last executing test programs: 3.176971724s ago: executing program 4 (id=15882): setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="fc0000001900010000000000fcdbdf2500000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000004000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000001000000000000004400050000000000000000000080000000000000000000022b0000000a000000fe8000000000a6c25f3f2077b9c800aa0000000004"], 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES8=r0], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040010}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000"], 0x50) connect$unix(r2, &(0x7f0000000340)=@file={0x72032be4f35493e9, './file0\x00'}, 0x6e) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000140)={0x1, 0x2, 0x81}) r5 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x50) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) listen(r0, 0xde2) 2.796378399s ago: executing program 4 (id=15886): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x5c, 0x10, 0x503, 0x900, 0x3000000, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x24, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_DATA={0x10, 0x5, 0x0, 0x1, [{0xa, 0x4, @remote}]}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x3}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x5c}}, 0x0) 2.688436921s ago: executing program 4 (id=15889): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = fsopen(&(0x7f0000000100)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x1) fchdir(r5) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000200)='.\x00', 0x10000a0) 2.488082104s ago: executing program 2 (id=15898): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x4000000, 0x1, 0x0, 'queue0\x00'}) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000180)={0x0, 0x0, {0x2, 0x3}}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x80002, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) acct(0x0) socket(0x1e, 0x4, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6c9fc0be700202fe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0207e80702"], 0x10}}, 0x40044) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x0) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/partitions\x00', 0x0, 0x0) r10 = syz_io_uring_setup(0x186, &(0x7f0000000080)={0x0, 0x3416, 0x13100, 0x2, 0x1}, &(0x7f0000000200), &(0x7f00000001c0)) io_uring_enter(r10, 0x2def, 0x0, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20000023896) syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x400, 0x7, 0x285}, &(0x7f00000004c0)=0x0, &(0x7f0000000280)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) 2.10094804s ago: executing program 0 (id=15905): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) pipe2(&(0x7f0000000040), 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) epoll_create(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r3 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r3, 0x29, 0x4a, &(0x7f0000000540)=0x2, 0x4) sendmmsg$inet6(r3, &(0x7f0000004580)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00'], 0x28}}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000001e00), 0x0, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000004c0)=@req3={0x8, 0x100000001, 0x210000, 0x1, 0x10000a}, 0x1c) sendmmsg(r3, &(0x7f0000000480)=[{{&(0x7f0000000000)=@can, 0x80, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC=r2], 0x20}}], 0x1, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000028a, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='kfree\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r6, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r7, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r9, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 2.06332966s ago: executing program 3 (id=15906): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff000000eeff03000008002010b70400000000000085000000010000009500"/64], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0x0, 0xee01) setrlimit(0x40000000000008, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f00000001c0)={0x200000000000001}, 0x8) sendto$inet6(r2, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000018c0)={0x130, r7, 0xacf5e67dd0b583a1, 0x0, 0x25dfdbfd, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x8000}}}}, [@beacon=[@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x104, 0x3, "fcd3fc25311cc6909ec6b8793d9de377843fb694749c57fe59c4bc622a074a40bf1cd75a4bed4ad083fcd9b63e96fd481ed67312346794d6382aa7b06bb8c8e03c29dc630566cc554b4d65e5a853a8a56cba40391239deaa7180d11c02833cccd19d862bc6575a8cee3755c40b4e7d4a88146220212ed136a5b5f0bf7db94d8c3524bf2ee8d5e955648d3964e6e6ac41537a38121b511f1ef177c54f0eca29daa862314517772c9276d7d832309a12c0d43c24865534aef706042aaddd8054fe33972c928c7423e5ea880c12b9afe445e02fdfaebdedb0d4a44d85a08badf52e7476c622aee878a41a2a7b63bf7d8c3c833c638ab98c70fdeceb70c9966779c8"}]}]]}, 0x130}}, 0x24040010) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000004000000ff0f000007", @ANYRES16=r1], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000280)=""/140, 0x8c, 0x0, &(0x7f0000000200)}}, 0x10) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r12, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r13, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c0001"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRESOCT=r10], &(0x7f0000000240)='GPL\x00', 0x0, 0x25, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, r9, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r14}, 0x10) rt_sigqueueinfo(0x0, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) 2.013582761s ago: executing program 3 (id=15907): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='svcrdma_decode_short_err\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000c40)='./file0\x00', 0x808080, &(0x7f0000000c80)={[{@discard}, {@bh}, {@noblock_validity}]}, 0x2c, 0x52c, &(0x7f0000000640)="$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") syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x3800813, &(0x7f0000000e80)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c757466382c6f76657272696465726f636b7065726d2c6e6f6a6f6c6965742c6e6f6a6f6c6965742c6f76657272696465726f636b7065726d2c646d6f64653d3078303030303030303030303030303030332c6e6f636f6d70726573732c6d6f64653d3078303030303030303030303030303038302c686964652c626c6f636b3d3078303030303030303030303030303230302c6d61703d61636f726e2c6f76657272696465726f636b7065726d2c636865636b3d72656c617865642c6769643d6db3d9cdae9e11e94ee6d0f68e5a1a6d108ac29224f5552b159a788ca78dd579e8cbd29794046949c009efe121c4ace04cff1a2573080f306f41604b77041fcb9f86c865927a9b766f286a1d7dd8da63a2db812a90df85c518f86c9ab7c560bbba37c7bfa91cb63fd83232267b49e195586e5319a647d043f7fa8644532755bb20945bbc6284068f3a8c4f286cc47a2853430426a2647f73024b996940c81a2fa08b76d187961627b6198b2638517026c9857393897f4dca02e38fb73941f4925e8f516603", @ANYRESHEX=0x0, @ANYBLOB=',\x00'], 0x5, 0xa51, &(0x7f0000001240)="$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") name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000052000000030000005c5407000a0000000000000009000000"], &(0x7f0000000000), 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000008, &(0x7f00000003c0), 0xfc, 0x53e, &(0x7f0000000940)="$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") ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r3, 0xa, 0x13) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r4, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002b80)="b2", 0x1}], 0x1}, 0x4000) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r5}, 0x18) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 1.906773632s ago: executing program 3 (id=15908): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r5, 0x1, &(0x7f0000001c00)=[&(0x7f0000000400)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r4, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) clock_nanosleep(0x2, 0xfffffdfc, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x1000, 0x0) ioctl$SNAPSHOT_FREE(r6, 0x3305) syz_clone(0x40200080, 0x0, 0x0, 0x0, 0x0, 0x0) 1.494174488s ago: executing program 2 (id=15912): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0x0, 0xee01) setrlimit(0x40000000000008, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f00000001c0)={0x200000000000001}, 0x8) sendto$inet6(r2, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000018c0)={0x130, r7, 0xacf5e67dd0b583a1, 0x0, 0x25dfdbfd, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x8000}}}}, [@beacon=[@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x104, 0x3, "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"}]}]]}, 0x130}}, 0x24040010) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000004000000ff0f000007", @ANYRES16=r1], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000280)=""/140, 0x8c, 0x0, &(0x7f0000000200)}}, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c0001"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) rt_sigqueueinfo(0x0, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) mount$9p_tcp(0x0, &(0x7f0000000680)='.\x00', &(0x7f00000006c0), 0x8010, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=tcp']) 1.451317969s ago: executing program 0 (id=15913): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff000000eeff03000008002010b70400000000000085000000010000009500"/65], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0x0, 0xee01) setrlimit(0x40000000000008, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f00000001c0)={0x200000000000001}, 0x8) sendto$inet6(r2, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000018c0)={0x130, r7, 0xacf5e67dd0b583a1, 0x0, 0x25dfdbfd, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x8000}}}}, [@beacon=[@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x104, 0x3, "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"}]}]]}, 0x130}}, 0x24040010) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000004000000ff0f000007", @ANYRES16=r1], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000280)=""/140, 0x8c, 0x0, &(0x7f0000000200)}}, 0x10) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r12, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r13, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c0001"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRESOCT=r10], &(0x7f0000000240)='GPL\x00', 0x0, 0x25, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, r9, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r14}, 0x10) rt_sigqueueinfo(0x0, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) mount$9p_tcp(0x0, &(0x7f0000000680)='.\x00', &(0x7f00000006c0), 0x8010, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=tcp']) 1.40695415s ago: executing program 2 (id=15914): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x10, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT, @ANYBLOB="0000000000000000000000001804000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70300000003000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) wait4(0x0, 0x0, 0x40000000, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x4, &(0x7f0000000140)=0x0) io_submit(r5, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r4, &(0x7f0000000000), 0x4000}]) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)=0x0) timer_settime(r7, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r8, &(0x7f0000000000), 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r9, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200878c5b4ce2dda10baaa2f2884600001c00000006750000000500000000100200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.40426689s ago: executing program 0 (id=15915): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x4e22, 0x2, @private0, 0xa}}}, 0x88) socket$packet(0x11, 0x2, 0x300) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000000), 0x400) socket(0x10, 0x803, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x4005890) r1 = syz_io_uring_setup(0x63d, &(0x7f0000000640)={0x0, 0x8826, 0x80, 0x0, 0x2d}, &(0x7f0000000300)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x100000004, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) r4 = syz_pidfd_open(0x0, 0x0) setns(r4, 0x24020000) r5 = open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='\x00', 0x89901) fcntl$getown(0xffffffffffffffff, 0x9) move_mount(0xffffffffffffffff, 0x0, r5, 0x0, 0x46) close(r5) socket$igmp6(0xa, 0x3, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) memfd_create(0x0, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYRES64=r3], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8000000003, 0x20002, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x800000000003}, 0x111142, 0x0, 0x10000005, 0x3, 0x3c, 0xa, 0xfffc, 0x0, 0x41, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r6, 0x9) 1.273204781s ago: executing program 0 (id=15916): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYRES32=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000001600), 0x42fffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000740)='mm_page_alloc\x00', r0, 0x0, 0xd}, 0x18) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r3) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)=ANY=[@ANYBLOB="8a4f30a3b27e9eed4edf210af981f88102f2e4beaa414bdf07676e1a11015a25ce9c10fbf25eff61475c3544f2bce4537faf87421dae9993d7d0bdd2e07300544927e42de685ff72112b2ee0efbd9f43709ede373ff7359a1b7bea8103d6d6c8f1e35af974895a6e5bc65be5fbb22703b1dc4e1afddc622c2ab7f9a8c0642406e5a7bd24a15bb0451cc2b75f57d5d6e271a5fc618b9a80d770e2b9b2c87b1f43166af2bc987822c5add32bb005f8b2dfcc1e0b75", @ANYRES16=r4, @ANYBLOB="01002dbd7040000000001e0000000800010000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4024044) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000200000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0x63e4b27f, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000005000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000000192f300a3c500009500000000000000aed6510ff7c6b54e8d7bcc89e8144d015cc5b34fe4035dcda193bfb9e401cb80e3e431ec85d7b1da4310edbc8a708fe23cf9e2471a2b0f5e5a763909410f54cd778334544b4646cf546f8abf18068dec8e6a18b4df34e4"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYRES8=r5], 0x10c}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000004840)={0x2ff, 0xa}) execveat(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={[&(0x7f0000000180)='+-&-},.{\x00']}, 0x0, 0x1000) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) write$selinux_create(0xffffffffffffffff, &(0x7f0000000580)=@objname={'system_u:object_r:var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x1, 0x20, './file0\x00'}, 0x61) sendmsg$nl_xfrm(r6, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000040)=ANY=[@ANYBLOB="44010000100001000000000800000000fc0100000000000000000000000000000a01010000000000000000000000000000000000200000000000202032000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff000000000000000000000000000000006c000000ac1414bb00000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000100000000000000000000000000000000004000000000000000d000000000000000a0000000000000000000000000000000000000000000000000000000a0001070000000000000000480003006465666c61746500000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000b00"], 0x144}}, 0x20000000) shmctl$SHM_UNLOCK(0x0, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080)}, 0x106, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 1.183758473s ago: executing program 4 (id=15917): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x10, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT, @ANYBLOB="0000000000000000000000001804000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70300000003000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) wait4(0x0, 0x0, 0x40000000, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x4, &(0x7f0000000140)=0x0) io_submit(r5, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r4, &(0x7f0000000000), 0x4000}]) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)=0x0) timer_settime(r7, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r8, &(0x7f0000000000), 0x208e24b) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r9, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200878c5b4ce2dda10baaa2f2884600001c00000006750000000500000000100200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.102662384s ago: executing program 3 (id=15918): socket$igmp6(0xa, 0x3, 0x3a) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) creat(&(0x7f0000000100)='./file0\x00', 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYRES32], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x1) r4 = memfd_create(&(0x7f00000001c0)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb80x0}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r9, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r10, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r8], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) r11 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r11, 0x6, 0x23, &(0x7f0000000040)=""/36, &(0x7f0000000200)=0x24) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0xd004, &(0x7f0000000380)={[{@barrier_val={'barrier', 0x3d, 0x4}}]}, 0x1, 0x4a3, &(0x7f0000000d00)="$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") 977.752246ms ago: executing program 0 (id=15919): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x10) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r5, 0x1, &(0x7f0000001c00)=[&(0x7f0000000400)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r4, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x1000, 0x0) ioctl$SNAPSHOT_FREE(r6, 0x3305) 955.323846ms ago: executing program 3 (id=15920): socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x22c01) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f82818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 884.098697ms ago: executing program 1 (id=15921): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x1, 0x3000) msgsnd(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="00000000000000379d6ca1cc117d8b4ca26549173e362152995b1b89d6f8b8534f15b56fcb1b931a7c71681494f4c88e9856c191df5e7cc72bccfa5587b22bf480f804b0a41fc2b746877c2b933f53fc3de3934f75e717352bc7df2bbe4c6c37e8fb05ae6bea414e1ea7e50a3fffed74b7f88d2443474dda04cef63ad8ea336f5c507b9c52133f9f8526270d199ab779c3b91472a3de02ee80b3620c550904e6a0b214a2138e09fd45fc743f8567df044d3a9559b8ebc2f5f9e99cdc41c33b95a4512c620e891057bf7a869340367978f9d12c6e33475b98d378cc680a"], 0x8, 0x0) 798.087038ms ago: executing program 1 (id=15922): bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000082a36b187dc70000000033e18a9c38", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000007d0c6b7b110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$selinux_user(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t r'], 0x27) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000940), 0x81000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r3, 0x0, 0x4ab}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000}, {0x0, 0xffffffff}, {0x2, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff}, {}, {}, {}, {0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x1}, {0x80}, {0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x15, 0x0, 0x8510}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0xfffefffd}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, {0x0, 0x0, 0x200}, {}, {}, {0x5}, {0x0, 0x0, 0x6}, {}, {}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x9}, {0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x2}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0xffffffff, 0x4}, {}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {}, {0x1fd2, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, {0x2, 0x0, 0x20000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x0, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffe, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, {0x0, 0x8000}, {0x0, 0x0, 0x10000, 0x0, 0x0, 0x4}, {0x0, 0x80000000, 0x0, 0x7dff800}], [{}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x2}, {}, {}, {0x4}, {0x3}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) 786.240558ms ago: executing program 3 (id=15923): syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r2, 0x0, 0x0, 0x20004041, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x7}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=r4, @ANYBLOB="0900000000000000000002000000140001800500020001"], 0x28}}, 0x0) 743.433459ms ago: executing program 1 (id=15924): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0x0, 0xee01) setrlimit(0x40000000000008, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f00000001c0)={0x200000000000001}, 0x8) sendto$inet6(r2, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000018c0)={0x130, r7, 0xacf5e67dd0b583a1, 0x0, 0x25dfdbfd, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x8000}}}}, [@beacon=[@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x104, 0x3, "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"}]}]]}, 0x130}}, 0x24040010) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000004000000ff0f000007", @ANYRES16=r1], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000280)=""/140, 0x8c, 0x0, &(0x7f0000000200)}}, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c0001"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) rt_sigqueueinfo(0x0, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) mount$9p_tcp(0x0, &(0x7f0000000680)='.\x00', &(0x7f00000006c0), 0x8010, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=tcp']) 725.997579ms ago: executing program 1 (id=15925): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f00000002c0)=0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000009c0)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bond\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r3, 0x25, 0x4, @val=@tracing={0x0, 0x20000000}}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000a00)={'syztnl2\x00', 0x0, 0x10, 0x7800, 0x5, 0xfff, {{0x46, 0x4, 0x1, 0x3d, 0x118, 0x66, 0x0, 0x1, 0x4, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x2c}, {[@timestamp_addr={0x44, 0xc, 0x52, 0x1, 0x6, [{@private=0xa010101, 0x1}]}, @timestamp={0x44, 0x28, 0x7c, 0x0, 0x2, [0x7f, 0x4, 0x4, 0x6, 0x3, 0x5, 0x334, 0x8, 0x1ff]}, @lsrr={0x83, 0x2b, 0x4c, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @empty, @rand_addr=0x64010100, @multicast1, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}, @multicast1]}, @timestamp_prespec={0x44, 0x34, 0xc7, 0x3, 0x4, [{@remote, 0x5}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x6406b00f}, {@rand_addr=0x64010102, 0x5}, {@empty, 0x4867}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x5}, {@multicast1, 0x3}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x2c, 0x10, 0x3, 0x6, [{@remote, 0x40}, {@multicast1, 0x3}, {@multicast1, 0xb16}, {@loopback, 0x19}, {@remote, 0x3}]}, @generic={0x86, 0xb, "ed04322176227fa6d0"}, @end, @timestamp_prespec={0x44, 0x34, 0x7d, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x3}, {@remote, 0x10001}, {@broadcast, 0x10000}, {@remote, 0x3}, {@rand_addr=0x64010101, 0x1}, {@loopback, 0x3a5b}]}]}}}}}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001100010027bd7000fddbdf2500000000", @ANYRES32=r5, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x80) 699.82099ms ago: executing program 1 (id=15926): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='svcrdma_decode_short_err\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000c40)='./file0\x00', 0x808080, &(0x7f0000000c80)={[{@discard}, {@bh}, {@noblock_validity}]}, 0x2c, 0x52c, &(0x7f0000000640)="$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") syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x3800813, &(0x7f0000000e80)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c757466382c6f76657272696465726f636b7065726d2c6e6f6a6f6c6965742c6e6f6a6f6c6965742c6f76657272696465726f636b7065726d2c646d6f64653d3078303030303030303030303030303030332c6e6f636f6d70726573732c6d6f64653d3078303030303030303030303030303038302c686964652c626c6f636b3d3078303030303030303030303030303230302c6d61703d61636f726e2c6f76657272696465726f636b7065726d2c636865636b3d72656c617865642c6769643d6db3d9cdae9e11e94ee6d0f68e5a1a6d108ac29224f5552b159a788ca78dd579e8cbd29794046949c009efe121c4ace04cff1a2573080f306f41604b77041fcb9f86c865927a9b766f286a1d7dd8da63a2db812a90df85c518f86c9ab7c560bbba37c7bfa91cb63fd83232267b49e195586e5319a647d043f7fa8644532755bb20945bbc6284068f3a8c4f286cc47a2853430426a2647f73024b996940c81a2fa08b76d187961627b6198b2638517026c9857393897f4dca02e38fb73941f4925e8f516603", @ANYRESHEX=0x0, @ANYBLOB=',\x00'], 0x5, 0xa51, &(0x7f0000001240)="$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") name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000052000000030000005c5407000a0000000000000009000000"], &(0x7f0000000000), 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000008, &(0x7f00000003c0), 0xfc, 0x53e, &(0x7f0000000940)="$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") ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r3, 0xa, 0x13) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r4, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002b80)="b2", 0x1}], 0x1}, 0x4000) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r5}, 0x18) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 664.93282ms ago: executing program 1 (id=15927): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = fsopen(&(0x7f0000000100)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x1) fchdir(r5) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000200)='.\x00', 0x10000a0) 477.283493ms ago: executing program 0 (id=15928): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r5, 0x1, &(0x7f0000001c00)=[&(0x7f0000000400)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r4, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) clock_nanosleep(0x2, 0xfffffdfc, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x1000, 0x0) ioctl$SNAPSHOT_FREE(r6, 0x3305) syz_clone(0x40200080, 0x0, 0x0, 0x0, 0x0, 0x0) 434.607824ms ago: executing program 2 (id=15929): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYRES32=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000001600), 0x42fffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000740)='mm_page_alloc\x00', r0, 0x0, 0xd}, 0x18) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r3) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)=ANY=[@ANYBLOB="8a4f30a3b27e9eed4edf210af981f88102f2e4beaa414bdf07676e1a11015a25ce9c10fbf25eff61475c3544f2bce4537faf87421dae9993d7d0bdd2e07300544927e42de685ff72112b2ee0efbd9f43709ede373ff7359a1b7bea8103d6d6c8f1e35af974895a6e5bc65be5fbb22703b1dc4e1afddc622c2ab7f9a8c0642406e5a7bd24a15bb0451cc2b75f57d5d6e271a5fc618b9a80d770e2b9b2c87b1f43166af2bc987822c5add32bb005f8b2dfcc1e0b75", @ANYRES16=r4, @ANYBLOB="01002dbd7040000000001e0000000800010000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4024044) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000200000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0x63e4b27f, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000005000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000000192f300a3c500009500000000000000aed6510ff7c6b54e8d7bcc89e8144d015cc5b34fe4035dcda193bfb9e401cb80e3e431ec85d7b1da4310edbc8a708fe23cf9e2471a2b0f5e5a763909410f54cd778334544b4646cf546f8abf18068dec8e6a18b4df34e4"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYRES8=r5], 0x10c}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000004840)={0x2ff, 0xa}) execveat(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={[&(0x7f0000000180)='+-&-},.{\x00']}, 0x0, 0x1000) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) write$selinux_create(0xffffffffffffffff, &(0x7f0000000580)=@objname={'system_u:object_r:var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x1, 0x20, './file0\x00'}, 0x61) sendmsg$nl_xfrm(r6, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000040)=ANY=[@ANYBLOB="44010000100001000000000800000000fc0100000000000000000000000000000a01010000000000000000000000000000000000200000000000202032000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff000000000000000000000000000000006c000000ac1414bb00000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000100000000000000000000000000000000004000000000000000d000000000000000a0000000000000000000000000000000000000000000000000000000a0001070000000000000000480003006465666c61746500000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000b00"], 0x144}}, 0x20000000) shmctl$SHM_UNLOCK(0x0, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080)}, 0x106, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 214.267637ms ago: executing program 4 (id=15930): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x00\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb80x0}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r9, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r10, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r8], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) r11 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r11, 0x6, 0x23, &(0x7f0000000040)=""/36, &(0x7f0000000200)=0x24) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0xd004, &(0x7f0000000380)={[{@barrier_val={'barrier', 0x3d, 0x4}}]}, 0x1, 0x4a3, &(0x7f0000000d00)="$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") 79.997879ms ago: executing program 2 (id=15932): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0xf03, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x8, 0x0, 0x1003, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000008, &(0x7f00000003c0), 0xfc, 0x53e, &(0x7f0000000940)="$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") (fail_nth: 1) 0s ago: executing program 2 (id=15933): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0900000000000000000002000000140001800500020001"], 0x28}}, 0x0) kernel console output (not intermixed with test programs): 9] audit: type=1326 audit(907.239:254936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 907.368779][ T29] audit: type=1326 audit(907.269:254937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 907.392025][ T29] audit: type=1326 audit(907.269:254938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 907.415297][ T29] audit: type=1326 audit(907.269:254939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 907.438387][ T29] audit: type=1326 audit(907.269:254940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 907.461552][ T29] audit: type=1326 audit(907.279:254941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 907.484703][ T29] audit: type=1326 audit(907.279:254942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 907.508056][ T29] audit: type=1326 audit(907.279:254943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 907.531243][ T29] audit: type=1326 audit(907.309:254944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 907.554380][ T29] audit: type=1326 audit(907.309:254945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14560 comm="syz.3.14902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 907.936674][T14598] syzkaller0: entered promiscuous mode [ 907.942223][T14598] syzkaller0: entered allmulticast mode [ 908.160253][T14614] netlink: 20 bytes leftover after parsing attributes in process `syz.3.14918'. [ 908.395419][T14616] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14919'. [ 908.898649][T14638] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 908.958041][T14638] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 909.037517][T14638] bond0 (unregistering): Released all slaves [ 909.732205][T14645] syzkaller0: entered promiscuous mode [ 909.737870][T14645] syzkaller0: entered allmulticast mode [ 910.404923][T14673] __nla_validate_parse: 1 callbacks suppressed [ 910.404996][T14673] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14936'. [ 911.219106][T14712] netlink: 536 bytes leftover after parsing attributes in process `syz.1.14951'. [ 911.514169][T14715] netlink: 12 bytes leftover after parsing attributes in process `syz.1.14952'. [ 911.581011][T14724] netlink: 132 bytes leftover after parsing attributes in process `syz.4.14956'. [ 911.796456][T14735] netlink: 'syz.0.14960': attribute type 39 has an invalid length. [ 911.888401][T14740] netlink: 536 bytes leftover after parsing attributes in process `syz.2.14962'. [ 912.571994][T14747] syzkaller0: entered promiscuous mode [ 912.577555][T14747] syzkaller0: entered allmulticast mode [ 913.117282][ T29] kauditd_printk_skb: 1479 callbacks suppressed [ 913.117301][ T29] audit: type=1326 audit(913.009:256425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.133959][T14764] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14969'. [ 913.146873][ T29] audit: type=1326 audit(913.009:256426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.155899][T14764] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14969'. [ 913.179296][ T29] audit: type=1326 audit(913.009:256427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.211765][ T29] audit: type=1326 audit(913.009:256428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.235180][ T29] audit: type=1326 audit(913.009:256429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.258427][ T29] audit: type=1326 audit(913.009:256430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.281605][ T29] audit: type=1326 audit(913.009:256431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.304874][ T29] audit: type=1326 audit(913.009:256432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.328206][ T29] audit: type=1326 audit(913.009:256433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f828428e929 code=0x7ffc0000 [ 913.351485][ T29] audit: type=1326 audit(913.009:256434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14761 comm="syz.1.14966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f828428e963 code=0x7ffc0000 [ 913.963285][T14794] lo speed is unknown, defaulting to 1000 [ 914.001807][T14800] netlink: 'syz.1.14980': attribute type 39 has an invalid length. [ 914.488947][T14815] netlink: 132 bytes leftover after parsing attributes in process `syz.1.14984'. [ 915.410677][T14833] netlink: 'syz.4.14991': attribute type 39 has an invalid length. [ 915.966031][T14856] netlink: 12 bytes leftover after parsing attributes in process `syz.1.14998'. [ 915.991958][T14859] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14859 comm=syz.4.14999 [ 916.073537][T14861] netlink: 'syz.1.15000': attribute type 3 has an invalid length. [ 916.128180][T14864] netlink: 'syz.4.15002': attribute type 39 has an invalid length. [ 916.167281][T14867] netlink: 'syz.1.15003': attribute type 39 has an invalid length. [ 916.285285][T14873] Restarting kernel threads ... [ 916.296575][T14873] Done restarting kernel threads. [ 916.412173][T14876] lo speed is unknown, defaulting to 1000 [ 916.554600][T14880] netlink: 12 bytes leftover after parsing attributes in process `syz.4.15006'. [ 916.661831][T14889] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15009'. [ 916.906408][T14899] netlink: 536 bytes leftover after parsing attributes in process `syz.2.15013'. [ 916.970463][T14902] netlink: 'syz.0.15015': attribute type 39 has an invalid length. [ 917.244990][T14920] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15019'. [ 917.385659][T14918] netlink: 12 bytes leftover after parsing attributes in process `syz.1.15018'. [ 917.840653][T14925] netlink: 8 bytes leftover after parsing attributes in process `syz.0.15021'. [ 918.109456][T14928] lo speed is unknown, defaulting to 1000 [ 918.204934][ T29] kauditd_printk_skb: 1089 callbacks suppressed [ 918.205027][ T29] audit: type=1326 audit(918.179:257524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.234963][ T29] audit: type=1326 audit(918.179:257525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.361089][T14943] netlink: 'syz.2.15027': attribute type 39 has an invalid length. [ 918.372904][ T29] audit: type=1326 audit(918.179:257526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.396184][ T29] audit: type=1326 audit(918.179:257527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.419507][ T29] audit: type=1326 audit(918.179:257528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.442821][ T29] audit: type=1326 audit(918.179:257529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.465933][ T29] audit: type=1326 audit(918.179:257530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.489287][ T29] audit: type=1326 audit(918.179:257531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.512561][ T29] audit: type=1326 audit(918.179:257532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 918.535790][ T29] audit: type=1326 audit(918.179:257533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14934 comm="syz.3.15025" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fdc1040e963 code=0x7ffc0000 [ 918.980469][T14952] netlink: 532 bytes leftover after parsing attributes in process `syz.2.15031'. [ 919.140921][T14957] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15033'. [ 919.193129][T14961] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15036'. [ 919.225937][T14955] Restarting kernel threads ... [ 919.241589][T14955] Done restarting kernel threads. [ 919.281715][T14949] lo speed is unknown, defaulting to 1000 [ 919.920599][T14987] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14987 comm=syz.4.15044 [ 920.257057][T15008] netlink: 'syz.1.15052': attribute type 39 has an invalid length. [ 921.554723][T15050] __nla_validate_parse: 1 callbacks suppressed [ 921.554746][T15050] netlink: 12 bytes leftover after parsing attributes in process `syz.3.15067'. [ 921.852109][T15063] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15070'. [ 922.026461][T15067] FAULT_INJECTION: forcing a failure. [ 922.026461][T15067] name failslab, interval 1, probability 0, space 0, times 0 [ 922.039361][T15067] CPU: 0 UID: 0 PID: 15067 Comm: syz.3.15073 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 922.039397][T15067] Tainted: [W]=WARN [ 922.039406][T15067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 922.039439][T15067] Call Trace: [ 922.039444][T15067] [ 922.039451][T15067] __dump_stack+0x1d/0x30 [ 922.039471][T15067] dump_stack_lvl+0xe8/0x140 [ 922.039489][T15067] dump_stack+0x15/0x1b [ 922.039507][T15067] should_fail_ex+0x265/0x280 [ 922.039604][T15067] should_failslab+0x8c/0xb0 [ 922.039671][T15067] kmem_cache_alloc_noprof+0x50/0x310 [ 922.039703][T15067] ? audit_log_start+0x365/0x6c0 [ 922.039742][T15067] audit_log_start+0x365/0x6c0 [ 922.039790][T15067] audit_seccomp+0x48/0x100 [ 922.039856][T15067] ? __seccomp_filter+0x68c/0x10d0 [ 922.039937][T15067] __seccomp_filter+0x69d/0x10d0 [ 922.039966][T15067] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 922.040001][T15067] ? vfs_write+0x75e/0x8e0 [ 922.040115][T15067] __secure_computing+0x82/0x150 [ 922.040142][T15067] syscall_trace_enter+0xcf/0x1e0 [ 922.040173][T15067] do_syscall_64+0xac/0x200 [ 922.040195][T15067] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 922.040296][T15067] ? clear_bhb_loop+0x40/0x90 [ 922.040316][T15067] ? clear_bhb_loop+0x40/0x90 [ 922.040341][T15067] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 922.040413][T15067] RIP: 0033:0x7fdc1040e929 [ 922.040430][T15067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 922.040448][T15067] RSP: 002b:00007fdc0ea77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000026 [ 922.040468][T15067] RAX: ffffffffffffffda RBX: 00007fdc10635fa0 RCX: 00007fdc1040e929 [ 922.040514][T15067] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 922.040530][T15067] RBP: 00007fdc0ea77090 R08: 0000000000000000 R09: 0000000000000000 [ 922.040544][T15067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 922.040555][T15067] R13: 0000000000000000 R14: 00007fdc10635fa0 R15: 00007ffdedba0888 [ 922.040574][T15067] [ 922.813777][T15086] netlink: 12 bytes leftover after parsing attributes in process `syz.3.15079'. [ 922.893595][T15090] netlink: 48 bytes leftover after parsing attributes in process `syz.4.15080'. [ 922.934224][T15090] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.102847][T15101] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15101 comm=syz.4.15083 [ 923.141711][T15094] lo speed is unknown, defaulting to 1000 [ 923.214913][ T29] kauditd_printk_skb: 793 callbacks suppressed [ 923.214931][ T29] audit: type=1326 audit(923.179:258325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fadc908e929 code=0x7ffc0000 [ 923.317919][ T29] audit: type=1326 audit(923.189:258326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fadc908e963 code=0x7ffc0000 [ 923.341219][ T29] audit: type=1326 audit(923.189:258327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fadc908d3df code=0x7ffc0000 [ 923.364380][ T29] audit: type=1326 audit(923.189:258328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fadc908e9b7 code=0x7ffc0000 [ 923.387630][ T29] audit: type=1326 audit(923.189:258329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fadc908d290 code=0x7ffc0000 [ 923.411103][ T29] audit: type=1326 audit(923.189:258330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fadc908d58a code=0x7ffc0000 [ 923.434134][ T29] audit: type=1326 audit(923.189:258331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadc908e929 code=0x7ffc0000 [ 923.457477][ T29] audit: type=1326 audit(923.189:258332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadc908e929 code=0x7ffc0000 [ 923.480858][ T29] audit: type=1326 audit(923.199:258333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fadc908e929 code=0x7ffc0000 [ 923.504023][ T29] audit: type=1326 audit(923.199:258334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15103 comm="syz.4.15084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadc908e929 code=0x7ffc0000 [ 923.847131][T15112] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15086'. [ 923.923340][T15116] netlink: 36 bytes leftover after parsing attributes in process `syz.1.15087'. [ 924.695033][T15133] lo speed is unknown, defaulting to 1000 [ 924.730083][T15143] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15143 comm=syz.2.15094 [ 924.758376][T31910] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.825173][T31910] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.858411][T15133] chnl_net:caif_netlink_parms(): no params data found [ 924.917583][T31910] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.999931][T15133] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.007240][T15133] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.043731][T15133] bridge_slave_0: entered allmulticast mode [ 925.055207][T15133] bridge_slave_0: entered promiscuous mode [ 925.074073][T31910] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.096185][T15133] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.103870][T15133] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.121266][T15133] bridge_slave_1: entered allmulticast mode [ 925.135810][T15133] bridge_slave_1: entered promiscuous mode [ 925.178763][T15133] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 925.207198][T15133] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 925.272045][T15133] team0: Port device team_slave_0 added [ 925.293791][T15133] team0: Port device team_slave_1 added [ 925.341187][T31910] bridge_slave_1: left promiscuous mode [ 925.347159][T31910] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.379961][T31910] bridge_slave_0: left allmulticast mode [ 925.385762][T31910] bridge_slave_0: left promiscuous mode [ 925.391492][T31910] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.585283][T15168] netlink: 12 bytes leftover after parsing attributes in process `syz.1.15101'. [ 925.603595][T15133] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 925.610659][T15133] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 925.636696][T15133] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 925.655229][T15133] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 925.662376][T15133] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 925.688602][T15133] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 925.701637][T31910] IPVS: stopping backup sync thread 6787 ... [ 925.753497][T15133] hsr_slave_0: entered promiscuous mode [ 925.760274][T15133] hsr_slave_1: entered promiscuous mode [ 925.768691][T15133] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 925.776481][T15133] Cannot create hsr debugfs directory [ 925.786695][T31910] hsr_slave_0: left promiscuous mode [ 925.792842][T31910] hsr_slave_1: left promiscuous mode [ 925.798800][T31910] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 925.806311][T31910] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 925.821184][T31910] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 925.829153][T31910] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 925.844705][T31910] veth1_vlan: left promiscuous mode [ 925.989292][T15179] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15179 comm=syz.3.15104 [ 926.022433][ T3379] lo speed is unknown, defaulting to 1000 [ 926.028359][ T3379] infiniband syz0: ib_query_port failed (-19) [ 926.236964][T15133] 8021q: adding VLAN 0 to HW filter on device bond0 [ 926.264878][T15133] 8021q: adding VLAN 0 to HW filter on device team0 [ 926.275018][T15195] netlink: 16 bytes leftover after parsing attributes in process `syz.2.15107'. [ 926.287230][ T148] bridge0: port 1(bridge_slave_0) entered blocking state [ 926.294437][ T148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 926.356489][T31910] bridge0: port 2(bridge_slave_1) entered blocking state [ 926.363721][T31910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 926.483091][T15133] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 926.634928][T15133] veth0_vlan: entered promiscuous mode [ 926.646076][T15133] veth1_vlan: entered promiscuous mode [ 926.664522][T15197] Restarting kernel threads ... [ 926.669544][T15133] veth0_macvtap: entered promiscuous mode [ 926.679403][T15197] Done restarting kernel threads. [ 926.679820][T15133] veth1_macvtap: entered promiscuous mode [ 926.705240][T15133] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 926.715570][T15216] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15109'. [ 926.727583][T15133] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 926.955557][T15224] SELinux: syz.2.15111 (15224) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 927.229077][T15229] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15112'. [ 927.238126][T15229] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15112'. [ 927.428405][T15241] netlink: 16 bytes leftover after parsing attributes in process `syz.0.15117'. [ 927.482890][T15247] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15247 comm=syz.2.15115 [ 927.495926][T15247] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15247 comm=syz.2.15115 [ 927.837594][T15266] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15124'. [ 927.846989][T15266] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15124'. [ 927.917065][T15273] SELinux: syz.4.15127 (15273) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 928.202506][T15284] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15284 comm=syz.4.15131 [ 928.215332][T15284] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15284 comm=syz.4.15131 [ 928.216588][T15282] netlink: 16 bytes leftover after parsing attributes in process `syz.2.15130'. [ 928.237330][ T29] kauditd_printk_skb: 1431 callbacks suppressed [ 928.237351][ T29] audit: type=1326 audit(928.209:259766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 928.267443][ T29] audit: type=1326 audit(928.209:259767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb9d243ab19 code=0x7ffc0000 [ 928.291138][ T29] audit: type=1326 audit(928.209:259768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9d249e929 code=0x7ffc0000 [ 928.315337][ T29] audit: type=1326 audit(928.289:259769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 928.338699][ T29] audit: type=1326 audit(928.289:259770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb9d243ab19 code=0x7ffc0000 [ 928.361906][ T29] audit: type=1326 audit(928.289:259771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9d249e929 code=0x7ffc0000 [ 928.386330][ T29] audit: type=1326 audit(928.359:259772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 928.409705][ T29] audit: type=1326 audit(928.359:259773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb9d243ab19 code=0x7ffc0000 [ 928.432903][ T29] audit: type=1326 audit(928.359:259774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9d249e929 code=0x7ffc0000 [ 928.457405][ T29] audit: type=1326 audit(928.359:259775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15259 comm="syz.0.15122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 928.485420][T15286] netlink: 'syz.4.15132': attribute type 39 has an invalid length. [ 928.826975][T15302] FAULT_INJECTION: forcing a failure. [ 928.826975][T15302] name failslab, interval 1, probability 0, space 0, times 0 [ 928.840126][T15302] CPU: 0 UID: 0 PID: 15302 Comm: syz.2.15138 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 928.840197][T15302] Tainted: [W]=WARN [ 928.840204][T15302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 928.840220][T15302] Call Trace: [ 928.840227][T15302] [ 928.840235][T15302] __dump_stack+0x1d/0x30 [ 928.840261][T15302] dump_stack_lvl+0xe8/0x140 [ 928.840284][T15302] dump_stack+0x15/0x1b [ 928.840305][T15302] should_fail_ex+0x265/0x280 [ 928.840408][T15302] should_failslab+0x8c/0xb0 [ 928.840432][T15302] kmem_cache_alloc_noprof+0x50/0x310 [ 928.840524][T15302] ? getname_flags+0x80/0x3b0 [ 928.840551][T15302] getname_flags+0x80/0x3b0 [ 928.840577][T15302] __x64_sys_mkdir+0x33/0x50 [ 928.840689][T15302] x64_sys_call+0x2289/0x2fb0 [ 928.840715][T15302] do_syscall_64+0xd2/0x200 [ 928.840736][T15302] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 928.840854][T15302] ? clear_bhb_loop+0x40/0x90 [ 928.840877][T15302] ? clear_bhb_loop+0x40/0x90 [ 928.840902][T15302] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 928.840990][T15302] RIP: 0033:0x7fc654d2e929 [ 928.841009][T15302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 928.841033][T15302] RSP: 002b:00007fc653397038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 928.841121][T15302] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2e929 [ 928.841177][T15302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 928.841192][T15302] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 928.841208][T15302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 928.841223][T15302] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 928.841247][T15302] [ 929.146437][T15314] syzkaller0: entered promiscuous mode [ 929.149778][T15304] Restarting kernel threads ... [ 929.151951][T15314] syzkaller0: entered allmulticast mode [ 929.157320][T15304] Done restarting kernel threads. [ 929.252260][T15319] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15142'. [ 929.261312][T15319] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15142'. [ 930.082610][T15347] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15153'. [ 930.210070][T15351] syzkaller0: entered promiscuous mode [ 930.215716][T15351] syzkaller0: entered allmulticast mode [ 930.966205][T15387] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15387 comm=syz.0.15167 [ 930.979068][T15387] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15387 comm=syz.0.15167 [ 931.198302][T15393] syzkaller0: entered promiscuous mode [ 931.203930][T15393] syzkaller0: entered allmulticast mode [ 931.438129][T15402] random: crng reseeded on system resumption [ 931.949613][T15421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15421 comm=syz.4.15178 [ 931.962518][T15421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15421 comm=syz.4.15178 [ 932.004571][T15423] FAULT_INJECTION: forcing a failure. [ 932.004571][T15423] name failslab, interval 1, probability 0, space 0, times 0 [ 932.017491][T15423] CPU: 0 UID: 0 PID: 15423 Comm: syz.2.15179 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 932.017558][T15423] Tainted: [W]=WARN [ 932.017567][T15423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 932.017582][T15423] Call Trace: [ 932.017589][T15423] [ 932.017598][T15423] __dump_stack+0x1d/0x30 [ 932.017623][T15423] dump_stack_lvl+0xe8/0x140 [ 932.017723][T15423] dump_stack+0x15/0x1b [ 932.017744][T15423] should_fail_ex+0x265/0x280 [ 932.017788][T15423] should_failslab+0x8c/0xb0 [ 932.017809][T15423] kmem_cache_alloc_noprof+0x50/0x310 [ 932.017833][T15423] ? audit_log_start+0x365/0x6c0 [ 932.017905][T15423] audit_log_start+0x365/0x6c0 [ 932.017947][T15423] audit_seccomp+0x48/0x100 [ 932.017979][T15423] ? __seccomp_filter+0x68c/0x10d0 [ 932.018000][T15423] __seccomp_filter+0x69d/0x10d0 [ 932.018021][T15423] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 932.018094][T15423] ? vfs_write+0x75e/0x8e0 [ 932.018128][T15423] ? __rcu_read_unlock+0x4f/0x70 [ 932.018216][T15423] ? __fget_files+0x184/0x1c0 [ 932.018237][T15423] __secure_computing+0x82/0x150 [ 932.018272][T15423] syscall_trace_enter+0xcf/0x1e0 [ 932.018303][T15423] do_syscall_64+0xac/0x200 [ 932.018349][T15423] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 932.018373][T15423] ? clear_bhb_loop+0x40/0x90 [ 932.018454][T15423] ? clear_bhb_loop+0x40/0x90 [ 932.018475][T15423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 932.018498][T15423] RIP: 0033:0x7fc654d2e929 [ 932.018517][T15423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 932.018593][T15423] RSP: 002b:00007fc653397038 EFLAGS: 00000246 ORIG_RAX: 00000000000000cc [ 932.018654][T15423] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2e929 [ 932.018670][T15423] RDX: 0000200000000300 RSI: 0000000000000008 RDI: 0000000000000000 [ 932.018723][T15423] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 932.018738][T15423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 932.018754][T15423] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 932.018780][T15423] [ 932.400316][T15420] Restarting kernel threads ... [ 932.405555][T15420] Done restarting kernel threads. [ 932.733052][T15449] syzkaller0: entered promiscuous mode [ 932.738724][T15449] syzkaller0: entered allmulticast mode [ 933.144674][T15469] netlink: 'syz.4.15195': attribute type 39 has an invalid length. [ 933.243923][ T29] kauditd_printk_skb: 1799 callbacks suppressed [ 933.243940][ T29] audit: type=1326 audit(933.219:261573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15446 comm="syz.3.15188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 933.273551][ T29] audit: type=1326 audit(933.219:261575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15446 comm="syz.3.15188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 933.296684][ T29] audit: type=1326 audit(933.219:261574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15435 comm="syz.0.15184" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 933.319833][ T29] audit: type=1326 audit(933.219:261576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15446 comm="syz.3.15188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 933.384429][T15474] __nla_validate_parse: 3 callbacks suppressed [ 933.384448][T15474] netlink: 8 bytes leftover after parsing attributes in process `syz.4.15196'. [ 933.405869][ T29] audit: type=1326 audit(933.219:261577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.2.15191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc654d258e7 code=0x7ffc0000 [ 933.429362][ T29] audit: type=1326 audit(933.219:261578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.2.15191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc654ccab19 code=0x7ffc0000 [ 933.452566][ T29] audit: type=1326 audit(933.219:261579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15457 comm="syz.2.15191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 933.475884][ T29] audit: type=1326 audit(933.219:261580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15446 comm="syz.3.15188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 933.499520][ T29] audit: type=1326 audit(933.219:261581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15446 comm="syz.3.15188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 933.522766][ T29] audit: type=1326 audit(933.219:261582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15446 comm="syz.3.15188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 933.571906][T15476] syzkaller0: entered promiscuous mode [ 933.577499][T15476] syzkaller0: entered allmulticast mode [ 933.609541][T15479] IPv6: sit1: Disabled Multicast RS [ 933.900551][T15494] qrtr: Invalid version 91 [ 934.005464][T15508] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15508 comm=syz.2.15210 [ 934.018210][T15508] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15508 comm=syz.2.15210 [ 934.096524][T15514] syzkaller0: entered promiscuous mode [ 934.102176][T15514] syzkaller0: entered allmulticast mode [ 934.631685][T15531] Falling back ldisc for ptm0. [ 934.748754][T15548] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15548 comm=syz.4.15223 [ 934.761489][T15548] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15548 comm=syz.4.15223 [ 934.998305][T15561] netlink: 12 bytes leftover after parsing attributes in process `syz.0.15228'. [ 935.023429][T15568] Falling back ldisc for ptm0. [ 935.252878][T15590] netlink: 132 bytes leftover after parsing attributes in process `syz.0.15247'. [ 935.705945][T15612] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15244'. [ 935.976562][T15636] netlink: 8 bytes leftover after parsing attributes in process `syz.0.15254'. [ 935.985663][T15636] netlink: 8 bytes leftover after parsing attributes in process `syz.0.15254'. [ 936.613727][T15670] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15265'. [ 936.622779][T15670] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15265'. [ 936.695782][T15673] netlink: 'syz.2.15266': attribute type 39 has an invalid length. [ 936.744001][T15679] FAULT_INJECTION: forcing a failure. [ 936.744001][T15679] name failslab, interval 1, probability 0, space 0, times 0 [ 936.756918][T15679] CPU: 0 UID: 0 PID: 15679 Comm: syz.2.15269 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 936.756965][T15679] Tainted: [W]=WARN [ 936.756975][T15679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 936.756992][T15679] Call Trace: [ 936.757000][T15679] [ 936.757019][T15679] __dump_stack+0x1d/0x30 [ 936.757047][T15679] dump_stack_lvl+0xe8/0x140 [ 936.757067][T15679] dump_stack+0x15/0x1b [ 936.757117][T15679] should_fail_ex+0x265/0x280 [ 936.757146][T15679] should_failslab+0x8c/0xb0 [ 936.757245][T15679] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 936.757309][T15679] ? sock_alloc_inode+0x34/0xa0 [ 936.757342][T15679] ? __pfx_sock_alloc_inode+0x10/0x10 [ 936.757438][T15679] sock_alloc_inode+0x34/0xa0 [ 936.757555][T15679] alloc_inode+0x3d/0x170 [ 936.757595][T15679] __sock_create+0x122/0x5b0 [ 936.757630][T15679] __sys_socketpair+0x170/0x430 [ 936.757665][T15679] __x64_sys_socketpair+0x52/0x60 [ 936.757769][T15679] x64_sys_call+0x23f2/0x2fb0 [ 936.757872][T15679] do_syscall_64+0xd2/0x200 [ 936.757891][T15679] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 936.757919][T15679] ? clear_bhb_loop+0x40/0x90 [ 936.757966][T15679] ? clear_bhb_loop+0x40/0x90 [ 936.757989][T15679] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 936.758010][T15679] RIP: 0033:0x7fc654d3087a [ 936.758026][T15679] Code: 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 35 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 936.758063][T15679] RSP: 002b:00007fc653396f78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 936.758084][T15679] RAX: ffffffffffffffda RBX: 00007fc654f55f00 RCX: 00007fc654d3087a [ 936.758097][T15679] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 936.758161][T15679] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 936.758182][T15679] R10: 00007fc653396f98 R11: 0000000000000246 R12: 0000000000000001 [ 936.758195][T15679] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 936.758215][T15679] [ 936.758229][T15679] socket: no more sockets [ 936.788834][T15683] FAULT_INJECTION: forcing a failure. [ 936.788834][T15683] name failslab, interval 1, probability 0, space 0, times 0 [ 936.980133][T15683] CPU: 1 UID: 0 PID: 15683 Comm: syz.0.15270 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 936.980164][T15683] Tainted: [W]=WARN [ 936.980172][T15683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 936.980188][T15683] Call Trace: [ 936.980199][T15683] [ 936.980209][T15683] __dump_stack+0x1d/0x30 [ 936.980234][T15683] dump_stack_lvl+0xe8/0x140 [ 936.980252][T15683] dump_stack+0x15/0x1b [ 936.980266][T15683] should_fail_ex+0x265/0x280 [ 936.980341][T15683] should_failslab+0x8c/0xb0 [ 936.980361][T15683] kmem_cache_alloc_node_noprof+0x57/0x320 [ 936.980385][T15683] ? __alloc_skb+0x101/0x320 [ 936.980411][T15683] __alloc_skb+0x101/0x320 [ 936.980498][T15683] netlink_alloc_large_skb+0xba/0xf0 [ 936.980525][T15683] netlink_sendmsg+0x3cf/0x6b0 [ 936.980548][T15683] ? __pfx_netlink_sendmsg+0x10/0x10 [ 936.980573][T15683] __sock_sendmsg+0x145/0x180 [ 936.980637][T15683] ____sys_sendmsg+0x31e/0x4e0 [ 936.980669][T15683] ___sys_sendmsg+0x17b/0x1d0 [ 936.980805][T15683] __x64_sys_sendmsg+0xd4/0x160 [ 936.980925][T15683] x64_sys_call+0x2999/0x2fb0 [ 936.980944][T15683] do_syscall_64+0xd2/0x200 [ 936.980960][T15683] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 936.980984][T15683] ? clear_bhb_loop+0x40/0x90 [ 936.981021][T15683] ? clear_bhb_loop+0x40/0x90 [ 936.981103][T15683] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 936.981122][T15683] RIP: 0033:0x7fb9d249e929 [ 936.981179][T15683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 936.981196][T15683] RSP: 002b:00007fb9d0b07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 936.981212][T15683] RAX: ffffffffffffffda RBX: 00007fb9d26c5fa0 RCX: 00007fb9d249e929 [ 936.981224][T15683] RDX: 0000000000000080 RSI: 00002000000002c0 RDI: 0000000000000003 [ 936.981235][T15683] RBP: 00007fb9d0b07090 R08: 0000000000000000 R09: 0000000000000000 [ 936.981276][T15683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 936.981293][T15683] R13: 0000000000000000 R14: 00007fb9d26c5fa0 R15: 00007fff8690f838 [ 936.981318][T15683] [ 937.298297][T15699] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15276'. [ 937.307554][T15699] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15276'. [ 937.405022][T15703] netlink: 'syz.1.15278': attribute type 39 has an invalid length. [ 937.447072][T15706] syzkaller0: entered promiscuous mode [ 937.452655][T15706] syzkaller0: entered allmulticast mode [ 937.975860][T15741] syzkaller0: entered promiscuous mode [ 937.981389][T15741] syzkaller0: entered allmulticast mode [ 938.253874][ T29] kauditd_printk_skb: 1062 callbacks suppressed [ 938.253905][ T29] audit: type=1326 audit(938.229:262645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 938.290850][ T29] audit: type=1326 audit(938.229:262646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 938.314246][ T29] audit: type=1326 audit(938.229:262647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 938.332232][T15763] syzkaller0: entered promiscuous mode [ 938.337609][ T29] audit: type=1326 audit(938.239:262648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 938.343222][T15763] syzkaller0: entered allmulticast mode [ 938.366279][ T29] audit: type=1326 audit(938.239:262649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 938.395204][ T29] audit: type=1326 audit(938.239:262650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 938.418557][ T29] audit: type=1326 audit(938.249:262651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 938.441826][ T29] audit: type=1326 audit(938.249:262652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fdc103aab19 code=0x7ffc0000 [ 938.465048][ T29] audit: type=1326 audit(938.249:262653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc1040e929 code=0x7ffc0000 [ 938.488268][ T29] audit: type=1326 audit(938.259:262654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15726 comm="syz.3.15287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fdc104058e7 code=0x7ffc0000 [ 938.579628][T15766] __nla_validate_parse: 4 callbacks suppressed [ 938.579651][T15766] netlink: 12 bytes leftover after parsing attributes in process `syz.4.15303'. [ 938.707682][T15767] chnl_net:caif_netlink_parms(): no params data found [ 938.831917][T15767] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.839099][T15767] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.847363][T15767] bridge_slave_0: entered allmulticast mode [ 938.854107][T15767] bridge_slave_0: entered promiscuous mode [ 938.861178][T15767] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.868417][T15767] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.876485][T15767] bridge_slave_1: entered allmulticast mode [ 938.883139][T15767] bridge_slave_1: entered promiscuous mode [ 938.916105][T15767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 938.927529][T15767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 938.951780][T15800] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15309'. [ 938.960936][T15800] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15309'. [ 938.980858][T15767] team0: Port device team_slave_0 added [ 938.998086][T15767] team0: Port device team_slave_1 added [ 939.029633][T15767] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 939.036695][T15767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 939.062790][T15767] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 939.074145][T15767] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 939.081110][T15767] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 939.107242][T15767] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 939.119308][T15806] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15312'. [ 939.153438][T31910] bridge_slave_1: left allmulticast mode [ 939.159213][T31910] bridge_slave_1: left promiscuous mode [ 939.164997][T31910] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.184503][T31910] bridge_slave_0: left allmulticast mode [ 939.190333][T31910] bridge_slave_0: left promiscuous mode [ 939.196118][T31910] bridge0: port 1(bridge_slave_0) entered disabled state [ 939.403680][T15767] hsr_slave_0: entered promiscuous mode [ 939.410456][T15767] hsr_slave_1: entered promiscuous mode [ 939.418360][T15767] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 939.426134][T15767] Cannot create hsr debugfs directory [ 939.436335][T31910] IPVS: stopping backup sync thread 6905 ... [ 939.448094][T31910] hsr_slave_0: left promiscuous mode [ 939.467224][T31910] hsr_slave_1: left promiscuous mode [ 939.472939][T31910] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 939.481346][T31910] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 939.514883][T31910] team0 (unregistering): Port device team_slave_1 removed [ 939.524998][T31910] team0 (unregistering): Port device team_slave_0 removed [ 939.592843][T15824] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15315'. [ 939.601938][T15824] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15315'. [ 939.670882][T15830] netlink: 'syz.3.15318': attribute type 39 has an invalid length. [ 939.713871][T15767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 939.757334][T15767] 8021q: adding VLAN 0 to HW filter on device team0 [ 939.786774][T31912] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.793949][T31912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.833808][T15829] netlink: 12 bytes leftover after parsing attributes in process `syz.4.15317'. [ 939.848631][T31922] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.855863][T31922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 939.876869][T15767] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 939.887301][T15767] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 940.065693][T15852] netlink: 'syz.4.15322': attribute type 39 has an invalid length. [ 940.067583][T15767] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 940.112839][T15857] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15323'. [ 940.323850][T15878] program syz.0.15328 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 940.389469][T15767] veth0_vlan: entered promiscuous mode [ 940.399566][T15767] veth1_vlan: entered promiscuous mode [ 940.416497][T15767] veth0_macvtap: entered promiscuous mode [ 940.424429][T15767] veth1_macvtap: entered promiscuous mode [ 940.436966][T15878] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 940.440426][T15767] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 940.462481][T15767] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 940.500085][T15878] netlink: 20 bytes leftover after parsing attributes in process `syz.0.15328'. [ 940.561521][T15891] netlink: 'syz.4.15329': attribute type 39 has an invalid length. [ 940.924126][ T148] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.010991][T15906] chnl_net:caif_netlink_parms(): no params data found [ 941.032260][ T148] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.063529][T15906] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.070767][T15906] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.092440][T15906] bridge_slave_0: entered allmulticast mode [ 941.104560][T15906] bridge_slave_0: entered promiscuous mode [ 941.116412][ T148] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.128305][T15906] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.135528][T15906] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.143608][T15906] bridge_slave_1: entered allmulticast mode [ 941.150788][T15906] bridge_slave_1: entered promiscuous mode [ 941.171746][T15906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 941.195352][ T148] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 941.227331][T15906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 941.238208][T15930] netlink: 132 bytes leftover after parsing attributes in process `syz.0.15339'. [ 941.266110][T15906] team0: Port device team_slave_0 added [ 941.278248][T15906] team0: Port device team_slave_1 added [ 941.314252][T15906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 941.321301][T15906] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 941.347331][T15906] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 941.420053][T15906] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 941.427097][T15906] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 941.453157][T15906] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 941.582649][T15906] hsr_slave_0: entered promiscuous mode [ 941.589946][T15906] hsr_slave_1: entered promiscuous mode [ 941.597741][T15906] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 941.605739][T15906] Cannot create hsr debugfs directory [ 941.642571][ T148] bridge_slave_1: left allmulticast mode [ 941.648399][ T148] bridge_slave_1: left promiscuous mode [ 941.654087][ T148] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.684603][ T148] bridge_slave_0: left allmulticast mode [ 941.690366][ T148] bridge_slave_0: left promiscuous mode [ 941.696255][ T148] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.715344][T15936] netlink: 'syz.4.15341': attribute type 39 has an invalid length. [ 941.935455][ T148] IPVS: stopping backup sync thread 6341 ... [ 941.957023][T15945] netlink: 'syz.4.15343': attribute type 3 has an invalid length. [ 941.977774][ T148] hsr_slave_0: left promiscuous mode [ 941.996959][ T148] hsr_slave_1: left promiscuous mode [ 942.005956][ T148] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 942.013566][ T148] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 942.045511][ T148] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 942.053081][ T148] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 942.087803][ T148] veth1_vlan: left promiscuous mode [ 942.105445][ T148] veth0_vlan: left promiscuous mode [ 942.250067][ T148] team0 (unregistering): Port device team_slave_1 removed [ 942.270899][ T148] team0 (unregistering): Port device team_slave_0 removed [ 942.600748][T15906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 942.662269][T15906] 8021q: adding VLAN 0 to HW filter on device team0 [ 942.707202][T31905] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.714387][T31905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 942.755514][T31905] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.762806][T31905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 942.860231][T15906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 942.867826][T15964] Restarting kernel threads ... [ 942.883875][T15964] Done restarting kernel threads. [ 943.099086][T15906] veth0_vlan: entered promiscuous mode [ 943.135997][T15906] veth1_vlan: entered promiscuous mode [ 943.168085][T15906] veth0_macvtap: entered promiscuous mode [ 943.194272][T15906] veth1_macvtap: entered promiscuous mode [ 943.218241][T15906] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 943.240725][T15906] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 943.264690][ T29] kauditd_printk_skb: 1793 callbacks suppressed [ 943.264706][ T29] audit: type=1326 audit(943.239:264448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15978 comm="syz.0.15351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 943.294249][ T29] audit: type=1326 audit(943.239:264449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15978 comm="syz.0.15351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb9d243ab19 code=0x7ffc0000 [ 943.317608][ T29] audit: type=1326 audit(943.239:264450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15978 comm="syz.0.15351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9d249e929 code=0x7ffc0000 [ 943.447000][ T29] audit: type=1326 audit(943.309:264451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15989 comm="syz.1.15354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 943.470350][ T29] audit: type=1326 audit(943.309:264452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15989 comm="syz.1.15354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 943.493528][ T29] audit: type=1326 audit(943.309:264453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15989 comm="syz.1.15354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 943.516728][ T29] audit: type=1326 audit(943.309:264454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15989 comm="syz.1.15354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 943.540057][ T29] audit: type=1326 audit(943.309:264455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15989 comm="syz.1.15354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 943.563248][ T29] audit: type=1326 audit(943.309:264456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15989 comm="syz.1.15354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 943.586694][ T29] audit: type=1326 audit(943.319:264457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15978 comm="syz.0.15351" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 943.895551][T16014] __nla_validate_parse: 4 callbacks suppressed [ 943.895595][T16014] netlink: 12 bytes leftover after parsing attributes in process `syz.3.15358'. [ 944.121429][T16026] FAULT_INJECTION: forcing a failure. [ 944.121429][T16026] name failslab, interval 1, probability 0, space 0, times 0 [ 944.134160][T16026] CPU: 1 UID: 0 PID: 16026 Comm: syz.1.15361 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 944.134270][T16026] Tainted: [W]=WARN [ 944.134277][T16026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 944.134289][T16026] Call Trace: [ 944.134297][T16026] [ 944.134305][T16026] __dump_stack+0x1d/0x30 [ 944.134327][T16026] dump_stack_lvl+0xe8/0x140 [ 944.134376][T16026] dump_stack+0x15/0x1b [ 944.134391][T16026] should_fail_ex+0x265/0x280 [ 944.134421][T16026] should_failslab+0x8c/0xb0 [ 944.134450][T16026] kmem_cache_alloc_noprof+0x50/0x310 [ 944.134545][T16026] ? skb_clone+0x151/0x1f0 [ 944.134568][T16026] skb_clone+0x151/0x1f0 [ 944.134643][T16026] __netlink_deliver_tap+0x2c9/0x500 [ 944.134680][T16026] netlink_unicast+0x653/0x680 [ 944.134763][T16026] netlink_sendmsg+0x58b/0x6b0 [ 944.134789][T16026] ? __pfx_netlink_sendmsg+0x10/0x10 [ 944.134833][T16026] __sock_sendmsg+0x145/0x180 [ 944.134864][T16026] ____sys_sendmsg+0x31e/0x4e0 [ 944.134904][T16026] ___sys_sendmsg+0x17b/0x1d0 [ 944.134953][T16026] __x64_sys_sendmsg+0xd4/0x160 [ 944.135076][T16026] x64_sys_call+0x2999/0x2fb0 [ 944.135104][T16026] do_syscall_64+0xd2/0x200 [ 944.135127][T16026] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 944.135161][T16026] ? clear_bhb_loop+0x40/0x90 [ 944.135253][T16026] ? clear_bhb_loop+0x40/0x90 [ 944.135281][T16026] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 944.135307][T16026] RIP: 0033:0x7f126442e929 [ 944.135326][T16026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 944.135350][T16026] RSP: 002b:00007f1262a76038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 944.135458][T16026] RAX: ffffffffffffffda RBX: 00007f1264656080 RCX: 00007f126442e929 [ 944.135472][T16026] RDX: 0000000000000040 RSI: 00002000000007c0 RDI: 000000000000000d [ 944.135484][T16026] RBP: 00007f1262a76090 R08: 0000000000000000 R09: 0000000000000000 [ 944.135496][T16026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 944.135508][T16026] R13: 0000000000000000 R14: 00007f1264656080 R15: 00007ffde1be99b8 [ 944.135567][T16026] [ 944.373272][T16026] netlink: 28 bytes leftover after parsing attributes in process `syz.1.15361'. [ 944.483605][T16023] Restarting kernel threads ... [ 944.488620][T16023] Done restarting kernel threads. [ 944.708050][T16035] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15365'. [ 944.804322][T16042] FAULT_INJECTION: forcing a failure. [ 944.804322][T16042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 944.817598][T16042] CPU: 0 UID: 0 PID: 16042 Comm: syz.4.15368 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 944.817698][T16042] Tainted: [W]=WARN [ 944.817877][T16042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 944.817895][T16042] Call Trace: [ 944.817903][T16042] [ 944.817911][T16042] __dump_stack+0x1d/0x30 [ 944.817932][T16042] dump_stack_lvl+0xe8/0x140 [ 944.817990][T16042] dump_stack+0x15/0x1b [ 944.818011][T16042] should_fail_ex+0x265/0x280 [ 944.818073][T16042] should_fail+0xb/0x20 [ 944.818237][T16042] should_fail_usercopy+0x1a/0x20 [ 944.818282][T16042] strncpy_from_user+0x25/0x230 [ 944.818312][T16042] ? kmem_cache_alloc_noprof+0x186/0x310 [ 944.818378][T16042] ? getname_flags+0x80/0x3b0 [ 944.818400][T16042] getname_flags+0xae/0x3b0 [ 944.818421][T16042] user_path_at+0x28/0x130 [ 944.818529][T16042] __x64_sys_umount+0x85/0xe0 [ 944.818651][T16042] x64_sys_call+0x2915/0x2fb0 [ 944.818674][T16042] do_syscall_64+0xd2/0x200 [ 944.818691][T16042] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 944.818721][T16042] ? clear_bhb_loop+0x40/0x90 [ 944.818743][T16042] ? clear_bhb_loop+0x40/0x90 [ 944.818810][T16042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 944.818848][T16042] RIP: 0033:0x7ffbb4a7e929 [ 944.818915][T16042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 944.818938][T16042] RSP: 002b:00007ffbb30e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 944.818958][T16042] RAX: ffffffffffffffda RBX: 00007ffbb4ca5fa0 RCX: 00007ffbb4a7e929 [ 944.818970][T16042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000002c0 [ 944.818982][T16042] RBP: 00007ffbb30e7090 R08: 0000000000000000 R09: 0000000000000000 [ 944.819018][T16042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 944.819034][T16042] R13: 0000000000000000 R14: 00007ffbb4ca5fa0 R15: 00007ffda38ba1d8 [ 944.819058][T16042] [ 945.374406][T16051] Restarting kernel threads ... [ 945.383119][T16051] Done restarting kernel threads. [ 945.515181][T16056] netlink: 12 bytes leftover after parsing attributes in process `syz.1.15372'. [ 945.636957][T16072] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15377'. [ 945.646036][T16072] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15377'. [ 945.744265][T16078] team0: No ports can be present during mode change [ 945.751888][T16079] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15380'. [ 945.790287][T16078] netlink: 20 bytes leftover after parsing attributes in process `syz.1.15380'. [ 945.802855][T16078] netlink: 20 bytes leftover after parsing attributes in process `syz.1.15380'. [ 945.812451][T16087] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15383'. [ 945.883700][T16070] Restarting kernel threads ... [ 945.895105][T16070] Done restarting kernel threads. [ 946.435647][T16105] Restarting kernel threads ... [ 946.447288][T16105] Done restarting kernel threads. [ 947.150127][T16157] Restarting kernel threads ... [ 947.155311][T16157] Done restarting kernel threads. [ 948.108576][T16244] netlink: 'syz.3.15412': attribute type 39 has an invalid length. [ 948.306490][ T29] kauditd_printk_skb: 807 callbacks suppressed [ 948.306508][ T29] audit: type=1400 audit(948.279:265263): avc: denied { read write } for pid=16249 comm="syz.0.15415" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 948.336034][ T29] audit: type=1400 audit(948.279:265264): avc: denied { open } for pid=16249 comm="syz.0.15415" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 948.457758][ T29] audit: type=1326 audit(948.389:265265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.481175][ T29] audit: type=1326 audit(948.389:265266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.504856][ T29] audit: type=1326 audit(948.399:265267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.528477][ T29] audit: type=1326 audit(948.399:265268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.551726][ T29] audit: type=1326 audit(948.399:265269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.575715][ T29] audit: type=1326 audit(948.399:265270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.599026][ T29] audit: type=1326 audit(948.399:265271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 948.622472][ T29] audit: type=1326 audit(948.399:265272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16255 comm="syz.4.15417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 949.263272][T16275] __nla_validate_parse: 9 callbacks suppressed [ 949.263293][T16275] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15423'. [ 949.545142][T16291] vhci_hcd: invalid port number 176 [ 949.549582][T16284] syzkaller0: entered promiscuous mode [ 949.556147][T16284] syzkaller0: entered allmulticast mode [ 949.801618][T16308] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15435'. [ 949.956704][T16320] netlink: 14 bytes leftover after parsing attributes in process `syz.0.15439'. [ 950.047953][T16322] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15440'. [ 950.057146][T16322] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15440'. [ 950.271841][T16328] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 950.282897][T16328] SELinux: failed to load policy [ 950.496566][T16341] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.15446'. [ 950.989787][T16370] netlink: 14 bytes leftover after parsing attributes in process `syz.4.15456'. [ 951.105353][T16370] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 951.124964][T16370] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 951.140126][T16370] bond0 (unregistering): Released all slaves [ 951.189610][T16379] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15459'. [ 951.229400][T16383] FAULT_INJECTION: forcing a failure. [ 951.229400][T16383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 951.242589][T16383] CPU: 1 UID: 0 PID: 16383 Comm: syz.2.15461 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 951.242634][T16383] Tainted: [W]=WARN [ 951.242642][T16383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 951.242655][T16383] Call Trace: [ 951.242664][T16383] [ 951.242674][T16383] __dump_stack+0x1d/0x30 [ 951.242701][T16383] dump_stack_lvl+0xe8/0x140 [ 951.242788][T16383] dump_stack+0x15/0x1b [ 951.242810][T16383] should_fail_ex+0x265/0x280 [ 951.242847][T16383] should_fail+0xb/0x20 [ 951.242883][T16383] should_fail_usercopy+0x1a/0x20 [ 951.242920][T16383] _copy_from_user+0x1c/0xb0 [ 951.242938][T16383] __sys_bind+0x106/0x2a0 [ 951.242976][T16383] __x64_sys_bind+0x3f/0x50 [ 951.243006][T16383] x64_sys_call+0x2086/0x2fb0 [ 951.243033][T16383] do_syscall_64+0xd2/0x200 [ 951.243055][T16383] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 951.243167][T16383] ? clear_bhb_loop+0x40/0x90 [ 951.243198][T16383] ? clear_bhb_loop+0x40/0x90 [ 951.243230][T16383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.243256][T16383] RIP: 0033:0x7fc654d2e929 [ 951.243273][T16383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 951.243352][T16383] RSP: 002b:00007fc653397038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 951.243371][T16383] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2e929 [ 951.243388][T16383] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000003 [ 951.243401][T16383] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 951.243483][T16383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 951.243567][T16383] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 951.243603][T16383] [ 952.093146][T16415] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 952.397622][T16431] netlink: 16 bytes leftover after parsing attributes in process `syz.1.15472'. [ 952.540893][T16437] (unnamed net_device) (uninitialized): invalid ARP target 0.0.0.0 specified for addition [ 952.550992][T16437] (unnamed net_device) (uninitialized): option arp_ip_target: invalid value (0) [ 952.684515][T16447] netlink: 'syz.2.15483': attribute type 39 has an invalid length. [ 952.736313][T16451] netlink: 'syz.2.15485': attribute type 1 has an invalid length. [ 952.827120][T16457] SELinux: security_context_str_to_sid () failed with errno=-22 [ 952.873748][T16452] Restarting kernel threads ... [ 952.889331][T16452] Done restarting kernel threads. [ 953.313519][ T29] kauditd_printk_skb: 2172 callbacks suppressed [ 953.313538][ T29] audit: type=1326 audit(953.279:267443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16464 comm="syz.0.15489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 953.343011][ T29] audit: type=1326 audit(953.279:267444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16464 comm="syz.0.15489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb9d243ab19 code=0x7ffc0000 [ 953.366361][ T29] audit: type=1326 audit(953.279:267445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16464 comm="syz.0.15489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9d249e929 code=0x7ffc0000 [ 953.396443][ T29] audit: type=1326 audit(953.289:267446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16464 comm="syz.0.15489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb9d24958e7 code=0x7ffc0000 [ 953.419676][ T29] audit: type=1326 audit(953.289:267447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16464 comm="syz.0.15489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb9d243ab19 code=0x7ffc0000 [ 953.442922][ T29] audit: type=1326 audit(953.289:267448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16464 comm="syz.0.15489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9d249e929 code=0x7ffc0000 [ 953.466246][ T29] audit: type=1326 audit(953.289:267449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16473 comm="syz.1.15492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 953.489343][ T29] audit: type=1326 audit(953.289:267450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16473 comm="syz.1.15492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 953.512590][ T29] audit: type=1326 audit(953.289:267451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16473 comm="syz.1.15492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 953.535800][ T29] audit: type=1326 audit(953.299:267452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16473 comm="syz.1.15492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 954.254417][T16511] Restarting kernel threads ... [ 954.259616][T16511] Done restarting kernel threads. [ 954.292786][T16518] __nla_validate_parse: 5 callbacks suppressed [ 954.292817][T16518] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 954.452386][T16531] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15511'. [ 954.461508][T16531] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15511'. [ 954.546958][T16536] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15513'. [ 954.764443][T16546] netlink: 'syz.1.15517': attribute type 39 has an invalid length. [ 954.849263][T16542] netlink: 12 bytes leftover after parsing attributes in process `syz.3.15516'. [ 954.953719][T16554] netlink: 16 bytes leftover after parsing attributes in process `syz.1.15518'. [ 954.963002][T16554] netlink: 16 bytes leftover after parsing attributes in process `syz.1.15518'. [ 955.584945][T16596] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15526'. [ 955.734542][T16605] netlink: 'syz.2.15527': attribute type 1 has an invalid length. [ 955.742454][T16605] netlink: 224 bytes leftover after parsing attributes in process `syz.2.15527'. [ 955.841863][T16615] netlink: 14 bytes leftover after parsing attributes in process `syz.1.15529'. [ 956.043851][T16615] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 956.076943][T16615] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 956.091442][T16615] bond0 (unregistering): Released all slaves [ 956.449590][T16692] netlink: 'syz.2.15539': attribute type 1 has an invalid length. [ 956.752036][T16729] SELinux: syz.0.15550 (16729) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 957.214590][T16757] Restarting kernel threads ... [ 957.225906][T16757] Done restarting kernel threads. [ 957.462525][T16777] netlink: 'syz.4.15554': attribute type 1 has an invalid length. [ 957.784330][T16827] FAULT_INJECTION: forcing a failure. [ 957.784330][T16827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 957.797869][T16827] CPU: 0 UID: 0 PID: 16827 Comm: syz.2.15563 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 957.797904][T16827] Tainted: [W]=WARN [ 957.797911][T16827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 957.797924][T16827] Call Trace: [ 957.797931][T16827] [ 957.797985][T16827] __dump_stack+0x1d/0x30 [ 957.798012][T16827] dump_stack_lvl+0xe8/0x140 [ 957.798037][T16827] dump_stack+0x15/0x1b [ 957.798056][T16827] should_fail_ex+0x265/0x280 [ 957.798138][T16827] should_fail+0xb/0x20 [ 957.798171][T16827] should_fail_usercopy+0x1a/0x20 [ 957.798208][T16827] _copy_to_user+0x20/0xa0 [ 957.798262][T16827] simple_read_from_buffer+0xb5/0x130 [ 957.798297][T16827] proc_fail_nth_read+0x100/0x140 [ 957.798410][T16827] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 957.798448][T16827] vfs_read+0x19d/0x6f0 [ 957.798484][T16827] ? __rcu_read_unlock+0x4f/0x70 [ 957.798548][T16827] ? __fget_files+0x184/0x1c0 [ 957.798575][T16827] ksys_read+0xda/0x1a0 [ 957.798663][T16827] __x64_sys_read+0x40/0x50 [ 957.798695][T16827] x64_sys_call+0x2d77/0x2fb0 [ 957.798721][T16827] do_syscall_64+0xd2/0x200 [ 957.798809][T16827] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 957.798871][T16827] ? clear_bhb_loop+0x40/0x90 [ 957.798892][T16827] ? clear_bhb_loop+0x40/0x90 [ 957.798916][T16827] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 957.798942][T16827] RIP: 0033:0x7fc654d2d33c [ 957.798961][T16827] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 957.798984][T16827] RSP: 002b:00007fc653397030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 957.799049][T16827] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2d33c [ 957.799062][T16827] RDX: 000000000000000f RSI: 00007fc6533970a0 RDI: 0000000000000004 [ 957.799078][T16827] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 957.799094][T16827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 957.799110][T16827] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 957.799135][T16827] [ 958.323780][ T29] kauditd_printk_skb: 1594 callbacks suppressed [ 958.323798][ T29] audit: type=1326 audit(958.299:269047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc654d258e7 code=0x7ffc0000 [ 958.356058][ T29] audit: type=1326 audit(958.329:269048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc654ccab19 code=0x7ffc0000 [ 958.379295][ T29] audit: type=1326 audit(958.329:269049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc654d258e7 code=0x7ffc0000 [ 958.402432][ T29] audit: type=1326 audit(958.329:269050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc654ccab19 code=0x7ffc0000 [ 958.425655][ T29] audit: type=1326 audit(958.329:269051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 958.448880][ T29] audit: type=1326 audit(958.329:269052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16806 comm="syz.3.15555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe78c7e58e7 code=0x7ffc0000 [ 958.472441][ T29] audit: type=1326 audit(958.329:269053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16806 comm="syz.3.15555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe78c78ab19 code=0x7ffc0000 [ 958.495723][ T29] audit: type=1326 audit(958.329:269054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16806 comm="syz.3.15555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe78c7ee929 code=0x7ffc0000 [ 958.545104][ T29] audit: type=1326 audit(958.499:269055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc654d258e7 code=0x7ffc0000 [ 958.568367][ T29] audit: type=1326 audit(958.499:269056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16830 comm="syz.2.15564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc654ccab19 code=0x7ffc0000 [ 958.602094][T16850] netlink: 'syz.4.15571': attribute type 1 has an invalid length. [ 958.693465][T16851] Restarting kernel threads ... [ 958.698761][T16851] Done restarting kernel threads. [ 958.851535][T16862] FAULT_INJECTION: forcing a failure. [ 958.851535][T16862] name failslab, interval 1, probability 0, space 0, times 0 [ 958.864494][T16862] CPU: 0 UID: 0 PID: 16862 Comm: syz.3.15575 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 958.864542][T16862] Tainted: [W]=WARN [ 958.864552][T16862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 958.864582][T16862] Call Trace: [ 958.864611][T16862] [ 958.864621][T16862] __dump_stack+0x1d/0x30 [ 958.864650][T16862] dump_stack_lvl+0xe8/0x140 [ 958.864675][T16862] dump_stack+0x15/0x1b [ 958.864730][T16862] should_fail_ex+0x265/0x280 [ 958.864776][T16862] should_failslab+0x8c/0xb0 [ 958.864802][T16862] kmem_cache_alloc_node_noprof+0x57/0x320 [ 958.864829][T16862] ? __alloc_skb+0x101/0x320 [ 958.864893][T16862] __alloc_skb+0x101/0x320 [ 958.864928][T16862] netlink_alloc_large_skb+0xba/0xf0 [ 958.865022][T16862] netlink_sendmsg+0x3cf/0x6b0 [ 958.865043][T16862] ? __pfx_netlink_sendmsg+0x10/0x10 [ 958.865071][T16862] __sock_sendmsg+0x145/0x180 [ 958.865096][T16862] ____sys_sendmsg+0x31e/0x4e0 [ 958.865152][T16862] ___sys_sendmsg+0x17b/0x1d0 [ 958.865213][T16862] __x64_sys_sendmsg+0xd4/0x160 [ 958.865255][T16862] x64_sys_call+0x2999/0x2fb0 [ 958.865282][T16862] do_syscall_64+0xd2/0x200 [ 958.865321][T16862] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 958.865355][T16862] ? clear_bhb_loop+0x40/0x90 [ 958.865382][T16862] ? clear_bhb_loop+0x40/0x90 [ 958.865404][T16862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 958.865428][T16862] RIP: 0033:0x7fe78c7ee929 [ 958.865448][T16862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 958.865549][T16862] RSP: 002b:00007fe78ae57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 958.865576][T16862] RAX: ffffffffffffffda RBX: 00007fe78ca15fa0 RCX: 00007fe78c7ee929 [ 958.865592][T16862] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000007 [ 958.865604][T16862] RBP: 00007fe78ae57090 R08: 0000000000000000 R09: 0000000000000000 [ 958.865617][T16862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 958.865629][T16862] R13: 0000000000000000 R14: 00007fe78ca15fa0 R15: 00007ffcb2782b88 [ 958.865650][T16862] [ 958.871933][T16860] bridge_slave_0: left allmulticast mode [ 959.092101][T16860] bridge_slave_0: left promiscuous mode [ 959.097895][T16860] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.107923][T16860] bridge_slave_1: left allmulticast mode [ 959.113669][T16860] bridge_slave_1: left promiscuous mode [ 959.119551][T16860] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.131485][T16860] team0: Port device team_slave_0 removed [ 959.140474][T16860] team0: Port device team_slave_1 removed [ 959.149438][T16860] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 959.157148][T16860] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 959.166245][T16860] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 959.173970][T16860] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 959.322138][T16882] netlink: 'syz.1.15582': attribute type 1 has an invalid length. [ 959.330181][T16882] __nla_validate_parse: 13 callbacks suppressed [ 959.330195][T16882] netlink: 224 bytes leftover after parsing attributes in process `syz.1.15582'. [ 959.352969][T16884] netlink: 108 bytes leftover after parsing attributes in process `syz.2.15583'. [ 959.362259][T16884] netlink: 108 bytes leftover after parsing attributes in process `syz.2.15583'. [ 959.371650][T16884] netlink: 108 bytes leftover after parsing attributes in process `syz.2.15583'. [ 959.453430][T16891] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15584'. [ 959.462504][T16891] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15584'. [ 959.485923][T16892] netlink: 14 bytes leftover after parsing attributes in process `syz.2.15585'. [ 959.495989][T16890] netlink: 8 bytes leftover after parsing attributes in process `syz.4.15586'. [ 959.505036][T16890] netlink: 8 bytes leftover after parsing attributes in process `syz.4.15586'. [ 959.808907][T16907] FAULT_INJECTION: forcing a failure. [ 959.808907][T16907] name failslab, interval 1, probability 0, space 0, times 0 [ 959.821737][T16907] CPU: 0 UID: 0 PID: 16907 Comm: syz.2.15592 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 959.821774][T16907] Tainted: [W]=WARN [ 959.821780][T16907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 959.821792][T16907] Call Trace: [ 959.821799][T16907] [ 959.821808][T16907] __dump_stack+0x1d/0x30 [ 959.821833][T16907] dump_stack_lvl+0xe8/0x140 [ 959.821857][T16907] dump_stack+0x15/0x1b [ 959.821876][T16907] should_fail_ex+0x265/0x280 [ 959.821970][T16907] should_failslab+0x8c/0xb0 [ 959.821997][T16907] kmem_cache_alloc_noprof+0x50/0x310 [ 959.822027][T16907] ? skb_clone+0x151/0x1f0 [ 959.822195][T16907] skb_clone+0x151/0x1f0 [ 959.822217][T16907] __netlink_deliver_tap+0x2c9/0x500 [ 959.822264][T16907] netlink_unicast+0x653/0x680 [ 959.822408][T16907] netlink_sendmsg+0x58b/0x6b0 [ 959.822441][T16907] ? __pfx_netlink_sendmsg+0x10/0x10 [ 959.822462][T16907] __sock_sendmsg+0x145/0x180 [ 959.822560][T16907] ____sys_sendmsg+0x31e/0x4e0 [ 959.822595][T16907] ___sys_sendmsg+0x17b/0x1d0 [ 959.822705][T16907] __x64_sys_sendmsg+0xd4/0x160 [ 959.822769][T16907] x64_sys_call+0x2999/0x2fb0 [ 959.822797][T16907] do_syscall_64+0xd2/0x200 [ 959.822819][T16907] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 959.823035][T16907] ? clear_bhb_loop+0x40/0x90 [ 959.823056][T16907] ? clear_bhb_loop+0x40/0x90 [ 959.823076][T16907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 959.823097][T16907] RIP: 0033:0x7fc654d2e929 [ 959.823157][T16907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 959.823186][T16907] RSP: 002b:00007fc653397038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 959.823209][T16907] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2e929 [ 959.823225][T16907] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000004 [ 959.823241][T16907] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 959.823256][T16907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 959.823321][T16907] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 959.823343][T16907] [ 959.824868][T16911] netlink: 'syz.0.15594': attribute type 1 has an invalid length. [ 960.049673][T16911] netlink: 224 bytes leftover after parsing attributes in process `syz.0.15594'. [ 960.082805][T16926] FAULT_INJECTION: forcing a failure. [ 960.082805][T16926] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 960.096123][T16926] CPU: 0 UID: 0 PID: 16926 Comm: syz.3.15595 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 960.096164][T16926] Tainted: [W]=WARN [ 960.096171][T16926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 960.096185][T16926] Call Trace: [ 960.096193][T16926] [ 960.096255][T16926] __dump_stack+0x1d/0x30 [ 960.096282][T16926] dump_stack_lvl+0xe8/0x140 [ 960.096307][T16926] dump_stack+0x15/0x1b [ 960.096323][T16926] should_fail_ex+0x265/0x280 [ 960.096352][T16926] should_fail+0xb/0x20 [ 960.096524][T16926] should_fail_usercopy+0x1a/0x20 [ 960.096564][T16926] strncpy_from_user+0x25/0x230 [ 960.096628][T16926] ? __kmalloc_cache_noprof+0x189/0x320 [ 960.096665][T16926] __se_sys_memfd_create+0x1ff/0x590 [ 960.096709][T16926] __x64_sys_memfd_create+0x31/0x40 [ 960.096763][T16926] x64_sys_call+0x122f/0x2fb0 [ 960.096791][T16926] do_syscall_64+0xd2/0x200 [ 960.096813][T16926] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 960.096859][T16926] ? clear_bhb_loop+0x40/0x90 [ 960.096948][T16926] ? clear_bhb_loop+0x40/0x90 [ 960.096976][T16926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 960.097002][T16926] RIP: 0033:0x7fe78c7ee929 [ 960.097037][T16926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 960.097056][T16926] RSP: 002b:00007fe78ae2ce18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 960.097091][T16926] RAX: ffffffffffffffda RBX: 000000000000052e RCX: 00007fe78c7ee929 [ 960.097107][T16926] RDX: 00007fe78ae2cef0 RSI: 0000000000000000 RDI: 00007fe78c8714cc [ 960.097123][T16926] RBP: 0000200000000640 R08: 00007fe78ae2cbb7 R09: 00007fe78ae2ce40 [ 960.097138][T16926] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 960.097154][T16926] R13: 00007fe78ae2cef0 R14: 00007fe78ae2ceb0 R15: 00002000000001c0 [ 960.097177][T16926] [ 960.333684][T16926] vhci_hcd: invalid port number 176 [ 960.567154][T16959] FAULT_INJECTION: forcing a failure. [ 960.567154][T16959] name failslab, interval 1, probability 0, space 0, times 0 [ 960.580018][T16959] CPU: 0 UID: 0 PID: 16959 Comm: syz.1.15601 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 960.580062][T16959] Tainted: [W]=WARN [ 960.580079][T16959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 960.580095][T16959] Call Trace: [ 960.580104][T16959] [ 960.580114][T16959] __dump_stack+0x1d/0x30 [ 960.580140][T16959] dump_stack_lvl+0xe8/0x140 [ 960.580202][T16959] dump_stack+0x15/0x1b [ 960.580275][T16959] should_fail_ex+0x265/0x280 [ 960.580312][T16959] should_failslab+0x8c/0xb0 [ 960.580341][T16959] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 960.580378][T16959] ? trace_probe_init+0x1a2/0x280 [ 960.580437][T16959] ? should_failslab+0x8c/0xb0 [ 960.580464][T16959] kstrdup+0x3e/0xd0 [ 960.580488][T16959] trace_probe_init+0x1a2/0x280 [ 960.580517][T16959] alloc_trace_uprobe+0x8b/0x1e0 [ 960.580587][T16959] create_local_trace_uprobe+0xb5/0x2c0 [ 960.580620][T16959] perf_uprobe_init+0xc0/0x150 [ 960.580717][T16959] perf_uprobe_event_init+0xc4/0x140 [ 960.580747][T16959] perf_try_init_event+0xd9/0x540 [ 960.580777][T16959] ? perf_event_alloc+0xb1c/0x1680 [ 960.580821][T16959] perf_event_alloc+0xb27/0x1680 [ 960.580859][T16959] __se_sys_perf_event_open+0x4a5/0x11c0 [ 960.580959][T16959] ? __rcu_read_unlock+0x4f/0x70 [ 960.580994][T16959] __x64_sys_perf_event_open+0x67/0x80 [ 960.581075][T16959] x64_sys_call+0x27ec/0x2fb0 [ 960.581137][T16959] do_syscall_64+0xd2/0x200 [ 960.581190][T16959] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 960.581216][T16959] ? clear_bhb_loop+0x40/0x90 [ 960.581236][T16959] ? clear_bhb_loop+0x40/0x90 [ 960.581259][T16959] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 960.581286][T16959] RIP: 0033:0x7f126442e929 [ 960.581352][T16959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 960.581377][T16959] RSP: 002b:00007f1262a97038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 960.581402][T16959] RAX: ffffffffffffffda RBX: 00007f1264655fa0 RCX: 00007f126442e929 [ 960.581419][T16959] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 00002000000004c0 [ 960.581452][T16959] RBP: 00007f1262a97090 R08: 0000000000000000 R09: 0000000000000000 [ 960.581511][T16959] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 960.581534][T16959] R13: 0000000000000000 R14: 00007f1264655fa0 R15: 00007ffde1be99b8 [ 960.581559][T16959] [ 960.581579][T16959] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 961.396623][T17004] SELinux: security_context_str_to_sid () failed with errno=-22 [ 961.466937][T17011] unsupported nla_type 65024 [ 961.471742][T17012] xt_CT: You must specify a L4 protocol and not use inversions on it [ 962.291831][T17068] SELinux: security_context_str_to_sid () failed with errno=-22 [ 962.977003][T17162] FAULT_INJECTION: forcing a failure. [ 962.977003][T17162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 962.990459][T17162] CPU: 0 UID: 0 PID: 17162 Comm: syz.4.15630 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 962.990499][T17162] Tainted: [W]=WARN [ 962.990505][T17162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 962.990521][T17162] Call Trace: [ 962.990528][T17162] [ 962.990538][T17162] __dump_stack+0x1d/0x30 [ 962.990564][T17162] dump_stack_lvl+0xe8/0x140 [ 962.990589][T17162] dump_stack+0x15/0x1b [ 962.990614][T17162] should_fail_ex+0x265/0x280 [ 962.990725][T17162] should_fail+0xb/0x20 [ 962.990756][T17162] should_fail_usercopy+0x1a/0x20 [ 962.990836][T17162] _copy_from_user+0x1c/0xb0 [ 962.990919][T17162] __sys_bpf+0x178/0x790 [ 962.990962][T17162] __x64_sys_bpf+0x41/0x50 [ 962.990994][T17162] x64_sys_call+0x2478/0x2fb0 [ 962.991039][T17162] do_syscall_64+0xd2/0x200 [ 962.991062][T17162] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 962.991116][T17162] ? clear_bhb_loop+0x40/0x90 [ 962.991137][T17162] ? clear_bhb_loop+0x40/0x90 [ 962.991227][T17162] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 962.991253][T17162] RIP: 0033:0x7ffbb4a7e929 [ 962.991286][T17162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 962.991310][T17162] RSP: 002b:00007ffbb30e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 962.991334][T17162] RAX: ffffffffffffffda RBX: 00007ffbb4ca5fa0 RCX: 00007ffbb4a7e929 [ 962.991348][T17162] RDX: 0000000000000070 RSI: 0000200000000440 RDI: 0000000000000005 [ 962.991367][T17162] RBP: 00007ffbb30e7090 R08: 0000000000000000 R09: 0000000000000000 [ 962.991444][T17162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 962.991458][T17162] R13: 0000000000000000 R14: 00007ffbb4ca5fa0 R15: 00007ffda38ba1d8 [ 962.991481][T17162] [ 963.275862][T17173] FAULT_INJECTION: forcing a failure. [ 963.275862][T17173] name failslab, interval 1, probability 0, space 0, times 0 [ 963.288663][T17173] CPU: 1 UID: 0 PID: 17173 Comm: syz.2.15633 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 963.288760][T17173] Tainted: [W]=WARN [ 963.288768][T17173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 963.288784][T17173] Call Trace: [ 963.288793][T17173] [ 963.288868][T17173] __dump_stack+0x1d/0x30 [ 963.288891][T17173] dump_stack_lvl+0xe8/0x140 [ 963.288911][T17173] dump_stack+0x15/0x1b [ 963.288940][T17173] should_fail_ex+0x265/0x280 [ 963.288976][T17173] should_failslab+0x8c/0xb0 [ 963.288997][T17173] kmem_cache_alloc_noprof+0x50/0x310 [ 963.289020][T17173] ? radix_tree_node_alloc+0x8a/0x1f0 [ 963.289083][T17173] ? widen_string+0x42/0x210 [ 963.289114][T17173] radix_tree_node_alloc+0x8a/0x1f0 [ 963.289188][T17173] ? widen_string+0x42/0x210 [ 963.289220][T17173] idr_get_free+0x1fa/0x550 [ 963.289282][T17173] idr_alloc_u32+0xca/0x180 [ 963.289325][T17173] tcf_idr_check_alloc+0x193/0x240 [ 963.289349][T17173] tcf_police_init+0x1ca/0xc80 [ 963.289407][T17173] tcf_action_init_1+0x367/0x4a0 [ 963.289446][T17173] tcf_action_init+0x267/0x6d0 [ 963.289474][T17173] ? mark_reg_read+0x59/0x340 [ 963.289518][T17173] tc_ctl_action+0x291/0x830 [ 963.289622][T17173] ? __pfx_tc_ctl_action+0x10/0x10 [ 963.289653][T17173] rtnetlink_rcv_msg+0x657/0x6d0 [ 963.289686][T17173] netlink_rcv_skb+0x120/0x220 [ 963.289771][T17173] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 963.289846][T17173] rtnetlink_rcv+0x1c/0x30 [ 963.289871][T17173] netlink_unicast+0x5a5/0x680 [ 963.289907][T17173] netlink_sendmsg+0x58b/0x6b0 [ 963.289990][T17173] ? __pfx_netlink_sendmsg+0x10/0x10 [ 963.290048][T17173] __sock_sendmsg+0x145/0x180 [ 963.290071][T17173] ____sys_sendmsg+0x31e/0x4e0 [ 963.290178][T17173] ___sys_sendmsg+0x17b/0x1d0 [ 963.290222][T17173] __x64_sys_sendmsg+0xd4/0x160 [ 963.290343][T17173] x64_sys_call+0x2999/0x2fb0 [ 963.290367][T17173] do_syscall_64+0xd2/0x200 [ 963.290461][T17173] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 963.290506][T17173] ? clear_bhb_loop+0x40/0x90 [ 963.290579][T17173] ? clear_bhb_loop+0x40/0x90 [ 963.290612][T17173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 963.290639][T17173] RIP: 0033:0x7fc654d2e929 [ 963.290655][T17173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 963.290678][T17173] RSP: 002b:00007fc653397038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 963.290739][T17173] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2e929 [ 963.290752][T17173] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000005 [ 963.290763][T17173] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 963.290777][T17173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 963.290794][T17173] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 963.290813][T17173] [ 963.670429][ T29] kauditd_printk_skb: 930 callbacks suppressed [ 963.670515][ T29] audit: type=1326 audit(963.639:269987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.700260][ T29] audit: type=1326 audit(963.639:269988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.723455][ T29] audit: type=1326 audit(963.639:269989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.746762][ T29] audit: type=1326 audit(963.639:269990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.770031][ T29] audit: type=1326 audit(963.639:269991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.793211][ T29] audit: type=1326 audit(963.639:269992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.816594][ T29] audit: type=1326 audit(963.639:269993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 963.839861][ T29] audit: type=1326 audit(963.639:269994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f126442e963 code=0x7ffc0000 [ 963.862879][ T29] audit: type=1326 audit(963.639:269995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f126442d3df code=0x7ffc0000 [ 963.885879][ T29] audit: type=1326 audit(963.639:269996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17181 comm="syz.1.15637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f126442e9b7 code=0x7ffc0000 [ 963.997562][T17192] xt_CT: You must specify a L4 protocol and not use inversions on it [ 964.048516][ T3388] Process accounting resumed [ 964.536273][T17217] Restarting kernel threads ... [ 964.541353][T17217] Done restarting kernel threads. [ 964.651645][T17221] SELinux: syz.1.15648 (17221) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 964.758448][T17227] SELinux: security_context_str_to_sid () failed with errno=-22 [ 965.087812][T17242] __nla_validate_parse: 5 callbacks suppressed [ 965.087830][T17242] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15655'. [ 965.103156][T17242] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15655'. [ 965.168905][T17244] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15656'. [ 965.187229][T17247] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15657'. [ 965.201250][T17244] netlink: 'syz.1.15656': attribute type 10 has an invalid length. [ 965.238383][T17244] team0: Port device dummy0 added [ 965.254019][T17249] netlink: 'syz.1.15656': attribute type 10 has an invalid length. [ 965.284522][T17249] team0: Port device dummy0 removed [ 965.290328][T17204] netlink: 28 bytes leftover after parsing attributes in process `syz.3.15642'. [ 965.304678][T17244] netlink: 76 bytes leftover after parsing attributes in process `syz.1.15656'. [ 965.639123][T17260] FAULT_INJECTION: forcing a failure. [ 965.639123][T17260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 965.652453][T17260] CPU: 1 UID: 0 PID: 17260 Comm: syz.2.15660 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 965.652516][T17260] Tainted: [W]=WARN [ 965.652525][T17260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 965.652541][T17260] Call Trace: [ 965.652549][T17260] [ 965.652559][T17260] __dump_stack+0x1d/0x30 [ 965.652631][T17260] dump_stack_lvl+0xe8/0x140 [ 965.652651][T17260] dump_stack+0x15/0x1b [ 965.652667][T17260] should_fail_ex+0x265/0x280 [ 965.652703][T17260] should_fail+0xb/0x20 [ 965.652776][T17260] should_fail_usercopy+0x1a/0x20 [ 965.652834][T17260] _copy_to_user+0x20/0xa0 [ 965.652853][T17260] simple_read_from_buffer+0xb5/0x130 [ 965.652883][T17260] proc_fail_nth_read+0x100/0x140 [ 965.653036][T17260] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 965.653073][T17260] vfs_read+0x19d/0x6f0 [ 965.653115][T17260] ? __rcu_read_unlock+0x4f/0x70 [ 965.653142][T17260] ? __fget_files+0x184/0x1c0 [ 965.653171][T17260] ksys_read+0xda/0x1a0 [ 965.653212][T17260] __x64_sys_read+0x40/0x50 [ 965.653249][T17260] x64_sys_call+0x2d77/0x2fb0 [ 965.653295][T17260] do_syscall_64+0xd2/0x200 [ 965.653312][T17260] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 965.653419][T17260] ? clear_bhb_loop+0x40/0x90 [ 965.653440][T17260] ? clear_bhb_loop+0x40/0x90 [ 965.653466][T17260] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.653492][T17260] RIP: 0033:0x7fc654d2d33c [ 965.653539][T17260] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 965.653638][T17260] RSP: 002b:00007fc653397030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 965.653659][T17260] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2d33c [ 965.653675][T17260] RDX: 000000000000000f RSI: 00007fc6533970a0 RDI: 0000000000000004 [ 965.653690][T17260] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 965.653706][T17260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 965.653721][T17260] R13: 0000000000000000 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 965.653740][T17260] [ 965.877021][T17264] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15661'. [ 965.987774][T17267] netlink: 'syz.2.15664': attribute type 1 has an invalid length. [ 965.995810][T17267] netlink: 224 bytes leftover after parsing attributes in process `syz.2.15664'. [ 966.127603][T17273] netlink: 'syz.2.15666': attribute type 1 has an invalid length. [ 966.135564][T17273] netlink: 224 bytes leftover after parsing attributes in process `syz.2.15666'. [ 966.304536][T17280] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15668'. [ 967.524468][T17342] netlink: 'syz.4.15693': attribute type 1 has an invalid length. [ 967.646796][T17344] SELinux: syz.3.15694 (17344) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 968.673725][ T29] kauditd_printk_skb: 1387 callbacks suppressed [ 968.673743][ T29] audit: type=1326 audit(968.649:271384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 968.786894][ T29] audit: type=1326 audit(968.679:271385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 968.810062][ T29] audit: type=1326 audit(968.679:271386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 968.833322][ T29] audit: type=1326 audit(968.679:271387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 968.856579][ T29] audit: type=1326 audit(968.679:271388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 968.880200][ T29] audit: type=1326 audit(968.699:271389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 968.903318][ T29] audit: type=1326 audit(968.699:271390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 968.926564][ T29] audit: type=1326 audit(968.699:271391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f126442e929 code=0x7ffc0000 [ 968.950195][ T29] audit: type=1326 audit(968.699:271392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f12644258e7 code=0x7ffc0000 [ 968.973470][ T29] audit: type=1326 audit(968.699:271393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17379 comm="syz.1.15709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f12643cab19 code=0x7ffc0000 [ 969.688553][T17406] netlink: 'syz.1.15713': attribute type 1 has an invalid length. [ 970.030642][T17426] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 970.038257][T17426] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 970.072273][T17426] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 970.079814][T17426] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 970.120316][T17430] __nla_validate_parse: 6 callbacks suppressed [ 970.120336][T17430] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15722'. [ 970.172577][T17431] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15722'. [ 970.203317][T17429] netlink: zone id is out of range [ 970.214081][T17426] openvswitch: netlink: Message has 6 unknown bytes. [ 970.223347][T17430] netlink: 'syz.2.15722': attribute type 1 has an invalid length. [ 970.231221][T17430] netlink: 'syz.2.15722': attribute type 2 has an invalid length. [ 970.286370][T17427] netlink: 12 bytes leftover after parsing attributes in process `syz.1.15723'. [ 971.084558][T17417] netlink: 28 bytes leftover after parsing attributes in process `syz.0.15720'. [ 971.621288][T17557] netlink: 132 bytes leftover after parsing attributes in process `syz.2.15733'. [ 972.065738][T17567] Restarting kernel threads ... [ 972.080687][T17567] Done restarting kernel threads. [ 972.201457][T17590] SELinux: syz.2.15746 (17590) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 972.266445][T17593] netlink: 'syz.1.15747': attribute type 1 has an invalid length. [ 972.274484][T17593] netlink: 224 bytes leftover after parsing attributes in process `syz.1.15747'. [ 972.443647][T17608] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15752'. [ 972.818933][T17622] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15757'. [ 973.288033][T17648] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15767'. [ 973.553520][T17658] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15768'. [ 973.685225][T17657] Restarting kernel threads ... [ 973.699271][T17657] Done restarting kernel threads. [ 973.752026][T17687] SELinux: syz.3.15770 (17687) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 973.912500][ T29] kauditd_printk_skb: 1324 callbacks suppressed [ 973.912519][ T29] audit: type=1326 audit(973.879:272713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 973.964813][ T29] audit: type=1326 audit(973.879:272714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 973.988147][ T29] audit: type=1326 audit(973.879:272715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.011426][ T29] audit: type=1326 audit(973.879:272716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.034913][ T29] audit: type=1326 audit(973.879:272717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.058126][ T29] audit: type=1326 audit(973.879:272718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.082122][ T29] audit: type=1326 audit(973.879:272719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.105833][ T29] audit: type=1326 audit(973.879:272720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.129189][ T29] audit: type=1326 audit(973.879:272721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fc654d2e929 code=0x7ffc0000 [ 974.152634][ T29] audit: type=1326 audit(973.879:272722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17702 comm="syz.2.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fc654d2e963 code=0x7ffc0000 [ 974.753963][T17770] Restarting kernel threads ... [ 974.759156][T17770] Done restarting kernel threads. [ 974.769477][T17779] SELinux: security_context_str_to_sid () failed with errno=-22 [ 975.329311][T17848] netlink: '+}[@': attribute type 10 has an invalid length. [ 975.757465][T17906] SELinux: security_context_str_to_sid ( ) failed with errno=-22 [ 975.854710][T17918] netlink: 'syz.1.15809': attribute type 4 has an invalid length. [ 975.865178][T17919] netlink: 'syz.1.15809': attribute type 4 has an invalid length. [ 975.994155][T17927] __nla_validate_parse: 13 callbacks suppressed [ 975.994240][T17927] netlink: 132 bytes leftover after parsing attributes in process `syz.4.15812'. [ 976.007252][T17920] netlink: 12 bytes leftover after parsing attributes in process `syz.0.15810'. [ 976.214299][T17943] netlink: 16 bytes leftover after parsing attributes in process `syz.1.15818'. [ 976.245889][T17943] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 976.253642][T17943] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 976.279778][T17948] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15819'. [ 976.289078][T17948] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15819'. [ 976.299922][T17943] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 976.307560][T17943] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 976.632760][T17995] netlink: 14 bytes leftover after parsing attributes in process `syz.2.15827'. [ 977.056275][T18038] SELinux: security_context_str_to_sid () failed with errno=-22 [ 977.094043][T18056] netlink: 16 bytes leftover after parsing attributes in process `syz.0.15834'. [ 977.100377][T18054] netlink: 5 bytes leftover after parsing attributes in process `syz.2.15833'. [ 977.122999][T18054] 0ªX¹¦D: renamed from gretap0 (while UP) [ 977.142613][T18054] 0ªX¹¦D: entered allmulticast mode [ 977.161677][T18054] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 977.210260][T18071] netlink: 'syz.1.15838': attribute type 1 has an invalid length. [ 977.217907][T18073] FAULT_INJECTION: forcing a failure. [ 977.217907][T18073] name failslab, interval 1, probability 0, space 0, times 0 [ 977.218177][T18071] netlink: 224 bytes leftover after parsing attributes in process `syz.1.15838'. [ 977.230770][T18073] CPU: 1 UID: 0 PID: 18073 Comm: syz.2.15839 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 977.230813][T18073] Tainted: [W]=WARN [ 977.230822][T18073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 977.230841][T18073] Call Trace: [ 977.230850][T18073] [ 977.230934][T18073] __dump_stack+0x1d/0x30 [ 977.231025][T18073] dump_stack_lvl+0xe8/0x140 [ 977.231052][T18073] dump_stack+0x15/0x1b [ 977.231076][T18073] should_fail_ex+0x265/0x280 [ 977.231201][T18073] ? tty_open+0x81/0xaf0 [ 977.231236][T18073] should_failslab+0x8c/0xb0 [ 977.231313][T18073] __kmalloc_cache_noprof+0x4c/0x320 [ 977.231355][T18073] tty_open+0x81/0xaf0 [ 977.231438][T18073] chrdev_open+0x2e8/0x3a0 [ 977.231466][T18073] do_dentry_open+0x649/0xa20 [ 977.231498][T18073] ? __pfx_chrdev_open+0x10/0x10 [ 977.231586][T18073] vfs_open+0x37/0x1e0 [ 977.231668][T18073] path_openat+0x1c5e/0x2170 [ 977.231776][T18073] do_filp_open+0x109/0x230 [ 977.231827][T18073] do_sys_openat2+0xa6/0x110 [ 977.231875][T18073] __x64_sys_openat+0xf2/0x120 [ 977.231914][T18073] x64_sys_call+0x1af/0x2fb0 [ 977.231943][T18073] do_syscall_64+0xd2/0x200 [ 977.231964][T18073] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 977.232005][T18073] ? clear_bhb_loop+0x40/0x90 [ 977.232108][T18073] ? clear_bhb_loop+0x40/0x90 [ 977.232137][T18073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 977.232168][T18073] RIP: 0033:0x7fc654d2e929 [ 977.232189][T18073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 977.232285][T18073] RSP: 002b:00007fc653397038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 977.232312][T18073] RAX: ffffffffffffffda RBX: 00007fc654f55fa0 RCX: 00007fc654d2e929 [ 977.232332][T18073] RDX: 0000000000042002 RSI: 0000200000001480 RDI: ffffffffffffff9c [ 977.232350][T18073] RBP: 00007fc653397090 R08: 0000000000000000 R09: 0000000000000000 [ 977.232368][T18073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 977.232385][T18073] R13: 0000000000000001 R14: 00007fc654f55fa0 R15: 00007ffd2459f498 [ 977.232489][T18073] [ 977.570035][T18092] netlink: 14 bytes leftover after parsing attributes in process `syz.1.15844'. [ 977.788834][T18117] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 977.788834][T18117] program syz.4.15852 not setting count and/or reply_len properly [ 977.906370][T18125] netlink: 'syz.4.15854': attribute type 1 has an invalid length. [ 977.986094][T18141] geneve2: entered promiscuous mode [ 978.592220][T18209] netlink: 'syz.4.15866': attribute type 1 has an invalid length. [ 978.814664][T18215] Restarting kernel threads ... [ 978.832816][T18215] Done restarting kernel threads. [ 979.115328][ T29] kauditd_printk_skb: 1560 callbacks suppressed [ 979.115399][ T29] audit: type=1326 audit(979.089:274283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.188637][ T29] audit: type=1326 audit(979.089:274284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=245 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.212100][ T29] audit: type=1326 audit(979.089:274285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.235903][ T29] audit: type=1326 audit(979.089:274286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.259427][ T29] audit: type=1326 audit(979.099:274287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.282691][ T29] audit: type=1326 audit(979.099:274288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.306853][ T29] audit: type=1326 audit(979.099:274289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.330076][ T29] audit: type=1326 audit(979.099:274290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.353435][ T29] audit: type=1326 audit(979.099:274291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.376692][ T29] audit: type=1326 audit(979.099:274292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18232 comm="syz.4.15875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb4a7e929 code=0x7ffc0000 [ 979.542859][T18292] FAULT_INJECTION: forcing a failure. [ 979.542859][T18292] name failslab, interval 1, probability 0, space 0, times 0 [ 979.555623][T18292] CPU: 1 UID: 0 PID: 18292 Comm: syz.0.15884 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 979.555671][T18292] Tainted: [W]=WARN [ 979.555680][T18292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 979.555763][T18292] Call Trace: [ 979.555770][T18292] [ 979.555777][T18292] __dump_stack+0x1d/0x30 [ 979.555797][T18292] dump_stack_lvl+0xe8/0x140 [ 979.555816][T18292] dump_stack+0x15/0x1b [ 979.555844][T18292] should_fail_ex+0x265/0x280 [ 979.555963][T18292] should_failslab+0x8c/0xb0 [ 979.556002][T18292] kmem_cache_alloc_noprof+0x50/0x310 [ 979.556027][T18292] ? skb_clone+0x151/0x1f0 [ 979.556048][T18292] skb_clone+0x151/0x1f0 [ 979.556069][T18292] __netlink_deliver_tap+0x2c9/0x500 [ 979.556110][T18292] netlink_unicast+0x653/0x680 [ 979.556223][T18292] netlink_sendmsg+0x58b/0x6b0 [ 979.556249][T18292] ? __pfx_netlink_sendmsg+0x10/0x10 [ 979.556271][T18292] __sock_sendmsg+0x145/0x180 [ 979.556302][T18292] ____sys_sendmsg+0x31e/0x4e0 [ 979.556406][T18292] ___sys_sendmsg+0x17b/0x1d0 [ 979.556457][T18292] __x64_sys_sendmsg+0xd4/0x160 [ 979.556511][T18292] x64_sys_call+0x2999/0x2fb0 [ 979.556538][T18292] do_syscall_64+0xd2/0x200 [ 979.556632][T18292] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 979.556667][T18292] ? clear_bhb_loop+0x40/0x90 [ 979.556701][T18292] ? clear_bhb_loop+0x40/0x90 [ 979.556722][T18292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 979.556747][T18292] RIP: 0033:0x7fb9d249e929 [ 979.556767][T18292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 979.556844][T18292] RSP: 002b:00007fb9d0b07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 979.556877][T18292] RAX: ffffffffffffffda RBX: 00007fb9d26c5fa0 RCX: 00007fb9d249e929 [ 979.556889][T18292] RDX: 0000000000000000 RSI: 0000200000001200 RDI: 0000000000000003 [ 979.556900][T18292] RBP: 00007fb9d0b07090 R08: 0000000000000000 R09: 0000000000000000 [ 979.556912][T18292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.556928][T18292] R13: 0000000000000000 R14: 00007fb9d26c5fa0 R15: 00007fff8690f838 [ 979.557074][T18292] [ 979.559271][T18293] netlink: '+}[@': attribute type 10 has an invalid length. [ 979.574896][T18292] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 979.826246][T18274] geneve1: entered promiscuous mode [ 981.251336][T18457] Restarting kernel threads ... [ 981.275221][T18457] Done restarting kernel threads. [ 981.549537][T18511] __nla_validate_parse: 18 callbacks suppressed [ 981.549600][T18511] netlink: 12 bytes leftover after parsing attributes in process `syz.0.15916'. [ 981.635128][T18520] netlink: 'syz.3.15918': attribute type 1 has an invalid length. [ 981.643260][T18520] netlink: 224 bytes leftover after parsing attributes in process `syz.3.15918'. [ 981.834542][T18530] SELinux: syz.1.15922 (18530) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 981.927965][T18538] netlink: 16 bytes leftover after parsing attributes in process `syz.1.15925'. [ 982.423955][T18547] Restarting kernel threads ... [ 982.443222][T18547] Done restarting kernel threads. [ 982.456477][T18549] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15929'. [ 982.570554][T18557] FAULT_INJECTION: forcing a failure. [ 982.570554][T18557] name failslab, interval 1, probability 0, space 0, times 0 [ 982.583305][T18557] CPU: 0 UID: 0 PID: 18557 Comm: syz.2.15932 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 982.583411][T18557] Tainted: [W]=WARN [ 982.583420][T18557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 982.583433][T18557] Call Trace: [ 982.583493][T18557] [ 982.583500][T18557] __dump_stack+0x1d/0x30 [ 982.583522][T18557] dump_stack_lvl+0xe8/0x140 [ 982.583545][T18557] dump_stack+0x15/0x1b [ 982.583563][T18557] should_fail_ex+0x265/0x280 [ 982.583591][T18557] ? __se_sys_memfd_create+0x1cc/0x590 [ 982.583704][T18557] should_failslab+0x8c/0xb0 [ 982.583745][T18557] __kmalloc_cache_noprof+0x4c/0x320 [ 982.583771][T18557] ? fput+0x8f/0xc0 [ 982.583799][T18557] __se_sys_memfd_create+0x1cc/0x590 [ 982.583893][T18557] __x64_sys_memfd_create+0x31/0x40 [ 982.583943][T18557] x64_sys_call+0x122f/0x2fb0 [ 982.583970][T18557] do_syscall_64+0xd2/0x200 [ 982.583991][T18557] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 982.584023][T18557] ? clear_bhb_loop+0x40/0x90 [ 982.584058][T18555] netlink: 'syz.4.15931': attribute type 1 has an invalid length. [ 982.584146][T18557] ================================================================== [ 982.584192][T18557] BUG: KCSAN: data-race in _prb_read_valid / data_alloc [ 982.584254][T18557] [ 982.584262][T18557] write to 0xffffffff8688a548 of 8 bytes by task 18555 on cpu 1: [ 982.584283][T18557] data_alloc+0x271/0x2b0 [ 982.584323][T18557] prb_reserve+0x808/0xaf0 [ 982.584361][T18557] vprintk_store+0x56d/0x860 [ 982.584382][T18557] vprintk_emit+0x178/0x650 [ 982.584405][T18557] vprintk_default+0x26/0x30 [ 982.584429][T18557] vprintk+0x1d/0x30 [ 982.584469][T18557] _printk+0x79/0xa0 [ 982.584504][T18557] __nla_validate_parse+0x1227/0x1d00 [ 982.584546][T18557] __nla_parse+0x40/0x60 [ 982.584585][T18557] genl_family_rcv_msg_attrs_parse+0x13b/0x190 [ 982.584621][T18557] genl_family_rcv_msg_doit+0x48/0x1b0 [ 982.584654][T18557] genl_rcv_msg+0x422/0x460 [ 982.584682][T18557] netlink_rcv_skb+0x120/0x220 [ 982.584720][T18557] genl_rcv+0x28/0x40 [ 982.584746][T18557] netlink_unicast+0x5a5/0x680 [ 982.584782][T18557] netlink_sendmsg+0x58b/0x6b0 [ 982.584804][T18557] __sock_sendmsg+0x145/0x180 [ 982.584833][T18557] ____sys_sendmsg+0x31e/0x4e0 [ 982.584874][T18557] ___sys_sendmsg+0x17b/0x1d0 [ 982.584914][T18557] __x64_sys_sendmsg+0xd4/0x160 [ 982.584954][T18557] x64_sys_call+0x2999/0x2fb0 [ 982.584981][T18557] do_syscall_64+0xd2/0x200 [ 982.585003][T18557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 982.585029][T18557] [ 982.585036][T18557] read to 0xffffffff8688a548 of 16 bytes by task 18557 on cpu 0: [ 982.585056][T18557] _prb_read_valid+0x1bc/0x920 [ 982.585097][T18557] prb_final_commit+0x136/0x1e0 [ 982.585136][T18557] vprintk_store+0x741/0x860 [ 982.585158][T18557] vprintk_emit+0x178/0x650 [ 982.585181][T18557] vprintk_default+0x26/0x30 [ 982.585204][T18557] vprintk+0x1d/0x30 [ 982.585235][T18557] _printk+0x79/0xa0 [ 982.585270][T18557] show_trace_log_lvl+0x4e3/0x560 [ 982.585294][T18557] __dump_stack+0x1d/0x30 [ 982.585314][T18557] dump_stack_lvl+0xe8/0x140 [ 982.585336][T18557] dump_stack+0x15/0x1b [ 982.585358][T18557] should_fail_ex+0x265/0x280 [ 982.585392][T18557] should_failslab+0x8c/0xb0 [ 982.585418][T18557] __kmalloc_cache_noprof+0x4c/0x320 [ 982.585459][T18557] __se_sys_memfd_create+0x1cc/0x590 [ 982.585497][T18557] __x64_sys_memfd_create+0x31/0x40 [ 982.585534][T18557] x64_sys_call+0x122f/0x2fb0 [ 982.585562][T18557] do_syscall_64+0xd2/0x200 [ 982.585584][T18557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 982.585612][T18557] [ 982.585617][T18557] Reported by Kernel Concurrency Sanitizer on: [ 982.585635][T18557] CPU: 0 UID: 0 PID: 18557 Comm: syz.2.15932 Tainted: G W 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT(voluntary) [ 982.585679][T18557] Tainted: [W]=WARN [ 982.585688][T18557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 982.585709][T18557] ================================================================== [ 982.585723][T18557] ? clear_bhb_loop+0x40/0x90 [ 982.585754][T18557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 982.585830][T18557] RIP: 0033:0x7fc654d2e929 [ 982.585850][T18557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 982.585904][T18557] RSP: 002b:00007fc653396e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 982.586002][T18557] RAX: ffffffffffffffda RBX: 000000000000053e RCX: 00007fc654d2e929 [ 982.586020][T18557] RDX: 00007fc653396ef0 RSI: 0000000000000000 RDI: 00007fc654db14cc [ 982.586110][T18557] RBP: 0000200000000940 R08: 00007fc653396bb7 R09: 00007fc653396e40 [ 982.586127][T18557] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 982.586144][T18557] R13: 00007fc653396ef0 R14: 00007fc653396eb0 R15: 00002000000003c0 [ 982.586170][T18557] [ 983.061993][T18555] netlink: 224 bytes leftover after parsing attributes in process `syz.4.15931'.