last executing test programs: 2.718881212s ago: executing program 2 (id=629): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="a77e", 0x2}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000018"], 0xa0}, 0x4004881) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2000) 2.717941592s ago: executing program 1 (id=630): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28, 0xfffd}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r7, {0x10, 0xfff3}, {}, {0xa, 0x7}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_KEY_ID={0x8, 0x1a, 0x7}, @TCA_FLOWER_KEY_FLAGS={0x8, 0x2f, 0x1000}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20044005}, 0x40040) 2.054863378s ago: executing program 0 (id=633): setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5100, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 1.980917055s ago: executing program 0 (id=635): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000300)="300e", 0x2, r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1}}], 0x90}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000e80)=ANY=[@ANYRESOCT=r5, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095", @ANYRESOCT, @ANYRESOCT=r3, @ANYRES64=0x0, @ANYBLOB="64288c95ae43bda0e5d0120864cc7da5dfc6c19c734c8a921bb2d88bf178b4eb1a832bf25a9d21b59bec37e321f8d231b8b402d5fab808811cdf44b51929ece40d461c2feba43b2ac66d42fa515f0abe84c40d4d001bf7ac80a334c19a54686d12f2a3b9eb591e9ddc463051173ef81cb9b11405e931548f9deddafc4a6104718595e21b904a3ef6acb7b2cee2ce5917ed0bc6f2bb9d2751588875ba3bec184642ea05ec894c7d7e87e939f0009662cde079993bdea4073444a680c5f76b1d9a9a8b86bd2e4704cc5e0b11d969df4d161ac5b1", @ANYRESHEX=r2], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r8, 0x0, 0x2}, 0x18) sendmsg$NFT_BATCH(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 1.918766441s ago: executing program 0 (id=637): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00005a7000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00004fe000/0x4000)=nil) mremap(&(0x7f0000ef9000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mremap(&(0x7f00006bd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) mremap(&(0x7f00007b2000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000968000/0x3000)=nil) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x183, 0x6}, 0x110c40, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x454a, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) 1.837533819s ago: executing program 2 (id=638): bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x20ffe, 0x0, 0x0, 0x40f00, 0xac, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) syz_emit_ethernet(0x6a, &(0x7f0000000200)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x4, "1fa3883e21cd9fe5caae18544a9131d14c91cf0d35507989", "6e447a58f2e6a0893330bdb477ae5aa6740446707740eb6dcb6c5545363eff42"}}}}}}, 0x0) 1.821648831s ago: executing program 2 (id=639): r0 = syz_io_uring_setup(0x14dd, &(0x7f0000000300)={0x0, 0x5121, 0x0, 0x3, 0x258}, &(0x7f0000000040)=0x0, &(0x7f0000000600)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000140)='./file1\x00'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a00000709000100"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000060a010400000000000000000a0073797a3100000000100004800c00018007000100727400000900020073797a3200000000140000001100010000000000000000000500000a000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) io_uring_enter(r0, 0x47ba, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'lo\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x40804}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000001640)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x4, 0x10000, {{0x19, 0x4, 0x3, 0x7, 0x64, 0x66, 0x0, 0x72, 0x2f, 0x0, @rand_addr=0x64010102, @remote, {[@timestamp_prespec={0x44, 0x34, 0xe8, 0x3, 0x1, [{@loopback, 0x40}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x100}, {@private=0xa010102, 0x3}, {@initdev={0xac, 0x1e, 0x6, 0x0}, 0x2}, {@multicast1, 0x6}, {@multicast1, 0x2da}]}, @noop, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x6, 0x6, "8aa942a0"}]}, @generic={0x86, 0xe, "adda5f9505422eb47ce7f3a9"}]}}}}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f00000002c0)={r11, 0x11, 0x6, @random="08d32bfb45c9"}, 0x10) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000100)={r11, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}}, 0x10) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r11, {0x0, 0xffff}, {0x4, 0xa}, {0x0, 0xe}}}, 0x24}, 0x1, 0x0, 0x0, 0x48080}, 0x0) 1.777140435s ago: executing program 0 (id=640): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000580)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1b5008, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$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") r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) unshare(0x2040400) r3 = fsopen(&(0x7f0000000400)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) fsopen(&(0x7f0000000240)='cramfs\x00', 0x1) unshare(0x2000400) r4 = fsmount(r3, 0x0, 0x0) ioctl$F2FS_IOC_DECOMPRESS_FILE(r0, 0xf517, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000280), 0x1, 0x109101) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./bus\x00', 0x0, 0x18}, 0x18) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r9, @ANYBLOB="4000aa000a0002"], 0x28}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001000)={0x6, 0x25, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@func, @alu={0x7, 0x1, 0xc, 0x4, 0x9, 0x18, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffff9}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x68dfec8e}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x2, 0xc6, &(0x7f0000000440)=""/198, 0x40f00, 0x2, '\x00', r9, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x3, 0xf, 0xffff, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000580)=[r4], &(0x7f0000000f80)=[{0x2, 0x2, 0x6, 0x6}, {0x2, 0x2, 0x5, 0x5}, {0x0, 0x3, 0x7, 0x9}, {0x4, 0x4, 0x8, 0x7}, {0x3, 0xffffff00, 0x6, 0x5}], 0x10, 0xf9}, 0x94) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000000)={0x4, 0x8, 0x0, 'queue0\x00', 0x8}) r10 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x100) preadv2(r10, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x100000}], 0x2, 0x0, 0x7feff000, 0x0) 1.776875595s ago: executing program 4 (id=641): r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1, 0x0, 0x20}, 0x18) semget$private(0x0, 0x4000000009, 0x42a) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x50, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000d40)=ANY=[@ANYBLOB="000000004c900285020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"/192]) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000530000008500"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010003000000000000002600000018000180140002006c6f"], 0x2c}}, 0x40) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x20048a, &(0x7f00000001c0)={[{@grpjquota}, {@noinit_itable}, {@abort}, {@bsdgroups}]}, 0x12, 0x51a, &(0x7f0000001200)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r5, 0x0) ftruncate(r5, 0xc17a) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r7, &(0x7f00000000c0)=ANY=[], 0xffffff6a) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r8, 0x4, 0x2200) splice(r6, 0x0, r9, 0x0, 0xfffd, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x40305829, &(0x7f0000000240)={0x17c04, 0xffffffffffffffff, 0x2, 0x100000001, 0x9, 0x3}) r10 = add_key$keyring(&(0x7f00000101c0), &(0x7f0000010180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', r10, 0x30}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.766436246s ago: executing program 1 (id=642): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00"/11], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e028008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703410000004000000000000000040014000d000a00100000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 1.688532783s ago: executing program 1 (id=643): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4094, 0xffe}], 0x1, 0xf0, 0xd215) syz_pidfd_open(0x0, 0x0) pidfd_getfd(r0, r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) fallocate(r4, 0x8, 0x8000000000000000, 0x1c00000) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000f000000050030000000000005002f000000000008000300", @ANYRES32=r7], 0x2c}}, 0x0) 1.633146929s ago: executing program 1 (id=644): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0x5}, 0x18) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) syz_usb_disconnect(r2) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000000)='./file2\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,dmask=00000000000000000000003,usefree,nodots,flush,dots,dots,gid=', @ANYRESHEX=0x0, @ANYBLOB], 0x1, 0x214, &(0x7f0000000840)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000004c0), 0x208e24b) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdcf, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain={'key_or_keyring:', r7}) keyctl$KEYCTL_MOVE(0x1e, r7, 0xffffffffffffffff, r8, 0x0) 1.632778279s ago: executing program 0 (id=645): mremap(&(0x7f0000ef9000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff25}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2, 0x31}, 0x48) 1.595652043s ago: executing program 3 (id=647): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)=0x3) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f0000000340)=[{0x7f, 0x46, 0x0, 0x6}]}) (fail_nth: 5) 1.513034421s ago: executing program 2 (id=648): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x74f0) syz_mount_image$ext4(&(0x7f00000004c0)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3804402, &(0x7f0000000340), 0xfd, 0x564, &(0x7f0000000b00)="$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") socket$nl_netfilter(0x10, 0x3, 0xc) pipe(0x0) r2 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340), &(0x7f0000000040)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)={0x60, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x90) io_uring_enter(r2, 0x627, 0x4c1, 0x43, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r4) sendmsg$NFC_CMD_DEP_LINK_UP(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01002abd7000fbdbdf250400000005000a0000000000080001"], 0x3c}, 0x1, 0x0, 0x0, 0x26040041}, 0x40) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(r4, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)={0x54, r6, 0x100, 0x0, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_clone(0x48020000, 0x0, 0x0, 0x0, 0x0, 0x0) 784.942633ms ago: executing program 4 (id=649): bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x20ffe, 0x0, 0x0, 0x40f00, 0xac, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) syz_emit_ethernet(0x6a, &(0x7f0000000200)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x4, "1fa3883e21cd9fe5caae18544a9131d14c91cf0d35507989", "6e447a58f2e6a0893330bdb477ae5aa6740446707740eb6dcb6c5545363eff42"}}}}}}, 0x0) 739.462087ms ago: executing program 4 (id=650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000004000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2000002, 0x42032, 0xffffffffffffffff, 0x80000000) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) read$hidraw(r3, &(0x7f0000000040)=""/180, 0xb4) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 650.860107ms ago: executing program 4 (id=651): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='kmem_cache_free\x00', r1}, 0x18) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)) gettid() r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r6, 0x0, r5, 0x0, 0x6, 0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000000100)=0x3ff) fcntl$setstatus(r5, 0x4, 0x7c00) dup3(r6, r5, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c000000010605"], 0x2c}, 0x1, 0x0, 0x0, 0x40001d0}, 0x0) 603.673051ms ago: executing program 3 (id=652): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00005a7000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00004fe000/0x4000)=nil) mremap(&(0x7f0000ef9000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mremap(&(0x7f00006bd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) mremap(&(0x7f00007b2000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000968000/0x3000)=nil) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x183, 0x6}, 0x110c40, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x454a, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) 565.298995ms ago: executing program 0 (id=653): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa0677"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) 532.915958ms ago: executing program 32 (id=653): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa0677"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) 480.196963ms ago: executing program 4 (id=655): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x1000000000000}, 0x18) syz_emit_ethernet(0x3a, &(0x7f0000000440)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x18, 0x0, @wg=@data}}}}}, 0x0) 463.305045ms ago: executing program 4 (id=656): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='kmem_cache_free\x00', r0}, 0x18) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r2, 0x0, r1, 0x0, 0x6, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x3ff) fcntl$setstatus(r1, 0x4, 0x7c00) dup3(r2, r1, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x40001d0}, 0x0) 347.271276ms ago: executing program 3 (id=657): r0 = memfd_secret(0x80000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x1c1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00'}, 0x18) fcntl$setlease(r0, 0x400, 0x0) close(r0) 325.718818ms ago: executing program 3 (id=658): syz_open_dev$loop(0x0, 0x54f, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x2}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x18) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), r3) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000040000e41300050003030000000a0000005dc000000000010800020005000000140006"], 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) 280.068663ms ago: executing program 3 (id=659): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf250401f2800c00180008ac0f0000000100140001"], 0x114}, {&(0x7f00000039c0)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="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"], 0x2cc}], 0x2, 0x0, 0x0, 0x20000001}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x1c}, 0x4e23, 0x0, 0x4e24, 0x0, 0x2, 0x80, 0x20, 0x11, 0x0, r4}, {0xe61, 0x0, 0x0, 0x2, 0x9, 0x1, 0xffd, 0x8}, {0xfffffffffffff5b9, 0x4, 0x7fffffffffffffff, 0x7}, 0x8000, 0x6e6bb5, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast1, 0x4d3, 0x3c}, 0xa, @in6=@remote, 0x43500, 0x0, 0x0, 0x4, 0xc, 0xd0, 0x1}}, 0xe8) r5 = getgid() lchown(&(0x7f0000000040)='./file0\x00', r4, r5) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000001240)) getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file1/file3\x00', 0x81a2062b7ec22e50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r8, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000880)=r9}, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010028bd7000fbdbdf25250000000e0001006e657464657673696d00000067ff02006e657464657673696d30000008008a00", @ANYRES32=r10, @ANYBLOB="24a46bdd9e58e9cb90b480366de8fd6f7d4c922ec14425f4de7b3f7babab1c8fe4ef52fccf9600d4cddc43c4b12de1cd180c5fc8cb499e82c8447d2f4ce72d"], 0x3c}}, 0x30) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) socket$nl_generic(0x10, 0x3, 0x10) r11 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYRES32=r11, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000004", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) r12 = geteuid() setresuid(r12, 0x0, r12) 273.116393ms ago: executing program 2 (id=660): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000780)='netlink_extack\x00', r0, 0x0, 0xb0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000f00), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x80, r2, 0x1, 0x0, 0x0, {}, [{@pci={{0x8, 0x8e}, {0x11}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x80}}, 0x0) 215.34145ms ago: executing program 1 (id=661): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x100000, 0x0, 0x3f, 0x0, 0x0, 0x0) 213.16967ms ago: executing program 2 (id=662): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x6, 0x2, 0x7ffcfffc}]}) socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40010) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="070000000400000008000000d90000", @ANYRES64=r4, @ANYBLOB="000000000000000000b89ac5247c14a7e2000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=r1], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000400000000fcffffff0000000768953f", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r8}, 0x18) r9 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r10 = socket$qrtr(0x2a, 0x2, 0x0) r11 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x400, 0x3, 0x47}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r12, r13, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r10, 0x0, 0x0}) io_uring_enter(r11, 0x3498, 0x969, 0xffff000000000000, 0x0, 0x0) dup3(r11, r9, 0x80000) 120.288679ms ago: executing program 3 (id=663): mremap(&(0x7f0000ef9000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff25}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2, 0x31}, 0x48) 0s ago: executing program 1 (id=664): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) ioctl$FIOCLEX(r3, 0x5451) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0xf, 0x0, 0x7fff8000}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='rxrpc_local\x00', r7}, 0x18) r8 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000003, 0x13, r4, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$cgroup_pressure(r1, &(0x7f0000000140)={'full', 0x20, 0x0, 0x20, 0x4}, 0x2f) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCFLSH(r0, 0x400455c8, 0x0) kernel console output (not intermixed with test programs): veth0_macvtap: entered promiscuous mode [ 39.521633][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.532287][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.542854][ T3322] veth1_macvtap: entered promiscuous mode [ 39.550709][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.559661][ T3315] veth1_vlan: entered promiscuous mode [ 39.569500][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.589504][ T2057] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.603705][ T2057] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.620318][ T3320] veth0_vlan: entered promiscuous mode [ 39.628461][ T2057] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.638325][ T3320] veth1_vlan: entered promiscuous mode [ 39.647421][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.656903][ T2057] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.682823][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.694273][ T2057] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.704171][ T3315] veth0_macvtap: entered promiscuous mode [ 39.716618][ T2057] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.717736][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.746416][ T2057] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.756119][ T3315] veth1_macvtap: entered promiscuous mode [ 39.792057][ T2057] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.812257][ T2057] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.822090][ T3320] veth0_macvtap: entered promiscuous mode [ 39.848268][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.858304][ T3320] veth1_macvtap: entered promiscuous mode [ 39.869783][ T2057] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.878763][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 39.878796][ T29] audit: type=1400 audit(1760774250.034:101): avc: denied { map_create } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.894334][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.903993][ T29] audit: type=1400 audit(1760774250.034:102): avc: denied { map_read map_write } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.931060][ T29] audit: type=1400 audit(1760774250.034:103): avc: denied { create } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.948941][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.950384][ T29] audit: type=1400 audit(1760774250.034:104): avc: denied { setopt } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.977049][ T29] audit: type=1400 audit(1760774250.034:105): avc: denied { write } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.998746][ T2057] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.007729][ T29] audit: type=1400 audit(1760774250.094:106): avc: denied { read } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.009280][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.026999][ T29] audit: type=1326 audit(1760774250.144:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3482 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 40.057991][ T29] audit: type=1326 audit(1760774250.144:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3482 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=23 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 40.083734][ T29] audit: type=1326 audit(1760774250.244:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3482 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 40.084844][ T2057] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.107127][ T29] audit: type=1326 audit(1760774250.244:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3482 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 40.148802][ T2057] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.208541][ T3491] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3'. [ 40.217466][ T3494] loop1: detected capacity change from 0 to 1024 [ 40.224316][ T3494] EXT4-fs: Ignoring removed orlov option [ 40.230371][ T3494] EXT4-fs: Ignoring removed nomblk_io_submit option [ 40.245085][ T2057] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.278836][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.296692][ T3494] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.309092][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.330726][ T3498] 9pnet: Could not find request transport: fd [ 45.311281][ T3771] __dump_stack+0x1d/0x30 [ 45.311305][ T3771] dump_stack_lvl+0xe8/0x140 [ 45.311406][ T3771] dump_stack+0x15/0x1b [ 45.311423][ T3771] should_fail_ex+0x265/0x280 [ 45.311464][ T3771] should_failslab+0x8c/0xb0 [ 45.311569][ T3771] kmem_cache_alloc_noprof+0x50/0x480 [ 45.311631][ T3771] ? alloc_vfsmnt+0x2d/0x300 [ 45.311672][ T3771] ? lockref_get+0xd8/0x130 [ 45.311705][ T3771] alloc_vfsmnt+0x2d/0x300 [ 45.311778][ T3771] clone_mnt+0x30/0x5d0 [ 45.311856][ T3771] ? __do_loopback+0x1f2/0x280 [ 45.311940][ T3771] __do_loopback+0x1ff/0x280 [ 45.312008][ T3771] do_loopback+0x1f1/0x2a0 [ 45.312032][ T3771] path_mount+0x3dc/0xb70 [ 45.312061][ T3771] ? user_path_at+0x109/0x130 [ 45.312190][ T3771] __se_sys_mount+0x28c/0x2e0 [ 45.312219][ T3771] ? fput+0x8f/0xc0 [ 45.312270][ T3771] __x64_sys_mount+0x67/0x80 [ 45.312301][ T3771] x64_sys_call+0x2b51/0x3000 [ 45.312344][ T3771] do_syscall_64+0xd2/0x200 [ 45.312368][ T3771] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 45.312407][ T3771] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 45.312428][ T3771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.312485][ T3771] RIP: 0033:0x7f3a3a2defc9 [ 45.312517][ T3771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.312540][ T3771] RSP: 002b:00007f3a38d47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 45.312582][ T3771] RAX: ffffffffffffffda RBX: 00007f3a3a535fa0 RCX: 00007f3a3a2defc9 [ 45.312600][ T3771] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000200000000000 [ 45.312616][ T3771] RBP: 00007f3a38d47090 R08: 0000000000000000 R09: 0000000000000000 [ 45.312631][ T3771] R10: 0000000000001001 R11: 0000000000000246 R12: 0000000000000002 [ 45.312648][ T3771] R13: 00007f3a3a536038 R14: 00007f3a3a535fa0 R15: 00007ffeb1556e28 [ 45.312693][ T3771] [ 45.596545][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.607907][ T3787] __nla_validate_parse: 13 callbacks suppressed [ 45.607927][ T3787] netlink: 40 bytes leftover after parsing attributes in process `syz.1.94'. [ 45.704995][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 45.713917][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 45.722779][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 45.747219][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 45.756307][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 45.765360][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 45.767021][ T3797] netlink: 8 bytes leftover after parsing attributes in process `syz.1.98'. [ 45.790922][ T3803] loop0: detected capacity change from 0 to 512 [ 45.799229][ T29] audit: type=1326 audit(1760774255.944:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.823365][ T29] audit: type=1326 audit(1760774255.944:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.847046][ T29] audit: type=1326 audit(1760774255.954:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.871002][ T29] audit: type=1326 audit(1760774255.954:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.877140][ T3803] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 45.894821][ T29] audit: type=1326 audit(1760774255.954:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.926500][ T29] audit: type=1326 audit(1760774255.954:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.929372][ T3807] netlink: 8 bytes leftover after parsing attributes in process `syz.3.101'. [ 45.949798][ T29] audit: type=1326 audit(1760774255.954:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3802 comm="syz.0.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f63acceefc9 code=0x7ffc0000 [ 45.952419][ T3790] loop4: detected capacity change from 0 to 128 [ 45.984765][ T3800] netlink: 28 bytes leftover after parsing attributes in process `syz.2.99'. [ 46.003064][ T3803] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 46.003757][ T3790] syz.4.96: attempt to access beyond end of device [ 46.003757][ T3790] loop4: rw=2049, sector=154, nr_sectors = 6 limit=128 [ 46.027041][ T3803] ext4 filesystem being mounted at /13/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.035780][ T3790] syz.4.96: attempt to access beyond end of device [ 46.035780][ T3790] loop4: rw=2049, sector=158, nr_sectors = 2 limit=128 [ 46.053787][ T3790] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 46.065418][ T3790] syz.4.96: attempt to access beyond end of device [ 46.065418][ T3790] loop4: rw=2049, sector=160, nr_sectors = 2 limit=128 [ 46.078742][ T3790] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 46.100146][ T3790] syz.4.96: attempt to access beyond end of device [ 46.100146][ T3790] loop4: rw=2049, sector=162, nr_sectors = 6 limit=128 [ 46.114228][ T3790] syz.4.96: attempt to access beyond end of device [ 46.114228][ T3790] loop4: rw=2049, sector=166, nr_sectors = 2 limit=128 [ 46.127524][ T3790] Buffer I/O error on dev loop4, logical block 83, lost async page write [ 46.136614][ T3790] syz.4.96: attempt to access beyond end of device [ 46.136614][ T3790] loop4: rw=2049, sector=168, nr_sectors = 2 limit=128 [ 46.150267][ T3790] Buffer I/O error on dev loop4, logical block 84, lost async page write [ 46.162405][ T3790] syz.4.96: attempt to access beyond end of device [ 46.162405][ T3790] loop4: rw=2049, sector=202, nr_sectors = 6 limit=128 [ 46.178484][ T3790] syz.4.96: attempt to access beyond end of device [ 46.178484][ T3790] loop4: rw=2049, sector=206, nr_sectors = 2 limit=128 [ 46.192168][ T3790] Buffer I/O error on dev loop4, logical block 103, lost async page write [ 46.201804][ T3813] netlink: 'syz.4.96': attribute type 39 has an invalid length. [ 46.229482][ T3790] syz.4.96: attempt to access beyond end of device [ 46.229482][ T3790] loop4: rw=2049, sector=208, nr_sectors = 2 limit=128 [ 46.242854][ T3790] Buffer I/O error on dev loop4, logical block 104, lost async page write [ 46.252122][ T3790] syz.4.96: attempt to access beyond end of device [ 46.252122][ T3790] loop4: rw=2049, sector=210, nr_sectors = 6 limit=128 [ 46.272072][ T3790] Buffer I/O error on dev loop4, logical block 107, lost async page write [ 46.288129][ T3790] Buffer I/O error on dev loop4, logical block 108, lost async page write [ 46.327565][ T3790] Buffer I/O error on dev loop4, logical block 119, lost async page write [ 46.363956][ T3790] Buffer I/O error on dev loop4, logical block 120, lost async page write [ 46.454687][ T3313] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 46.783533][ T3847] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3847 comm=syz.2.114 [ 46.816861][ T3847] netlink: 'syz.2.114': attribute type 6 has an invalid length. [ 47.399786][ T3869] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 47.399786][ T3869] program syz.3.120 not setting count and/or reply_len properly [ 47.507618][ T3871] 9p: Unknown access argument 00000000000000000000Ï"1L­^DÃÛZ;¬«!ˆlˆÔÂÞUŒ–³mãôåÔ×€r¡3» Rrm5·Q߸D­¶à»eÿžÖÂÕýññg ŒC¾âOÓmx: -22 [ 47.737410][ C0] hrtimer: interrupt took 38787 ns [ 47.765290][ T3892] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 47.850427][ T3900] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 47.984410][ T3909] Zero length message leads to an empty skb [ 48.245281][ T3926] FAULT_INJECTION: forcing a failure. [ 48.245281][ T3926] name failslab, interval 1, probability 0, space 0, times 0 [ 48.258309][ T3926] CPU: 1 UID: 0 PID: 3926 Comm: syz.3.142 Not tainted syzkaller #0 PREEMPT(voluntary) [ 48.258345][ T3926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 48.258361][ T3926] Call Trace: [ 48.258368][ T3926] [ 48.258406][ T3926] __dump_stack+0x1d/0x30 [ 48.258432][ T3926] dump_stack_lvl+0xe8/0x140 [ 48.258456][ T3926] dump_stack+0x15/0x1b [ 48.258471][ T3926] should_fail_ex+0x265/0x280 [ 48.258533][ T3926] should_failslab+0x8c/0xb0 [ 48.258560][ T3926] kmem_cache_alloc_noprof+0x50/0x480 [ 48.258595][ T3926] ? fib6_add_1+0x4f8/0xa80 [ 48.258626][ T3926] ? __kmalloc_noprof+0x2a2/0x570 [ 48.258653][ T3926] fib6_add_1+0x4f8/0xa80 [ 48.258711][ T3926] fib6_add+0xff/0xe00 [ 48.258789][ T3926] ? should_fail_ex+0xdb/0x280 [ 48.258833][ T3926] ip6_ins_rt+0x73/0xb0 [ 48.258862][ T3926] __ipv6_dev_ac_inc+0x4ee/0x640 [ 48.258904][ T3926] ipv6_sock_ac_join+0x3dc/0x540 [ 48.258943][ T3926] do_ipv6_setsockopt+0x1938/0x2160 [ 48.259025][ T3926] ? kstrtoull+0x111/0x140 [ 48.259056][ T3926] ? avc_has_perm_noaudit+0x1b1/0x200 [ 48.259089][ T3926] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 48.259117][ T3926] ipv6_setsockopt+0x59/0x130 [ 48.259229][ T3926] udpv6_setsockopt+0x99/0xb0 [ 48.259273][ T3926] sock_common_setsockopt+0x69/0x80 [ 48.259293][ T3926] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 48.259313][ T3926] __sys_setsockopt+0x184/0x200 [ 48.259400][ T3926] __x64_sys_setsockopt+0x64/0x80 [ 48.259452][ T3926] x64_sys_call+0x20ec/0x3000 [ 48.259472][ T3926] do_syscall_64+0xd2/0x200 [ 48.259494][ T3926] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 48.259541][ T3926] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 48.259630][ T3926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.259649][ T3926] RIP: 0033:0x7f0fe239efc9 [ 48.259663][ T3926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.259681][ T3926] RSP: 002b:00007f0fe0e07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 48.259698][ T3926] RAX: ffffffffffffffda RBX: 00007f0fe25f5fa0 RCX: 00007f0fe239efc9 [ 48.259710][ T3926] RDX: 000000000000001b RSI: 0000000000000029 RDI: 0000000000000005 [ 48.259720][ T3926] RBP: 00007f0fe0e07090 R08: 0000000000000014 R09: 0000000000000000 [ 48.259731][ T3926] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000002 [ 48.259741][ T3926] R13: 00007f0fe25f6038 R14: 00007f0fe25f5fa0 R15: 00007ffdbdc4fa68 [ 48.259808][ T3926] [ 49.372968][ T3966] ip6gre1: entered allmulticast mode [ 49.421497][ T3966] syz.4.156 (3966) used greatest stack depth: 10160 bytes left [ 49.711770][ T3974] loop4: detected capacity change from 0 to 1024 [ 49.879325][ T3984] batadv_slave_1: entered promiscuous mode [ 49.885797][ T3984] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 49.899182][ T3984] batadv_slave_1 (unregistering): left promiscuous mode [ 49.906446][ T3984] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 50.032981][ T3987] loop0: detected capacity change from 0 to 256 [ 50.136121][ T29] kauditd_printk_skb: 353 callbacks suppressed [ 50.136217][ T29] audit: type=1404 audit(1760774260.304:1058): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 50.174010][ T29] audit: type=1404 audit(1760774260.324:1059): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 50.189441][ T29] audit: type=1400 audit(1760774260.324:1060): avc: denied { read } for pid=3994 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 50.255812][ T29] audit: type=1400 audit(1760774260.334:1061): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 50.269650][ T4001] loop2: detected capacity change from 0 to 512 [ 50.280467][ T29] audit: type=1400 audit(1760774260.334:1062): avc: denied { open } for pid=3313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 50.311485][ T29] audit: type=1400 audit(1760774260.334:1063): avc: denied { ioctl } for pid=3313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 50.337824][ T29] audit: type=1400 audit(1760774260.384:1064): avc: denied { open } for pid=3996 comm="syz.4.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.349129][ T4001] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 50.357632][ T29] audit: type=1400 audit(1760774260.384:1065): avc: denied { perfmon } for pid=3996 comm="syz.4.167" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 50.377827][ T4001] EXT4-fs error (device loop2): ext4_free_branches:1023: inode #11: comm syz.2.169: invalid indirect mapped block 4294967295 (level 1) [ 50.386993][ T29] audit: type=1400 audit(1760774260.384:1066): avc: denied { kernel } for pid=3996 comm="syz.4.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.387093][ T29] audit: type=1400 audit(1760774260.384:1067): avc: denied { tracepoint } for pid=3996 comm="syz.4.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.456033][ T4004] netlink: 'syz.4.167': attribute type 4 has an invalid length. [ 50.484024][ T4006] veth0: entered promiscuous mode [ 50.519233][ T4005] veth0: left promiscuous mode [ 50.541139][ T4001] EXT4-fs (loop2): Remounting filesystem read-only [ 50.541714][ T4011] 8021q: adding VLAN 0 to HW filter on device bond1 [ 50.556760][ T4001] EXT4-fs (loop2): 2 truncates cleaned up [ 50.568437][ T4011] team0: Port device bond1 added [ 50.573943][ T4001] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.604271][ T4015] loop3: detected capacity change from 0 to 1024 [ 50.632439][ T4011] netlink: 'syz.1.171': attribute type 1 has an invalid length. [ 50.640326][ T4011] __nla_validate_parse: 42 callbacks suppressed [ 50.640342][ T4011] netlink: 224 bytes leftover after parsing attributes in process `syz.1.171'. [ 50.665135][ T4015] EXT4-fs error (device loop3): ext4_acquire_dquot:6945: comm syz.3.172: Failed to acquire dquot type 0 [ 50.676694][ T4001] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000. [ 50.691126][ T4015] EXT4-fs error (device loop3): mb_free_blocks:2017: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 50.708323][ T4015] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.172: corrupted inode contents [ 50.720688][ T4015] EXT4-fs error (device loop3): ext4_dirty_inode:6517: inode #13: comm syz.3.172: mark_inode_dirty error [ 50.733620][ T4015] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.172: corrupted inode contents [ 50.737846][ T4015] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #13: comm syz.3.172: mark_inode_dirty error [ 50.739858][ T4015] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.172: corrupted inode contents [ 50.740282][ T4015] EXT4-fs error (device loop3) in ext4_orphan_del:301: Corrupt filesystem [ 50.740933][ T4015] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.172: corrupted inode contents [ 50.744918][ T4015] EXT4-fs error (device loop3): ext4_truncate:4637: inode #13: comm syz.3.172: mark_inode_dirty error [ 50.745405][ T4015] EXT4-fs error (device loop3) in ext4_process_orphan:343: Corrupt filesystem [ 50.825698][ T4015] EXT4-fs (loop3): 1 truncate cleaned up [ 50.831797][ T4015] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.851344][ T4015] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 50.890392][ T3320] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.924088][ T4018] loop1: detected capacity change from 0 to 4096 [ 50.933847][ T4018] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 50.965230][ T4020] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 50.983383][ T4018] netlink: 12 bytes leftover after parsing attributes in process `syz.1.174'. [ 50.995508][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.034823][ T4018] netlink: 4 bytes leftover after parsing attributes in process `syz.1.174'. [ 51.058183][ T4025] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 51.200205][ T4038] capability: warning: `syz.0.177' uses deprecated v2 capabilities in a way that may be insecure [ 51.228522][ T4037] netlink: 8 bytes leftover after parsing attributes in process `syz.4.182'. [ 51.973989][ T4048] netlink: 'syz.0.185': attribute type 10 has an invalid length. [ 51.982210][ T4048] netlink: 40 bytes leftover after parsing attributes in process `syz.0.185'. [ 52.038988][ T4048] team0: Port device geneve1 added [ 52.072331][ T4050] netlink: 'syz.3.187': attribute type 3 has an invalid length. [ 52.101269][ T4056] netlink: 40 bytes leftover after parsing attributes in process `syz.0.189'. [ 52.110300][ T4056] netlink: 40 bytes leftover after parsing attributes in process `syz.0.189'. [ 52.129698][ T4056] netlink: 40 bytes leftover after parsing attributes in process `syz.0.189'. [ 52.139210][ T4056] netlink: 40 bytes leftover after parsing attributes in process `syz.0.189'. [ 52.272787][ T4054] loop2: detected capacity change from 0 to 512 [ 52.281663][ T4054] EXT4-fs: dax option not supported [ 52.309591][ T4066] netlink: 24 bytes leftover after parsing attributes in process `syz.1.191'. [ 52.488624][ T4080] serio: Serial port ptm0 [ 54.179899][ T4155] loop2: detected capacity change from 0 to 512 [ 54.216222][ T4155] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a842c01c, mo2=0002] [ 54.225188][ T4155] System zones: 0-2, 18-18, 34-35 [ 54.231330][ T4155] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 54.244900][ T4155] ext4 filesystem being mounted at /47/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 54.411266][ T4166] netlink: 'syz.2.225': attribute type 1 has an invalid length. [ 54.816817][ T4178] FAULT_INJECTION: forcing a failure. [ 54.816817][ T4178] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 54.830459][ T4178] CPU: 1 UID: 0 PID: 4178 Comm: syz.0.230 Not tainted syzkaller #0 PREEMPT(voluntary) [ 54.830494][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 54.830511][ T4178] Call Trace: [ 54.830519][ T4178] [ 54.830529][ T4178] __dump_stack+0x1d/0x30 [ 54.830556][ T4178] dump_stack_lvl+0xe8/0x140 [ 54.830576][ T4178] dump_stack+0x15/0x1b [ 54.830655][ T4178] should_fail_ex+0x265/0x280 [ 54.830701][ T4178] should_fail_alloc_page+0xf2/0x100 [ 54.830771][ T4178] __alloc_frozen_pages_noprof+0xff/0x360 [ 54.830833][ T4178] alloc_pages_mpol+0xb3/0x260 [ 54.830854][ T4178] vma_alloc_folio_noprof+0x1aa/0x300 [ 54.830876][ T4178] do_wp_page+0xf60/0x2510 [ 54.830902][ T4178] ? __rcu_read_lock+0x37/0x50 [ 54.830927][ T4178] ? css_rstat_updated+0xb7/0x240 [ 54.831021][ T4178] ? __rcu_read_lock+0x37/0x50 [ 54.831048][ T4178] handle_mm_fault+0x77d/0x2be0 [ 54.831071][ T4178] ? vma_start_read+0x141/0x1f0 [ 54.831218][ T4178] do_user_addr_fault+0x630/0x1080 [ 54.831245][ T4178] ? fpregs_restore_userregs+0xe2/0x1d0 [ 54.831298][ T4178] ? switch_fpu_return+0xe/0x20 [ 54.831335][ T4178] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 54.831421][ T4178] exc_page_fault+0x62/0xa0 [ 54.831448][ T4178] asm_exc_page_fault+0x26/0x30 [ 54.831510][ T4178] RIP: 0033:0x7f63acbb0cb0 [ 54.831525][ T4178] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 54.831544][ T4178] RSP: 002b:00007f63ab7564a0 EFLAGS: 00010202 [ 54.831559][ T4178] RAX: 0000000000004005 RBX: 00007f63ab756540 RCX: 0000000000000031 [ 54.831572][ T4178] RDX: 00000000000000ff RSI: 0000000000000400 RDI: 00007f63ab7565e0 [ 54.831584][ T4178] RBP: 0000000000000032 R08: 00007f63a3337000 R09: 0000000000000004 [ 54.831638][ T4178] R10: 00002000000014c2 R11: 0000000000000454 R12: 0000000000000301 [ 54.831658][ T4178] R13: 00007f63acd8dc40 R14: 0000000000000013 R15: 00007f63ab7565e0 [ 54.831678][ T4178] [ 54.831721][ T4178] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 55.212484][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.251147][ T29] kauditd_printk_skb: 363 callbacks suppressed [ 55.251164][ T29] audit: type=1326 audit(1760774265.414:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.3.233" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f0fe239efc9 code=0x0 [ 55.806228][ T29] audit: type=1326 audit(1760774265.944:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.830382][ T29] audit: type=1326 audit(1760774265.944:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.854461][ T29] audit: type=1326 audit(1760774265.944:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.878356][ T29] audit: type=1326 audit(1760774265.944:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.901923][ T29] audit: type=1326 audit(1760774265.944:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.925686][ T29] audit: type=1326 audit(1760774265.944:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.949492][ T29] audit: type=1326 audit(1760774265.944:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.973144][ T29] audit: type=1326 audit(1760774265.944:1437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 55.996845][ T29] audit: type=1326 audit(1760774265.944:1438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 56.002650][ T4200] __nla_validate_parse: 11 callbacks suppressed [ 56.002674][ T4200] netlink: 24 bytes leftover after parsing attributes in process `syz.2.232'. [ 56.243806][ T4204] netlink: 12 bytes leftover after parsing attributes in process `syz.3.236'. [ 56.276830][ T4204] netlink: 40 bytes leftover after parsing attributes in process `syz.3.236'. [ 56.293489][ T4204] batadv_slave_1: entered promiscuous mode [ 56.305541][ T4204] netlink: 4 bytes leftover after parsing attributes in process `syz.3.236'. [ 56.328595][ T4204] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 56.364370][ T4204] batadv_slave_1 (unregistering): left promiscuous mode [ 56.371717][ T4204] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 56.381451][ T4215] netlink: 24 bytes leftover after parsing attributes in process `syz.1.237'. [ 56.586024][ T4221] netlink: 12 bytes leftover after parsing attributes in process `syz.1.242'. [ 56.662912][ T4222] netlink: 40 bytes leftover after parsing attributes in process `syz.1.242'. [ 56.672992][ T4225] 9pnet: Unknown protocol version 9 [ 56.743557][ T4225] syzkaller0: entered promiscuous mode [ 56.749338][ T4225] syzkaller0: entered allmulticast mode [ 56.870306][ T4222] netlink: 4 bytes leftover after parsing attributes in process `syz.1.242'. [ 57.668081][ T4246] netlink: 24 bytes leftover after parsing attributes in process `syz.2.249'. [ 57.681456][ T4246] loop2: detected capacity change from 0 to 512 [ 57.693394][ T4246] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 57.720801][ T4246] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 57.733556][ T4246] ext4 filesystem being mounted at /50/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 57.751319][ T4251] netlink: 'syz.3.250': attribute type 10 has an invalid length. [ 57.759260][ T4251] netlink: 40 bytes leftover after parsing attributes in process `syz.3.250'. [ 57.773791][ T4251] team0: Port device geneve1 added [ 57.929909][ T4259] syz.3.253: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 57.944676][ T4259] CPU: 1 UID: 0 PID: 4259 Comm: syz.3.253 Not tainted syzkaller #0 PREEMPT(voluntary) [ 57.944715][ T4259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 57.944737][ T4259] Call Trace: [ 57.944820][ T4259] [ 57.944829][ T4259] __dump_stack+0x1d/0x30 [ 57.944915][ T4259] dump_stack_lvl+0xe8/0x140 [ 57.944935][ T4259] dump_stack+0x15/0x1b [ 57.945029][ T4259] warn_alloc+0x12b/0x1a0 [ 57.945069][ T4259] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 57.945117][ T4259] __vmalloc_node_range_noprof+0x9d/0xed0 [ 57.945213][ T4259] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 57.945252][ T4259] ? __rcu_read_unlock+0x4f/0x70 [ 57.945278][ T4259] ? __perf_event_task_sched_in+0xa5b/0xac0 [ 57.945321][ T4259] ? perf_cgroup_switch+0x10c/0x480 [ 57.945366][ T4259] ? update_load_avg+0x1da/0x820 [ 57.945397][ T4259] ? __list_add_valid_or_report+0x38/0xe0 [ 57.945437][ T4259] ? should_fail_ex+0x30/0x280 [ 57.945512][ T4259] ? xskq_create+0x36/0xe0 [ 57.945542][ T4259] vmalloc_user_noprof+0x7d/0xb0 [ 57.945575][ T4259] ? xskq_create+0x80/0xe0 [ 57.945614][ T4259] xskq_create+0x80/0xe0 [ 57.945662][ T4259] xsk_init_queue+0x95/0xf0 [ 57.945690][ T4259] xsk_setsockopt+0x3f5/0x640 [ 57.945852][ T4259] ? __pfx_xsk_setsockopt+0x10/0x10 [ 57.945878][ T4259] __sys_setsockopt+0x184/0x200 [ 57.945916][ T4259] __x64_sys_setsockopt+0x64/0x80 [ 57.945946][ T4259] x64_sys_call+0x20ec/0x3000 [ 57.945994][ T4259] do_syscall_64+0xd2/0x200 [ 57.946028][ T4259] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 57.946063][ T4259] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 57.946088][ T4259] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.946155][ T4259] RIP: 0033:0x7f0fe239efc9 [ 57.946179][ T4259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.946199][ T4259] RSP: 002b:00007f0fe0e07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 57.946219][ T4259] RAX: ffffffffffffffda RBX: 00007f0fe25f5fa0 RCX: 00007f0fe239efc9 [ 57.946232][ T4259] RDX: 0000000000000006 RSI: 000000000000011b RDI: 000000000000000b [ 57.946245][ T4259] RBP: 00007f0fe2421f91 R08: 0000000000000004 R09: 0000000000000000 [ 57.946306][ T4259] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 57.946319][ T4259] R13: 00007f0fe25f6038 R14: 00007f0fe25f5fa0 R15: 00007ffdbdc4fa68 [ 57.946403][ T4259] [ 58.187187][ T4259] Mem-Info: [ 58.190353][ T4259] active_anon:9892 inactive_anon:0 isolated_anon:0 [ 58.190353][ T4259] active_file:8980 inactive_file:2245 isolated_file:0 [ 58.190353][ T4259] unevictable:0 dirty:1644 writeback:0 [ 58.190353][ T4259] slab_reclaimable:3159 slab_unreclaimable:14425 [ 58.190353][ T4259] mapped:32266 shmem:3116 pagetables:1246 [ 58.190353][ T4259] sec_pagetables:0 bounce:0 [ 58.190353][ T4259] kernel_misc_reclaimable:0 [ 58.190353][ T4259] free:1892117 free_pcp:12382 free_cma:0 [ 58.235735][ T4259] Node 0 active_anon:39568kB inactive_anon:0kB active_file:35920kB inactive_file:8980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:133240kB dirty:6576kB writeback:0kB shmem:12464kB kernel_stack:3472kB pagetables:4984kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 58.263465][ T4259] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 58.293562][ T4259] lowmem_reserve[]: 0 2883 7862 7862 [ 58.298997][ T4259] Node 0 DMA32 free:2949156kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2952688kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB [ 58.330547][ T4259] lowmem_reserve[]: 0 0 4978 4978 [ 58.335824][ T4259] Node 0 Normal free:4602976kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:33652kB inactive_anon:0kB active_file:35920kB inactive_file:8980kB unevictable:0kB writepending:6576kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:51792kB local_pcp:14824kB free_cma:0kB [ 58.369217][ T4259] lowmem_reserve[]: 0 0 0 0 [ 58.373825][ T4259] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 58.386685][ T4259] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 6*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949156kB [ 58.402828][ T4259] Node 0 Normal: 430*4kB (UM) 195*8kB (UME) 105*16kB (UME) 68*32kB (UME) 42*64kB (UME) 24*128kB (UME) 32*256kB (UME) 19*512kB (UM) 11*1024kB (UM) 5*2048kB (UME) 1111*4096kB (UM) = 4602976kB [ 58.421970][ T4259] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 58.431478][ T4259] 11497 total pagecache pages [ 58.436215][ T4259] 0 pages in swap cache [ 58.440474][ T4259] Free swap = 124996kB [ 58.444654][ T4259] Total swap = 124996kB [ 58.448893][ T4259] 2097051 pages RAM [ 58.452733][ T4259] 0 pages HighMem/MovableOnly [ 58.457475][ T4259] 80479 pages reserved [ 58.466193][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 58.867920][ T4293] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 58.976067][ T4296] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.072938][ T4296] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.166215][ T4303] loop2: detected capacity change from 0 to 4096 [ 59.219328][ T4303] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 59.533545][ T4323] mmap: syz.2.269 (4323) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 59.589194][ T4296] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.662816][ T4296] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.725924][ T294] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.748916][ T294] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.762197][ T59] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.778059][ T59] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.899116][ T4334] loop4: detected capacity change from 0 to 4096 [ 59.909354][ T4334] EXT4-fs (loop4): couldn't mount as ext2 due to feature incompatibilities [ 60.209850][ T4353] loop4: detected capacity change from 0 to 2048 [ 60.227862][ T4353] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 60.256066][ T3315] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.265631][ T4362] loop2: detected capacity change from 0 to 2048 [ 60.279908][ T29] kauditd_printk_skb: 449 callbacks suppressed [ 60.279925][ T29] audit: type=1400 audit(1760774270.444:1888): avc: denied { read write } for pid=4368 comm="syz.0.294" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 60.280388][ T1071] hid (null): global environment stack underflow [ 60.286366][ T29] audit: type=1400 audit(1760774270.444:1889): avc: denied { open } for pid=4368 comm="syz.0.294" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 60.309829][ T1071] hid (null): unknown global tag 0xd [ 60.345108][ T1071] hid (null): unknown global tag 0xe [ 60.355183][ T1071] hid (null): unknown global tag 0xd [ 60.362338][ T1071] hid-generic 0003:0005:0003.0001: reserved main item tag 0xd [ 60.364177][ T4362] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 60.369880][ T1071] hid-generic 0003:0005:0003.0001: global environment stack underflow [ 60.369955][ T1071] hid-generic 0003:0005:0003.0001: item 0 1 1 11 parsing failed [ 60.398035][ T1071] hid-generic 0003:0005:0003.0001: probe with driver hid-generic failed with error -22 [ 60.404562][ T4373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4373 comm=syz.3.296 [ 60.421163][ T4362] FAULT_INJECTION: forcing a failure. [ 60.421163][ T4362] name failslab, interval 1, probability 0, space 0, times 0 [ 60.433930][ T4362] CPU: 0 UID: 0 PID: 4362 Comm: wÞ£ÿ Not tainted syzkaller #0 PREEMPT(voluntary) [ 60.434003][ T4362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 60.434016][ T4362] Call Trace: [ 60.434022][ T4362] [ 60.434030][ T4362] __dump_stack+0x1d/0x30 [ 60.434055][ T4362] dump_stack_lvl+0xe8/0x140 [ 60.434079][ T4362] dump_stack+0x15/0x1b [ 60.434101][ T4362] should_fail_ex+0x265/0x280 [ 60.434201][ T4362] should_failslab+0x8c/0xb0 [ 60.434303][ T4362] kmem_cache_alloc_noprof+0x50/0x480 [ 60.434330][ T4362] ? ext4_mb_new_blocks+0x2ce/0x2080 [ 60.434374][ T4362] ext4_mb_new_blocks+0x2ce/0x2080 [ 60.434418][ T4362] ? ext4_ext_search_right+0x30b/0x4f0 [ 60.434486][ T4362] ? ext4_inode_to_goal_block+0x1be/0x1e0 [ 60.434509][ T4362] ext4_ext_map_blocks+0xff5/0x38a0 [ 60.434551][ T4362] ext4_map_blocks+0x5ee/0xd00 [ 60.434710][ T4362] ext4_iomap_begin+0x88d/0xe00 [ 60.434755][ T4362] ? __pfx_ext4_iomap_begin+0x10/0x10 [ 60.434789][ T4362] iomap_iter+0x332/0x730 [ 60.434858][ T4362] ? should_failslab+0x8c/0xb0 [ 60.434899][ T4362] __iomap_dio_rw+0x705/0x1240 [ 60.434944][ T4362] ? ext4_journal_check_start+0x11a/0x1b0 [ 60.435035][ T4362] iomap_dio_rw+0x40/0x90 [ 60.435060][ T4362] ext4_file_write_iter+0xb3a/0xf60 [ 60.435171][ T4362] do_iter_readv_writev+0x4a1/0x540 [ 60.435209][ T4362] vfs_writev+0x2df/0x8b0 [ 60.435258][ T4362] __se_sys_pwritev2+0xfc/0x1c0 [ 60.435347][ T4362] __x64_sys_pwritev2+0x67/0x80 [ 60.435385][ T4362] x64_sys_call+0x2c59/0x3000 [ 60.435449][ T4362] do_syscall_64+0xd2/0x200 [ 60.435477][ T4362] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 60.435506][ T4362] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 60.435527][ T4362] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.435601][ T4362] RIP: 0033:0x7f3a3a2defc9 [ 60.435618][ T4362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.435637][ T4362] RSP: 002b:00007f3a38d47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 60.435658][ T4362] RAX: ffffffffffffffda RBX: 00007f3a3a535fa0 RCX: 00007f3a3a2defc9 [ 60.435675][ T4362] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000006 [ 60.435690][ T4362] RBP: 00007f3a38d47090 R08: 0000000000000000 R09: 0000000000000003 [ 60.435721][ T4362] R10: 0000000000009c00 R11: 0000000000000246 R12: 0000000000000001 [ 60.435738][ T4362] R13: 00007f3a3a536038 R14: 00007f3a3a535fa0 R15: 00007ffeb1556e28 [ 60.435763][ T4362] [ 60.710613][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.739101][ T29] audit: type=1326 audit(1760774270.894:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.762711][ T29] audit: type=1326 audit(1760774270.894:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.771772][ T4379] loop4: detected capacity change from 0 to 4096 [ 60.786290][ T29] audit: type=1326 audit(1760774270.904:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.816195][ T29] audit: type=1326 audit(1760774270.904:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.839675][ T29] audit: type=1326 audit(1760774270.904:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.863266][ T29] audit: type=1326 audit(1760774270.904:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.870563][ T4379] EXT4-fs (loop4): couldn't mount as ext2 due to feature incompatibilities [ 60.886957][ T29] audit: type=1326 audit(1760774270.904:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.919090][ T29] audit: type=1326 audit(1760774270.904:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4380 comm="syz.3.300" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 60.966933][ T4381] loop3: detected capacity change from 0 to 512 [ 60.978438][ T4381] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 61.007830][ T4384] __nla_validate_parse: 8 callbacks suppressed [ 61.007846][ T4384] netlink: 40 bytes leftover after parsing attributes in process `syz.2.299'. [ 61.023028][ T4384] netlink: 40 bytes leftover after parsing attributes in process `syz.2.299'. [ 61.039232][ T4381] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 61.053854][ T4381] ext4 filesystem being mounted at /74/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 61.087054][ T4384] netlink: 40 bytes leftover after parsing attributes in process `syz.2.299'. [ 61.096235][ T4384] netlink: 40 bytes leftover after parsing attributes in process `syz.2.299'. [ 61.173644][ T4403] loop2: detected capacity change from 0 to 512 [ 61.187757][ T4403] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 61.221590][ T4403] ext4 filesystem being mounted at /57/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 61.249862][ T4403] EXT4-fs error (device loop2): ext4_lookup:1787: inode #12: comm syz.2.305: iget: bad i_size value: 2533274857506816 [ 61.264012][ T4403] EXT4-fs error (device loop2): ext4_lookup:1787: inode #12: comm syz.2.305: iget: bad i_size value: 2533274857506816 [ 61.277984][ T4403] EXT4-fs error (device loop2): ext4_lookup:1787: inode #12: comm syz.2.305: iget: bad i_size value: 2533274857506816 [ 61.310468][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.320740][ T3320] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 61.382921][ T4414] loop2: detected capacity change from 0 to 1024 [ 61.397165][ T4414] EXT4-fs error (device loop2): ext4_acquire_dquot:6945: comm syz.2.308: Failed to acquire dquot type 0 [ 61.414547][ T4414] EXT4-fs error (device loop2): mb_free_blocks:2017: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 61.431326][ T4414] EXT4-fs error (device loop2): ext4_do_update_inode:5632: inode #13: comm syz.2.308: corrupted inode contents [ 61.443748][ T4414] EXT4-fs error (device loop2): ext4_dirty_inode:6517: inode #13: comm syz.2.308: mark_inode_dirty error [ 61.447902][ T4419] netlink: 12 bytes leftover after parsing attributes in process `syz.1.310'. [ 61.455892][ T4414] EXT4-fs error (device loop2): ext4_do_update_inode:5632: inode #13: comm syz.2.308: corrupted inode contents [ 61.476536][ T4414] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #13: comm syz.2.308: mark_inode_dirty error [ 61.488231][ T4414] EXT4-fs error (device loop2): ext4_do_update_inode:5632: inode #13: comm syz.2.308: corrupted inode contents [ 61.500612][ T4414] EXT4-fs error (device loop2) in ext4_orphan_del:301: Corrupt filesystem [ 61.509585][ T4414] EXT4-fs error (device loop2): ext4_do_update_inode:5632: inode #13: comm syz.2.308: corrupted inode contents [ 61.521951][ T4414] EXT4-fs error (device loop2): ext4_truncate:4637: inode #13: comm syz.2.308: mark_inode_dirty error [ 61.523627][ T4421] netlink: 8 bytes leftover after parsing attributes in process `syz.1.311'. [ 61.533871][ T4414] EXT4-fs error (device loop2) in ext4_process_orphan:343: Corrupt filesystem [ 61.552465][ T4414] EXT4-fs (loop2): 1 truncate cleaned up [ 61.558719][ T4414] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 61.578126][ T4414] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 61.635788][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.976376][ T4423] netlink: 96 bytes leftover after parsing attributes in process `syz.0.312'. [ 62.289520][ T4453] netlink: 8 bytes leftover after parsing attributes in process `syz.3.324'. [ 62.339768][ T4455] loop3: detected capacity change from 0 to 1024 [ 62.352144][ T4455] EXT4-fs error (device loop3): ext4_acquire_dquot:6945: comm syz.3.325: Failed to acquire dquot type 0 [ 62.368820][ T4455] EXT4-fs error (device loop3): mb_free_blocks:2017: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 62.383687][ T4455] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.325: corrupted inode contents [ 62.396907][ T4455] EXT4-fs error (device loop3): ext4_dirty_inode:6517: inode #13: comm syz.3.325: mark_inode_dirty error [ 62.408911][ T4455] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.325: corrupted inode contents [ 62.421163][ T4455] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #13: comm syz.3.325: mark_inode_dirty error [ 62.433327][ T4455] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.325: corrupted inode contents [ 62.446206][ T4455] EXT4-fs error (device loop3) in ext4_orphan_del:301: Corrupt filesystem [ 62.454933][ T4455] EXT4-fs error (device loop3): ext4_do_update_inode:5632: inode #13: comm syz.3.325: corrupted inode contents [ 62.467478][ T4455] EXT4-fs error (device loop3): ext4_truncate:4637: inode #13: comm syz.3.325: mark_inode_dirty error [ 62.478937][ T4455] EXT4-fs error (device loop3) in ext4_process_orphan:343: Corrupt filesystem [ 62.512705][ T4455] EXT4-fs (loop3): 1 truncate cleaned up [ 62.525798][ T4455] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 62.650334][ T4458] loop2: detected capacity change from 0 to 1024 [ 62.670598][ T4458] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 62.799606][ T4455] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 62.821842][ T4458] netlink: 24 bytes leftover after parsing attributes in process `syz.2.326'. [ 62.854553][ T4465] netlink: 8 bytes leftover after parsing attributes in process `syz.0.328'. [ 62.864563][ T3320] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 63.300673][ T4499] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 63.657206][ T344] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.685911][ T344] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.749143][ T344] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.917975][ T4519] Cannot find add_set index 4 as target [ 63.960297][ T4499] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.100864][ T344] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 64.241434][ T4499] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.467719][ T4527] batadv_slave_1: entered promiscuous mode [ 64.511242][ T4499] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.557059][ T4530] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 64.705196][ T4530] batadv_slave_1 (unregistering): left promiscuous mode [ 64.712486][ T4530] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 64.805908][ T4523] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.814260][ T4523] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.825623][ T4523] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.881386][ T4523] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.169018][ T4556] ipvlan0: mtu less than device minimum [ 65.198566][ T4551] netlink: zone id is out of range [ 65.204273][ T4551] netlink: set zone limit has 8 unknown bytes [ 65.982549][ T29] kauditd_printk_skb: 606 callbacks suppressed [ 65.982566][ T29] audit: type=1326 audit(1760774276.104:2500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.012581][ T29] audit: type=1326 audit(1760774276.104:2501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.036272][ T29] audit: type=1326 audit(1760774276.104:2502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.060002][ T29] audit: type=1326 audit(1760774276.104:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.083753][ T29] audit: type=1326 audit(1760774276.104:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.107529][ T29] audit: type=1326 audit(1760774276.104:2505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.131228][ T29] audit: type=1326 audit(1760774276.104:2506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.155164][ T29] audit: type=1326 audit(1760774276.104:2507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.178687][ T29] audit: type=1326 audit(1760774276.104:2508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.194277][ T4593] __nla_validate_parse: 16 callbacks suppressed [ 66.194374][ T4593] netlink: 24 bytes leftover after parsing attributes in process `syz.1.366'. [ 66.202261][ T29] audit: type=1326 audit(1760774276.104:2509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4579 comm="syz.1.366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc269aefc9 code=0x7ffc0000 [ 66.377172][ T4594] netlink: 24 bytes leftover after parsing attributes in process `syz.3.367'. [ 66.403933][ T4596] Option 'Í'M•O§±' to dns_resolver key: bad/missing value [ 66.470003][ T4602] netlink: 12 bytes leftover after parsing attributes in process `syz.3.371'. [ 66.514631][ T4602] netlink: 40 bytes leftover after parsing attributes in process `syz.3.371'. [ 66.583234][ T4607] FAULT_INJECTION: forcing a failure. [ 66.583234][ T4607] name failslab, interval 1, probability 0, space 0, times 0 [ 66.596234][ T4607] CPU: 0 UID: 0 PID: 4607 Comm: syz.4.374 Not tainted syzkaller #0 PREEMPT(voluntary) [ 66.596326][ T4607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 66.596341][ T4607] Call Trace: [ 66.596349][ T4607] [ 66.596359][ T4607] __dump_stack+0x1d/0x30 [ 66.596392][ T4607] dump_stack_lvl+0xe8/0x140 [ 66.596434][ T4607] dump_stack+0x15/0x1b [ 66.596456][ T4607] should_fail_ex+0x265/0x280 [ 66.596501][ T4607] should_failslab+0x8c/0xb0 [ 66.596599][ T4607] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 66.596642][ T4607] ? sidtab_sid2str_get+0xa0/0x130 [ 66.596676][ T4607] kmemdup_noprof+0x2b/0x70 [ 66.596701][ T4607] sidtab_sid2str_get+0xa0/0x130 [ 66.596778][ T4607] security_sid_to_context_core+0x1eb/0x2e0 [ 66.596812][ T4607] security_sid_to_context+0x27/0x40 [ 66.596844][ T4607] avc_audit_post_callback+0x9d/0x520 [ 66.596884][ T4607] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 66.597048][ T4607] common_lsm_audit+0x1bb/0x230 [ 66.597075][ T4607] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 66.597111][ T4607] slow_avc_audit+0x104/0x140 [ 66.597158][ T4607] avc_has_perm+0x13a/0x180 [ 66.597201][ T4607] may_create+0x21a/0x2b0 [ 66.597261][ T4607] selinux_inode_mknod+0xb3/0xc0 [ 66.597287][ T4607] security_inode_mknod+0x82/0xd0 [ 66.597317][ T4607] vfs_mknod+0x281/0x310 [ 66.597339][ T4607] do_mknodat+0x24b/0x610 [ 66.597373][ T4607] __x64_sys_mknodat+0x5e/0x70 [ 66.597395][ T4607] x64_sys_call+0x2ed7/0x3000 [ 66.597418][ T4607] do_syscall_64+0xd2/0x200 [ 66.597480][ T4607] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 66.597527][ T4607] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 66.597550][ T4607] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.597573][ T4607] RIP: 0033:0x7fdba92cefc9 [ 66.597590][ T4607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.597694][ T4607] RSP: 002b:00007fdba7d37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 66.597714][ T4607] RAX: ffffffffffffffda RBX: 00007fdba9525fa0 RCX: 00007fdba92cefc9 [ 66.597727][ T4607] RDX: 00000000000021c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 66.597740][ T4607] RBP: 00007fdba7d37090 R08: 0000000000000000 R09: 0000000000000000 [ 66.597752][ T4607] R10: 0000000000000103 R11: 0000000000000246 R12: 0000000000000002 [ 66.597765][ T4607] R13: 00007fdba9526038 R14: 00007fdba9525fa0 R15: 00007ffeb0a08468 [ 66.597847][ T4607] [ 66.915303][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.3.371'. [ 67.042764][ T4609] loop2: detected capacity change from 0 to 1024 [ 67.083669][ T4609] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 67.133535][ T4609] netlink: 24 bytes leftover after parsing attributes in process `syz.2.375'. [ 67.377509][ T4636] loop4: detected capacity change from 0 to 1024 [ 67.440824][ T4636] EXT4-fs (loop4): couldn't mount as ext2 due to feature incompatibilities [ 67.589232][ T4644] netlink: 'syz.0.382': attribute type 4 has an invalid length. [ 67.605505][ T4644] netlink: 'syz.0.382': attribute type 4 has an invalid length. [ 68.364054][ T4636] netlink: 24 bytes leftover after parsing attributes in process `syz.4.376'. [ 68.613797][ T4669] netlink: 'syz.1.392': attribute type 2 has an invalid length. [ 69.013836][ T4691] netlink: 'syz.2.399': attribute type 30 has an invalid length. [ 69.057936][ T4669] SELinux: failed to load policy [ 69.265294][ T4697] netlink: 24 bytes leftover after parsing attributes in process `syz.3.400'. [ 69.280576][ T4701] netlink: 12 bytes leftover after parsing attributes in process `syz.4.403'. [ 69.300306][ T4701] netlink: 40 bytes leftover after parsing attributes in process `syz.4.403'. [ 70.090005][ T4741] FAULT_INJECTION: forcing a failure. [ 70.090005][ T4741] name failslab, interval 1, probability 0, space 0, times 0 [ 70.103241][ T4741] CPU: 0 UID: 0 PID: 4741 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 70.103266][ T4741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 70.103277][ T4741] Call Trace: [ 70.103283][ T4741] [ 70.103295][ T4741] __dump_stack+0x1d/0x30 [ 70.103315][ T4741] dump_stack_lvl+0xe8/0x140 [ 70.103333][ T4741] dump_stack+0x15/0x1b [ 70.103385][ T4741] should_fail_ex+0x265/0x280 [ 70.103421][ T4741] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 70.103440][ T4741] should_failslab+0x8c/0xb0 [ 70.103464][ T4741] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 70.103491][ T4741] ? shmem_alloc_inode+0x34/0x50 [ 70.103510][ T4741] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 70.103527][ T4741] shmem_alloc_inode+0x34/0x50 [ 70.103609][ T4741] alloc_inode+0x40/0x170 [ 70.103659][ T4741] new_inode+0x1d/0xe0 [ 70.103681][ T4741] shmem_get_inode+0x244/0x750 [ 70.103701][ T4741] __shmem_file_setup+0x113/0x210 [ 70.103731][ T4741] shmem_file_setup+0x3b/0x50 [ 70.103771][ T4741] __se_sys_memfd_create+0x2c3/0x590 [ 70.103792][ T4741] __x64_sys_memfd_create+0x31/0x40 [ 70.103812][ T4741] x64_sys_call+0x2ac2/0x3000 [ 70.103831][ T4741] do_syscall_64+0xd2/0x200 [ 70.103936][ T4741] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 70.103963][ T4741] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 70.103983][ T4741] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.104003][ T4741] RIP: 0033:0x7f0fe239efc9 [ 70.104017][ T4741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.104072][ T4741] RSP: 002b:00007f0fe0e06e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 70.104089][ T4741] RAX: ffffffffffffffda RBX: 0000000000000483 RCX: 00007f0fe239efc9 [ 70.104100][ T4741] RDX: 00007f0fe0e06ef0 RSI: 0000000000000000 RDI: 00007f0fe2422960 [ 70.104112][ T4741] RBP: 0000200000001040 R08: 00007f0fe0e06bb7 R09: 00007f0fe0e06e40 [ 70.104123][ T4741] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 70.104134][ T4741] R13: 00007f0fe0e06ef0 R14: 00007f0fe0e06eb0 R15: 0000200000000680 [ 70.104151][ T4741] [ 70.318513][ T4728] loop4: detected capacity change from 0 to 128 [ 70.359515][ T4728] bio_check_eod: 32 callbacks suppressed [ 70.359529][ T4728] syz.4.412: attempt to access beyond end of device [ 70.359529][ T4728] loop4: rw=2049, sector=154, nr_sectors = 6 limit=128 [ 70.405669][ T4728] syz.4.412: attempt to access beyond end of device [ 70.405669][ T4728] loop4: rw=2049, sector=158, nr_sectors = 2 limit=128 [ 70.419199][ T4728] buffer_io_error: 18 callbacks suppressed [ 70.419220][ T4728] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 70.431672][ T4749] bridge0: entered promiscuous mode [ 70.440648][ T4749] macsec1: entered promiscuous mode [ 70.447548][ T4749] bridge0: port 3(macsec1) entered blocking state [ 70.454496][ T4749] bridge0: port 3(macsec1) entered disabled state [ 70.454646][ T4728] syz.4.412: attempt to access beyond end of device [ 70.454646][ T4728] loop4: rw=2049, sector=160, nr_sectors = 2 limit=128 [ 70.469166][ T4749] macsec1: entered allmulticast mode [ 70.474539][ T4728] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 70.479807][ T4749] bridge0: entered allmulticast mode [ 70.489048][ T4728] syz.4.412: attempt to access beyond end of device [ 70.489048][ T4728] loop4: rw=2049, sector=162, nr_sectors = 6 limit=128 [ 70.495904][ T4751] netlink: 'syz.4.412': attribute type 39 has an invalid length. [ 70.509061][ T4728] syz.4.412: attempt to access beyond end of device [ 70.509061][ T4728] loop4: rw=2049, sector=166, nr_sectors = 2 limit=128 [ 70.529001][ T4728] Buffer I/O error on dev loop4, logical block 83, lost async page write [ 70.538706][ T4749] macsec1: left allmulticast mode [ 70.543836][ T4749] bridge0: left allmulticast mode [ 70.549538][ T4728] syz.4.412: attempt to access beyond end of device [ 70.549538][ T4728] loop4: rw=2049, sector=168, nr_sectors = 2 limit=128 [ 70.563200][ T4728] Buffer I/O error on dev loop4, logical block 84, lost async page write [ 70.572334][ T4749] bridge0: left promiscuous mode [ 70.572772][ T4728] syz.4.412: attempt to access beyond end of device [ 70.572772][ T4728] loop4: rw=2049, sector=202, nr_sectors = 6 limit=128 [ 70.591982][ T4728] syz.4.412: attempt to access beyond end of device [ 70.591982][ T4728] loop4: rw=2049, sector=206, nr_sectors = 2 limit=128 [ 70.605572][ T4728] Buffer I/O error on dev loop4, logical block 103, lost async page write [ 70.615313][ T4728] syz.4.412: attempt to access beyond end of device [ 70.615313][ T4728] loop4: rw=2049, sector=208, nr_sectors = 2 limit=128 [ 70.629153][ T4728] Buffer I/O error on dev loop4, logical block 104, lost async page write [ 70.638582][ T4728] syz.4.412: attempt to access beyond end of device [ 70.638582][ T4728] loop4: rw=2049, sector=210, nr_sectors = 6 limit=128 [ 70.652777][ T4728] Buffer I/O error on dev loop4, logical block 107, lost async page write [ 70.661494][ T4728] Buffer I/O error on dev loop4, logical block 108, lost async page write [ 70.671191][ T4728] Buffer I/O error on dev loop4, logical block 119, lost async page write [ 70.710092][ T4728] Buffer I/O error on dev loop4, logical block 120, lost async page write [ 70.829254][ T4753] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 70.883599][ T4753] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.021751][ T4753] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.108455][ T4753] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.131014][ T29] kauditd_printk_skb: 609 callbacks suppressed [ 72.131032][ T29] audit: type=1400 audit(1760774282.294:3119): avc: denied { append } for pid=4785 comm="syz.3.429" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 72.199417][ T4788] process 'syz.3.431' launched '/dev/fd/11' with NULL argv: empty string added [ 72.209942][ T29] audit: type=1400 audit(1760774282.374:3120): avc: denied { execute_no_trans } for pid=4787 comm="syz.3.431" path=2F6D656D66643AA39F6EB4645204693502ACCEE1889D634038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 72.261384][ T29] audit: type=1400 audit(1760774282.424:3121): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 72.299419][ T29] audit: type=1326 audit(1760774282.454:3122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.314842][ T2057] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.323868][ T29] audit: type=1326 audit(1760774282.454:3123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.349865][ T2057] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.356260][ T29] audit: type=1326 audit(1760774282.464:3124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.388255][ T29] audit: type=1326 audit(1760774282.464:3125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.412012][ T29] audit: type=1326 audit(1760774282.464:3126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.412057][ T2057] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.436928][ T29] audit: type=1326 audit(1760774282.464:3127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.468529][ T29] audit: type=1326 audit(1760774282.464:3128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.3.434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fe239efc9 code=0x7ffc0000 [ 72.494304][ T2057] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.555295][ T4800] __nla_validate_parse: 7 callbacks suppressed [ 72.555315][ T4800] netlink: 36 bytes leftover after parsing attributes in process `syz.3.437'. [ 72.688263][ T4811] netlink: 8 bytes leftover after parsing attributes in process `syz.0.443'. [ 72.702035][ T4809] netlink: 'syz.2.442': attribute type 10 has an invalid length. [ 72.709944][ T4809] netlink: 40 bytes leftover after parsing attributes in process `syz.2.442'. [ 72.730934][ T4812] netlink: 40 bytes leftover after parsing attributes in process `syz.1.441'. [ 72.753047][ T4809] team0: Port device geneve1 added [ 72.805820][ T4820] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.861254][ T4820] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.961180][ T4794] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 72.969574][ T4794] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 73.324286][ T4820] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.397095][ T4820] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.546586][ T4851] netlink: 272 bytes leftover after parsing attributes in process `syz.3.455'. [ 73.787852][ T4862] netlink: 24 bytes leftover after parsing attributes in process `syz.4.454'. [ 74.314931][ T4882] netlink: 'syz.0.467': attribute type 3 has an invalid length. [ 74.322822][ T4882] netlink: 'syz.0.467': attribute type 4 has an invalid length. [ 74.330627][ T4882] netlink: 9067 bytes leftover after parsing attributes in process `syz.0.467'. [ 74.394195][ T4891] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.457675][ T4902] FAULT_INJECTION: forcing a failure. [ 74.457675][ T4902] name failslab, interval 1, probability 0, space 0, times 0 [ 74.470421][ T4902] CPU: 0 UID: 0 PID: 4902 Comm: syz.4.474 Not tainted syzkaller #0 PREEMPT(voluntary) [ 74.470454][ T4902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 74.470542][ T4902] Call Trace: [ 74.470550][ T4902] [ 74.470558][ T4902] __dump_stack+0x1d/0x30 [ 74.470611][ T4902] dump_stack_lvl+0xe8/0x140 [ 74.470673][ T4902] dump_stack+0x15/0x1b [ 74.470704][ T4902] should_fail_ex+0x265/0x280 [ 74.470758][ T4902] should_failslab+0x8c/0xb0 [ 74.470795][ T4902] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 74.470919][ T4902] ? __alloc_skb+0x101/0x320 [ 74.470952][ T4902] __alloc_skb+0x101/0x320 [ 74.471040][ T4902] ? audit_log_start+0x342/0x720 [ 74.471066][ T4902] audit_log_start+0x3a0/0x720 [ 74.471085][ T4902] ? idr_replace+0xef/0x120 [ 74.471115][ T4902] audit_seccomp+0x48/0x100 [ 74.471218][ T4902] ? __seccomp_filter+0x82d/0x1250 [ 74.471251][ T4902] __seccomp_filter+0x83e/0x1250 [ 74.471281][ T4902] ? newseg+0x5de/0x670 [ 74.471307][ T4902] ? up_write+0x18/0x60 [ 74.471404][ T4902] __secure_computing+0x82/0x150 [ 74.471430][ T4902] syscall_trace_enter+0xcf/0x1e0 [ 74.471504][ T4902] do_syscall_64+0xac/0x200 [ 74.471536][ T4902] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 74.471569][ T4902] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 74.471599][ T4902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.471627][ T4902] RIP: 0033:0x7fdba92cd9dc [ 74.471722][ T4902] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 74.471740][ T4902] RSP: 002b:00007fdba7d37030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 74.471759][ T4902] RAX: ffffffffffffffda RBX: 00007fdba9525fa0 RCX: 00007fdba92cd9dc [ 74.471772][ T4902] RDX: 000000000000000f RSI: 00007fdba7d370a0 RDI: 0000000000000006 [ 74.471785][ T4902] RBP: 00007fdba7d37090 R08: 0000000000000000 R09: 0000000000000000 [ 74.471797][ T4902] R10: 000020000000e000 R11: 0000000000000246 R12: 0000000000000002 [ 74.471810][ T4902] R13: 00007fdba9526038 R14: 00007fdba9525fa0 R15: 00007ffeb0a08468 [ 74.471836][ T4902] [ 74.701217][ T4891] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.780219][ T4891] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.837577][ T4891] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.937020][ T37] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.948655][ T37] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.058895][ T37] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.067280][ T37] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.174096][ T4922] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 75.194647][ T4922] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 75.360508][ T4924] netlink: 24 bytes leftover after parsing attributes in process `syz.4.482'. [ 75.773084][ T4933] netlink: 8 bytes leftover after parsing attributes in process `syz.1.485'. [ 75.807405][ T4935] 9pnet_fd: Insufficient options for proto=fd [ 75.818314][ T4935] netlink: 4 bytes leftover after parsing attributes in process `syz.1.486'. [ 75.836117][ T4935] team0: Port device team_slave_0 removed [ 77.184211][ T29] kauditd_printk_skb: 687 callbacks suppressed [ 77.184232][ T29] audit: type=1326 audit(1760774287.344:3812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.243792][ T29] audit: type=1326 audit(1760774287.344:3813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.267318][ T29] audit: type=1326 audit(1760774287.384:3814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.290680][ T29] audit: type=1326 audit(1760774287.384:3815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.314541][ T29] audit: type=1326 audit(1760774287.384:3816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.338118][ T29] audit: type=1326 audit(1760774287.384:3817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.361686][ T29] audit: type=1326 audit(1760774287.384:3818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.385617][ T29] audit: type=1326 audit(1760774287.384:3819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.409169][ T29] audit: type=1326 audit(1760774287.384:3820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.432984][ T29] audit: type=1326 audit(1760774287.384:3821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5002 comm="syz.4.511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 77.556150][ T5023] FAULT_INJECTION: forcing a failure. [ 77.556150][ T5023] name failslab, interval 1, probability 0, space 0, times 0 [ 77.569972][ T5025] __nla_validate_parse: 16 callbacks suppressed [ 77.569991][ T5025] netlink: 12 bytes leftover after parsing attributes in process `syz.3.520'. [ 77.585498][ T5023] CPU: 0 UID: 0 PID: 5023 Comm: syz.4.519 Not tainted syzkaller #0 PREEMPT(voluntary) [ 77.585523][ T5023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 77.585534][ T5023] Call Trace: [ 77.585540][ T5023] [ 77.585546][ T5023] __dump_stack+0x1d/0x30 [ 77.585565][ T5023] dump_stack_lvl+0xe8/0x140 [ 77.585609][ T5023] dump_stack+0x15/0x1b [ 77.585696][ T5023] should_fail_ex+0x265/0x280 [ 77.585782][ T5023] should_failslab+0x8c/0xb0 [ 77.585807][ T5023] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 77.585837][ T5023] ? __alloc_skb+0x101/0x320 [ 77.585860][ T5023] __alloc_skb+0x101/0x320 [ 77.585880][ T5023] ? fib6_table_lookup+0x214/0x630 [ 77.585978][ T5023] sctp_packet_transmit+0x1c8/0x1510 [ 77.586039][ T5023] ? __rcu_read_unlock+0x4f/0x70 [ 77.586111][ T5023] ? sctp_packet_append_chunk+0x735/0x850 [ 77.586141][ T5023] sctp_packet_singleton+0x114/0x170 [ 77.586165][ T5023] sctp_outq_flush+0x337/0x1970 [ 77.586212][ T5023] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 77.586244][ T5023] sctp_outq_uncork+0x56/0x70 [ 77.586262][ T5023] sctp_do_sm+0x2ed3/0x3230 [ 77.586363][ T5023] sctp_primitive_ASSOCIATE+0x71/0x90 [ 77.586392][ T5023] sctp_sendmsg_to_asoc+0xa76/0xf20 [ 77.586429][ T5023] ? sctp_connect_new_asoc+0x29c/0x3a0 [ 77.586461][ T5023] sctp_sendmsg+0x1263/0x18d0 [ 77.586561][ T5023] ? selinux_socket_sendmsg+0x141/0x1b0 [ 77.586584][ T5023] ? __pfx_sctp_sendmsg+0x10/0x10 [ 77.586610][ T5023] inet_sendmsg+0xc5/0xd0 [ 77.586678][ T5023] __sock_sendmsg+0x102/0x180 [ 77.586698][ T5023] __sys_sendto+0x268/0x330 [ 77.586730][ T5023] __x64_sys_sendto+0x76/0x90 [ 77.586754][ T5023] x64_sys_call+0x2d14/0x3000 [ 77.586774][ T5023] do_syscall_64+0xd2/0x200 [ 77.586811][ T5023] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 77.586835][ T5023] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 77.586855][ T5023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.586921][ T5023] RIP: 0033:0x7fdba92cefc9 [ 77.586935][ T5023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.586951][ T5023] RSP: 002b:00007fdba7d37038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 77.586968][ T5023] RAX: ffffffffffffffda RBX: 00007fdba9525fa0 RCX: 00007fdba92cefc9 [ 77.586979][ T5023] RDX: 000000000000ffe0 RSI: 0000200000000040 RDI: 0000000000000005 [ 77.587050][ T5023] RBP: 00007fdba7d37090 R08: 0000200000000100 R09: 000000000000001c [ 77.587061][ T5023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 77.587072][ T5023] R13: 00007fdba9526038 R14: 00007fdba9525fa0 R15: 00007ffeb0a08468 [ 77.587089][ T5023] [ 77.588677][ T5025] netlink: 40 bytes leftover after parsing attributes in process `syz.3.520'. [ 77.719607][ T5026] netlink: 4 bytes leftover after parsing attributes in process `syz.3.520'. [ 77.921154][ T37] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.944512][ T37] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.962740][ T37] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.980319][ T37] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.156685][ T5044] netlink: 24 bytes leftover after parsing attributes in process `syz.0.523'. [ 78.377490][ T5053] netlink: 24 bytes leftover after parsing attributes in process `syz.2.525'. [ 78.405598][ T5058] netlink: 8 bytes leftover after parsing attributes in process `syz.4.530'. [ 78.587112][ T5068] netlink: 28 bytes leftover after parsing attributes in process `syz.1.534'. [ 78.596160][ T5068] netlink: 28 bytes leftover after parsing attributes in process `syz.1.534'. [ 78.793295][ T5074] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 79.132205][ T5089] netlink: 'syz.3.542': attribute type 10 has an invalid length. [ 79.140419][ T5089] netlink: 40 bytes leftover after parsing attributes in process `syz.3.542'. [ 79.916220][ T5101] netlink: 176 bytes leftover after parsing attributes in process `syz.1.546'. [ 79.968456][ T5104] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.548' sets config #1 [ 80.130436][ T5110] FAULT_INJECTION: forcing a failure. [ 80.130436][ T5110] name failslab, interval 1, probability 0, space 0, times 0 [ 80.143294][ T5110] CPU: 1 UID: 0 PID: 5110 Comm: syz.1.550 Not tainted syzkaller #0 PREEMPT(voluntary) [ 80.143426][ T5110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 80.143439][ T5110] Call Trace: [ 80.143445][ T5110] [ 80.143453][ T5110] __dump_stack+0x1d/0x30 [ 80.143475][ T5110] dump_stack_lvl+0xe8/0x140 [ 80.143497][ T5110] dump_stack+0x15/0x1b [ 80.143562][ T5110] should_fail_ex+0x265/0x280 [ 80.143599][ T5110] should_failslab+0x8c/0xb0 [ 80.143627][ T5110] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 80.143691][ T5110] ? sidtab_sid2str_get+0xa0/0x130 [ 80.143723][ T5110] kmemdup_noprof+0x2b/0x70 [ 80.143749][ T5110] sidtab_sid2str_get+0xa0/0x130 [ 80.143779][ T5110] security_sid_to_context_core+0x1eb/0x2e0 [ 80.143839][ T5110] security_sid_to_context+0x27/0x40 [ 80.143867][ T5110] avc_audit_post_callback+0x10f/0x520 [ 80.143903][ T5110] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 80.143986][ T5110] common_lsm_audit+0x1bb/0x230 [ 80.144012][ T5110] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 80.144095][ T5110] slow_avc_audit+0x104/0x140 [ 80.144131][ T5110] avc_has_perm+0x13a/0x180 [ 80.144173][ T5110] selinux_socket_sendmsg+0x175/0x1b0 [ 80.144201][ T5110] security_socket_sendmsg+0x48/0x80 [ 80.144224][ T5110] __sock_sendmsg+0x30/0x180 [ 80.144252][ T5110] ____sys_sendmsg+0x31e/0x4e0 [ 80.144306][ T5110] ___sys_sendmsg+0x17b/0x1d0 [ 80.144353][ T5110] __x64_sys_sendmsg+0xd4/0x160 [ 80.144388][ T5110] x64_sys_call+0x191e/0x3000 [ 80.144410][ T5110] do_syscall_64+0xd2/0x200 [ 80.144470][ T5110] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 80.144500][ T5110] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 80.144649][ T5110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.144671][ T5110] RIP: 0033:0x7fcc269aefc9 [ 80.144686][ T5110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.144705][ T5110] RSP: 002b:00007fcc2540f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.144725][ T5110] RAX: ffffffffffffffda RBX: 00007fcc26c05fa0 RCX: 00007fcc269aefc9 [ 80.144737][ T5110] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000004 [ 80.144826][ T5110] RBP: 00007fcc2540f090 R08: 0000000000000000 R09: 0000000000000000 [ 80.144838][ T5110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.144851][ T5110] R13: 00007fcc26c06038 R14: 00007fcc26c05fa0 R15: 00007fff0c3d5cf8 [ 80.144871][ T5110] [ 80.480828][ T5110] ieee802154 phy1 wpan1: encryption failed: -22 [ 80.834287][ T5124] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 80.842279][ T5124] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 81.239961][ T5156] FAULT_INJECTION: forcing a failure. [ 81.239961][ T5156] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 81.253490][ T5156] CPU: 1 UID: 0 PID: 5156 Comm: syz.3.567 Not tainted syzkaller #0 PREEMPT(voluntary) [ 81.253520][ T5156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 81.253571][ T5156] Call Trace: [ 81.253578][ T5156] [ 81.253586][ T5156] __dump_stack+0x1d/0x30 [ 81.253609][ T5156] dump_stack_lvl+0xe8/0x140 [ 81.253629][ T5156] dump_stack+0x15/0x1b [ 81.253646][ T5156] should_fail_ex+0x265/0x280 [ 81.253743][ T5156] should_fail+0xb/0x20 [ 81.253775][ T5156] should_fail_usercopy+0x1a/0x20 [ 81.253846][ T5156] strncpy_from_user+0x25/0x230 [ 81.253874][ T5156] ? kmem_cache_alloc_noprof+0x242/0x480 [ 81.253903][ T5156] ? getname_flags+0x80/0x3b0 [ 81.253974][ T5156] getname_flags+0xae/0x3b0 [ 81.254004][ T5156] path_removexattrat+0xf5/0x570 [ 81.254050][ T5156] __x64_sys_removexattr+0x38/0x50 [ 81.254164][ T5156] x64_sys_call+0x2433/0x3000 [ 81.254187][ T5156] do_syscall_64+0xd2/0x200 [ 81.254212][ T5156] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 81.254242][ T5156] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 81.254332][ T5156] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.254355][ T5156] RIP: 0033:0x7f0fe239efc9 [ 81.254412][ T5156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.254431][ T5156] RSP: 002b:00007f0fe0e07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c5 [ 81.254451][ T5156] RAX: ffffffffffffffda RBX: 00007f0fe25f5fa0 RCX: 00007f0fe239efc9 [ 81.254464][ T5156] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 00002000000000c0 [ 81.254508][ T5156] RBP: 00007f0fe0e07090 R08: 0000000000000000 R09: 0000000000000000 [ 81.254520][ T5156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.254533][ T5156] R13: 00007f0fe25f6038 R14: 00007f0fe25f5fa0 R15: 00007ffdbdc4fa68 [ 81.254559][ T5156] [ 81.726802][ T5171] syz.1.571 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 82.394364][ T29] kauditd_printk_skb: 540 callbacks suppressed [ 82.394385][ T29] audit: type=1326 audit(1760774292.544:4362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.424951][ T29] audit: type=1326 audit(1760774292.544:4363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.448791][ T29] audit: type=1326 audit(1760774292.544:4364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=90 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.450401][ T5185] bridge0: port 3(veth0_to_bridge) entered blocking state [ 82.473370][ T29] audit: type=1326 audit(1760774292.544:4365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.479727][ T5185] bridge0: port 3(veth0_to_bridge) entered disabled state [ 82.510545][ T29] audit: type=1326 audit(1760774292.544:4366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3a3a2dd810 code=0x7ffc0000 [ 82.533984][ T29] audit: type=1326 audit(1760774292.544:4367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.543597][ T5185] veth0_to_bridge: entered allmulticast mode [ 82.557780][ T29] audit: type=1326 audit(1760774292.544:4368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.557874][ T29] audit: type=1326 audit(1760774292.544:4369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.605808][ T5185] veth0_to_bridge: entered promiscuous mode [ 82.612397][ T29] audit: type=1326 audit(1760774292.544:4370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.617766][ T5185] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 82.641198][ T29] audit: type=1326 audit(1760774292.544:4371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5183 comm="syz.2.576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 82.689290][ T5185] bridge0: port 3(veth0_to_bridge) entered blocking state [ 82.696743][ T5185] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 82.775077][ T5191] netlink: 'syz.4.579': attribute type 10 has an invalid length. [ 82.782913][ T5191] __nla_validate_parse: 4 callbacks suppressed [ 82.782933][ T5191] netlink: 40 bytes leftover after parsing attributes in process `syz.4.579'. [ 82.830976][ T5196] netlink: 12 bytes leftover after parsing attributes in process `syz.1.581'. [ 82.866391][ T5198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5198 comm=syz.4.582 [ 82.920390][ T5202] netlink: 24 bytes leftover after parsing attributes in process `syz.3.580'. [ 83.304546][ T5222] random: crng reseeded on system resumption [ 83.308449][ T5224] netlink: 176 bytes leftover after parsing attributes in process `syz.0.588'. [ 83.328506][ T5222] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=37 sclass=netlink_audit_socket pid=5222 comm=syz.2.591 [ 83.351330][ T5222] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5222 comm=syz.2.591 [ 83.380236][ T5222] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5222 comm=syz.2.591 [ 83.602358][ T5233] netlink: 24 bytes leftover after parsing attributes in process `syz.0.593'. [ 83.823497][ T5250] netlink: 24 bytes leftover after parsing attributes in process `syz.0.595'. [ 83.864366][ T5253] netlink: 'syz.3.601': attribute type 10 has an invalid length. [ 83.872216][ T5253] netlink: 40 bytes leftover after parsing attributes in process `syz.3.601'. [ 83.898376][ T5255] netlink: 12 bytes leftover after parsing attributes in process `syz.0.602'. [ 84.549814][ T5289] netlink: 24 bytes leftover after parsing attributes in process `syz.1.612'. [ 84.705798][ T5298] FAULT_INJECTION: forcing a failure. [ 84.705798][ T5298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.719010][ T5298] CPU: 0 UID: 0 PID: 5298 Comm: syz.1.616 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.719073][ T5298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 84.719091][ T5298] Call Trace: [ 84.719100][ T5298] [ 84.719110][ T5298] __dump_stack+0x1d/0x30 [ 84.719194][ T5298] dump_stack_lvl+0xe8/0x140 [ 84.719220][ T5298] dump_stack+0x15/0x1b [ 84.719242][ T5298] should_fail_ex+0x265/0x280 [ 84.719363][ T5298] should_fail+0xb/0x20 [ 84.719403][ T5298] should_fail_usercopy+0x1a/0x20 [ 84.719427][ T5298] _copy_to_user+0x20/0xa0 [ 84.719458][ T5298] simple_read_from_buffer+0xb5/0x130 [ 84.719507][ T5298] proc_fail_nth_read+0x10e/0x150 [ 84.719543][ T5298] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 84.719579][ T5298] vfs_read+0x1a8/0x770 [ 84.719654][ T5298] ? __rcu_read_unlock+0x4f/0x70 [ 84.719731][ T5298] ? __fget_files+0x184/0x1c0 [ 84.719762][ T5298] ksys_read+0xda/0x1a0 [ 84.719862][ T5298] __x64_sys_read+0x40/0x50 [ 84.719891][ T5298] x64_sys_call+0x27c0/0x3000 [ 84.719977][ T5298] do_syscall_64+0xd2/0x200 [ 84.720006][ T5298] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 84.720114][ T5298] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 84.720143][ T5298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.720172][ T5298] RIP: 0033:0x7fcc269ad9dc [ 84.720192][ T5298] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 84.720215][ T5298] RSP: 002b:00007fcc2540f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 84.720240][ T5298] RAX: ffffffffffffffda RBX: 00007fcc26c05fa0 RCX: 00007fcc269ad9dc [ 84.720308][ T5298] RDX: 000000000000000f RSI: 00007fcc2540f0a0 RDI: 0000000000000006 [ 84.720322][ T5298] RBP: 00007fcc2540f090 R08: 0000000000000000 R09: 0000000000000000 [ 84.720391][ T5298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.720407][ T5298] R13: 00007fcc26c06038 R14: 00007fcc26c05fa0 R15: 00007fff0c3d5cf8 [ 84.720433][ T5298] [ 84.952548][ T5301] netlink: 8 bytes leftover after parsing attributes in process `syz.2.617'. [ 86.329016][ T5350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=5350 comm=syz.0.632 [ 86.826963][ T5373] netlink: 'syz.1.642': attribute type 10 has an invalid length. [ 86.856883][ T5373] team0: Port device geneve1 added [ 86.867350][ T5371] bridge: RTM_NEWNEIGH with invalid ether address [ 86.907867][ T5367] batadv_slave_1: entered promiscuous mode [ 86.914220][ T5367] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 86.928498][ T5367] batadv_slave_1 (unregistering): left promiscuous mode [ 86.935743][ T5367] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 87.005532][ T5385] FAULT_INJECTION: forcing a failure. [ 87.005532][ T5385] name failslab, interval 1, probability 0, space 0, times 0 [ 87.018562][ T5385] CPU: 0 UID: 0 PID: 5385 Comm: syz.3.647 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.018590][ T5385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 87.018605][ T5385] Call Trace: [ 87.018613][ T5385] [ 87.018624][ T5385] __dump_stack+0x1d/0x30 [ 87.018653][ T5385] dump_stack_lvl+0xe8/0x140 [ 87.018680][ T5385] dump_stack+0x15/0x1b [ 87.018772][ T5385] should_fail_ex+0x265/0x280 [ 87.018819][ T5385] should_failslab+0x8c/0xb0 [ 87.018856][ T5385] __kmalloc_node_noprof+0xaa/0x580 [ 87.018899][ T5385] ? __vmalloc_node_range_noprof+0x410/0xed0 [ 87.018946][ T5385] __vmalloc_node_range_noprof+0x410/0xed0 [ 87.019025][ T5385] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 87.019116][ T5385] __vmalloc_noprof+0x83/0xc0 [ 87.019150][ T5385] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 87.019321][ T5385] ? ppp_poll+0x161/0x170 [ 87.019356][ T5385] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 87.019390][ T5385] ? bpf_prog_alloc+0x2a/0x150 [ 87.019448][ T5385] ? ppp_poll+0x161/0x170 [ 87.019485][ T5385] bpf_prog_alloc+0x3c/0x150 [ 87.019532][ T5385] ? ppp_poll+0x161/0x170 [ 87.019606][ T5385] bpf_prog_create+0x73/0x130 [ 87.019639][ T5385] ? __pfx_ppp_ioctl+0x10/0x10 [ 87.019740][ T5385] ppp_get_filter+0x113/0x160 [ 87.019781][ T5385] ppp_ioctl+0xb93/0x11c0 [ 87.019808][ T5385] ? __fget_files+0x184/0x1c0 [ 87.019857][ T5385] ? __pfx_ppp_ioctl+0x10/0x10 [ 87.019891][ T5385] __se_sys_ioctl+0xce/0x140 [ 87.019915][ T5385] __x64_sys_ioctl+0x43/0x50 [ 87.019970][ T5385] x64_sys_call+0x1816/0x3000 [ 87.020060][ T5385] do_syscall_64+0xd2/0x200 [ 87.020149][ T5385] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 87.020185][ T5385] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 87.020283][ T5385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.020305][ T5385] RIP: 0033:0x7f0fe239efc9 [ 87.020325][ T5385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.020349][ T5385] RSP: 002b:00007f0fe0e07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 87.020440][ T5385] RAX: ffffffffffffffda RBX: 00007f0fe25f5fa0 RCX: 00007f0fe239efc9 [ 87.020455][ T5385] RDX: 0000200000000080 RSI: 0000000040107447 RDI: 0000000000000003 [ 87.020472][ T5385] RBP: 00007f0fe0e07090 R08: 0000000000000000 R09: 0000000000000000 [ 87.020488][ T5385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.020557][ T5385] R13: 00007f0fe25f6038 R14: 00007f0fe25f5fa0 R15: 00007ffdbdc4fa68 [ 87.020582][ T5385] [ 87.020592][ T5385] syz.3.647: vmalloc error: size 4096, failed to allocated page array size 8, mode:0x400dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 87.292120][ T5385] CPU: 0 UID: 0 PID: 5385 Comm: syz.3.647 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.292150][ T5385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 87.292195][ T5385] Call Trace: [ 87.292204][ T5385] [ 87.292214][ T5385] __dump_stack+0x1d/0x30 [ 87.292269][ T5385] dump_stack_lvl+0xe8/0x140 [ 87.292294][ T5385] dump_stack+0x15/0x1b [ 87.292316][ T5385] warn_alloc+0x12b/0x1a0 [ 87.292351][ T5385] __vmalloc_node_range_noprof+0x4b9/0xed0 [ 87.292498][ T5385] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 87.292551][ T5385] __vmalloc_noprof+0x83/0xc0 [ 87.292589][ T5385] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 87.292645][ T5385] ? ppp_poll+0x161/0x170 [ 87.292700][ T5385] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 87.292740][ T5385] ? bpf_prog_alloc+0x2a/0x150 [ 87.292812][ T5385] ? ppp_poll+0x161/0x170 [ 87.292849][ T5385] bpf_prog_alloc+0x3c/0x150 [ 87.292879][ T5385] ? ppp_poll+0x161/0x170 [ 87.292991][ T5385] bpf_prog_create+0x73/0x130 [ 87.293027][ T5385] ? __pfx_ppp_ioctl+0x10/0x10 [ 87.293061][ T5385] ppp_get_filter+0x113/0x160 [ 87.293113][ T5385] ppp_ioctl+0xb93/0x11c0 [ 87.293149][ T5385] ? __fget_files+0x184/0x1c0 [ 87.293184][ T5385] ? __pfx_ppp_ioctl+0x10/0x10 [ 87.293272][ T5385] __se_sys_ioctl+0xce/0x140 [ 87.293293][ T5385] __x64_sys_ioctl+0x43/0x50 [ 87.293317][ T5385] x64_sys_call+0x1816/0x3000 [ 87.293346][ T5385] do_syscall_64+0xd2/0x200 [ 87.293382][ T5385] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 87.293418][ T5385] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 87.293447][ T5385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.293475][ T5385] RIP: 0033:0x7f0fe239efc9 [ 87.293548][ T5385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.293567][ T5385] RSP: 002b:00007f0fe0e07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 87.293586][ T5385] RAX: ffffffffffffffda RBX: 00007f0fe25f5fa0 RCX: 00007f0fe239efc9 [ 87.293598][ T5385] RDX: 0000200000000080 RSI: 0000000040107447 RDI: 0000000000000003 [ 87.293611][ T5385] RBP: 00007f0fe0e07090 R08: 0000000000000000 R09: 0000000000000000 [ 87.293626][ T5385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.293642][ T5385] R13: 00007f0fe25f6038 R14: 00007f0fe25f5fa0 R15: 00007ffdbdc4fa68 [ 87.293671][ T5385] [ 87.293680][ T5385] Mem-Info: [ 87.532958][ T5385] active_anon:13063 inactive_anon:0 isolated_anon:0 [ 87.532958][ T5385] active_file:10371 inactive_file:11554 isolated_file:0 [ 87.532958][ T5385] unevictable:0 dirty:471 writeback:0 [ 87.532958][ T5385] slab_reclaimable:3180 slab_unreclaimable:15463 [ 87.532958][ T5385] mapped:35080 shmem:9122 pagetables:1227 [ 87.532958][ T5385] sec_pagetables:0 bounce:0 [ 87.532958][ T5385] kernel_misc_reclaimable:0 [ 87.532958][ T5385] free:1848024 free_pcp:40159 free_cma:0 [ 87.579108][ T5385] Node 0 active_anon:54108kB inactive_anon:0kB active_file:41484kB inactive_file:46216kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:140320kB dirty:1884kB writeback:0kB shmem:38228kB kernel_stack:3376kB pagetables:5024kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 87.606888][ T5385] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 87.636824][ T5385] lowmem_reserve[]: 0 2883 7862 7862 [ 87.642195][ T5385] Node 0 DMA32 free:2949156kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2952688kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:3532kB free_cma:0kB [ 87.656539][ T29] kauditd_printk_skb: 1224 callbacks suppressed [ 87.656563][ T29] audit: type=1326 audit(1760774297.824:5596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.4.641" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdba92cefc9 code=0x7ffc0000 [ 87.674032][ T5385] lowmem_reserve[]: 0 0 4978 4978 [ 87.708797][ T5385] Node 0 Normal free:4425496kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:55996kB inactive_anon:0kB active_file:41484kB inactive_file:46216kB unevictable:0kB writepending:1836kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:155480kB local_pcp:144856kB free_cma:0kB [ 87.742521][ T5385] lowmem_reserve[]: 0 0 0 0 [ 87.747117][ T5385] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 87.760125][ T5385] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 6*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949156kB [ 87.776491][ T5385] Node 0 Normal: 295*4kB (UME) 594*8kB (UME) 666*16kB (UME) 491*32kB (UME) 320*64kB (UME) 174*128kB (UM) 60*256kB (UM) 23*512kB (UME) 16*1024kB (UM) 23*2048kB (UME) 1040*4096kB (UM) = 4425516kB [ 87.796274][ T5385] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 87.806072][ T5385] 29105 total pagecache pages [ 87.810768][ T5385] 0 pages in swap cache [ 87.814939][ T5385] Free swap = 124996kB [ 87.819352][ T5385] Total swap = 124996kB [ 87.823682][ T5385] 2097051 pages RAM [ 87.827806][ T5385] 0 pages HighMem/MovableOnly [ 87.832721][ T5385] 80479 pages reserved [ 88.057235][ T5405] __nla_validate_parse: 13 callbacks suppressed [ 88.057252][ T5405] netlink: 24 bytes leftover after parsing attributes in process `syz.4.651'. [ 88.149820][ T29] audit: type=1400 audit(1760774298.314:5597): avc: denied { mounton } for pid=5410 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 88.197301][ T59] netdevsim netdevsim0 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 88.207744][ T59] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 88.258691][ T59] netdevsim netdevsim0 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 88.269245][ T59] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 88.314705][ T5424] netlink: 'syz.3.659': attribute type 1 has an invalid length. [ 88.322515][ T5424] netlink: 224 bytes leftover after parsing attributes in process `syz.3.659'. [ 88.343706][ T59] netdevsim netdevsim0 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 88.354243][ T59] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 88.367995][ T5424] netlink: 24 bytes leftover after parsing attributes in process `syz.3.659'. [ 88.388561][ T29] audit: type=1326 audit(1760774298.554:5598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.413323][ T29] audit: type=1326 audit(1760774298.554:5599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.437025][ T29] audit: type=1326 audit(1760774298.554:5600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.460772][ T29] audit: type=1326 audit(1760774298.554:5601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.484075][ T29] audit: type=1326 audit(1760774298.554:5602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.507886][ T29] audit: type=1326 audit(1760774298.554:5603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.531382][ T29] audit: type=1326 audit(1760774298.554:5604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.554765][ T29] audit: type=1326 audit(1760774298.554:5605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.2.662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f3a3a2defc9 code=0x7ffc0000 [ 88.581253][ T3322] ================================================================== [ 88.589442][ T3322] BUG: KCSAN: data-race in generic_fillattr / inode_add_bytes [ 88.596976][ T3322] [ 88.599327][ T3322] read-write to 0xffff88811ab96ca0 of 8 bytes by task 5434 on cpu 0: [ 88.607425][ T3322] inode_add_bytes+0x47/0xe0 [ 88.612239][ T3322] __dquot_alloc_space+0x180/0x8a0 [ 88.617703][ T3322] shmem_inode_acct_blocks+0x129/0x240 [ 88.623207][ T3322] shmem_get_folio_gfp+0x5a7/0xd60 [ 88.628537][ T3322] shmem_write_begin+0xa8/0x190 [ 88.633437][ T3322] generic_perform_write+0x184/0x490 [ 88.638894][ T3322] shmem_file_write_iter+0xc5/0xf0 [ 88.644208][ T3322] __kernel_write_iter+0x2d6/0x540 [ 88.649437][ T3322] dump_user_range+0x61e/0x8f0 [ 88.654230][ T3322] elf_core_dump+0x1de7/0x1f80 [ 88.659151][ T3322] coredump_write+0xb12/0xe30 [ 88.663846][ T3322] vfs_coredump+0x143a/0x20d0 [ 88.668554][ T3322] get_signal+0xd84/0xf70 [ 88.672897][ T3322] arch_do_signal_or_restart+0x96/0x440 [ 88.678476][ T3322] irqentry_exit_to_user_mode+0x5b/0xa0 [ 88.684035][ T3322] irqentry_exit+0x12/0x50 [ 88.688483][ T3322] asm_exc_page_fault+0x26/0x30 [ 88.693360][ T3322] [ 88.695693][ T3322] read to 0xffff88811ab96ca0 of 8 bytes by task 3322 on cpu 1: [ 88.703278][ T3322] generic_fillattr+0x27d/0x340 [ 88.708280][ T3322] shmem_getattr+0x181/0x200 [ 88.713072][ T3322] vfs_getattr_nosec+0x146/0x1e0 [ 88.718036][ T3322] vfs_statx+0x113/0x390 [ 88.722297][ T3322] vfs_fstatat+0x115/0x170 [ 88.726739][ T3322] __se_sys_newfstatat+0x55/0x260 [ 88.731788][ T3322] __x64_sys_newfstatat+0x55/0x70 [ 88.737006][ T3322] x64_sys_call+0x135a/0x3000 [ 88.741785][ T3322] do_syscall_64+0xd2/0x200 [ 88.746769][ T3322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.752676][ T3322] [ 88.755006][ T3322] value changed: 0x0000000000000c30 -> 0x0000000000000c40 [ 88.762174][ T3322] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 88.764547][ T3322] Reported by Kernel Concurrency Sanitizer on: [ 88.770713][ T3322] CPU: 1 UID: 0 PID: 3322 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 88.780618][ T3322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 88.790780][ T3322] ================================================================== [ 88.882950][ T59] netdevsim netdevsim0 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 88.893387][ T59] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.026167][ T59] bridge_slave_1: left allmulticast mode [ 89.031896][ T59] bridge_slave_1: left promiscuous mode [ 89.037827][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.046214][ T59] bridge_slave_0: left allmulticast mode [ 89.052057][ T59] bridge_slave_0: left promiscuous mode [ 89.057950][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.124527][ T59] team0: Port device geneve1 removed [ 89.237546][ T59] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 89.247919][ T59] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 89.257691][ T59] bond0 (unregistering): Released all slaves [ 89.300459][ T59] hsr_slave_0: left promiscuous mode [ 89.306153][ T59] hsr_slave_1: left promiscuous mode [ 89.311931][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 89.319376][ T59] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 89.329373][ T59] veth1_macvtap: left promiscuous mode [ 89.334878][ T59] veth0_macvtap: left promiscuous mode [ 89.340525][ T59] veth1_vlan: left promiscuous mode [ 89.345935][ T59] veth0_vlan: left promiscuous mode [ 89.402097][ T59] team0 (unregistering): Port device team_slave_1 removed [ 89.412187][ T59] team0 (unregistering): Port device team_slave_0 removed [ 89.840750][ T59] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.888421][ T59] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.948309][ T59] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.029931][ T59] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.111214][ T59] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.166620][ T59] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.226655][ T59] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.266751][ T59] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.350015][ T59] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.416556][ T59] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.486640][ T59] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.546516][ T59] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.630396][ T59] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.657010][ T59] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.716658][ T59] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.756838][ T59] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.809113][ T59] bridge_slave_1: left allmulticast mode [ 90.814810][ T59] bridge_slave_1: left promiscuous mode [ 90.820552][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.828336][ T59] bridge_slave_0: left allmulticast mode [ 90.834034][ T59] bridge_slave_0: left promiscuous mode [ 90.839792][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.848327][ T59] veth0_to_bridge: left allmulticast mode [ 90.854065][ T59] veth0_to_bridge: left promiscuous mode [ 90.859980][ T59] bridge0: port 3(veth0_to_bridge) entered disabled state [ 90.867684][ T59] bridge_slave_1: left allmulticast mode [ 90.873426][ T59] bridge_slave_1: left promiscuous mode [ 90.879147][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.886985][ T59] bridge_slave_0: left allmulticast mode [ 90.892803][ T59] bridge_slave_0: left promiscuous mode [ 90.898701][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.907170][ T59] bridge_slave_1: left allmulticast mode [ 90.912917][ T59] bridge_slave_1: left promiscuous mode [ 90.918809][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.926778][ T59] bridge_slave_0: left allmulticast mode [ 90.932641][ T59] bridge_slave_0: left promiscuous mode [ 90.938328][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.947058][ T59] bridge_slave_1: left allmulticast mode [ 90.952989][ T59] bridge_slave_1: left promiscuous mode [ 90.958712][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.966520][ T59] bridge_slave_0: left allmulticast mode [ 90.972304][ T59] bridge_slave_0: left promiscuous mode [ 90.978197][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.154192][ T59] team0: Port device geneve1 removed [ 91.197671][ T59] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.207573][ T59] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.217124][ T59] bond0 (unregistering): Released all slaves [ 91.241486][ T59] team0: Port device geneve1 removed [ 91.307203][ T59] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.316997][ T59] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.326713][ T59] bond0 (unregistering): Released all slaves [ 91.348634][ T59] team0: Port device geneve1 removed [ 91.457353][ T59] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.467181][ T59] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.476568][ T59] bond0 (unregistering): Released all slaves [ 91.485612][ T59] team0: Port device bond1 removed [ 91.491849][ T59] bond1 (unregistering): Released all slaves [ 91.500360][ T59] bond2 (unregistering): Released all slaves [ 91.524681][ T59] team0: Port device geneve1 removed [ 91.657196][ T59] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.667127][ T59] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.676610][ T59] bond0 (unregistering): Released all slaves [ 93.281236][ T59] hsr_slave_0: left promiscuous mode [ 93.286991][ T59] hsr_slave_1: left promiscuous mode [ 93.292676][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.300167][ T59] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.309399][ T59] hsr_slave_0: left promiscuous mode [ 93.315148][ T59] hsr_slave_1: left promiscuous mode [ 93.320848][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.328364][ T59] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.337802][ T59] hsr_slave_0: left promiscuous mode [ 93.343513][ T59] hsr_slave_1: left promiscuous mode [ 93.349257][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.356728][ T59] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.366285][ T59] hsr_slave_0: left promiscuous mode [ 93.372049][ T59] hsr_slave_1: left promiscuous mode [ 93.387731][ T59] veth1_macvtap: left promiscuous mode [ 93.393335][ T59] veth0_macvtap: left promiscuous mode [ 93.398962][ T59] veth1_vlan: left promiscuous mode [ 93.404270][ T59] veth0_vlan: left promiscuous mode [ 93.410296][ T59] veth1_macvtap: left promiscuous mode [ 93.415903][ T59] veth0_macvtap: left promiscuous mode [ 93.421600][ T59] veth1_vlan: left promiscuous mode [ 93.427160][ T59] veth0_vlan: left promiscuous mode [ 93.433091][ T59] veth1_macvtap: left promiscuous mode [ 93.438758][ T59] veth0_macvtap: left promiscuous mode [ 93.444379][ T59] veth1_vlan: left promiscuous mode [ 93.449884][ T59] veth0_vlan: left promiscuous mode [ 93.455736][ T59] veth1_macvtap: left promiscuous mode [ 93.461253][ T59] veth0_macvtap: left promiscuous mode [ 93.466928][ T59] veth1_vlan: left promiscuous mode [ 93.472433][ T59] veth0_vlan: left promiscuous mode [ 93.619519][ T59] team0 (unregistering): Port device team_slave_1 removed [ 93.629921][ T59] team0 (unregistering): Port device team_slave_0 removed [ 93.683300][ T59] team0 (unregistering): Port device team_slave_1 removed [ 93.694246][ T59] team0 (unregistering): Port device team_slave_0 removed [ 93.744036][ T59] team0 (unregistering): Port device team_slave_1 removed [ 93.798781][ T59] team0 (unregistering): Port device team_slave_1 removed [ 93.809949][ T59] team0 (unregistering): Port device team_slave_0 removed