last executing test programs: 4.917787528s ago: executing program 2 (id=342): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0x2, 0x4, 0x0, @empty}, 0x1c) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = gettid() r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x60010002, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000000300)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x3c, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0, 0x0]}, 0x40) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a80000000060a010400000000000000000a0000010900010073797a310000000054000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dffff000000000000a0c70000000000000000000000000000000008000100544545000900020073797a32"], 0xa8}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x18) write$qrtrtun(r1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000480)='ns\x00') fstat(r6, &(0x7f0000006b00)) ioctl$VT_RESIZEX(r6, 0x560a, &(0x7f0000000040)={0x1, 0x0, 0x7, 0x0, 0x0, 0x200}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x6, 0x85, 0x40, 0x7ffe0003}, {0x2, 0x7, 0x2, 0xf}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000280)={[{@user_xattr}]}, 0x9, 0x537, &(0x7f0000000fc0)="$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") 4.86134809s ago: executing program 0 (id=343): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x81}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0x3) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r5, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x8, &(0x7f00000005c0)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x18) syz_open_procfs$userns(r0, &(0x7f0000000140)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 4.097409033s ago: executing program 2 (id=347): r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="06000000040000"], 0x50) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x129242, 0x0) pwrite64(r2, &(0x7f000009dd80)='\"', 0x1, 0x9000) r3 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007", @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x10, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000040)={r0, 0xcd}, &(0x7f0000000300)=ANY=[@ANYBLOB="656e633d6f61657020686173683d7368613232342d67656e657269396300000000000000000000000000000000000000f1000000000000000000000000000000000000000000000000000000000000ca546ba88e3c0f8b21e50e511ad02624ed3829949dfad601f2646825c073820b05415c88c6cb0f6f"], &(0x7f0000001080)="052fc065f67f139809e6c3391ef61233e8d791edc405c250434eb555143195968638417f45812dd925d29397ec267c31993955bbc6d0ccdfb601a9bac68bd3a3f4b62f3c50c1735737d372b5e4f42270d91de4b3d5a20aaf3d6180474ed093ec1ce05c3be25e33935ed4f7b0c325f93057e1fbe8bcd88f99526202e3b69ac0569235bca54f68a57787410375dfca2d453628fadc05657752a0ed3180ab9726b718d27e69c9db909ede26e6a2d2a8930a683ea03eba4748be2212e17f8dc1d4f2e2f01cd2c1d1e33c53b3bcea07", &(0x7f0000000240)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) recvfrom$unix(r5, 0x0, 0x0, 0x40000000, &(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4, 0x0, 0x3}, 0x18) r6 = socket$netlink(0x10, 0x3, 0x0) syz_usb_connect(0x0, 0x553, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], &(0x7f0000001000)={0xa, &(0x7f0000000400)={0xa, 0x6, 0x201, 0x7, 0x3, 0x3, 0x40}, 0x89, &(0x7f0000000800)=ANY=[@ANYRES16=r4], 0x6, [{0x49, &(0x7f0000000900)=ANY=[@ANYRES64=r4]}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0xf4ff}}, {0x4, &(0x7f0000000580)=@lang_id={0x4, 0x3, 0x2009}}, {0x4, &(0x7f00000007c0)=@lang_id={0x4, 0x3, 0x402}}, {0x4, &(0x7f0000000940)=@lang_id={0x4, 0x3, 0x439}}, {0xd2, &(0x7f0000000680)=@string={0xd2, 0x3, "daa4c860c0c52e36d016dd670ca84db2635abe183f4b4fe727e93e2b6cc21bab7a34f49dea9dba833369668f4b465b10537794e6dac20b5386a3a456afad645cdf171af62cf3d41f5928f8d109929f9a944a1a3a7cc1a9df26666b00bf0359908987ee4bf8cfc35d83ecb8957a243d2ddf1254bd5b7d5372f23733d41ba3be057b895a03e5294255d9ce11b4ce210d7c766aa416e9342d419e995f606fdb99375bea914a15571cca82a07f822ea40020616e8f694f5b43c9a183d0d3db7053ed622deb6d7a04f5ac3eb3fed2e9722c0d"}}]}) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x3}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000c00) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1a, 0xb, &(0x7f00000009c0)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @tracing=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8543}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000001180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c756e616d4d3dd0aedec1aa20ffd81d1bf86db893add13261eb1538bb30775434b693292d6a9570dd8e8402f3c5da30195a217cb058a396eda2ab40a26d93dd083c0074dcab6cab21ae16c4cdf97bdc355f3b41d27b654301345cb3c4cec37953322d01beaa7257964fd30fe2d72f171da72e389f382dea3c8d91906aead5d5aeccc097ef1092ea987c2b00000000000100002c00f4574f3cba0243d905ec480cc011677061f4c82ba0fb422d2f908b5a690a1e361817cd6ff4e68eb8320de3ed8a29703e83f7da877e3a37a275916c94a6e6e22b60e860d47e4ebb2edd460d7e11c89627ab39bf"]) ptrace(0x11, r8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) socket(0x10, 0x3, 0x0) ptrace$cont(0x20, r8, 0x0, 0x0) ptrace(0x11, r8) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r7, 0x8983, &(0x7f0000000000)={0x0, 'geneve0\x00', {0x2}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r11, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x8}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newqdisc={0x34, 0x24, 0xd0f, 0x0, 0x25dfdb7c, {0x60, 0x0, 0x0, r11, {}, {0x1, 0x2}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) 2.893027065s ago: executing program 1 (id=358): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4004884) 2.697417354s ago: executing program 0 (id=360): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000000a499d0000000000000000020000010900010073797a310000000008000240000000030400060014000000110001"], 0x54}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000d50000d67b6b780d9600006cfe000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r5, &(0x7f00000000c0)=[{&(0x7f0000001600)=""/4113, 0x1011}], 0x1, 0xf0, 0xa) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/reserved_size', 0x8b00, 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x5, @local, 0x9}, {0xa, 0x4e22, 0x7ff, @local, 0x92}, r7, 0x9}}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18000000", @ANYRES32, @ANYRES16=r2], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f00000003c0)={r8, r2}, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x400c895}, 0x24000800) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000080)) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x8, 0x0, 0x0, 0xb0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x8, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0xffffffffffffffff) 2.620588757s ago: executing program 1 (id=361): prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x6, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff47}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYRES32=0x0, @ANYRES32=r2, @ANYRES16=r0, @ANYRESDEC=r1, @ANYBLOB="2347278ce9c8c91c5085c05bc123c45ad3961900380e02e3f753bba4e42fc2dfe76ccd9d1b1812a285102446fb1e25cb521fa7ad0cd1be551512ff00edb8822b2f2de530162e01439d4f1d457eb8d3060936c28ab0670f8208c9fa7faafe94b5df5ed184fa8e9876f32ab24d97eb30b9c609fa47a6d40b41103715e58d45818704a4410fbdd9d3dd771f52602787f02f2da1d3266c5772ef717029fd019eb60219782d7248a8feccd5af5742f833d255459721635e61901757686653ab0f75da82691e8d", @ANYRESOCT], 0x48) r3 = syz_open_dev$usbfs(&(0x7f0000000040), 0x8, 0x290c0) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x8008551d, &(0x7f00000000c0)={0x8870, 0x9, [{0x9}, {0x4}, {0x5, 0x1}, {0x9}, {0x6, 0x1}, {0xa}, {0x1}, {0xa}, {0xa}]}) r4 = fsopen(&(0x7f0000000100)='cifs\x00', 0x1) fchmod(r4, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="77aa18023479e2ee89"]) 2.615540067s ago: executing program 3 (id=362): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3fb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_open_procfs(0x0, &(0x7f0000001300)='net/kcm\x00') r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) sendmmsg$inet(r3, &(0x7f0000000240)=[{{&(0x7f00000007c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a905000400007464fd009e150451160200000064", 0x14}], 0x1}}], 0x1, 0x4004040) 2.55349788s ago: executing program 0 (id=363): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/238, 0xee}], 0x1) ioctl$KIOCSOUND(r0, 0x4b2f, 0x2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 2.55288277s ago: executing program 3 (id=364): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000600)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000000000000000000000000000000000001fe8000000000000000000000000000bb00000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00010000000000000c00000000000000000000000000000000000000000000000200000000000000ffffffffffffffff000000000020000000000000000000000000000000000000000a000000000000feffffffff7f4000020000000000000800000000000000"], 0xfc}}, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 2.537852371s ago: executing program 1 (id=365): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mm_page_free\x00', r0, 0x0, 0x1002}, 0x18) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x4010, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r4}, &(0x7f0000000a00), &(0x7f0000000400)=r3}, 0x20) ioctl$INCFS_IOC_FILL_BLOCKS(r1, 0x80106720, &(0x7f0000000340)={0x1, &(0x7f0000000180)=[{0xfffffb24, 0x59, &(0x7f00000000c0)="aa16e9b01187c9f21b5dd333a1cff2d5ea859787ea893a53a48e2d293350c48618f891ed96911e2b8f4aac2d3cb2c16fddd092644fa4c92023588fa374b9a47239145ded0072d0bed3532407f9893484be2299fdab8234b174"}]}) r5 = socket(0x15, 0x5, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) getsockopt(r5, 0x200000000114, 0x271d, 0x0, &(0x7f0000000000)) memfd_create(&(0x7f0000000480)='mm_page_free\x00', 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000600)={0x0, 0x75, 0x4, [0x8, 0x6, 0x9, 0x2]}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000680)={r6, @in6={{0xa, 0x4e24, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4830}}, 0x1, 0x3}, 0x90) mmap(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x1000002, 0x200000005c831, r2, 0x0) 2.490061353s ago: executing program 1 (id=367): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200000000000002000000090002"], 0x80}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a300000"], 0x110}}, 0x0) 2.489459413s ago: executing program 3 (id=368): syz_usb_connect(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x403}}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffff, @loopback, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r3, 0x0, 0x2}, 0x18) r4 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x4000) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[], 0x2b08}}, 0x4000806) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000340)=@ccm_128={{0x304}, "49c2ace48cb54d80", "e0e6d4a271e30000596600", '\x00', "c962b0c0b5d958c9"}, 0x28) recvmmsg(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)=""/94, 0x5e}], 0x1}, 0x4}], 0x1, 0x40000002, 0x0) 2.433161615s ago: executing program 0 (id=369): open(&(0x7f0000000000)='./bus\x00', 0x40542, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x50) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000000c0)=0xa5d1, 0x4) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x3, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="03000000040000000400"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r5, 0x3e8, 0xf, 0x0, &(0x7f0000000000)="c1df07000000d30a298ee68886dd87", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r6, 0x0, 0x9}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x4008032, 0xffffffffffffffff, 0xd06d000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) msgget$private(0x0, 0x79) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') 2.426381475s ago: executing program 1 (id=370): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x81}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0x3) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r5, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x8, &(0x7f00000005c0)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x18) syz_open_procfs$userns(r0, &(0x7f0000000140)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 1.934029787s ago: executing program 2 (id=375): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3fb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_open_procfs(0x0, &(0x7f0000001300)='net/kcm\x00') r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) sendmmsg$inet(r3, &(0x7f0000000240)=[{{&(0x7f00000007c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a905000400007464fd009e150451160200000064", 0x14}], 0x1}}], 0x1, 0x4004040) 1.8633016s ago: executing program 4 (id=376): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'ip6tnl0\x00'}, @IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}]}}}]}, 0x50}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="08000000040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000025000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0x14, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r4, 0x2000012, 0xe, 0xf0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc}, 0x50) io_setup(0x8, 0x0) r5 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000540)='.log\x00', 0x0, 0x9) fchown(r5, 0x0, 0xee01) 1.839001871s ago: executing program 3 (id=377): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$qrtrtun(r0, &(0x7f0000000340)="8f52eb24cc8080", 0x7) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x7], &(0x7f0000000240)=[0x2], 0x700, 0x9}}, 0x40) 1.711635276s ago: executing program 2 (id=378): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mm_page_free\x00', r0, 0x0, 0x1002}, 0x18) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x4010, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r4}, &(0x7f0000000a00), &(0x7f0000000400)=r3}, 0x20) ioctl$INCFS_IOC_FILL_BLOCKS(r1, 0x80106720, &(0x7f0000000340)={0x1, &(0x7f0000000180)=[{0xfffffb24, 0x59, &(0x7f00000000c0)="aa16e9b01187c9f21b5dd333a1cff2d5ea859787ea893a53a48e2d293350c48618f891ed96911e2b8f4aac2d3cb2c16fddd092644fa4c92023588fa374b9a47239145ded0072d0bed3532407f9893484be2299fdab8234b174"}]}) r5 = socket(0x15, 0x5, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) getsockopt(r5, 0x200000000114, 0x271d, 0x0, &(0x7f0000000000)) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500)=@md5={0x1, "92d734f4b1d8659fa4ae73e3c5e91eb0"}, 0x11, 0x3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000600)={0x0, 0x75, 0x4, [0x8, 0x6, 0x9, 0x2]}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000680)={r6, @in6={{0xa, 0x4e24, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4830}}, 0x1, 0x3}, 0x90) mmap(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x1000002, 0x200000005c831, r2, 0x0) 1.62960281s ago: executing program 3 (id=379): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000600)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000000000000000000000000000000000001fe8000000000000000000000000000bb00000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00010000000000000c00000000000000000000000000000000000000000000000200000000000000ffffffffffffffff000000000020000000000000000000000000000000000000000a000000000000feffffffff7f4000020000000000000800000000000000000100000000000000440005007f000001"], 0xfc}}, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 1.62909476s ago: executing program 4 (id=380): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc0ed4040, &(0x7f00000000c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@stripe={'stripe', 0x3d, 0x1}}, {@inlinecrypt}, {@grpid}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@usrjquota}, {@nolazytime}, {@noload}]}, 0xf5, 0x49f, &(0x7f00000004c0)="$eJzs3M1vVFUbAPDnTqel5eOlLy+vCgGtgpH40dLyIQsTo9GEhUajLjCu6rQQpICBmgghWl1gjAtD4t64NPEvcGF0Y9SViS5xb0iIYQO6uubOvbcfwwxt6dApzO+XXOac+8E5z5x7Zs49904D6FpD2T9JxMaIuBwRmyOi2rjDUP5y49qF2t/XLtSSSNPX/0qiPyKuX7tQK/6L+pLZkK9I0yK/rkm5F9+KGJ+amjxT5EemT747cvbc+aeOnxw/Nnls8tTYoUP79+3sOzh2oC1xZnFd3/7B6R3bDr956eXakUtv//xNVt+NxfYyjnYayt/dph5td2EdtmleOql2sCIsS9ZuvcVyOdKenhiY3bY5Xvy4o5UD7rRqs+/nwkwK3MOygTrQjcov+uz6t1wWGy+0cezRcVefyyPK4r5RLPmWalSKfXobrm/bqT8ijsz882W2xB2ahwAAmO/7bPzzZLPxXyXum7fff4p7KIMR8d+I2BIR/4uIrRHx/4j6vvdHxAPLLL/xDsnN45/KlQXZtGeZJdxaNv57pri3tXD8V47+YrCnyG2qx9+bHD0+Nbm3eE/2RO+6LD+64JCFfnjht88b131WTLMPzRv/ZUtW/sIIK1caJ+gmxqfHVx557upHEdurzeJPZgf6SURsi4jtt1nG8ce/3tFqW7P4y7HwotpwJZJ+FfFY3v4z0RB/KWl5f3L06YNjB0b6Y2py70h5Viw4rO6XXy++2qr8FcXfBln7r296/ufVz64Rk/6Is+fOn6jfrz17G4X88UktabFpaxF/b8v4bz7/a7sj+pI36um+cq/itS95KXsZKNe/Pz49fWZs7tgyX38dzePfs2su/vGY6/9b8suzSH5/bfb4nRHxYEQ8VLTdwxHxSETsukX4Pz2/+51W21q3/y1m5dsoi3+iZft/l6ZpDGapufZffqLnxI/ftio/XfT8z9p/fz21p1izlM+/pVZwxW8gAAAA3AUq9Wfgk8rwbLpSGR7On+HfGusr1Yh44ujp905N5M/KD0ZvpZzp2jxvPnS0mBsu82MN+X3FvPEXPQP1/HDt9NREp4OHLrehof+nRf/P/NneWy3AWnRPPdEHLIv+D91L/4fupf9D93q2/rTfTKerAay2vuarP1ztegAdsfzxf/8dqQew+lz/Q/eq9//rna4F0Am+/6ErtfxtfGVFP/m/WxPVtVGNpomBtVGNMhGVRfeprJGqLi3xyqd5l1gr9SkT1SX/MYvbTKxruqnpx8Xhjav78QQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALBi/wYAAP//wIrhrg==") 1.535133564s ago: executing program 0 (id=381): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200000000000002000000090002"], 0x80}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a300000"], 0x110}}, 0x0) 1.529033504s ago: executing program 3 (id=382): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x88, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000", @ANYRESDEC=r0], &(0x7f0000000200)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x20d0000, &(0x7f0000000140)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x516, &(0x7f0000000d00)="$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") clock_getres(0xeaffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB="a68fecad1a82386f85504fe00659eb89c781ddfc87d785589927aa5d735049f9b75baa2f74d1d72de9d6b3a66a2f167a39404d5a79938078cedc336bf19d7ac6c62769625a408901a8db8e7c4ceab1c60ab8bedd4df55d628217ea01cb492d7d25a9f9c281b028ddcfc7ba598bc02b1faa36b5db5dcab9591cb2f939398192fe0123594991f3e8fc31bdf00f2cb2bf130508a91e81c9984f8ea5a4cdaac4e40044cfb5eb952feb60330847d88abb47046c2e55ecf78028dd46fc7af1e934260a8259d422f2b18e1c7a1be010cf70703b6472340f3e0ef003ad98ee367438f82a76ac8ee012e4311b094816940fce00"/254, @ANYBLOB="0000000000000000b7030000003e7400850000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, 0x0, 0x0) ioperm(0x0, 0x9, 0xd648) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xb8}, 0x1, 0x0, 0x0, 0x404c830}, 0x0) waitid(0x0, 0x0, 0x0, 0x41000004, 0x0) mlockall(0x3) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r9}}, 0x20) 1.480569207s ago: executing program 4 (id=383): r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)="da", 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0xd0}}], 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x80000001, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) close(r0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x204000, &(0x7f0000001600)={[{@debug}, {@min_batch_time={'min_batch_time', 0x3d, 0x4ab}}, {@data_err_ignore}, {@nobarrier}, {@inlinecrypt}, {@orlov}, {@nogrpid}, {@discard}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x3, 0x572, &(0x7f0000000c40)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0xce342, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) fchmodat(r6, &(0x7f0000000540)='./file1\x00', 0x1c) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x7b2428aa, 0xfffffffffffffff9, 0x0) memfd_secret(0x80000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800800000000000000000ff00000049f1d7382b7dd901575c34f6f85de5bf25bae6f9cf5bc582eaafd4f0ea60f4925d9139af9a927365e8fe62e082a9fc345fcf2c28c27a1a0ef0f3a3c674a1feefe8a92231c7b53aaf45c513c76dc4ec20085ea7f33b43de9107a501b0c03f89ba", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x54a54383001ec2f7, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x8635}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r7, 0x0, 0xf}, 0x18) write$UHID_CREATE2(r4, &(0x7f0000000180)=ANY=[], 0x118) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x200000, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESHEX, @ANYRES32, @ANYRES64, @ANYBLOB="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"/305, @ANYBLOB="2229e4daa91ec6fa6fd7ca657a9d9f0446f4bbdff89e6765851a5d70b519b302033dd5cbb4d27206c473f94fae84697ab284df33b0630899a5df9e5ce7324342fc20de8fb31fb199caf1595de9aa6509e782ac930a0d5c829089bd4da31bc036392c3206cf9cc114d440114fc43209674f8b4364791569a55b9974f251f78edc4a6b911bde5ace78f844e62ce270ec0a8149fae1d7d9485b87d35518691b74d1ca2256b2827dd43da0b0b69c8b3dc3caf243fb571c3a2f82ad6c3a570eb32d8862a3e399", @ANYBLOB="261fb61f7fa8df3110a5f5c53ddf67660b95dbe2472304e2600fa2d6d38759bcd4adaf188f447131ef2ae4263d98018a2c9f2a0836f14ea40e6648d4bce2126080bf4d4c5b45349e571b194c576f0db70d9b3e0425fb17e2c629fe29efbec3f3a7bfeb6d616b59eff7b9ecc54b0bb5d30cb3ac2c057047b150f136cb18768f635a51fe722baf217d296dfe54b41b4f5d025f3f5796e0392cb908c463f461f45e1712c7ea1ac353262114a1283f57a0711bbe4adb71661ab755623d4b93d8f65da63171ff38f1ffd18c149ff0", @ANYRES64, @ANYRES8], 0x4, 0x301, &(0x7f0000000080)="$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") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) pwrite64(r3, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 1.430131859s ago: executing program 0 (id=384): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x81}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0x3) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r5, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x8, &(0x7f00000005c0)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x18) syz_open_procfs$userns(r0, &(0x7f0000000140)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 1.278640515s ago: executing program 2 (id=385): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0209000007"], 0x38}, 0x1, 0x0, 0x500}, 0x0) 1.095600683s ago: executing program 4 (id=386): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000221000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000080)="2b0de442df089ce21148d2add2afb1704d5a0b85ad2e31e9ed1e0f9ef71447b627e4c7db7163bb85720dbbd048da68d8e77247c98f61fbd2b92d6c", 0x75, r0}, 0x38) 212.787771ms ago: executing program 1 (id=387): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) (async) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x2, "0060dcd61508c43445000000000008fa096304"}) (async) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x2, "0060dcd61508c43445000000000008fa096304"}) r3 = syz_open_pts(r2, 0x82080) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x20, 0x30}, 0xc) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000000180)="1a", 0x1, 0x804, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r1, &(0x7f0000000c80)="7cffa9061b2f8b082b6f69ae50430c8a8b6aa3162ba083c4a52e1ab0ac50ed4a19b1a69988000d5bed4433daaa4932dbb1cb3550dee8b23579d76ce37d574b43fca1eed8ebd38d1303240ed0d84517692128dd5aef5c4d", 0x57, 0xbcff, 0x0, 0x0) (async) sendto$inet6(r1, &(0x7f0000000c80)="7cffa9061b2f8b082b6f69ae50430c8a8b6aa3162ba083c4a52e1ab0ac50ed4a19b1a69988000d5bed4433daaa4932dbb1cb3550dee8b23579d76ce37d574b43fca1eed8ebd38d1303240ed0d84517692128dd5aef5c4d", 0x57, 0xbcff, 0x0, 0x0) writev(r1, &(0x7f0000001300)=[{&(0x7f0000000280)="a4", 0x34000}], 0x1) (async) writev(r1, &(0x7f0000001300)=[{&(0x7f0000000280)="a4", 0x34000}], 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000002000090002000000ffdbdf250200000008000800", @ANYRES32=r5], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) r7 = socket$packet(0x11, 0x2, 0x300) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, 0x0, 0x4) (async) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, 0x0, 0x4) close(r8) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0x2, 0x3b}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000980)={'sit0\x00', &(0x7f0000000ec0)={'syztnl0\x00', 0x0, 0x8, 0x8000, 0x3, 0x1, {{0x35, 0x4, 0x3, 0x8, 0xd4, 0x65, 0x0, 0x4, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@end, @rr={0x7, 0xf, 0xd3, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast2]}, @timestamp_addr={0x44, 0x34, 0xb6, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@multicast1, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@local, 0xd}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}]}, @ssrr={0x89, 0x17, 0x7e, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @broadcast, @multicast2]}, @ssrr={0x89, 0x1b, 0x54, [@dev={0xac, 0x14, 0x14, 0xf}, @broadcast, @empty, @local, @multicast1, @remote]}, @cipso={0x86, 0x28, 0x0, [{0x7, 0x3, "ab"}, {0x1, 0xe, "8f56fad1c6f9ac4553182286"}, {0x5, 0x11, "3403c52ef531a6519f32b3ae1d556a"}]}, @timestamp={0x44, 0x20, 0x3c, 0x0, 0x6, [0xbd9, 0x840, 0x5, 0x6, 0x400000, 0xfffffffc, 0x9]}]}}}}}) sendmmsg$inet(r9, &(0x7f0000001080)=[{{&(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="69e00e7c8909b43988acf34276f870a55d0b116c2581cd7255c7c130247e16ddcd039f10ac9676e75b30404bfd61951b4598a9464b91c299f54b37f6cc78e4e5ad94b3c777556c09203df72365bd83052b4595c2a5121f7a47f4c6ee6db156d5d4262067fe25967a9f91589b4d816be7f3abcaccea86501b5fdb3df8e571ac6fd1091d86f40d2868b163ba0e61934ca472a047c22e7c85b0e48b273600a4f1cfc1cfa8c1f3e78fa5aa44fae8ac5ed0a06ebb16ac45ccc1a06c4506791de1c904fb38dc6f6715bb4d11663794d65dd4c0543eabe5d6564d6b7b", 0xd9}, {&(0x7f0000000300)="23a51eede1fbda30cdcb0619934b04ea6a73b0edc5e36ca619139c41d7bb0a23763caac8f1ca", 0x26}, {&(0x7f0000000840)="f45c12eebcc084a1e6d416e6ee5786ae4785ee8ec874ab1f8a46a35e41c7bfe82c9df2b78a7113ced50c0c7ac6ade243b18624e2ee5399d2d5adb6516f7f114d238e88905f0552299a288b40dbd16ecb0819a9541076493e7baa8a849f5c90019899266c98ea8d13de0cd4547a240592849ad06bae1a34c45a2b21bd1b8860d35a3ef2de789012aee80a286969831c225730f7d31fb241b1a7e03045c81205d30ba9ab15da05c1f9b741ba55f7fdbdb6eb37f0c6c5fe32ce504f718c77062c2a9b10775cbc5a", 0xc6}, {&(0x7f0000000380)="febcfeae5983c1ed5b6364821af89b88665bd502a0b555", 0x17}, {&(0x7f00000003c0)}, {&(0x7f0000000a00)="6feec33b3967fb9ff5489be2a475cc8753b76a151a6956e8d89a0199428b10c9e65ece112981dc1159228ac1d9c83bc12b799e802a1203b6a95f192d5cde372f87ac3df8e03d91e8027443abbd0ff42f3b3637dc8ec0825a6c23c59994e9b61ebffd8fabeb392da9301deea7205837e7389ee673926b4f585b777f41a1554853ec41af210796960c8211cf0aeeed2dc80e0b2abbd9d7f38ad19b086bf601abfa1895597570ba6662d3f195f3343d166e5c8b93cdb8bc1d31fb728e615135ca4218fe34ad0c76db8ab718f386f09fdbc872724f", 0xd3}, {&(0x7f0000000b00)="765efbe34c65d6811e614cb43937421c5643f0b37ab76f5399b43fe38f86cfc61b344e91e9560cc61e907b8ce82dd9fb1dc4ce31da3510ada318d313df92fc080fbd92dcd7418de870b434b2870b83d67f032da45ca10587918ae6c728d30c615d4c796eddd8d23fffd097884e5fd568bde98d00ac85a921485d532dcb2adadb18c2b5cd7a5c3f0814de9aafe725a1722c297380c0077050f4da94fca7589db643a36f24790095dc18bb891e73fc5a80c3d507a2fc6ed06ac9f37276875280485e55f5aeafc2c2795f4196e4183636a084d5ce83212c4ee45445cded4210c7e03a", 0xe1}], 0x7, &(0x7f0000000c00)=[@ip_retopts={{0x38, 0x0, 0x7, {[@noop, @cipso={0x86, 0x1c, 0x3, [{0x2, 0xe, "8b37b561ac148194a8bf31ab"}, {0x2, 0x8, "888969dc507f"}]}, @timestamp={0x44, 0x8, 0xf, 0x0, 0x5, [0x8]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x12c, 0x0, 0x7, {[@ra={0x94, 0x4}, @rr={0x7, 0xf, 0xa, [@multicast1, @rand_addr=0x64010102, @loopback]}, @timestamp_prespec={0x44, 0x4c, 0x1b, 0x3, 0x7, [{@broadcast, 0x1}, {@private=0xa010102, 0x10}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x400}, {@local, 0x7}, {@rand_addr=0x64010100, 0x1}, {@multicast2, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@loopback, 0x9a5}, {@private=0xa010100, 0x3}]}, @timestamp_addr={0x44, 0x4c, 0x9, 0x1, 0x1, [{@multicast2, 0x6}, {@private=0xa010101, 0xffffffff}, {@empty, 0x8}, {@multicast2, 0xe087}, {@local, 0x1}, {@multicast2, 0x95}, {@remote, 0xc5a}, {@remote, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x99, 0x3, 0x8, [{@remote, 0x4}, {@loopback, 0x5}, {@local, 0x2}, {@local, 0xffff}, {@initdev={0xac, 0x1e, 0x6, 0x0}, 0x1}, {@multicast1, 0x3}, {@local, 0x10000}]}, @rr={0x7, 0x7, 0x5b, [@rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x2c, 0x76, 0x3, 0x7, [{@rand_addr=0x64010101, 0x7ff}, {@local, 0x8}, {@empty, 0xa}, {@local, 0x5}, {@rand_addr=0x64010101, 0x4}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @private=0xa010101, @multicast1}}}, @ip_retopts={{0x64, 0x0, 0x7, {[@cipso={0x86, 0x4a, 0x3, [{0x5, 0x6, "20161f89"}, {0x2, 0x5, "3237c6"}, {0x6, 0xd, "a235cc84877506cc47c46d"}, {0x2, 0x4, '~k'}, {0x7, 0x4, "4495"}, {0x5, 0xc, "f3621823e26d72b99b8c"}, {0x6, 0xe, "37e48d98f98f0f9e337d8e78"}, {0x6, 0xa, "33f48c00eb169757"}]}, @end, @end, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x54e}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6e}}, @ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0x90, [@multicast1, @private=0xa010100, @rand_addr=0x64010102, @private=0xa010102, @multicast2, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x2f}]}, @end, @ra={0x94, 0x4, 0x1}, @end, @end, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xef, 0x3, 0x6, [{@local, 0xda0f}]}, @timestamp_prespec={0x44, 0x1c, 0xf7, 0x3, 0x2, [{@loopback, 0x1}, {@broadcast, 0x3ff}, {@rand_addr=0x64010100, 0x6}]}, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xbf}}], 0x2c0}}, {{&(0x7f0000000680)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000700)="3e86d79ab0a7056f4db203e76f6b21", 0xf}], 0x1, &(0x7f0000000fc0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4c}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @dev={0xac, 0x14, 0x14, 0x39}, @broadcast}}}, @ip_retopts={{0x64, 0x0, 0x7, {[@rr={0x7, 0xb, 0x64, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0x17, 0xbf, [@dev={0xac, 0x14, 0x14, 0x31}, @multicast1, @rand_addr=0x64010101, @rand_addr=0x64010100, @multicast2]}, @timestamp={0x44, 0x14, 0x35, 0x0, 0x6, [0x5, 0x40000000, 0x1, 0x1]}, @timestamp_prespec={0x44, 0xc, 0x63, 0x3, 0x3, [{@private=0xa010102, 0x4}]}, @lsrr={0x83, 0xf, 0x76, [@local, @empty, @loopback]}]}}}], 0xa0}}], 0x2, 0x40804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r4, 0x0, 0x5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, 0x0, &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) (async) socket$nl_netfilter(0x10, 0x3, 0xc) 145.568054ms ago: executing program 2 (id=388): syz_usb_connect(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x403}}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffff, @loopback, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r3, 0x0, 0x2}, 0x18) r4 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x4000) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[], 0x2b08}}, 0x4000806) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000340)=@ccm_128={{0x304}, "49c2ace48cb54d80", "e0e6d4a271e30000596600", '\x00', "c962b0c0b5d958c9"}, 0x28) recvmmsg(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)=""/94, 0x5e}], 0x1}, 0x4}], 0x1, 0x40000002, 0x0) 58.312348ms ago: executing program 4 (id=389): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3fb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_open_procfs(0x0, &(0x7f0000001300)='net/kcm\x00') r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) sendmmsg$inet(r3, &(0x7f0000000240)=[{{&(0x7f00000007c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a905000400007464fd009e150451160200000064", 0x14}], 0x1}}], 0x1, 0x4004040) 0s ago: executing program 4 (id=390): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0xb, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x30, 0x30, 0x0]}}, &(0x7f00000005c0)=""/240, 0x2a, 0xf0, 0x1, 0x2, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) setreuid(0x0, 0xee00) setresuid(0xee00, 0xee01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x381042, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000180)=[{0x4, 0x4, 0xd, 0x6}, {0x4, 0x4, 0x3, 0x2}], 0x10, 0x26}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01032757c38d085641a7260000000c000180080001"], 0x20}, 0x1, 0x0, 0x0, 0x20040005}, 0x48d4) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.46' (ED25519) to the list of known hosts. [ 33.624448][ T29] audit: type=1400 audit(1765106885.895:62): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.647574][ T29] audit: type=1400 audit(1765106885.925:63): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.648530][ T3309] cgroup: Unknown subsys name 'net' [ 33.675475][ T29] audit: type=1400 audit(1765106885.945:64): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.816447][ T3309] cgroup: Unknown subsys name 'cpuset' [ 33.822676][ T3309] cgroup: Unknown subsys name 'rlimit' [ 34.014523][ T29] audit: type=1400 audit(1765106886.285:65): avc: denied { setattr } for pid=3309 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.037839][ T29] audit: type=1400 audit(1765106886.285:66): avc: denied { create } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.058295][ T29] audit: type=1400 audit(1765106886.295:67): avc: denied { write } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.060193][ T3311] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.078773][ T29] audit: type=1400 audit(1765106886.295:68): avc: denied { read } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.107689][ T29] audit: type=1400 audit(1765106886.295:69): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.132570][ T29] audit: type=1400 audit(1765106886.295:70): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.143519][ T3309] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.156041][ T29] audit: type=1400 audit(1765106886.315:71): avc: denied { read } for pid=3048 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 36.534542][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 36.607657][ T3329] chnl_net:caif_netlink_parms(): no params data found [ 36.645818][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 36.674296][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.681499][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.688812][ T3318] bridge_slave_0: entered allmulticast mode [ 36.695536][ T3318] bridge_slave_0: entered promiscuous mode [ 36.704275][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.711534][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.718842][ T3318] bridge_slave_1: entered allmulticast mode [ 36.725215][ T3318] bridge_slave_1: entered promiscuous mode [ 36.745350][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 36.796320][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.807944][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 36.822263][ T3329] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.829409][ T3329] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.836595][ T3329] bridge_slave_0: entered allmulticast mode [ 36.843037][ T3329] bridge_slave_0: entered promiscuous mode [ 36.850653][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.867263][ T3329] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.874409][ T3329] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.881599][ T3329] bridge_slave_1: entered allmulticast mode [ 36.888054][ T3329] bridge_slave_1: entered promiscuous mode [ 36.940632][ T3318] team0: Port device team_slave_0 added [ 36.946433][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.953634][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.961019][ T3323] bridge_slave_0: entered allmulticast mode [ 36.967434][ T3323] bridge_slave_0: entered promiscuous mode [ 36.982642][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.992664][ T3318] team0: Port device team_slave_1 added [ 36.998388][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.005467][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.012849][ T3323] bridge_slave_1: entered allmulticast mode [ 37.019477][ T3323] bridge_slave_1: entered promiscuous mode [ 37.034127][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.057856][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.065030][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.072246][ T3325] bridge_slave_0: entered allmulticast mode [ 37.078577][ T3325] bridge_slave_0: entered promiscuous mode [ 37.103828][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.111047][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.118317][ T3325] bridge_slave_1: entered allmulticast mode [ 37.124769][ T3325] bridge_slave_1: entered promiscuous mode [ 37.136560][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.143530][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.169464][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.181604][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.190786][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.198206][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.205577][ T3319] bridge_slave_0: entered allmulticast mode [ 37.212198][ T3319] bridge_slave_0: entered promiscuous mode [ 37.224622][ T3329] team0: Port device team_slave_0 added [ 37.230738][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.238177][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.264210][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.276082][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.285395][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.292596][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.299803][ T3319] bridge_slave_1: entered allmulticast mode [ 37.306423][ T3319] bridge_slave_1: entered promiscuous mode [ 37.319662][ T3329] team0: Port device team_slave_1 added [ 37.338673][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.365392][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.381280][ T3323] team0: Port device team_slave_0 added [ 37.388003][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.402035][ T3329] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.409069][ T3329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.435036][ T3329] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.451806][ T3323] team0: Port device team_slave_1 added [ 37.458567][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.472761][ T3329] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.479870][ T3329] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.505891][ T3329] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.532410][ T3325] team0: Port device team_slave_0 added [ 37.542391][ T3318] hsr_slave_0: entered promiscuous mode [ 37.548481][ T3318] hsr_slave_1: entered promiscuous mode [ 37.570715][ T3325] team0: Port device team_slave_1 added [ 37.583754][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.590868][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.617131][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.631744][ T3319] team0: Port device team_slave_0 added [ 37.647164][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.654121][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.680117][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.691765][ T3319] team0: Port device team_slave_1 added [ 37.709373][ T3329] hsr_slave_0: entered promiscuous mode [ 37.715519][ T3329] hsr_slave_1: entered promiscuous mode [ 37.721703][ T3329] debugfs: 'hsr0' already exists in 'hsr' [ 37.727482][ T3329] Cannot create hsr debugfs directory [ 37.740826][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.747851][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.773844][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.791164][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.798170][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.824095][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.846295][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.853350][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.879514][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.906865][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.913830][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.939845][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.969670][ T3323] hsr_slave_0: entered promiscuous mode [ 37.975884][ T3323] hsr_slave_1: entered promiscuous mode [ 37.981964][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 37.987871][ T3323] Cannot create hsr debugfs directory [ 38.018215][ T3325] hsr_slave_0: entered promiscuous mode [ 38.024308][ T3325] hsr_slave_1: entered promiscuous mode [ 38.030304][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 38.036091][ T3325] Cannot create hsr debugfs directory [ 38.084094][ T3319] hsr_slave_0: entered promiscuous mode [ 38.090113][ T3319] hsr_slave_1: entered promiscuous mode [ 38.096184][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 38.101913][ T3319] Cannot create hsr debugfs directory [ 38.231704][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.242867][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.256290][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.272341][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.304143][ T3323] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.316353][ T3323] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.325250][ T3323] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.343583][ T3329] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.352725][ T3323] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.362625][ T3329] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.376104][ T3329] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.387214][ T3329] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.417534][ T3319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.427338][ T3319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.442801][ T3319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.456201][ T3319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.485519][ T3325] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.494758][ T3325] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.508698][ T3325] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.525739][ T3325] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.578860][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.596408][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.615793][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.627565][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.638481][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.652183][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.659287][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.671620][ T3329] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.679590][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.686691][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.695718][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.702859][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.716973][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.724100][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.738805][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.746082][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.761899][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.769015][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.789027][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.818091][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.837654][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.856489][ T387] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.863717][ T387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.878277][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.888286][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.895395][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.912466][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.919599][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.938279][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.945410][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.972137][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.991817][ T3319] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.003004][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.074966][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.093208][ T3329] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.147056][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.223553][ T3329] veth0_vlan: entered promiscuous mode [ 39.244572][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.254757][ T3329] veth1_vlan: entered promiscuous mode [ 39.278975][ T3318] veth0_vlan: entered promiscuous mode [ 39.328025][ T3318] veth1_vlan: entered promiscuous mode [ 39.335606][ T3323] veth0_vlan: entered promiscuous mode [ 39.349618][ T3329] veth0_macvtap: entered promiscuous mode [ 39.364033][ T3323] veth1_vlan: entered promiscuous mode [ 39.376810][ T3329] veth1_macvtap: entered promiscuous mode [ 39.402452][ T3319] veth0_vlan: entered promiscuous mode [ 39.409041][ T3318] veth0_macvtap: entered promiscuous mode [ 39.422496][ T3329] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.434449][ T3318] veth1_macvtap: entered promiscuous mode [ 39.442731][ T3319] veth1_vlan: entered promiscuous mode [ 39.449483][ T3329] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.458276][ T3323] veth0_macvtap: entered promiscuous mode [ 39.476011][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.486549][ T3325] veth0_vlan: entered promiscuous mode [ 39.493016][ T3323] veth1_macvtap: entered promiscuous mode [ 39.499690][ T52] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.509857][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.523233][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.532458][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.543392][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.556797][ T3325] veth1_vlan: entered promiscuous mode [ 39.568006][ T354] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.576916][ T354] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.588208][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.599087][ T354] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.612474][ T354] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.626885][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.634543][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 39.634559][ T29] audit: type=1400 audit(1765106891.905:85): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/root/syzkaller.9pWaxQ/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.665710][ T29] audit: type=1400 audit(1765106891.905:86): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.687814][ T29] audit: type=1400 audit(1765106891.905:87): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/root/syzkaller.9pWaxQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.713064][ T29] audit: type=1400 audit(1765106891.905:88): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.734864][ T29] audit: type=1400 audit(1765106891.905:89): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/root/syzkaller.9pWaxQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.761510][ T29] audit: type=1400 audit(1765106891.905:90): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/root/syzkaller.9pWaxQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.789072][ T29] audit: type=1400 audit(1765106891.905:91): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.812510][ T29] audit: type=1400 audit(1765106891.945:92): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.812929][ T3329] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.835367][ T29] audit: type=1400 audit(1765106891.945:93): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="gadgetfs" ino=5262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.874848][ T31] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.883708][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.893585][ T3319] veth0_macvtap: entered promiscuous mode [ 39.901098][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.909993][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.927128][ T29] audit: type=1400 audit(1765106892.185:94): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.948028][ T3490] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 39.962078][ T3319] veth1_macvtap: entered promiscuous mode [ 39.980573][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.991681][ T3325] veth0_macvtap: entered promiscuous mode [ 40.003469][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.018676][ T3325] veth1_macvtap: entered promiscuous mode [ 40.029954][ T2538] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.056135][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.066862][ T2538] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.088939][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.108300][ T2538] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.143202][ T2538] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.175668][ T2538] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.206351][ T2538] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.231298][ T2538] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.231344][ T2538] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.265516][ C1] hrtimer: interrupt took 47829 ns [ 40.268107][ T3513] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 40.317583][ T3312] udevd[3312]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 40.402861][ T3527] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 40.751803][ T3548] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 41.744638][ T3552] loop3: detected capacity change from 0 to 128 [ 43.753834][ T3567] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 43.907618][ T3552] syz.3.21: attempt to access beyond end of device [ 43.907618][ T3552] loop3: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 43.940607][ T3552] syz.3.21: attempt to access beyond end of device [ 43.940607][ T3552] loop3: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 43.981669][ T3552] syz.3.21: attempt to access beyond end of device [ 43.981669][ T3552] loop3: rw=2049, sector=177, nr_sectors = 8 limit=128 [ 43.997957][ T3552] syz.3.21: attempt to access beyond end of device [ 43.997957][ T3552] loop3: rw=2049, sector=193, nr_sectors = 8 limit=128 [ 44.011351][ T3552] syz.3.21: attempt to access beyond end of device [ 44.011351][ T3552] loop3: rw=2049, sector=209, nr_sectors = 8 limit=128 [ 44.026113][ T3552] syz.3.21: attempt to access beyond end of device [ 44.026113][ T3552] loop3: rw=2049, sector=225, nr_sectors = 8 limit=128 [ 44.039559][ T3552] syz.3.21: attempt to access beyond end of device [ 44.039559][ T3552] loop3: rw=2049, sector=241, nr_sectors = 8 limit=128 [ 44.064055][ T3575] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 44.085246][ T3579] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 44.132990][ T3552] syz.3.21: attempt to access beyond end of device [ 44.132990][ T3552] loop3: rw=2049, sector=257, nr_sectors = 8 limit=128 [ 44.192000][ T3552] syz.3.21: attempt to access beyond end of device [ 44.192000][ T3552] loop3: rw=2049, sector=273, nr_sectors = 8 limit=128 [ 44.207498][ T3590] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 44.265861][ T3552] syz.3.21: attempt to access beyond end of device [ 44.265861][ T3552] loop3: rw=2049, sector=289, nr_sectors = 8 limit=128 [ 44.342997][ T3597] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.494812][ T3608] netlink: 16 bytes leftover after parsing attributes in process `syz.0.38'. [ 44.775385][ T3618] netlink: 'syz.2.43': attribute type 3 has an invalid length. [ 44.787191][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 44.787209][ T29] audit: type=1400 audit(1765106897.065:152): avc: denied { name_bind } for pid=3617 comm="syz.2.43" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 44.848014][ T29] audit: type=1400 audit(1765106897.065:153): avc: denied { create } for pid=3617 comm="syz.2.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 44.868211][ T29] audit: type=1400 audit(1765106897.105:154): avc: denied { write } for pid=3617 comm="syz.2.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 44.951347][ T29] audit: type=1400 audit(1765106897.225:155): avc: denied { write } for pid=3615 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 44.964412][ T3616] veth2: entered promiscuous mode [ 44.975956][ T3616] veth2: entered allmulticast mode [ 44.976072][ T29] audit: type=1400 audit(1765106897.225:156): avc: denied { connect } for pid=3615 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 45.000470][ T29] audit: type=1400 audit(1765106897.225:157): avc: denied { name_connect } for pid=3615 comm="syz.3.42" dest=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 45.068220][ T29] audit: type=1326 audit(1765106897.275:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3615 comm="syz.3.42" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f401811f749 code=0x7ffc0000 [ 45.091630][ T29] audit: type=1326 audit(1765106897.275:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3615 comm="syz.3.42" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f401811f749 code=0x7ffc0000 [ 45.114928][ T29] audit: type=1326 audit(1765106897.275:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3615 comm="syz.3.42" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f401811df90 code=0x7ffc0000 [ 45.138451][ T29] audit: type=1326 audit(1765106897.315:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3615 comm="syz.3.42" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f401811f749 code=0x7ffc0000 [ 45.234516][ T3631] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 45.461172][ T3597] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.537468][ T3597] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.549506][ T3646] raw_sendmsg: syz.0.52 forgot to set AF_INET. Fix it! [ 45.616144][ T3597] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.663639][ T2538] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.679979][ T2538] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.696771][ T2538] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.705477][ T2538] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.792271][ T3665] FAULT_INJECTION: forcing a failure. [ 45.792271][ T3665] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 45.805721][ T3665] CPU: 0 UID: 0 PID: 3665 Comm: syz.1.62 Not tainted syzkaller #0 PREEMPT(voluntary) [ 45.805752][ T3665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 45.805768][ T3665] Call Trace: [ 45.805780][ T3665] [ 45.805848][ T3665] __dump_stack+0x1d/0x30 [ 45.805879][ T3665] dump_stack_lvl+0xe8/0x140 [ 45.805978][ T3665] dump_stack+0x15/0x1b [ 45.805997][ T3665] should_fail_ex+0x265/0x280 [ 45.806025][ T3665] should_fail+0xb/0x20 [ 45.806049][ T3665] should_fail_usercopy+0x1a/0x20 [ 45.806069][ T3665] strncpy_from_user+0x27/0x260 [ 45.806098][ T3665] getname_flags+0xae/0x3b0 [ 45.806120][ T3665] path_listxattrat+0x7e/0x2a0 [ 45.806198][ T3665] __x64_sys_listxattr+0x4a/0x60 [ 45.806220][ T3665] x64_sys_call+0x2a62/0x3000 [ 45.806241][ T3665] do_syscall_64+0xd8/0x2a0 [ 45.806383][ T3665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.806402][ T3665] RIP: 0033:0x7f6ade4df749 [ 45.806498][ T3665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.806513][ T3665] RSP: 002b:00007f6adcf3f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 45.806533][ T3665] RAX: ffffffffffffffda RBX: 00007f6ade735fa0 RCX: 00007f6ade4df749 [ 45.806544][ T3665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 45.806554][ T3665] RBP: 00007f6adcf3f090 R08: 0000000000000000 R09: 0000000000000000 [ 45.806564][ T3665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.806574][ T3665] R13: 00007f6ade736038 R14: 00007f6ade735fa0 R15: 00007fff0765c618 [ 45.806641][ T3665] [ 45.992775][ T3668] mmap: syz.1.63 (3668) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 46.121449][ T3687] netlink: 40 bytes leftover after parsing attributes in process `syz.1.70'. [ 46.133287][ T3687] netlink: 12 bytes leftover after parsing attributes in process `syz.1.70'. [ 46.161170][ T3687] openvswitch: netlink: Key 0 has unexpected len 2 expected 0 [ 46.185160][ T3692] bond1: option primary_reselect: invalid value (4) [ 46.200516][ T3692] bond1 (unregistering): Released all slaves [ 46.209954][ T3697] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 46.294250][ T3703] netlink: 20 bytes leftover after parsing attributes in process `syz.2.76'. [ 46.341191][ T3703] netlink: 16 bytes leftover after parsing attributes in process `syz.2.76'. [ 46.355452][ T3703] bond0: entered promiscuous mode [ 46.360603][ T3703] bond_slave_0: entered promiscuous mode [ 46.366759][ T3703] bond_slave_1: entered promiscuous mode [ 46.374827][ T3703] gretap0: entered promiscuous mode [ 46.381505][ T3703] hsr1: entered promiscuous mode [ 46.396489][ T3710] tipc: Started in network mode [ 46.401508][ T3710] tipc: Node identity aaaaaaaaaa38, cluster identity 4711 [ 46.408774][ T3710] tipc: Enabled bearer , priority 0 [ 46.495225][ T3714] netlink: 8 bytes leftover after parsing attributes in process `syz.0.80'. [ 46.524471][ T3726] netlink: 80 bytes leftover after parsing attributes in process `syz.2.85'. [ 46.723309][ T3743] FAULT_INJECTION: forcing a failure. [ 46.723309][ T3743] name failslab, interval 1, probability 0, space 0, times 1 [ 46.736050][ T3743] CPU: 0 UID: 0 PID: 3743 Comm: syz.2.88 Not tainted syzkaller #0 PREEMPT(voluntary) [ 46.736083][ T3743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 46.736113][ T3743] Call Trace: [ 46.736120][ T3743] [ 46.736128][ T3743] __dump_stack+0x1d/0x30 [ 46.736155][ T3743] dump_stack_lvl+0xe8/0x140 [ 46.736179][ T3743] dump_stack+0x15/0x1b [ 46.736255][ T3743] should_fail_ex+0x265/0x280 [ 46.736277][ T3743] should_failslab+0x8c/0xb0 [ 46.736315][ T3743] __kmalloc_node_track_caller_noprof+0xb9/0x5b0 [ 46.736401][ T3743] ? sidtab_sid2str_get+0xa0/0x130 [ 46.736447][ T3743] kmemdup_noprof+0x2b/0x70 [ 46.736512][ T3743] sidtab_sid2str_get+0xa0/0x130 [ 46.736612][ T3743] security_sid_to_context_core+0x1eb/0x2e0 [ 46.736696][ T3743] security_sid_to_context+0x27/0x40 [ 46.736722][ T3743] selinux_lsmprop_to_secctx+0x67/0xf0 [ 46.736763][ T3743] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 46.736784][ T3743] audit_log_subj_ctx+0xa4/0x3e0 [ 46.736808][ T3743] ? skb_put+0xa9/0xf0 [ 46.736833][ T3743] audit_log_task_context+0x48/0x70 [ 46.736860][ T3743] audit_log_task+0xf4/0x250 [ 46.736904][ T3743] audit_seccomp+0x61/0x100 [ 46.736956][ T3743] ? __seccomp_filter+0x832/0x1260 [ 46.736984][ T3743] __seccomp_filter+0x843/0x1260 [ 46.737016][ T3743] ? __schedule+0x85f/0xcd0 [ 46.737094][ T3743] ? __fget_files+0x184/0x1c0 [ 46.737121][ T3743] __secure_computing+0x82/0x150 [ 46.737146][ T3743] syscall_trace_enter+0xcf/0x1e0 [ 46.737170][ T3743] do_syscall_64+0xb2/0x2a0 [ 46.737209][ T3743] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.737236][ T3743] RIP: 0033:0x7f11794cf749 [ 46.737255][ T3743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.737277][ T3743] RSP: 002b:00007f1177eed038 EFLAGS: 00000246 ORIG_RAX: 000000000000014e [ 46.737298][ T3743] RAX: ffffffffffffffda RBX: 00007f1179726180 RCX: 00007f11794cf749 [ 46.737319][ T3743] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 46.737333][ T3743] RBP: 00007f1177eed090 R08: 0000000000000000 R09: 0000000000000000 [ 46.737349][ T3743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.737365][ T3743] R13: 00007f1179726218 R14: 00007f1179726180 R15: 00007ffef13510e8 [ 46.737388][ T3743] [ 47.384305][ T3760] FAULT_INJECTION: forcing a failure. [ 47.384305][ T3760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.397603][ T3760] CPU: 0 UID: 0 PID: 3760 Comm: syz.1.97 Not tainted syzkaller #0 PREEMPT(voluntary) [ 47.397637][ T3760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.397653][ T3760] Call Trace: [ 47.397661][ T3760] [ 47.397671][ T3760] __dump_stack+0x1d/0x30 [ 47.397772][ T3760] dump_stack_lvl+0xe8/0x140 [ 47.397796][ T3760] dump_stack+0x15/0x1b [ 47.397821][ T3760] should_fail_ex+0x265/0x280 [ 47.397843][ T3760] should_fail+0xb/0x20 [ 47.397914][ T3760] should_fail_usercopy+0x1a/0x20 [ 47.397987][ T3760] _copy_to_user+0x20/0xa0 [ 47.398017][ T3760] simple_read_from_buffer+0xb5/0x130 [ 47.398037][ T3760] proc_fail_nth_read+0x10e/0x150 [ 47.398083][ T3760] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 47.398118][ T3760] vfs_read+0x1a8/0x770 [ 47.398140][ T3760] ? __rcu_read_unlock+0x4f/0x70 [ 47.398166][ T3760] ? __fget_files+0x184/0x1c0 [ 47.398246][ T3760] ? mutex_lock+0x58/0x90 [ 47.398329][ T3760] ksys_read+0xda/0x1a0 [ 47.398348][ T3760] __x64_sys_read+0x40/0x50 [ 47.398370][ T3760] x64_sys_call+0x2889/0x3000 [ 47.398401][ T3760] do_syscall_64+0xd8/0x2a0 [ 47.398453][ T3760] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.398480][ T3760] RIP: 0033:0x7f6ade4de15c [ 47.398551][ T3760] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 47.398645][ T3760] RSP: 002b:00007f6adcf3f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 47.398662][ T3760] RAX: ffffffffffffffda RBX: 00007f6ade735fa0 RCX: 00007f6ade4de15c [ 47.398674][ T3760] RDX: 000000000000000f RSI: 00007f6adcf3f0a0 RDI: 0000000000000004 [ 47.398685][ T3760] RBP: 00007f6adcf3f090 R08: 0000000000000000 R09: 0000000000000000 [ 47.398731][ T3760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.398745][ T3760] R13: 00007f6ade736038 R14: 00007f6ade735fa0 R15: 00007fff0765c618 [ 47.398762][ T3760] [ 47.597728][ T3562] tipc: Node number set to 9611946 [ 47.898855][ T3796] FAULT_INJECTION: forcing a failure. [ 47.898855][ T3796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.912051][ T3796] CPU: 0 UID: 0 PID: 3796 Comm: syz.2.108 Not tainted syzkaller #0 PREEMPT(voluntary) [ 47.912083][ T3796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.912095][ T3796] Call Trace: [ 47.912112][ T3796] [ 47.912119][ T3796] __dump_stack+0x1d/0x30 [ 47.912216][ T3796] dump_stack_lvl+0xe8/0x140 [ 47.912238][ T3796] dump_stack+0x15/0x1b [ 47.912334][ T3796] should_fail_ex+0x265/0x280 [ 47.912363][ T3796] should_fail+0xb/0x20 [ 47.912387][ T3796] should_fail_usercopy+0x1a/0x20 [ 47.912410][ T3796] _copy_to_user+0x20/0xa0 [ 47.912457][ T3796] simple_read_from_buffer+0xb5/0x130 [ 47.912485][ T3796] proc_fail_nth_read+0x10e/0x150 [ 47.912590][ T3796] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 47.912623][ T3796] vfs_read+0x1a8/0x770 [ 47.912645][ T3796] ? __rcu_read_unlock+0x4f/0x70 [ 47.912672][ T3796] ? __fget_files+0x184/0x1c0 [ 47.912727][ T3796] ? mutex_lock+0x58/0x90 [ 47.912748][ T3796] ksys_read+0xda/0x1a0 [ 47.912772][ T3796] __x64_sys_read+0x40/0x50 [ 47.912795][ T3796] x64_sys_call+0x2889/0x3000 [ 47.912827][ T3796] do_syscall_64+0xd8/0x2a0 [ 47.912876][ T3796] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.912902][ T3796] RIP: 0033:0x7f11794ce15c [ 47.912996][ T3796] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 47.913017][ T3796] RSP: 002b:00007f1177f2f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 47.913078][ T3796] RAX: ffffffffffffffda RBX: 00007f1179725fa0 RCX: 00007f11794ce15c [ 47.913094][ T3796] RDX: 000000000000000f RSI: 00007f1177f2f0a0 RDI: 0000000000000004 [ 47.913153][ T3796] RBP: 00007f1177f2f090 R08: 0000000000000000 R09: 0000000000000000 [ 47.913164][ T3796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.913177][ T3796] R13: 00007f1179726038 R14: 00007f1179725fa0 R15: 00007ffef13510e8 [ 47.913201][ T3796] [ 48.291388][ T3812] Zero length message leads to an empty skb [ 48.369838][ T3818] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3818 comm=syz.4.113 [ 48.382295][ T3818] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3818 comm=syz.4.113 [ 48.389199][ T3812] netlink: 12 bytes leftover after parsing attributes in process `syz.3.110'. [ 48.807601][ T3873] netlink: 'syz.4.125': attribute type 7 has an invalid length. [ 48.866838][ T3884] netlink: 12 bytes leftover after parsing attributes in process `syz.2.129'. [ 48.875871][ T3884] netlink: 20 bytes leftover after parsing attributes in process `syz.2.129'. [ 48.891635][ T3886] syz.4.130 uses obsolete (PF_INET,SOCK_PACKET) [ 48.898545][ T3886] bond_slave_0: entered promiscuous mode [ 48.904378][ T3886] bond_slave_0: entered allmulticast mode [ 48.969793][ T3898] FAULT_INJECTION: forcing a failure. [ 48.969793][ T3898] name failslab, interval 1, probability 0, space 0, times 0 [ 48.982556][ T3898] CPU: 1 UID: 0 PID: 3898 Comm: syz.2.135 Not tainted syzkaller #0 PREEMPT(voluntary) [ 48.982589][ T3898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 48.982607][ T3898] Call Trace: [ 48.982614][ T3898] [ 48.982622][ T3898] __dump_stack+0x1d/0x30 [ 48.982651][ T3898] dump_stack_lvl+0xe8/0x140 [ 48.982678][ T3898] dump_stack+0x15/0x1b [ 48.982701][ T3898] should_fail_ex+0x265/0x280 [ 48.982861][ T3898] should_failslab+0x8c/0xb0 [ 48.982883][ T3898] __kmalloc_cache_noprof+0x65/0x4c0 [ 48.982947][ T3898] ? tipc_group_create_member+0x42/0x270 [ 48.983003][ T3898] tipc_group_create_member+0x42/0x270 [ 48.983047][ T3898] tipc_group_add_member+0x2e/0x40 [ 48.983088][ T3898] tipc_nametbl_build_group+0x1b6/0x230 [ 48.983168][ T3898] tipc_sk_join+0x240/0x2e0 [ 48.983206][ T3898] tipc_setsockopt+0x598/0x620 [ 48.983239][ T3898] ? __pfx_tipc_setsockopt+0x10/0x10 [ 48.983344][ T3898] __sys_setsockopt+0x184/0x200 [ 48.983374][ T3898] __x64_sys_setsockopt+0x64/0x80 [ 48.983408][ T3898] x64_sys_call+0x21d5/0x3000 [ 48.983433][ T3898] do_syscall_64+0xd8/0x2a0 [ 48.983487][ T3898] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.983514][ T3898] RIP: 0033:0x7f11794cf749 [ 48.983532][ T3898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.983553][ T3898] RSP: 002b:00007f1177f2f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 48.983575][ T3898] RAX: ffffffffffffffda RBX: 00007f1179725fa0 RCX: 00007f11794cf749 [ 48.983662][ T3898] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000003 [ 48.983677][ T3898] RBP: 00007f1177f2f090 R08: 0000000000000010 R09: 0000000000000000 [ 48.983693][ T3898] R10: 0000200000000380 R11: 0000000000000246 R12: 0000000000000001 [ 48.983708][ T3898] R13: 00007f1179726038 R14: 00007f1179725fa0 R15: 00007ffef13510e8 [ 48.983732][ T3898] [ 49.218699][ T3903] 9pnet_fd: Insufficient options for proto=fd [ 49.277709][ T3909] 0ªX¹¦À: renamed from caif0 [ 49.297325][ T3909] 0ªX¹¦À: entered allmulticast mode [ 49.302571][ T3909] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 49.347073][ T3920] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 49.354479][ T3920] IPv6: NLM_F_CREATE should be set when creating new route [ 49.361798][ T3920] IPv6: NLM_F_CREATE should be set when creating new route [ 49.383092][ T3920] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 49.409519][ T3925] ======================================================= [ 49.409519][ T3925] WARNING: The mand mount option has been deprecated and [ 49.409519][ T3925] and is ignored by this kernel. Remove the mand [ 49.409519][ T3925] option from the mount to silence this warning. [ 49.409519][ T3925] ======================================================= [ 49.521857][ T3928] VFS: Mount too revealing [ 49.597903][ T3946] __nla_validate_parse: 4 callbacks suppressed [ 49.597921][ T3946] netlink: 12 bytes leftover after parsing attributes in process `syz.3.150'. [ 49.799919][ T29] kauditd_printk_skb: 595 callbacks suppressed [ 49.799943][ T29] audit: type=1326 audit(1765106902.075:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.835751][ T29] audit: type=1326 audit(1765106902.105:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.859200][ T29] audit: type=1326 audit(1765106902.105:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.882599][ T29] audit: type=1326 audit(1765106902.105:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.905774][ T29] audit: type=1326 audit(1765106902.105:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.929128][ T29] audit: type=1326 audit(1765106902.105:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.952388][ T29] audit: type=1326 audit(1765106902.105:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 49.970676][ T3952] netlink: 'syz.1.157': attribute type 1 has an invalid length. [ 49.983598][ T3952] netlink: 224 bytes leftover after parsing attributes in process `syz.1.157'. [ 49.996378][ T29] audit: type=1326 audit(1765106902.135:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 50.019696][ T29] audit: type=1326 audit(1765106902.135:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 50.042975][ T29] audit: type=1326 audit(1765106902.235:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ade4df749 code=0x7ffc0000 [ 50.200243][ T3973] netlink: 'syz.2.162': attribute type 1 has an invalid length. [ 50.208379][ T3973] netlink: 8 bytes leftover after parsing attributes in process `syz.2.162'. [ 50.217450][ T3973] program syz.2.162 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 50.230701][ T3965] netlink: 4 bytes leftover after parsing attributes in process `syz.4.160'. [ 50.378788][ T3977] 8021q: adding VLAN 0 to HW filter on device bond1 [ 50.402095][ T3985] netlink: 'syz.4.164': attribute type 10 has an invalid length. [ 50.457344][ T3988] netlink: 8 bytes leftover after parsing attributes in process `syz.1.167'. [ 50.493156][ T3977] bond1 (unregistering): Released all slaves [ 50.527995][ T3986] netlink: 4 bytes leftover after parsing attributes in process `syz.1.167'. [ 50.577291][ T3985] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 50.600409][ T3985] team0: Failed to send options change via netlink (err -105) [ 50.608069][ T3985] team0: Port device dummy0 added [ 50.623219][ T3991] netlink: 'syz.0.168': attribute type 7 has an invalid length. [ 50.631055][ T3991] netlink: 8 bytes leftover after parsing attributes in process `syz.0.168'. [ 50.656919][ T3985] syz.4.164 (3985) used greatest stack depth: 10032 bytes left [ 50.679666][ T3994] smc: net device bond0 applied user defined pnetid SYZ0 [ 50.719767][ T3999] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 50.732831][ T3994] netlink: 12 bytes leftover after parsing attributes in process `syz.2.169'. [ 50.759754][ T3999] netlink: 'syz.1.171': attribute type 1 has an invalid length. [ 50.767896][ T3999] netlink: 224 bytes leftover after parsing attributes in process `syz.1.171'. [ 50.786958][ T3994] bond1: (slave veth3): Enslaving as an active interface with an up link [ 51.067833][ T4023] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.161670][ T4023] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.392324][ T4023] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.499870][ T4023] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.553179][ T4039] FAULT_INJECTION: forcing a failure. [ 51.553179][ T4039] name failslab, interval 1, probability 0, space 0, times 0 [ 51.565904][ T4039] CPU: 0 UID: 0 PID: 4039 Comm: syz.1.183 Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.565930][ T4039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.565960][ T4039] Call Trace: [ 51.565969][ T4039] [ 51.565977][ T4039] __dump_stack+0x1d/0x30 [ 51.566008][ T4039] dump_stack_lvl+0xe8/0x140 [ 51.566103][ T4039] dump_stack+0x15/0x1b [ 51.566128][ T4039] should_fail_ex+0x265/0x280 [ 51.566151][ T4039] should_failslab+0x8c/0xb0 [ 51.566191][ T4039] __kmalloc_node_noprof+0xbe/0x5c0 [ 51.566220][ T4039] ? alloc_slab_obj_exts+0x3e/0xd0 [ 51.566242][ T4039] alloc_slab_obj_exts+0x3e/0xd0 [ 51.566261][ T4039] __memcg_slab_post_alloc_hook+0x240/0x530 [ 51.566305][ T4039] kmem_cache_alloc_lru_noprof+0x2cc/0x4c0 [ 51.566331][ T4039] ? __d_alloc+0x37/0x340 [ 51.566363][ T4039] __d_alloc+0x37/0x340 [ 51.566389][ T4039] ? mpol_shared_policy_init+0xbd/0x4c0 [ 51.566448][ T4039] d_alloc_pseudo+0x1e/0x80 [ 51.566494][ T4039] alloc_file_pseudo+0x71/0x160 [ 51.566525][ T4039] __shmem_file_setup+0x1de/0x210 [ 51.566570][ T4039] shmem_file_setup+0x3b/0x50 [ 51.566658][ T4039] __se_sys_memfd_create+0x2f7/0x6b0 [ 51.566700][ T4039] __x64_sys_memfd_create+0x31/0x40 [ 51.566730][ T4039] x64_sys_call+0x28cb/0x3000 [ 51.566804][ T4039] do_syscall_64+0xd8/0x2a0 [ 51.566843][ T4039] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.566903][ T4039] RIP: 0033:0x7f6ade4df749 [ 51.566981][ T4039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.567008][ T4039] RSP: 002b:00007f6adcf3ed68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 51.567033][ T4039] RAX: ffffffffffffffda RBX: 0000000000001062 RCX: 00007f6ade4df749 [ 51.567046][ T4039] RDX: 00007f6adcf3edec RSI: 0000000000000000 RDI: 00007f6ade564960 [ 51.567057][ T4039] RBP: 0000200000000000 R08: 00007f6adcf3eb07 R09: 0000000000000000 [ 51.567069][ T4039] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 51.567097][ T4039] R13: 00007f6adcf3edec R14: 00007f6adcf3edf0 R15: 00007fff0765c618 [ 51.567123][ T4039] [ 51.896969][ T2538] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.023290][ T52] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.031652][ T52] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.058608][ T4045] xt_TCPMSS: Only works on TCP SYN packets [ 52.065534][ T4045] bridge0: port 3(gretap0) entered blocking state [ 52.072248][ T4045] bridge0: port 3(gretap0) entered disabled state [ 52.078844][ T4045] gretap0: entered allmulticast mode [ 52.085446][ T4045] gretap0: entered promiscuous mode [ 52.090950][ T4045] bridge0: port 3(gretap0) entered blocking state [ 52.097453][ T4045] bridge0: port 3(gretap0) entered forwarding state [ 52.191356][ T52] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.556063][ T4068] capability: warning: `syz.3.193' uses deprecated v2 capabilities in a way that may be insecure [ 53.631805][ T4074] netlink: 68 bytes leftover after parsing attributes in process `syz.3.195'. [ 53.815685][ T4079] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 54.014303][ T4079] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 54.146262][ T4079] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 54.272301][ T4079] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 54.402689][ T52] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.578322][ T52] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.586686][ T52] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.595099][ T52] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.736130][ T4098] __nla_validate_parse: 1 callbacks suppressed [ 54.736145][ T4098] netlink: 24 bytes leftover after parsing attributes in process `syz.1.206'. [ 54.765736][ T4096] FAULT_INJECTION: forcing a failure. [ 54.765736][ T4096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.778900][ T4096] CPU: 0 UID: 0 PID: 4096 Comm: syz.3.205 Not tainted syzkaller #0 PREEMPT(voluntary) [ 54.778963][ T4096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 54.778977][ T4096] Call Trace: [ 54.778985][ T4096] [ 54.778993][ T4096] __dump_stack+0x1d/0x30 [ 54.779028][ T4096] dump_stack_lvl+0xe8/0x140 [ 54.779094][ T4096] dump_stack+0x15/0x1b [ 54.779132][ T4096] should_fail_ex+0x265/0x280 [ 54.779161][ T4096] should_fail+0xb/0x20 [ 54.779236][ T4096] should_fail_usercopy+0x1a/0x20 [ 54.779289][ T4096] _copy_to_user+0x20/0xa0 [ 54.779318][ T4096] simple_read_from_buffer+0xb5/0x130 [ 54.779339][ T4096] proc_fail_nth_read+0x10e/0x150 [ 54.779420][ T4096] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 54.779448][ T4096] vfs_read+0x1a8/0x770 [ 54.779465][ T4096] ? schedule_timeout+0x53/0x170 [ 54.779495][ T4096] ? __rcu_read_unlock+0x4f/0x70 [ 54.779568][ T4096] ? __fget_files+0x184/0x1c0 [ 54.779590][ T4096] ? mutex_lock+0x58/0x90 [ 54.779612][ T4096] ksys_read+0xda/0x1a0 [ 54.779631][ T4096] __x64_sys_read+0x40/0x50 [ 54.779651][ T4096] x64_sys_call+0x2889/0x3000 [ 54.779881][ T4096] do_syscall_64+0xd8/0x2a0 [ 54.779911][ T4096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.779943][ T4096] RIP: 0033:0x7f401811e15c [ 54.779959][ T4096] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 54.779976][ T4096] RSP: 002b:00007f4016b87030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 54.779995][ T4096] RAX: ffffffffffffffda RBX: 00007f4018375fa0 RCX: 00007f401811e15c [ 54.780009][ T4096] RDX: 000000000000000f RSI: 00007f4016b870a0 RDI: 0000000000000003 [ 54.780021][ T4096] RBP: 00007f4016b87090 R08: 0000000000000000 R09: 0000000000000000 [ 54.780104][ T4096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.780115][ T4096] R13: 00007f4018376038 R14: 00007f4018375fa0 R15: 00007ffd5bb4ac18 [ 54.780211][ T4096] [ 55.073922][ T4089] syz.2.202 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 55.088464][ T4089] CPU: 1 UID: 0 PID: 4089 Comm: syz.2.202 Not tainted syzkaller #0 PREEMPT(voluntary) [ 55.088504][ T4089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 55.088519][ T4089] Call Trace: [ 55.088528][ T4089] [ 55.088536][ T4089] __dump_stack+0x1d/0x30 [ 55.088567][ T4089] dump_stack_lvl+0xe8/0x140 [ 55.088675][ T29] kauditd_printk_skb: 365 callbacks suppressed [ 55.088598][ T4089] dump_stack+0x15/0x1b [ 55.088689][ T29] audit: type=1400 audit(1765106907.345:1131): avc: denied { read } for pid=4107 comm="syz.3.210" name="usbmon1" dev="devtmpfs" ino=143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 55.088754][ T4089] dump_header+0x81/0x240 [ 55.088787][ T4089] oom_kill_process+0x295/0x350 [ 55.088822][ T4089] out_of_memory+0x97b/0xb80 [ 55.088862][ T4089] try_charge_memcg+0x610/0xa10 [ 55.088936][ T4089] obj_cgroup_charge_pages+0xa6/0x150 [ 55.088982][ T4089] __memcg_kmem_charge_page+0x9f/0x170 [ 55.089025][ T4089] __alloc_frozen_pages_noprof+0x18f/0x360 [ 55.089106][ T4089] alloc_pages_mpol+0xb3/0x260 [ 55.089145][ T4089] ? alloc_pages_noprof+0xf4/0x130 [ 55.089187][ T4089] alloc_pages_noprof+0x90/0x130 [ 55.089291][ T4089] __vmalloc_node_range_noprof+0xa7b/0x1310 [ 55.089354][ T4089] __kvmalloc_node_noprof+0x492/0x6b0 [ 55.089448][ T4089] ? ip_set_alloc+0x24/0x30 [ 55.089482][ T4089] ? ip_set_alloc+0x24/0x30 [ 55.089547][ T4089] ip_set_alloc+0x24/0x30 [ 55.089580][ T4089] hash_netiface_create+0x282/0x740 [ 55.089634][ T4089] ? __pfx_hash_netiface_create+0x10/0x10 [ 55.089679][ T4089] ip_set_create+0x3cc/0x970 [ 55.089770][ T4089] ? __nla_parse+0x40/0x60 [ 55.089809][ T4089] nfnetlink_rcv_msg+0x4c6/0x590 [ 55.089885][ T4089] netlink_rcv_skb+0x123/0x220 [ 55.089938][ T4089] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 55.089982][ T4089] nfnetlink_rcv+0x167/0x16c0 [ 55.090001][ T4089] ? kmem_cache_free+0xe3/0x3a0 [ 55.090026][ T4089] ? __kfree_skb+0x109/0x150 [ 55.090065][ T4089] ? nlmon_xmit+0x4f/0x60 [ 55.090090][ T4089] ? consume_skb+0x49/0x150 [ 55.090117][ T4089] ? nlmon_xmit+0x4f/0x60 [ 55.090143][ T4089] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 55.090229][ T4089] ? __dev_queue_xmit+0x138d/0x1ec0 [ 55.090261][ T4089] ? __dev_queue_xmit+0x148/0x1ec0 [ 55.090296][ T4089] ? ref_tracker_free+0x37d/0x3e0 [ 55.090464][ T4089] ? __netlink_deliver_tap+0x4dc/0x500 [ 55.090509][ T4089] netlink_unicast+0x5c0/0x690 [ 55.090547][ T4089] netlink_sendmsg+0x58b/0x6b0 [ 55.090588][ T4089] ? __pfx_netlink_sendmsg+0x10/0x10 [ 55.090712][ T4089] __sock_sendmsg+0x145/0x180 [ 55.090777][ T4089] ____sys_sendmsg+0x31e/0x4a0 [ 55.090817][ T4089] ___sys_sendmsg+0x17b/0x1d0 [ 55.090919][ T4089] __x64_sys_sendmsg+0xd4/0x160 [ 55.090963][ T4089] x64_sys_call+0x17ba/0x3000 [ 55.090997][ T4089] do_syscall_64+0xd8/0x2a0 [ 55.091106][ T4089] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.091136][ T4089] RIP: 0033:0x7f11794cf749 [ 55.091157][ T4089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.091182][ T4089] RSP: 002b:00007f1177f2f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.091208][ T4089] RAX: ffffffffffffffda RBX: 00007f1179725fa0 RCX: 00007f11794cf749 [ 55.091240][ T4089] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000004 [ 55.091257][ T4089] RBP: 00007f1179553f91 R08: 0000000000000000 R09: 0000000000000000 [ 55.091274][ T4089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.091291][ T4089] R13: 00007f1179726038 R14: 00007f1179725fa0 R15: 00007ffef13510e8 [ 55.091321][ T4089] [ 55.091371][ T4089] memory: usage 307200kB, limit 307200kB, failcnt 276 [ 55.099232][ T29] audit: type=1400 audit(1765106907.345:1132): avc: denied { open } for pid=4107 comm="syz.3.210" path="/dev/usbmon1" dev="devtmpfs" ino=143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 55.099263][ T29] audit: type=1400 audit(1765106907.345:1133): avc: denied { ioctl } for pid=4107 comm="syz.3.210" path="/dev/usbmon1" dev="devtmpfs" ino=143 ioctlcmd=0x920a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 55.167615][ T4113] netlink: 'syz.4.211': attribute type 4 has an invalid length. [ 55.172460][ T4089] memory+swap: usage 307312kB, limit 9007199254740988kB, failcnt 0 [ 55.519997][ T4089] kmem: usage 79804kB, limit 9007199254740988kB, failcnt 0 [ 55.520019][ T4089] Memory cgroup stats for /syz2: [ 55.539436][ T4117] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 55.556347][ T4089] cache 524288 [ 55.559829][ T4089] rss 36864 [ 55.562965][ T4089] shmem 0 [ 55.565997][ T4089] mapped_file 8192 [ 55.569844][ T4089] dirty 8192 [ 55.573259][ T4089] writeback 0 [ 55.576852][ T4089] workingset_refault_anon 59 [ 55.581513][ T4089] workingset_refault_file 138 [ 55.586235][ T4089] swap 86016 [ 55.589506][ T4089] swapcached 40960 [ 55.593238][ T4089] pgpgin 13567 [ 55.596720][ T4089] pgpgout 13429 [ 55.600190][ T4089] pgfault 16582 [ 55.603668][ T4089] pgmajfault 44 [ 55.607238][ T4089] inactive_anon 0 [ 55.610979][ T4089] active_anon 40960 [ 55.614831][ T4089] inactive_file 0 [ 55.618558][ T4089] active_file 524288 [ 55.622636][ T4089] unevictable 0 [ 55.626158][ T4089] hierarchical_memory_limit 314572800 [ 55.631582][ T4089] hierarchical_memsw_limit 9223372036854771712 [ 55.637796][ T4089] total_cache 524288 [ 55.641745][ T4089] total_rss 36864 [ 55.645536][ T4089] total_shmem 0 [ 55.649129][ T4089] total_mapped_file 8192 [ 55.653569][ T4089] total_dirty 8192 [ 55.657345][ T4089] total_writeback 0 [ 55.661184][ T4089] total_workingset_refault_anon 59 [ 55.666353][ T4089] total_workingset_refault_file 138 [ 55.671606][ T4089] total_swap 86016 [ 55.675342][ T4089] total_swapcached 40960 [ 55.679721][ T4089] total_pgpgin 13567 [ 55.683667][ T4089] total_pgpgout 13429 [ 55.687691][ T4089] total_pgfault 16582 [ 55.691809][ T4089] total_pgmajfault 44 [ 55.695885][ T4089] total_inactive_anon 0 [ 55.700123][ T4089] total_active_anon 40960 [ 55.704454][ T4089] total_inactive_file 0 [ 55.708728][ T4089] total_active_file 524288 [ 55.713156][ T4089] total_unevictable 0 [ 55.717205][ T4089] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.202,pid=4088,uid=0 [ 55.731926][ T4089] Memory cgroup out of memory: Killed process 4089 (syz.2.202) total-vm:90128kB, anon-rss:1264kB, file-rss:21668kB, shmem-rss:0kB, UID:0 pgtables:116kB oom_score_adj:1000 [ 55.771138][ T4089] syz.2.202 (4089) used greatest stack depth: 7240 bytes left [ 55.836461][ T4129] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 55.873281][ T4131] netlink: 68 bytes leftover after parsing attributes in process `syz.2.217'. [ 55.888320][ T4117] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 55.915153][ T29] audit: type=1326 audit(1765106908.185:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 55.947291][ T4129] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 55.949370][ T29] audit: type=1326 audit(1765106908.215:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 56.016891][ T4117] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.171139][ T29] audit: type=1326 audit(1765106908.265:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 56.194631][ T29] audit: type=1326 audit(1765106908.265:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 56.218084][ T29] audit: type=1326 audit(1765106908.265:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 56.241635][ T29] audit: type=1326 audit(1765106908.265:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 56.265098][ T29] audit: type=1326 audit(1765106908.265:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.4.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 56.298040][ T4129] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.347646][ T4117] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.389160][ T4129] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.447605][ T52] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.460834][ T52] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.492880][ T52] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.515809][ T52] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.769348][ T4165] netlink: 8 bytes leftover after parsing attributes in process `syz.1.229'. [ 56.847832][ T4157] veth2: entered promiscuous mode [ 56.853015][ T4157] veth2: entered allmulticast mode [ 57.027200][ T4175] FAULT_INJECTION: forcing a failure. [ 57.027200][ T4175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.040562][ T4175] CPU: 0 UID: 0 PID: 4175 Comm: syz.1.233 Not tainted syzkaller #0 PREEMPT(voluntary) [ 57.040600][ T4175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 57.040616][ T4175] Call Trace: [ 57.040624][ T4175] [ 57.040642][ T4175] __dump_stack+0x1d/0x30 [ 57.040667][ T4175] dump_stack_lvl+0xe8/0x140 [ 57.040721][ T4175] dump_stack+0x15/0x1b [ 57.040741][ T4175] should_fail_ex+0x265/0x280 [ 57.040776][ T4175] should_fail+0xb/0x20 [ 57.040800][ T4175] should_fail_usercopy+0x1a/0x20 [ 57.040900][ T4175] _copy_from_user+0x1c/0xb0 [ 57.041069][ T4175] perf_copy_attr+0x145/0x610 [ 57.041104][ T4175] ? get_pid_task+0x96/0xd0 [ 57.041222][ T4175] __se_sys_perf_event_open+0x67/0x1210 [ 57.041324][ T4175] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 57.041421][ T4175] ? vfs_write+0x7e8/0x960 [ 57.041438][ T4175] ? __rcu_read_unlock+0x4f/0x70 [ 57.041541][ T4175] __x64_sys_perf_event_open+0x67/0x80 [ 57.041618][ T4175] x64_sys_call+0x78c/0x3000 [ 57.041641][ T4175] do_syscall_64+0xd8/0x2a0 [ 57.041684][ T4175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.041711][ T4175] RIP: 0033:0x7f6ade4df749 [ 57.041739][ T4175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.041779][ T4175] RSP: 002b:00007f6adcf3f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 57.041797][ T4175] RAX: ffffffffffffffda RBX: 00007f6ade735fa0 RCX: 00007f6ade4df749 [ 57.041872][ T4175] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000140 [ 57.041888][ T4175] RBP: 00007f6adcf3f090 R08: 0000000000000002 R09: 0000000000000000 [ 57.041948][ T4175] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 57.042021][ T4175] R13: 00007f6ade736038 R14: 00007f6ade735fa0 R15: 00007fff0765c618 [ 57.042046][ T4175] [ 57.369516][ T4191] netlink: 8 bytes leftover after parsing attributes in process `syz.4.240'. [ 57.379184][ T4191] netlink: 40 bytes leftover after parsing attributes in process `syz.4.240'. [ 57.394462][ T4173] veth4: entered promiscuous mode [ 57.399616][ T4173] veth4: entered allmulticast mode [ 57.546668][ T4200] vhci_hcd: USB_PORT_FEAT_LINK_STATE req not supported for USB 2.0 roothub [ 57.819512][ T4207] netlink: 'syz.2.245': attribute type 4 has an invalid length. [ 57.963390][ T4210] netlink: 4 bytes leftover after parsing attributes in process `syz.2.246'. [ 58.421310][ T4218] veth4: entered promiscuous mode [ 58.426432][ T4218] veth4: entered allmulticast mode [ 58.571256][ T4223] netlink: 12 bytes leftover after parsing attributes in process `syz.0.250'. [ 58.601757][ T4223] bridge2: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 58.675163][ T4236] vhci_hcd: USB_PORT_FEAT_LINK_STATE req not supported for USB 2.0 roothub [ 58.693635][ T4238] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 58.753349][ T4243] netlink: 68 bytes leftover after parsing attributes in process `syz.2.253'. [ 58.898513][ T4257] netlink: 72 bytes leftover after parsing attributes in process `syz.0.258'. [ 59.490398][ T4279] 9pnet_fd: Insufficient options for proto=fd [ 59.575590][ T4277] veth4: entered promiscuous mode [ 59.580727][ T4277] veth4: entered allmulticast mode [ 59.668028][ T4292] FAULT_INJECTION: forcing a failure. [ 59.668028][ T4292] name failslab, interval 1, probability 0, space 0, times 0 [ 59.680847][ T4292] CPU: 1 UID: 0 PID: 4292 Comm: syz.4.269 Not tainted syzkaller #0 PREEMPT(voluntary) [ 59.680929][ T4292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 59.680945][ T4292] Call Trace: [ 59.680953][ T4292] [ 59.680964][ T4292] __dump_stack+0x1d/0x30 [ 59.680989][ T4292] dump_stack_lvl+0xe8/0x140 [ 59.681022][ T4292] dump_stack+0x15/0x1b [ 59.681040][ T4292] should_fail_ex+0x265/0x280 [ 59.681111][ T4292] should_failslab+0x8c/0xb0 [ 59.681131][ T4292] __kmalloc_cache_node_noprof+0x6a/0x4d0 [ 59.681153][ T4292] ? __get_vm_area_node+0x106/0x1d0 [ 59.681175][ T4292] __get_vm_area_node+0x106/0x1d0 [ 59.681271][ T4292] __vmalloc_node_range_noprof+0x28e/0x1310 [ 59.681325][ T4292] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 59.681346][ T4292] ? do_dentry_open+0x52a/0xa60 [ 59.681406][ T4292] ? __rcu_read_unlock+0x4f/0x70 [ 59.681425][ T4292] ? avc_has_perm_noaudit+0xab/0x130 [ 59.681488][ T4292] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 59.681505][ T4292] __vmalloc_noprof+0xa4/0xf0 [ 59.681527][ T4292] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 59.681578][ T4292] bpf_prog_alloc_no_stats+0x47/0x390 [ 59.681595][ T4292] ? bpf_prog_alloc+0x2a/0x150 [ 59.681612][ T4292] bpf_prog_alloc+0x3c/0x150 [ 59.681629][ T4292] bpf_prog_load+0x506/0x1140 [ 59.681657][ T4292] ? security_bpf+0x2b/0x90 [ 59.681751][ T4292] __sys_bpf+0x469/0x7c0 [ 59.681777][ T4292] __x64_sys_bpf+0x41/0x50 [ 59.681834][ T4292] x64_sys_call+0x28e1/0x3000 [ 59.681856][ T4292] do_syscall_64+0xd8/0x2a0 [ 59.681884][ T4292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.681903][ T4292] RIP: 0033:0x7f13c3b9f749 [ 59.681987][ T4292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.682012][ T4292] RSP: 002b:00007f13c2607038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 59.682029][ T4292] RAX: ffffffffffffffda RBX: 00007f13c3df5fa0 RCX: 00007f13c3b9f749 [ 59.682039][ T4292] RDX: 0000000000000090 RSI: 0000200000000340 RDI: 0000000000000005 [ 59.682050][ T4292] RBP: 00007f13c2607090 R08: 0000000000000000 R09: 0000000000000000 [ 59.682117][ T4292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 59.682127][ T4292] R13: 00007f13c3df6038 R14: 00007f13c3df5fa0 R15: 00007ffcf8a7f1c8 [ 59.682224][ T4292] [ 59.682248][ T4292] syz.4.269: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 59.930338][ T4292] CPU: 1 UID: 0 PID: 4292 Comm: syz.4.269 Not tainted syzkaller #0 PREEMPT(voluntary) [ 59.930372][ T4292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 59.930408][ T4292] Call Trace: [ 59.930415][ T4292] [ 59.930422][ T4292] __dump_stack+0x1d/0x30 [ 59.930445][ T4292] dump_stack_lvl+0xe8/0x140 [ 59.930496][ T4292] dump_stack+0x15/0x1b [ 59.930513][ T4292] warn_alloc+0x12b/0x1a0 [ 59.930578][ T4292] __vmalloc_node_range_noprof+0x2b3/0x1310 [ 59.930607][ T4292] ? do_dentry_open+0x52a/0xa60 [ 59.930657][ T4292] ? __rcu_read_unlock+0x4f/0x70 [ 59.930675][ T4292] ? avc_has_perm_noaudit+0xab/0x130 [ 59.930710][ T4292] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 59.930728][ T4292] __vmalloc_noprof+0xa4/0xf0 [ 59.930797][ T4292] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 59.930879][ T4292] bpf_prog_alloc_no_stats+0x47/0x390 [ 59.930896][ T4292] ? bpf_prog_alloc+0x2a/0x150 [ 59.930913][ T4292] bpf_prog_alloc+0x3c/0x150 [ 59.931075][ T4292] bpf_prog_load+0x506/0x1140 [ 59.931102][ T4292] ? security_bpf+0x2b/0x90 [ 59.931133][ T4292] __sys_bpf+0x469/0x7c0 [ 59.931169][ T4292] __x64_sys_bpf+0x41/0x50 [ 59.931258][ T4292] x64_sys_call+0x28e1/0x3000 [ 59.931281][ T4292] do_syscall_64+0xd8/0x2a0 [ 59.931308][ T4292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.931358][ T4292] RIP: 0033:0x7f13c3b9f749 [ 59.931424][ T4292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.931440][ T4292] RSP: 002b:00007f13c2607038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 59.931516][ T4292] RAX: ffffffffffffffda RBX: 00007f13c3df5fa0 RCX: 00007f13c3b9f749 [ 59.931544][ T4292] RDX: 0000000000000090 RSI: 0000200000000340 RDI: 0000000000000005 [ 59.931555][ T4292] RBP: 00007f13c2607090 R08: 0000000000000000 R09: 0000000000000000 [ 59.931636][ T4292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 59.931647][ T4292] R13: 00007f13c3df6038 R14: 00007f13c3df5fa0 R15: 00007ffcf8a7f1c8 [ 59.931664][ T4292] [ 59.931736][ T4292] Mem-Info: [ 60.139893][ T4292] active_anon:24240 inactive_anon:2 isolated_anon:0 [ 60.139893][ T4292] active_file:20141 inactive_file:2438 isolated_file:0 [ 60.139893][ T4292] unevictable:0 dirty:141 writeback:0 [ 60.139893][ T4292] slab_reclaimable:3146 slab_unreclaimable:15299 [ 60.139893][ T4292] mapped:29294 shmem:16541 pagetables:1126 [ 60.139893][ T4292] sec_pagetables:0 bounce:0 [ 60.139893][ T4292] kernel_misc_reclaimable:0 [ 60.139893][ T4292] free:1807753 free_pcp:64267 free_cma:0 [ 60.185668][ T4292] Node 0 active_anon:96960kB inactive_anon:8kB active_file:80564kB inactive_file:9752kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117176kB dirty:564kB writeback:0kB shmem:66164kB kernel_stack:3616kB pagetables:4504kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 60.213020][ T4292] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 60.242762][ T4292] lowmem_reserve[]: 0 2880 7859 7859 [ 60.248126][ T4292] Node 0 DMA32 free:2945896kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2949528kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:3528kB free_cma:0kB [ 60.279711][ T4292] lowmem_reserve[]: 0 0 4978 4978 [ 60.284801][ T4292] Node 0 Normal free:4269756kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:96960kB inactive_anon:8kB active_file:80564kB inactive_file:9752kB unevictable:0kB writepending:564kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:253436kB local_pcp:194048kB free_cma:0kB [ 60.318124][ T4292] lowmem_reserve[]: 0 0 0 0 [ 60.322713][ T4292] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 60.335567][ T4292] Node 0 DMA32: 4*4kB (M) 1*8kB (M) 3*16kB (M) 3*32kB (M) 3*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2945896kB [ 60.351905][ T4292] Node 0 Normal: 884*4kB (UME) 435*8kB (UM) 207*16kB (UME) 155*32kB (UME) 89*64kB (UME) 72*128kB (UM) 45*256kB (UME) 28*512kB (UM) 13*1024kB (U) 5*2048kB (UE) 1023*4096kB (UM) = 4269816kB [ 60.370938][ T4292] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 60.380375][ T4292] 39119 total pagecache pages [ 60.385102][ T4292] 3 pages in swap cache [ 60.389432][ T4292] Free swap = 118844kB [ 60.391173][ T4298] netlink: 52 bytes leftover after parsing attributes in process `syz.0.272'. [ 60.393604][ T4292] Total swap = 124996kB [ 60.393617][ T4292] 2097051 pages RAM [ 60.410706][ T4292] 0 pages HighMem/MovableOnly [ 60.415520][ T4292] 81269 pages reserved [ 60.463619][ T4301] netlink: 52 bytes leftover after parsing attributes in process `syz.0.274'. [ 60.500543][ T2538] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.527818][ T2538] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.556383][ T2538] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.565126][ T2538] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.795695][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 60.795740][ T29] audit: type=1326 audit(1765106913.055:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 60.825338][ T29] audit: type=1326 audit(1765106913.065:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 60.848871][ T29] audit: type=1326 audit(1765106913.065:1310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 60.872353][ T29] audit: type=1326 audit(1765106913.065:1311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f13c3b9f783 code=0x7ffc0000 [ 60.938993][ T4321] netlink: 68 bytes leftover after parsing attributes in process `syz.0.280'. [ 61.021333][ T4327] netlink: 52 bytes leftover after parsing attributes in process `syz.0.285'. [ 61.037709][ T4328] netlink: 48 bytes leftover after parsing attributes in process `syz.1.282'. [ 61.086911][ T4329] bridge_slave_0: left allmulticast mode [ 61.092595][ T4329] bridge_slave_0: left promiscuous mode [ 61.098383][ T4329] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.162565][ T4339] netlink: 'syz.3.283': attribute type 10 has an invalid length. [ 61.170472][ T4339] netlink: 40 bytes leftover after parsing attributes in process `syz.3.283'. [ 61.217845][ T29] audit: type=1326 audit(1765106913.215:1312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f13c3b9e1ff code=0x7ffc0000 [ 61.241292][ T29] audit: type=1326 audit(1765106913.215:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f13c3b9f7d7 code=0x7ffc0000 [ 61.264649][ T29] audit: type=1326 audit(1765106913.215:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f13c3b9df90 code=0x7ffc0000 [ 61.288686][ T29] audit: type=1326 audit(1765106913.215:1315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f13c3b9e3aa code=0x7ffc0000 [ 61.312147][ T29] audit: type=1326 audit(1765106913.215:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 61.335884][ T29] audit: type=1326 audit(1765106913.225:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=126 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 61.377423][ T4329] bridge_slave_1: left allmulticast mode [ 61.383223][ T4329] bridge_slave_1: left promiscuous mode [ 61.389021][ T4329] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.406365][ T4329] bond0: (slave bond_slave_0): Releasing backup interface [ 61.416805][ T4329] bond0: (slave bond_slave_1): Releasing backup interface [ 61.449058][ T4329] team0: Port device team_slave_0 removed [ 61.461640][ T4329] team0: Port device team_slave_1 removed [ 61.470178][ T4329] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 61.477760][ T4329] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 61.487378][ T4329] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 61.494932][ T4329] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 61.505301][ T4329] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 61.552297][ T4339] batman_adv: batadv0: Adding interface: veth1_vlan [ 61.559111][ T4339] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 61.639574][ T4339] batman_adv: batadv0: Interface activated: veth1_vlan [ 61.704242][ T4359] netlink: 64 bytes leftover after parsing attributes in process `syz.4.295'. [ 61.948261][ T4378] IPv6: addrconf: prefix option has invalid lifetime [ 62.002679][ T4354] veth6: entered promiscuous mode [ 62.008086][ T4354] veth6: entered allmulticast mode [ 62.067205][ T4384] netlink: 28 bytes leftover after parsing attributes in process `syz.3.304'. [ 62.482522][ T4421] FAULT_INJECTION: forcing a failure. [ 62.482522][ T4421] name failslab, interval 1, probability 0, space 0, times 0 [ 62.495362][ T4421] CPU: 0 UID: 0 PID: 4421 Comm: syz.4.316 Not tainted syzkaller #0 PREEMPT(voluntary) [ 62.495396][ T4421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 62.495413][ T4421] Call Trace: [ 62.495422][ T4421] [ 62.495432][ T4421] __dump_stack+0x1d/0x30 [ 62.495463][ T4421] dump_stack_lvl+0xe8/0x140 [ 62.495488][ T4421] dump_stack+0x15/0x1b [ 62.495533][ T4421] should_fail_ex+0x265/0x280 [ 62.495562][ T4421] should_failslab+0x8c/0xb0 [ 62.495600][ T4421] __kmalloc_cache_node_noprof+0x6a/0x4d0 [ 62.495644][ T4421] ? __get_vm_area_node+0x106/0x1d0 [ 62.495732][ T4421] __get_vm_area_node+0x106/0x1d0 [ 62.495765][ T4421] __vmalloc_node_range_noprof+0x28e/0x1310 [ 62.495799][ T4421] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 62.495829][ T4421] ? __rcu_read_unlock+0x4f/0x70 [ 62.495891][ T4421] ? avc_has_perm_noaudit+0xab/0x130 [ 62.495939][ T4421] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 62.495958][ T4421] __vmalloc_noprof+0xa4/0xf0 [ 62.496049][ T4421] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 62.496170][ T4421] bpf_prog_alloc_no_stats+0x47/0x390 [ 62.496240][ T4421] ? bpf_prog_alloc+0x2a/0x150 [ 62.496282][ T4421] bpf_prog_alloc+0x3c/0x150 [ 62.496307][ T4421] bpf_prog_load+0x506/0x1140 [ 62.496347][ T4421] ? security_bpf+0x2b/0x90 [ 62.496455][ T4421] __sys_bpf+0x469/0x7c0 [ 62.496491][ T4421] __x64_sys_bpf+0x41/0x50 [ 62.496554][ T4421] x64_sys_call+0x28e1/0x3000 [ 62.496597][ T4421] do_syscall_64+0xd8/0x2a0 [ 62.496628][ T4421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.496657][ T4421] RIP: 0033:0x7f13c3b9f749 [ 62.496672][ T4421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.496694][ T4421] RSP: 002b:00007f13c2607038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 62.496718][ T4421] RAX: ffffffffffffffda RBX: 00007f13c3df5fa0 RCX: 00007f13c3b9f749 [ 62.496735][ T4421] RDX: 0000000000000094 RSI: 0000200000000680 RDI: 0000000000000005 [ 62.496751][ T4421] RBP: 00007f13c2607090 R08: 0000000000000000 R09: 0000000000000000 [ 62.496766][ T4421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.496782][ T4421] R13: 00007f13c3df6038 R14: 00007f13c3df5fa0 R15: 00007ffcf8a7f1c8 [ 62.496830][ T4421] [ 62.775355][ T4427] netlink: 8 bytes leftover after parsing attributes in process `syz.4.318'. [ 62.801505][ T4431] netlink: 8 bytes leftover after parsing attributes in process `syz.4.318'. [ 63.059557][ T4456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24592 sclass=netlink_route_socket pid=4456 comm=syz.0.329 [ 65.034005][ T4504] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 65.115345][ T4504] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 65.180394][ T4504] netlink: 'syz.2.347': attribute type 13 has an invalid length. [ 65.195967][ T4513] Driver unsupported XDP return value 0 on prog (id 295) dev N/A, expect packet loss! [ 65.208286][ T3489] IPVS: starting estimator thread 0... [ 65.281017][ T4517] 9pnet_fd: Insufficient options for proto=fd [ 65.296799][ T4514] IPVS: using max 2256 ests per chain, 112800 per kthread [ 65.485791][ T4504] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.493045][ T4504] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.522041][ T4532] __nla_validate_parse: 4 callbacks suppressed [ 65.522056][ T4532] netlink: 40 bytes leftover after parsing attributes in process `syz.3.356'. [ 65.623807][ T4534] netlink: 232 bytes leftover after parsing attributes in process `syz.3.357'. [ 65.803199][ T4504] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 65.831857][ T4504] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 65.874690][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 65.874742][ T29] audit: type=1326 audit(1765106918.145:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 65.904345][ T29] audit: type=1326 audit(1765106918.145:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f13c3b9df90 code=0x7ffc0000 [ 65.927874][ T29] audit: type=1326 audit(1765106918.145:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 65.951471][ T29] audit: type=1326 audit(1765106918.145:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 65.974821][ T29] audit: type=1326 audit(1765106918.145:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 65.998223][ T29] audit: type=1326 audit(1765106918.145:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 66.021689][ T29] audit: type=1326 audit(1765106918.145:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 66.045105][ T29] audit: type=1326 audit(1765106918.145:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 66.068949][ T29] audit: type=1326 audit(1765106918.145:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 66.092282][ T29] audit: type=1326 audit(1765106918.145:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.4.354" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f13c3b9f749 code=0x7ffc0000 [ 66.347401][ T4528] veth6: entered promiscuous mode [ 66.352570][ T4528] veth6: entered allmulticast mode [ 66.366231][ T4542] netlink: 12 bytes leftover after parsing attributes in process `syz.0.360'. [ 66.366584][ T31] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.386462][ T31] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.426719][ T31] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.438777][ T4548] serio: Serial port ptm0 [ 66.445166][ T31] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.481943][ T4551] netlink: 68 bytes leftover after parsing attributes in process `syz.3.364'. [ 66.540472][ T4559] netlink: 48 bytes leftover after parsing attributes in process `syz.1.367'. [ 66.572707][ T4557] SELinux: failed to load policy [ 66.586347][ T4563] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.735458][ T4563] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.930920][ T4563] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.991655][ T4563] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.096617][ T31] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.128318][ T31] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.234742][ T31] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.330692][ T31] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.505280][ T4599] netlink: 48 bytes leftover after parsing attributes in process `syz.0.381'. [ 69.025102][ T4610] ================================================================== [ 69.033258][ T4610] BUG: KCSAN: data-race in __bpf_get_stackid / bcmp [ 69.039927][ T4610] [ 69.042276][ T4610] write to 0xffff88810a1d1b48 of 152 bytes by task 3319 on cpu 1: [ 69.050285][ T4610] __bpf_get_stackid+0x737/0x7d0 [ 69.055373][ T4610] bpf_get_stackid+0xf3/0x130 [ 69.060096][ T4610] bpf_get_stackid_raw_tp+0xf6/0x120 [ 69.065443][ T4610] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 69.070929][ T4610] bpf_trace_run2+0x107/0x1d0 [ 69.075644][ T4610] __traceiter_kfree+0x2e/0x50 [ 69.080443][ T4610] kfree+0x353/0x3c0 [ 69.084362][ T4610] selinux_netlbl_sk_security_free+0x18b/0x1d0 [ 69.090538][ T4610] selinux_sk_free_security+0x3a/0x50 [ 69.095946][ T4610] security_sk_free+0x65/0x80 [ 69.100642][ T4610] __sk_destruct+0x3cd/0x500 [ 69.105535][ T4610] __sk_free+0x227/0x270 [ 69.109822][ T4610] sk_free+0x39/0x80 [ 69.113734][ T4610] tcp_close+0x8d/0xd0 [ 69.117827][ T4610] inet_release+0xce/0xf0 [ 69.122230][ T4610] sock_close+0x6b/0x150 [ 69.126540][ T4610] __fput+0x29b/0x650 [ 69.130537][ T4610] fput_close_sync+0xad/0x190 [ 69.135228][ T4610] __x64_sys_close+0x56/0xf0 [ 69.139841][ T4610] x64_sys_call+0x2c25/0x3000 [ 69.144537][ T4610] do_syscall_64+0xd8/0x2a0 [ 69.149054][ T4610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.154960][ T4610] [ 69.157289][ T4610] read to 0xffff88810a1d1b80 of 8 bytes by task 4610 on cpu 0: [ 69.164883][ T4610] bcmp+0x23/0x90 [ 69.168560][ T4610] __bpf_get_stackid+0x382/0x7d0 [ 69.173633][ T4610] bpf_get_stackid+0xf3/0x130 [ 69.178331][ T4610] bpf_get_stackid_raw_tp+0xf6/0x120 [ 69.183637][ T4610] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 69.189106][ T4610] bpf_trace_run2+0x107/0x1d0 [ 69.193825][ T4610] __traceiter_kfree+0x2e/0x50 [ 69.198612][ T4610] kfree+0x353/0x3c0 [ 69.202519][ T4610] ___sys_recvmsg+0x135/0x370 [ 69.207229][ T4610] do_recvmmsg+0x1ef/0x540 [ 69.211655][ T4610] __x64_sys_recvmmsg+0xe5/0x170 [ 69.216604][ T4610] x64_sys_call+0x2b75/0x3000 [ 69.221299][ T4610] do_syscall_64+0xd8/0x2a0 [ 69.225914][ T4610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.231816][ T4610] [ 69.234141][ T4610] value changed: 0xffffffff81275ef5 -> 0xffffffff8454015d [ 69.241253][ T4610] [ 69.243580][ T4610] Reported by Kernel Concurrency Sanitizer on: [ 69.249742][ T4610] CPU: 0 UID: 0 PID: 4610 Comm: syz.0.384 Not tainted syzkaller #0 PREEMPT(voluntary) [ 69.259417][ T4610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 69.269525][ T4610] ==================================================================