on: [ 720.367219][ C0] CPU: 0 UID: 0 PID: 32162 Comm: syz.6.9433 Tainted: G W 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 720.381291][ C0] Tainted: [W]=WARN [ 720.385093][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 720.395242][ C0] ================================================================== [ 721.110939][T32036] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 721.122208][T32036] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 721.133476][T32036] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 721.145011][T32036] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0