last executing test programs: 7.746458624s ago: executing program 1 (id=3757): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_pidfd_open(0x0, 0x0) umount2(0x0, 0x2) 7.159449041s ago: executing program 1 (id=3760): syz_usb_connect(0x2, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 4.435151715s ago: executing program 4 (id=3784): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x8, 0x3, 0x2c0, 0x100, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev, [], [0x0, 0xffffff00], '\x00', 'wg1\x00', {}, {}, 0x6}, 0x0, 0xd8, 0x100, 0x0, {0x0, 0x4c00}, [@common=@inet=@tcp={{0x30}, {[0x1], [], 0x0, 0x0, 0x8, 0x4}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r2 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000)=0xfffffffc, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r3}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) utimensat(r4, 0x0, 0x0, 0x0) 4.411113425s ago: executing program 4 (id=3785): write$cgroup_devices(0xffffffffffffffff, 0x0, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe80, 0xe80, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xf7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r4, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x1c}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r5, 0x400, 0x1) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44000000100001041300"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e000100697036677265746170000000040002800a0001"], 0x44}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) mkdir(&(0x7f0000000180)='./file1\x00', 0x84) chmod(&(0x7f0000000340)='./file1\x00', 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x0) close(r5) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') syz_emit_ethernet(0x66, &(0x7f0000001000)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x0, 0x21, 0x0, @remote, @broadcast}, @redirect={0x5, 0x3, 0x0, @remote, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x3, 0xa5}, @cipso={0x86, 0x21, 0x2, [{0x0, 0x7, "ed6c628523"}, {0x7, 0x10, "222b72e4f34acad61bfe047b9fdc"}, {0x1, 0x2}, {0x5, 0x2}]}, @timestamp={0x44, 0x4, 0x5a, 0x0, 0x4}]}}}}}}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r7, @ANYBLOB="0100000000000000000001000000060006000300000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5426c010880f4000080060005000180000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff240002001bc715ee4868b12a49f4df11bc05475489f6a27c4d6483ad2fa5e45903b0ce851400040002000000ac1414aa00000000000000008c00098028000080060001000a00000014000200ff020000000000000000000000000001050003000000000028000080060001000a000000140002000000000000000000000000000000000105000300030000001c000080060001000200da0008000200e000000105000300000000001c000080060001000200000008000200ac141400050003000000000074000080200004000a004e2200000000fc0000000000000000000000000000000400000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff080003000100000024000200cde20bc0d9b90ac13642d7b66459dd9db5e20b4b16d3d23f2cb03a8aa417dce6080007000000000014000200776730"], 0x1c8}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) set_mempolicy(0x3, &(0x7f00000000c0)=0x5, 0xa) 4.322083856s ago: executing program 4 (id=3786): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b208850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000, @void, @value}, 0x94) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="68000000000801040000000000000000020000040900010073797a30000000000900010073797a310000000006000240910000003400048008bc014000000003080001400000ffff08000140000000040800014000000005080001400000000808000140fffffc01"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000000004850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) ustat(0xd, &(0x7f0000000680)) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48c8}, 0x20004804) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000001c) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xfffffffb) r3 = io_uring_setup(0x4e4d, &(0x7f0000000080)={0x0, 0x5275, 0x80, 0x9, 0x200000}) pause() close_range(r3, 0xffffffffffffffff, 0x0) 4.124949109s ago: executing program 1 (id=3787): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000002000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000180)="4d83e1bcba553b82441a7c5a886501037ed8ae6b15e95b5831c9b8c5ce65fc086a9e6f46", 0x24}, {&(0x7f00000001c0)="d83a0c9c5e121fa390cc79ad37241c785319f3a9345c1c822aa15773c2ff0077a4091b5663a7b0844a0fffb41da2bf1643c23e51b66e2c87e253cf89d59d9acff1f5009ab5735d0accead2063292efa5c4487e83ded68a82b6f03a910516725cfb87b5b8e05dfcb651918c3feb045d16e15e29c382fbb61fa25a565cc1b009135ab7df08d236cc6a5f2a", 0x8a}, {&(0x7f00000002c0)="4039811063829418fc6569448e0edd03f15152c89d277b95c23549bc1f863a71fc6c67cb72f8", 0x26}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000002a8f0ef741c2a000000008400000007000000ac1414aa00000000f99ccb0cfe8e0e94e964295f50d6e0f110785df4ee93fac8b78580f8d4de7b4b336446de33e1e5f6a04df085bb88c5d67a102aab8674b94b92beee4dd97abc90b1bedbd2a041ea76f7a2d8634f8cd035feaf8c4719ae0523b7e67ffd45fb8d00245420dc047f7d"], 0x18}, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20008050) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000140)={0x0, 0x0, 0x4e}, &(0x7f0000000fc0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unshare(0x22020400) socket$packet(0x11, 0x2, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2}, {0x60}, {0x6}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x200002, &(0x7f00000000c0), 0x3, 0x582, &(0x7f0000000c00)="$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") clock_getres(0x4, &(0x7f0000000340)) 3.847425322s ago: executing program 0 (id=3789): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/rt_acct\x00') r1 = socket(0x18, 0x4, 0x0) sendfile(r1, r0, 0x0, 0x8) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = io_uring_setup(0x2cb3, &(0x7f0000000040)={0x0, 0x6db2, 0x8, 0x1, 0xfa}) r4 = io_uring_setup(0x4ac9, &(0x7f00000000c0)={0x0, 0x85b1, 0x10000, 0x2, 0x3ca, 0x0, r3}) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000480)=[r2, r3], 0x2) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f00000004c0)=[r2], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r5 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$inet6_int(r5, 0x29, 0x11, 0x0, &(0x7f0000000200)) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x1) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010067656e657665300000000000000000001400010076657468315f746f5f7465616d"], 0x110}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r6, 0x4040534e, &(0x7f00000001c0)={0x10b, @tick=0x3, 0x4, {0x7, 0x74}, 0xcb, 0x0, 0x9}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0x490, 0xffffffff, 0x120, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3c0, 0x3c0, 0x3c0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@ipv6={@private1, @empty, [0xff000000, 0x0, 0x0, 0xffffffff], [0xffffffff, 0x0, 0xff000000, 0xffffff00], 'veth1_macvtap\x00', 'ip_vti0\x00', {0xff}, {0xff}, 0x84, 0xfe, 0x3}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@hl={{0x28}, {0x3, 0x2}}, @common=@icmp6={{0x28}, {0x4, "b6c7"}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x4}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@inet=@iprange={{0x68}, {@ipv4=@rand_addr=0x64010100, @ipv4=@loopback, @ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x43}}, @common=@inet=@tcpmss={{0x28}, {0x3, 0x1, 0x1}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}, {0xa9a8, 0x0, 0x1, [0x200, 0x2db, 0x98, 0x140, 0x9, 0x7, 0xffa8, 0x9, 0xf0, 0xbf, 0x2, 0x6, 0x6, 0xbb1f, 0xff, 0x9ce9], 0xd}}, @common=@eui64={{0x28}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9, 0x0, 0x100}, 0x18) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000000240)='R\x10rust\xe3c*s\xa8rVid:\xc4e', 0x0) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x29, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d815001b001105142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 3.797965603s ago: executing program 0 (id=3790): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0x1d}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000024000180060005004e230000060001000200000008000300ac1414aa0800060001"], 0x38}, 0x1, 0x0, 0x0, 0x4000011}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="010028bd7000fcdbdf2504"], 0x14}}, 0x0) 3.780036673s ago: executing program 0 (id=3791): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x2, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00', r2}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) 3.725165294s ago: executing program 0 (id=3793): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x10000000, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1, 0x0, 0x8}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x34) socket$nl_route(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002a40)={0x6, 0x20, &(0x7f0000001900)=@raw=[@alu={0x7, 0x0, 0xd, 0x7, 0x4, 0x20, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0x6, 0x8, 0x4, 0x2, 0x4}, @ldst={0x3, 0x0, 0x4, 0x1, 0x2, 0x1, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1020000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f00000003c0)='syzkaller\x00', 0xdc6, 0x1000, &(0x7f0000001a00)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0xc, 0x9, 0xfffffff9}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[r2, r2, r2, r2, r2], &(0x7f0000002a00)=[{0x2, 0x2, 0x3, 0xc}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002c00)={@ifindex, 0xd, 0x1, 0xfffff4f3, &(0x7f0000002b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000002c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002b80)=[0x0, 0x0], &(0x7f0000002bc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002c40)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="2600000000f4e633", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYRES64=r4], 0x20) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$dir(0xffffffffffffff9c, 0x0, 0x313002, 0x49) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x97a4, 0x7fffffff}, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) 3.459576457s ago: executing program 4 (id=3797): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000feffffff850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex_waitv(&(0x7f0000001ec0)=[{0x0, &(0x7f0000000440)=0x3, 0x82}, {0x2, &(0x7f0000000480)=0x4, 0x82}, {0x40, &(0x7f00000004c0)=0x5cd, 0x2}, {0x40, &(0x7f0000000500)=0x13, 0x82}, {0x2, &(0x7f0000000580)=0xbc, 0x82}, {0x0, &(0x7f00000005c0)=0x3, 0x82}, {0x82, &(0x7f0000000600)=0x3, 0x2}, {0x647, &(0x7f0000000640)=0xffffffffffffffff, 0x82}, {0x7, &(0x7f0000000680)=0x1, 0x2}, {0x6, &(0x7f00000006c0)=0x6, 0x82}, {0x847f, &(0x7f0000000700)=0x6, 0x2}, {0xc, &(0x7f0000000740)=0xf, 0x2}, {0x8, &(0x7f0000000780)=0x6, 0x2}, {0x4, &(0x7f00000007c0), 0x82}, {0x4, &(0x7f0000000800)=0xc7, 0x82}, {0x8, &(0x7f00000008c0)=0x1, 0x2}, {0xdc8, &(0x7f0000000900)=0xfffffffffffffc01, 0x82}, {0x5, &(0x7f0000000940)=0xe000000000000000, 0x82}, {0x6097, &(0x7f0000000980)=0x10, 0x2}, {0x5, &(0x7f00000009c0)=0xaf11, 0x2}, {0xffff, &(0x7f0000000a00), 0x2}, {0x8, &(0x7f0000000a40)=0x5dbf, 0x2}, {0x1, &(0x7f0000000a80)=0x8, 0x82}, {0x1c, &(0x7f0000000ac0)=0x9, 0x82}, {0x9, &(0x7f0000000b00)=0x5, 0x2}, {0x0, &(0x7f0000000b40)=0x6, 0x2}, {0x3, &(0x7f0000000b80)=0x2, 0x82}, {0x8, &(0x7f0000000bc0)=0x2, 0xc3}, {0x8, &(0x7f0000000c00)=0x3, 0x82}, {0x1, &(0x7f0000000c40)=0xfffffffffffffffc, 0x2}, {0x5, &(0x7f0000000c80)=0x5, 0x82}, {0x1, &(0x7f0000000cc0)=0x300000, 0x82}, {0x7, &(0x7f0000000d00)=0x1ff, 0x2}, {0x9, &(0x7f0000000d40)=0x2, 0x2}, {0x6, &(0x7f0000000d80)=0x7, 0x82}, {0x6, &(0x7f0000000dc0)=0x7ff, 0x2}, {0x6d7a, &(0x7f0000000e00)=0x7ff, 0x82}, {0x8, &(0x7f0000000e40)=0x10001, 0x2}, {0x1, &(0x7f0000000e80), 0x82}, {0x9, &(0x7f0000000ec0)=0x2, 0x82}, {0x401, &(0x7f0000000f00)=0x1, 0x82}, {0x217, &(0x7f0000000f40)=0x8, 0x82}, {0x0, &(0x7f0000000f80)=0x10001, 0x2}, {0x2, &(0x7f0000000fc0)=0xe, 0x82}, {0x2, &(0x7f0000001000)=0x1bf3, 0x82}, {0x10000, &(0x7f0000001040)=0x1a831f66, 0x2}, {0x10, &(0x7f0000001080)=0x5, 0x2}, {0x50000, &(0x7f00000010c0)=0x6a, 0x2}, {0x100000001, &(0x7f0000001100)=0x4fb, 0x82}, {0x3, &(0x7f0000001140)=0xfffffffffffffff4, 0x80}, {0x2b, &(0x7f0000001180), 0x82}, {0x246, &(0x7f00000011c0)=0x6, 0x2}, {0x6c98, &(0x7f0000001200)=0x5, 0x2}, {0x2, &(0x7f0000001240)=0x4, 0x2}, {0x693c00000, &(0x7f0000001280)=0x7, 0x82}, {0x3ff, &(0x7f00000012c0)=0xc92f, 0x2}, {0x1, &(0x7f0000001300)=0x2, 0x2}, {0x3ff, &(0x7f0000001340)=0x3ff, 0x82}, {0x80, &(0x7f0000001380)=0x2f923749, 0x2}, {0x1, &(0x7f00000013c0)=0x100, 0x2}, {0x0, &(0x7f0000001400)=0x8, 0x82}, {0x8, &(0x7f0000001440)=0x7fffffffffffffff, 0x2}, {0x5, &(0x7f0000001480), 0x2}, {0x5d91, &(0x7f00000014c0)=0xb565, 0x2}, {0x4, &(0x7f0000001500)=0x7, 0x82}, {0x3, &(0x7f0000001540)=0x8, 0x2}, {0x3, &(0x7f0000001580)=0xfff, 0x2}, {0x4, &(0x7f00000015c0)=0x100, 0x2}, {0x2, &(0x7f0000001600), 0x2}, {0x0, &(0x7f0000001640)=0x1, 0x2}, {0x0, &(0x7f0000001680)=0xe48, 0x2}, {0x1, &(0x7f00000016c0)=0x6, 0x2}, {0x3ff, &(0x7f0000001700)=0x4, 0x82}, {0x1, &(0x7f0000001740)=0x7ac, 0x82}, {0x0, &(0x7f0000001780)=0x2, 0x2}, {0x6, &(0x7f00000017c0)=0x5, 0x82}, {0x7, &(0x7f0000001800)=0x1, 0x2}, {0x8, &(0x7f0000001840), 0x82}, {0x3, &(0x7f0000001880)=0x3, 0x2}, {0x1, &(0x7f00000018c0)=0x9255, 0x82}, {0x740, &(0x7f0000001900)=0x81c4, 0x80}, {0x3, &(0x7f0000001940)=0xd, 0x82}, {0x0, &(0x7f0000001980)=0x6, 0x82}, {0x4, &(0x7f00000019c0)=0x7fffffff, 0x2}, {0x3, &(0x7f0000001a00)=0x8000, 0x82}, {0x3, &(0x7f0000001a40)=0x1, 0x82}, {0xf46, &(0x7f0000001a80)=0x5, 0x2}, {0x0, &(0x7f0000001ac0)=0x1, 0x2}, {0x1, &(0x7f0000001b00)=0x7}, {0x1c000000000000, &(0x7f0000001b40)=0x8, 0x2}, {0x3, &(0x7f0000001bc0)=0x2, 0x2}, {0x7, &(0x7f0000001c00), 0x82}, {0x0, &(0x7f0000001c40)=0x70e, 0x82}, {0x7fffffffffffffff, &(0x7f0000001c80)=0x3e2, 0x82}, {0x5, &(0x7f0000001cc0)=0x6, 0x2}, {0xc0c, &(0x7f0000001d00)=0x9, 0x2}, {0x1, &(0x7f0000001d40)=0x48000000, 0x2}, {0xde38000, &(0x7f0000001d80)=0x8000000000000000, 0x2}, {0x5, &(0x7f0000001dc0)=0x826a, 0x2}, {0x6, &(0x7f0000001e00), 0x82}, {0xda, &(0x7f0000001e40), 0x82}, {0x7ff, &(0x7f0000001e80)=0x7fffffffffffffff, 0x82}], 0x66, 0x0, &(0x7f0000002880), 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002940)={{r3, 0xffffffffffffffff}, &(0x7f00000028c0), &(0x7f0000002900)=r5}, 0x20) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000002bc0)={@local, @multicast2, 0x0}, &(0x7f0000002c00)=0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d40)=@bpf_ext={0x1c, 0x2c, &(0x7f0000002980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x30}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x0, 0xd, 0xb, 0x7, 0x1, 0x10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @map_val={0x18, 0x7, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x401}, @jmp={0x5, 0x0, 0x1, 0x2, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @call={0x85, 0x0, 0x0, 0xc9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002b00)='syzkaller\x00', 0xfffffffe, 0x59, &(0x7f0000002b40)=""/89, 0x0, 0x6d, '\x00', r7, 0x0, r1, 0x8, &(0x7f0000002c40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000002c80)={0x5, 0x0, 0x2, 0x2}, 0x10, 0x24d41, r4, 0x2, &(0x7f0000002cc0)=[r3], &(0x7f0000002d00)=[{0x1, 0x2, 0x7, 0xc}, {0x1, 0x1, 0x10, 0xc}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r5}, 0x10) r8 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000400)={0x0, 0x7f, 0x700}) 3.417858477s ago: executing program 4 (id=3798): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) r1 = syz_usb_connect(0x4, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f0000000440)=@lang_id={0x4}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x42f}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x42b}}]}) r2 = socket$inet(0x2, 0x3, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES32=r2, @ANYRESOCT=r0, @ANYRESHEX], 0x0) syz_usb_connect(0x2, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x9b, &(0x7f0000000000)=ANY=[@ANYBLOB="9b03abe98397850d9289638d7120310994176d76ee8005e3bf5de76d569d98cc3ce7d4419c84da5f7e420900d136a14f65099da81db6c35a3e0c7fb9fe03b0fa265df2be125facefe74e0e21bb6a1889f400fb206292c4d96927f019fba2ad2987739c5e0d"]}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0x0, &(0x7f0000000380)='net/ptype\x00') sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000), 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x7fff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x3, &(0x7f0000000400)=ANY=[@ANYRESHEX=r5], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r8}, 0x10) syslog(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$netlink(0x10, 0x3, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r9, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r10, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r10, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') 2.873742244s ago: executing program 0 (id=3802): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000"], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="7e02a65a4de50296d0b4522219b6c038af14e605d4b5dd721d03ba25e1371f700691b80de9a6", @ANYRESDEC=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x73, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc000000", @ANYBLOB], 0x50) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x0, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) r5 = add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000a80), 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r5) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x3f) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000002c0)=0x1) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TESTMODE(r8, &(0x7f0000002980)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000002940)={&(0x7f0000002540)=ANY=[@ANYBLOB="f4070000", @ANYRES16=0x0, @ANYBLOB="000327bd7000fedbdf252d00000008000300", @ANYRES32=r9], 0x3f4}, 0x1, 0x0, 0x0, 0x851}, 0x4004001) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r7, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000e9", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf257f00000008000300", @ANYRES32=r9, @ANYBLOB="0c009900000000000700000006004800400000000a00f50008021100000000000a00f50008021100000100000a00340002020202020200000600480055000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4004056}, 0x10) 2.807082665s ago: executing program 0 (id=3803): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = syz_usb_connect(0x4, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f0000000440)=@lang_id={0x4}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x42f}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x42b}}]}) r2 = socket$inet(0x2, 0x3, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES32=r2, @ANYRESOCT=r0, @ANYRESHEX], 0x0) syz_usb_connect(0x2, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x9b, &(0x7f0000000000)=ANY=[@ANYBLOB="9b03abe98397850d9289638d7120310994176d76ee8005e3bf5de76d569d98cc3ce7d4419c84da5f7e420900d136a14f65099da81db6c35a3e0c7fb9fe03b0fa265df2be125facefe74e0e21bb6a1889f400fb206292c4d96927f019fba2ad2987739c5e0d"]}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0x0, &(0x7f0000000380)='net/ptype\x00') sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000), 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x7fff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x3, &(0x7f0000000400)=ANY=[@ANYRESHEX=r5], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r8}, 0x10) syslog(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$netlink(0x10, 0x3, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r9, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r10, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r10, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') 1.798362038s ago: executing program 3 (id=3807): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0xe, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (fail_nth: 1) 1.580977031s ago: executing program 3 (id=3808): r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_open_dev$usbfs(&(0x7f0000003f00), 0x203, 0xa401) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='kfree\x00', r3, 0x0, 0x8}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r4}, 0x18) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) connect(r0, &(0x7f0000000000)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80) 1.580253331s ago: executing program 3 (id=3809): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r2, &(0x7f0000000240), 0xfffffecc) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000200)=""/97) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000004000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, 0x0, &(0x7f0000000840)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000002600)={0x0, 0x0, "5a77bd318786aeb879ca62cdab2a02fa560186d85b25a5665a3247e500f61681905db88235f8a5447dd2a2ed6e91626f068881e50f68530c2b21a100efb76cba37ff3111d6847e0c7f719e169a596e5fc008daefba68f6222103472bc55704cdb72b4b996ed82ccb1eaae27969d008ba7d34171113d806726615380fe65a6a0a72e19c2b60bd6276fd8bb6363d10f70da60fd53ded22c87eb2be010e4a62fb73c33424b437bb192c9d06ea6ed04983fe5c5ca033dfce0a82575ef14eee686be0fc58e384f93a13e4e8bbf599394baea3a9ca1864f0a35d6cc38fca32ad6b39905a9727d2001457df7be7e1aefe3635b2ee97c143f28def4b73905ca14d90d1f6"}) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80085504, &(0x7f0000000240)={0x0, 0x7}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x300000) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x18302, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r7 = gettid() kcmp(r7, r7, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) r8 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001b00), 0x2, 0x0) ioctl$USBDEVFS_CONTROL(r8, 0xc0105500, &(0x7f00000001c0)={0x0, 0x1, 0x8, 0x3, 0x0, 0x0, 0x0}) setsockopt$sock_int(r9, 0x1, 0x2f, &(0x7f0000000300)=0xd, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r6}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r3}, 0x8) socket(0x10, 0x803, 0x0) 1.219513015s ago: executing program 2 (id=3811): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb57ae0fffc5a", 0x12, 0xffffffffffffffff) 1.218939285s ago: executing program 2 (id=3812): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b208850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000, @void, @value}, 0x94) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="68000000000801040000000000000000020000040900010073797a30000000000900010073797a310000000006000240910000003400048008bc014000000003080001400000ffff08000140000000040800014000000005080001400000000808000140fffffc01"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000000004850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) ustat(0xd, &(0x7f0000000680)) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x7c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48c8}, 0x20004804) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000001c) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xfffffffb) r3 = io_uring_setup(0x4e4d, &(0x7f0000000080)={0x0, 0x5275, 0x80, 0x9, 0x200000}) pause() close_range(r3, 0xffffffffffffffff, 0x0) 1.106200236s ago: executing program 1 (id=3813): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b7040000000000008500000001"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) 1.032646967s ago: executing program 1 (id=3814): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000080)) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x0}, 0xffff0f00, 0x0, r2) socket$tipc(0x1e, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000ac0)="1694273f", 0x4) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000001380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r6 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) write$binfmt_misc(r0, &(0x7f0000000240), 0xfffffecc) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x80, 0x8, 0x6}) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 725.264641ms ago: executing program 3 (id=3815): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000001200)={0x60000010}) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f0000000400)={0xe000000e}) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000600)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r0, 0x0, 0x3}, 0x18) r5 = socket$nl_rdma(0x10, 0x3, 0x14) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x400000, &(0x7f0000000500)=ANY=[@ANYBLOB="666c7573682c6e6f646f74732c646973636172642c646d61736b3d30303030303030303030303030303030303030303030322c646d61736b3d30303030303030303030303030303030303030303137372c646f74732c6e6f646f74732c71756965742c646f74732c0023c3cb4d2e3cbf18508098ee0de2af38db67d42d1bc4ab714d52f019082433fc9ca2d7174b2c4e5531c9f4c7a4d53914e100"/167], 0x1, 0x140, &(0x7f0000000000)="$eJzs27Fq21AUBuDj2m3ddvFcOgi6dDJtn6CluFAqaEnwkEwJOFnsYIgXJZMfJS8YCJ683ZAo2Imxhwy2IPq+RT/8CO4dpMMV6OjT2XAwnpyO/8+i3WhE60dkMW9EJ15FM0rTAABeknlKcZNSSm+n8e4qUkpVrwgA2DbzHwDqx/wHgPox/wGgfvYPDv/+zPPeXpa1I66nRb/ol9ey//0n733N7nWWd82Kot9c9N/KPnvav473D/33tf2b+PK57O+6X//ylf5DDLa/fQAAAKiFbraw9nzf7W7qy/To+8DK+b0VH1s72wYA8AyTi8vh8Wh0ci4IgrAIVb+ZgG1bPvRVrwQAAAAAAAAAAAAAANhkF78TVb1HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWHUbAAD//0DvUik=") bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x30, 0x1, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x7], 0x0, 0x0, 0x1}}, 0x40) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="38000000031401002dbd7000fedbdf250900020073797a310000000008004100727865001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 701.282121ms ago: executing program 3 (id=3816): madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xdbd76c996685eb82, 0x41071, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x48, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000000)="77690addcfbe1fbb66ec", 0xfd9c}], 0x1, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r4, &(0x7f0000001b00)=[{&(0x7f00000008c0)=""/4096, 0x1000}], 0x1) splice(r2, 0x0, r5, 0x0, 0x25a5, 0x0) 627.113742ms ago: executing program 3 (id=3817): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x8, 0x3, 0x2c0, 0x100, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev, [], [0x0, 0xffffff00], '\x00', 'wg1\x00', {}, {}, 0x6}, 0x0, 0xd8, 0x100, 0x0, {0x0, 0x4c00}, [@common=@inet=@tcp={{0x30}, {[0x1], [], 0x0, 0x0, 0x8, 0x4}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r2 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000)=0xfffffffc, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r5}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/43) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r3, 0x0, 0x3ffff) sendfile(r4, r3, 0x0, 0x7ffff000) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000040a010100b1917bc801b300094000000002000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r6 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r6, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2, 0x0, 0x0, 0x1}}, 0x2e) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 316.261136ms ago: executing program 2 (id=3818): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2000000, @void, @value}, 0x94) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000054850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x1be) sendmsg$tipc(r2, &(0x7f0000000240)={&(0x7f0000000080), 0x10, 0x0}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=ANY=[@ANYBLOB="a001000010000100000000000000000064010102000000000000000000000000ff01000000000000000000000000000100000000000000000000200000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000003200000000002a6de5ea00000000000000000001feffffffffffffff0000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400af0000000000000048000200656362286369706865725f6e756c6c29000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017000000e1"], 0x1a0}}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x85, "00000000000000000000ffff00"}) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000fbb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r5, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7, 0x0, 0x3, 0x7, 0x2, 0x3, 0x3, 0x309, 0x38, 0xfffffffc, 0xe, 0x0, 0x20, 0x1, 0x5}, [{0x3, 0x8, 0xf3, 0x7f, 0x4, 0x200004, 0xc, 0x400}]}, 0x58) close(r5) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 314.801116ms ago: executing program 4 (id=3819): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x8, 0x3, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000008c0)=r4, 0x4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, 0x0, 0x0) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r6) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x14, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r7, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x33}, @void}}}, 0x1c}}, 0x4000054) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r9}, 0x10) r10 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r10, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 245.311767ms ago: executing program 2 (id=3820): write$cgroup_devices(0xffffffffffffffff, 0x0, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe80, 0xe80, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xf7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x1c, r4, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x1c}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r5, 0x400, 0x1) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44000000100001041300"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e000100697036677265746170000000040002800a0001"], 0x44}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) mkdir(&(0x7f0000000180)='./file1\x00', 0x84) chmod(&(0x7f0000000340)='./file1\x00', 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x0) close(r5) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') syz_emit_ethernet(0x66, &(0x7f0000001000)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x0, 0x21, 0x0, @remote, @broadcast}, @redirect={0x5, 0x3, 0x0, @remote, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x3, 0xa5}, @cipso={0x86, 0x21, 0x2, [{0x0, 0x7, "ed6c628523"}, {0x7, 0x10, "222b72e4f34acad61bfe047b9fdc"}, {0x1, 0x2}, {0x5, 0x2}]}, @timestamp={0x44, 0x4, 0x5a, 0x0, 0x4}]}}}}}}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r7, @ANYBLOB="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"], 0x1c8}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) set_mempolicy(0x3, &(0x7f00000000c0)=0x5, 0xa) 169.349988ms ago: executing program 1 (id=3821): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$netlink(0x10, 0x3, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001900)=@newtaction={0x194, 0x30, 0x1, 0x0, 0x0, {}, [{0x180, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x0, 0xfffffffe}, 0x4}}]}, {0x4}, {0xc}, {0xc}}}, @m_pedit={0x34, 0x2, 0x0, 0x0, {{0xa}, {0x8, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}]}, {0x4}, {0xc}, {0xc}}}, @m_simple={0xfc, 0x1a, 0x0, 0x0, {{0xb}, {0x80, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x7, 0x9, 0x3, 0x7f, 0x4}}, @TCA_DEF_DATA={0x8, 0x3, 'GPL\x00'}, @TCA_DEF_DATA={0x6, 0x3, '*\x00'}, @TCA_DEF_DATA={0xa, 0x3, 'pedit\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x4a, 0x10000000, 0x400, 0x7}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x7, 0x7, 0x6, 0x388}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x1, 0x10000000, 0xa8000000, 0xffff7fff}}]}, {0x52, 0x6, "58f532bcbc510c48eac376db6e0a913409f74dfe54bc8dec16ca7a65f99df045fb179b8a7bc33c27f203dc0c734c4fc547a4074584c525c1e1f245c416df11bc3393cf877592af8be79e47774273"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}]}, 0x194}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) socket(0x2, 0x80805, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r1, r3, 0xfffffffffffffc01, 0x0) 63.487479ms ago: executing program 2 (id=3822): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000feffffff850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) futex_waitv(&(0x7f0000001ec0)=[{0x0, &(0x7f0000000440)=0x3, 0x82}, {0x2, &(0x7f0000000480)=0x4, 0x82}, {0x40, &(0x7f00000004c0)=0x5cd, 0x2}, {0x40, &(0x7f0000000500)=0x13, 0x82}, {0x2, &(0x7f0000000580)=0xbc, 0x82}, {0x0, &(0x7f00000005c0)=0x3, 0x82}, {0x82, &(0x7f0000000600)=0x3, 0x2}, {0x647, &(0x7f0000000640)=0xffffffffffffffff, 0x82}, {0x7, &(0x7f0000000680)=0x1, 0x2}, {0x6, &(0x7f00000006c0)=0x6, 0x82}, {0x847f, &(0x7f0000000700)=0x6, 0x2}, {0xc, &(0x7f0000000740)=0xf, 0x2}, {0x8, &(0x7f0000000780)=0x6, 0x2}, {0x4, &(0x7f00000007c0), 0x82}, {0x4, &(0x7f0000000800)=0xc7, 0x82}, {0x8, &(0x7f00000008c0)=0x1, 0x2}, {0xdc8, &(0x7f0000000900)=0xfffffffffffffc01, 0x82}, {0x5, &(0x7f0000000940)=0xe000000000000000, 0x82}, {0x6097, &(0x7f0000000980)=0x10, 0x2}, {0x5, &(0x7f00000009c0)=0xaf11, 0x2}, {0xffff, &(0x7f0000000a00), 0x2}, {0x8, &(0x7f0000000a40)=0x5dbf, 0x2}, {0x1, &(0x7f0000000a80)=0x8, 0x82}, {0x1c, &(0x7f0000000ac0)=0x9, 0x82}, {0x9, &(0x7f0000000b00)=0x5, 0x2}, {0x0, &(0x7f0000000b40)=0x6, 0x2}, {0x3, &(0x7f0000000b80)=0x2, 0x82}, {0x8, &(0x7f0000000bc0)=0x2, 0xc3}, {0x8, &(0x7f0000000c00)=0x3, 0x82}, {0x1, &(0x7f0000000c40)=0xfffffffffffffffc, 0x2}, {0x5, &(0x7f0000000c80)=0x5, 0x82}, {0x1, &(0x7f0000000cc0)=0x300000, 0x82}, {0x7, &(0x7f0000000d00)=0x1ff, 0x2}, {0x9, &(0x7f0000000d40)=0x2, 0x2}, {0x6, &(0x7f0000000d80)=0x7, 0x82}, {0x6, &(0x7f0000000dc0)=0x7ff, 0x2}, {0x6d7a, &(0x7f0000000e00)=0x7ff, 0x82}, {0x8, &(0x7f0000000e40)=0x10001, 0x2}, {0x1, &(0x7f0000000e80), 0x82}, {0x9, &(0x7f0000000ec0)=0x2, 0x82}, {0x401, &(0x7f0000000f00)=0x1, 0x82}, {0x217, &(0x7f0000000f40)=0x8, 0x82}, {0x0, &(0x7f0000000f80)=0x10001, 0x2}, {0x2, &(0x7f0000000fc0)=0xe, 0x82}, {0x2, &(0x7f0000001000)=0x1bf3, 0x82}, {0x10000, &(0x7f0000001040)=0x1a831f66, 0x2}, {0x10, &(0x7f0000001080)=0x5, 0x2}, {0x50000, &(0x7f00000010c0)=0x6a, 0x2}, {0x100000001, &(0x7f0000001100)=0x4fb, 0x82}, {0x3, &(0x7f0000001140)=0xfffffffffffffff4, 0x80}, {0x2b, &(0x7f0000001180), 0x82}, {0x246, &(0x7f00000011c0)=0x6, 0x2}, {0x6c98, &(0x7f0000001200)=0x5, 0x2}, {0x2, &(0x7f0000001240)=0x4, 0x2}, {0x693c00000, &(0x7f0000001280)=0x7, 0x82}, {0x3ff, &(0x7f00000012c0)=0xc92f, 0x2}, {0x1, &(0x7f0000001300)=0x2, 0x2}, {0x3ff, &(0x7f0000001340)=0x3ff, 0x82}, {0x80, &(0x7f0000001380)=0x2f923749, 0x2}, {0x1, &(0x7f00000013c0)=0x100, 0x2}, {0x0, &(0x7f0000001400)=0x8, 0x82}, {0x8, &(0x7f0000001440)=0x7fffffffffffffff, 0x2}, {0x5, &(0x7f0000001480), 0x2}, {0x5d91, &(0x7f00000014c0)=0xb565, 0x2}, {0x4, &(0x7f0000001500)=0x7, 0x82}, {0x3, &(0x7f0000001540)=0x8, 0x2}, {0x3, &(0x7f0000001580)=0xfff, 0x2}, {0x4, &(0x7f00000015c0)=0x100, 0x2}, {0x2, &(0x7f0000001600), 0x2}, {0x0, &(0x7f0000001640)=0x1, 0x2}, {0x0, &(0x7f0000001680)=0xe48, 0x2}, {0x1, &(0x7f00000016c0)=0x6, 0x2}, {0x3ff, &(0x7f0000001700)=0x4, 0x82}, {0x1, &(0x7f0000001740)=0x7ac, 0x82}, {0x0, &(0x7f0000001780)=0x2, 0x2}, {0x6, &(0x7f00000017c0)=0x5, 0x82}, {0x7, &(0x7f0000001800)=0x1, 0x2}, {0x8, &(0x7f0000001840), 0x82}, {0x3, &(0x7f0000001880)=0x3, 0x2}, {0x1, &(0x7f00000018c0)=0x9255, 0x82}, {0x740, &(0x7f0000001900)=0x81c4, 0x80}, {0x3, &(0x7f0000001940)=0xd, 0x82}, {0x0, &(0x7f0000001980)=0x6, 0x82}, {0x4, &(0x7f00000019c0)=0x7fffffff, 0x2}, {0x3, &(0x7f0000001a00)=0x8000, 0x82}, {0x3, &(0x7f0000001a40)=0x1, 0x82}, {0xf46, &(0x7f0000001a80)=0x5, 0x2}, {0x0, &(0x7f0000001ac0)=0x1, 0x2}, {0x1, &(0x7f0000001b00)=0x7}, {0x1c000000000000, &(0x7f0000001b40)=0x8, 0x2}, {0xffffffff, 0x0, 0x82}, {0x3, &(0x7f0000001bc0)=0x2, 0x2}, {0x7, &(0x7f0000001c00), 0x82}, {0x0, &(0x7f0000001c40)=0x70e, 0x82}, {0x7fffffffffffffff, &(0x7f0000001c80)=0x3e2, 0x82}, {0x5, &(0x7f0000001cc0)=0x6, 0x2}, {0xc0c, &(0x7f0000001d00)=0x9, 0x2}, {0x1, &(0x7f0000001d40)=0x48000000, 0x2}, {0xde38000, &(0x7f0000001d80)=0x8000000000000000, 0x2}, {0x5, &(0x7f0000001dc0)=0x826a, 0x2}, {0x6, &(0x7f0000001e00), 0x82}, {0xda, &(0x7f0000001e40), 0x82}, {0x7ff, &(0x7f0000001e80)=0x7fffffffffffffff, 0x82}], 0x67, 0x0, &(0x7f0000002880), 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002940)={{r3, 0xffffffffffffffff}, &(0x7f00000028c0), &(0x7f0000002900)=r5}, 0x20) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000002bc0)={@local, @multicast2, 0x0}, &(0x7f0000002c00)=0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d40)=@bpf_ext={0x1c, 0x2c, &(0x7f0000002980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x30}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x0, 0xd, 0xb, 0x7, 0x1, 0x10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @map_val={0x18, 0x7, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x401}, @jmp={0x5, 0x0, 0x1, 0x2, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @call={0x85, 0x0, 0x0, 0xc9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002b00)='syzkaller\x00', 0xfffffffe, 0x59, &(0x7f0000002b40)=""/89, 0x0, 0x6d, '\x00', r7, 0x0, r1, 0x8, &(0x7f0000002c40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000002c80)={0x5, 0x0, 0x2, 0x2}, 0x10, 0x24d41, r4, 0x2, &(0x7f0000002cc0)=[r3], &(0x7f0000002d00)=[{0x1, 0x2, 0x7, 0xc}, {0x1, 0x1, 0x10, 0xc}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r5}, 0x10) r8 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000400)={0x0, 0x7f, 0x700}) 0s ago: executing program 2 (id=3823): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000002000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000180)="4d83e1bcba553b82441a7c5a886501037ed8ae6b15e95b5831c9b8c5ce65fc086a9e6f46", 0x24}, {&(0x7f00000001c0)="d83a0c9c5e121fa390cc79ad37241c785319f3a9345c1c822aa15773c2ff0077a4091b5663a7b0844a0fffb41da2bf1643c23e51b66e2c87e253cf89d59d9acff1f5009ab5735d0accead2063292efa5c4487e83ded68a82b6f03a910516725cfb87b5b8e05dfcb651918c3feb045d16e15e29c382fbb61fa25a565cc1b009135ab7df08d236cc6a5f2a", 0x8a}, {&(0x7f00000002c0)="4039811063829418fc6569448e0edd03f15152c89d277b95c23549bc1f863a71fc6c67cb72f8", 0x26}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000002a8f0ef741c2a000000008400000007000000ac1414aa00000000f99ccb0cfe8e0e94e964295f50d6e0f110785df4ee93fac8b78580f8d4de7b4b336446de33e1e5f6a04df085bb88c5d67a102aab8674b94b92beee4dd97abc90b1bedbd2a041ea76f7a2d8634f8cd035feaf8c4719ae0523b7e67ffd45fb8d00245420dc047f7d"], 0x18}, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20008050) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r2) ptrace$peeksig(0x4209, r2, &(0x7f0000000140)={0x0, 0x0, 0x4e}, &(0x7f0000000fc0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unshare(0x22020400) socket$packet(0x11, 0x2, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2}, {0x60}, {0x6}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x200002, &(0x7f00000000c0), 0x3, 0x582, &(0x7f0000000c00)="$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") clock_getres(0x4, &(0x7f0000000340)) kernel console output (not intermixed with test programs): have been left with an inconsistent configuration, please check. [ 270.339765][T12344] dummy0: entered promiscuous mode [ 270.340065][T12344] bridge0: port 3(dummy0) entered blocking state [ 270.340092][T12344] bridge0: port 3(dummy0) entered disabled state [ 270.340208][T12344] dummy0: entered allmulticast mode [ 270.341247][T12344] bridge0: port 3(dummy0) entered blocking state [ 270.341359][T12344] bridge0: port 3(dummy0) entered forwarding state [ 270.358974][T12349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.360485][T12349] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.363187][T12349] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 270.363272][T11362] lo speed is unknown, defaulting to 1000 [ 270.393377][ T1049] lo speed is unknown, defaulting to 1000 [ 270.488141][T12368] usb usb8: selecting invalid altsetting 7 [ 270.550720][T12365] dccp_invalid_packet: P.Data Offset(172) too large [ 270.587823][T12375] xt_hashlimit: max too large, truncated to 1048576 [ 270.601806][T12375] siw: device registration error -23 [ 270.761017][T12388] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 271.020481][T12403] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3217'. [ 271.030426][T12403] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3217'. [ 271.124197][T12408] xt_hashlimit: max too large, truncated to 1048576 [ 271.321660][T12419] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 271.445839][ T3902] lo speed is unknown, defaulting to 1000 [ 271.451774][ T3902] syz0: Port: 1 Link DOWN [ 271.485474][T12425] netlink: 'syz.2.3228': attribute type 13 has an invalid length. [ 271.493438][T12425] netlink: 'syz.2.3228': attribute type 27 has an invalid length. [ 271.519808][T12425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.529554][T12425] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.543817][T12435] netlink: 'syz.2.3228': attribute type 10 has an invalid length. [ 271.545737][T12425] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 271.545774][T12018] lo speed is unknown, defaulting to 1000 [ 271.545792][T12018] syz0: Port: 1 Link ACTIVE [ 271.548449][T12435] dummy0: entered promiscuous mode [ 271.588674][T12435] bridge0: port 3(dummy0) entered blocking state [ 271.588710][T12435] bridge0: port 3(dummy0) entered disabled state [ 271.588895][T12435] dummy0: entered allmulticast mode [ 271.589719][T12435] bridge0: port 3(dummy0) entered blocking state [ 271.589757][T12435] bridge0: port 3(dummy0) entered forwarding state [ 271.592536][T12436] usb usb8: selecting invalid altsetting 7 [ 271.709139][T12445] xt_hashlimit: max too large, truncated to 1048576 [ 271.714567][T12445] siw: device registration error -23 [ 271.933169][T12452] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 271.934693][T12453] FAULT_INJECTION: forcing a failure. [ 271.934693][T12453] name failslab, interval 1, probability 0, space 0, times 0 [ 271.953752][T12453] CPU: 1 UID: 0 PID: 12453 Comm: syz.3.3238 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 271.953790][T12453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 271.953810][T12453] Call Trace: [ 271.953818][T12453] [ 271.953827][T12453] __dump_stack+0x1d/0x30 [ 271.953855][T12453] dump_stack_lvl+0xe8/0x140 [ 271.953879][T12453] dump_stack+0x15/0x1b [ 271.953931][T12453] should_fail_ex+0x265/0x280 [ 271.953968][T12453] should_failslab+0x8c/0xb0 [ 271.954060][T12453] kmem_cache_alloc_node_noprof+0x57/0x320 [ 271.954082][T12453] ? __alloc_skb+0x101/0x320 [ 271.954126][T12453] __alloc_skb+0x101/0x320 [ 271.954166][T12453] netlink_alloc_large_skb+0xba/0xf0 [ 271.954213][T12453] netlink_sendmsg+0x3cf/0x6b0 [ 271.954235][T12453] ? __pfx_netlink_sendmsg+0x10/0x10 [ 271.954261][T12453] __sock_sendmsg+0x145/0x180 [ 271.954298][T12453] ____sys_sendmsg+0x31e/0x4e0 [ 271.954384][T12453] ___sys_sendmsg+0x17b/0x1d0 [ 271.954430][T12453] __x64_sys_sendmsg+0xd4/0x160 [ 271.954473][T12453] x64_sys_call+0x2999/0x2fb0 [ 271.954501][T12453] do_syscall_64+0xd0/0x1a0 [ 271.954532][T12453] ? clear_bhb_loop+0x40/0x90 [ 271.954562][T12453] ? clear_bhb_loop+0x40/0x90 [ 271.954591][T12453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 271.954619][T12453] RIP: 0033:0x7f969773e969 [ 271.954639][T12453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.954732][T12453] RSP: 002b:00007f9695da7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 271.954751][T12453] RAX: ffffffffffffffda RBX: 00007f9697965fa0 RCX: 00007f969773e969 [ 271.954763][T12453] RDX: 0000000000000000 RSI: 0000200000000480 RDI: 0000000000000003 [ 271.954780][T12453] RBP: 00007f9695da7090 R08: 0000000000000000 R09: 0000000000000000 [ 271.954796][T12453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.954812][T12453] R13: 0000000000000000 R14: 00007f9697965fa0 R15: 00007fff8ee4f788 [ 271.954837][T12453] [ 271.988034][T12455] tipc: Started in network mode [ 272.148542][ T29] kauditd_printk_skb: 339 callbacks suppressed [ 272.148563][ T29] audit: type=1400 audit(2000002806.304:27028): avc: denied { remount } for pid=12456 comm="syz.3.3241" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 272.150392][T12455] tipc: Node identity 03000000000000000e, cluster identity 4711 [ 272.230385][ T29] audit: type=1326 audit(2000002806.404:27029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.230519][ T29] audit: type=1326 audit(2000002806.404:27030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.230644][ T29] audit: type=1326 audit(2000002806.404:27031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.230810][ T29] audit: type=1326 audit(2000002806.404:27032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.230897][ T29] audit: type=1326 audit(2000002806.404:27033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.231113][ T29] audit: type=1326 audit(2000002806.404:27034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.231271][ T29] audit: type=1326 audit(2000002806.404:27035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.231519][ T29] audit: type=1326 audit(2000002806.404:27036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.420913][ T29] audit: type=1326 audit(2000002806.514:27037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12462 comm="syz.1.3243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 272.459366][T12466] netlink: 'syz.0.3244': attribute type 13 has an invalid length. [ 272.467243][T12466] netlink: 'syz.0.3244': attribute type 27 has an invalid length. [ 272.512172][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.519993][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.527798][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.535594][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.543379][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.551191][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.558978][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.566846][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.574703][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.582735][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.585635][T12475] syz!: rxe_newlink: already configured on team_slave_0 [ 272.590719][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.605322][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.613127][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.620961][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.628748][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.636511][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.644344][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.652119][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.659920][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.667774][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.675594][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.683494][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.691289][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.699079][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.706982][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.714802][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.722597][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.730488][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.730513][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.746050][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.754034][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.761840][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.769765][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.777533][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.785682][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.793589][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.801377][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.809159][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.816968][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.825419][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.833332][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.841224][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.849009][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: unknown main item tag 0x0 [ 272.858967][T12465] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.866329][T12465] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.959807][T12465] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 272.969787][T12465] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 273.049755][ T3888] hid-generic 0000:007F:FFFFFFFE.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 273.100901][T12465] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.110089][T12465] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.119353][T12465] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.128528][T12465] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.252245][T12466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.262750][T12466] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.273207][T12466] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 273.293823][T12469] ip6gretap1: entered allmulticast mode [ 273.303171][T12473] dummy0: entered promiscuous mode [ 273.308976][T12473] bridge0: port 3(dummy0) entered blocking state [ 273.315423][T12473] bridge0: port 3(dummy0) entered disabled state [ 273.328358][T12473] dummy0: entered allmulticast mode [ 273.334646][T12473] bridge0: port 3(dummy0) entered blocking state [ 273.341130][T12473] bridge0: port 3(dummy0) entered forwarding state [ 273.480748][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.488685][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.496492][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.504293][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.512169][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.519953][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.527972][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.535777][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.543556][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.551316][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.559180][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.566991][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.574817][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.582608][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.590418][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.590447][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.590469][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.590490][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.590517][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.629386][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.637245][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.645027][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.652908][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.660673][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.668445][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.676184][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.683931][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.691764][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.699650][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.707496][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.715313][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.723114][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.730973][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.738798][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.746565][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.754345][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.762118][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.769936][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.777733][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.785723][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.793575][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.801425][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.809251][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: unknown main item tag 0x0 [ 273.817685][ T3907] hid-generic 0000:007F:FFFFFFFE.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 273.998382][T12537] ipvlan0: entered allmulticast mode [ 274.003823][T12537] veth0_vlan: entered allmulticast mode [ 274.024265][T12538] SELinux: Context system_u:object_r:systemd_passwd_var_run_t:s0 is not valid (left unmapped). [ 274.025883][T12537] team0: Device ipvlan0 failed to register rx_handler [ 274.256366][T12543] __nla_validate_parse: 3 callbacks suppressed [ 274.256387][T12543] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3272'. [ 274.335125][T12555] unsupported nla_type 52263 [ 274.596063][T12567] lo speed is unknown, defaulting to 1000 [ 274.941441][T12580] xt_hashlimit: max too large, truncated to 1048576 [ 274.953696][T12580] siw: device registration error -23 [ 275.012457][T12583] dccp_invalid_packet: P.Data Offset(172) too large [ 275.030233][T12585] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 275.078153][T12592] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 275.121118][T12590] dccp_invalid_packet: P.Data Offset(172) too large [ 275.265528][T12608] validate_nla: 2 callbacks suppressed [ 275.265542][T12608] netlink: 'syz.0.3296': attribute type 10 has an invalid length. [ 275.279337][T12608] ipvlan0: entered allmulticast mode [ 275.284659][T12608] veth0_vlan: entered allmulticast mode [ 275.290864][T12608] team0: Device ipvlan0 failed to register rx_handler [ 275.342287][T12613] netlink: 'syz.1.3298': attribute type 27 has an invalid length. [ 275.391881][T12613] bridge0: port 3(dummy0) entered disabled state [ 275.415529][T12613] ipvlan0: left allmulticast mode [ 275.420702][T12613] veth0_vlan: left allmulticast mode [ 275.487546][T12614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.501104][T12614] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.523023][T12614] bridge0: port 3(dummy0) entered blocking state [ 275.529531][T12614] bridge0: port 3(dummy0) entered forwarding state [ 275.558940][T12614] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 275.720061][T12624] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3299'. [ 275.729990][T12624] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3299'. [ 276.081921][T12630] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 276.185891][T12641] dccp_invalid_packet: P.Data Offset(172) too large [ 276.293298][T12651] netlink: 76 bytes leftover after parsing attributes in process `syz.0.3311'. [ 276.305188][ T3904] IPVS: starting estimator thread 0... [ 276.313481][T12651] FAULT_INJECTION: forcing a failure. [ 276.313481][T12651] name failslab, interval 1, probability 0, space 0, times 0 [ 276.326359][T12651] CPU: 0 UID: 0 PID: 12651 Comm: syz.0.3311 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 276.326413][T12651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 276.326424][T12651] Call Trace: [ 276.326430][T12651] [ 276.326438][T12651] __dump_stack+0x1d/0x30 [ 276.326457][T12651] dump_stack_lvl+0xe8/0x140 [ 276.326475][T12651] dump_stack+0x15/0x1b [ 276.326490][T12651] should_fail_ex+0x265/0x280 [ 276.326571][T12651] should_failslab+0x8c/0xb0 [ 276.326636][T12651] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 276.326658][T12651] ? sidtab_sid2str_get+0xa0/0x130 [ 276.326695][T12651] kmemdup_noprof+0x2b/0x70 [ 276.326733][T12651] sidtab_sid2str_get+0xa0/0x130 [ 276.326761][T12651] security_sid_to_context_core+0x1eb/0x2e0 [ 276.326816][T12651] security_sid_to_context+0x27/0x40 [ 276.326842][T12651] avc_audit_post_callback+0x9d/0x520 [ 276.326875][T12651] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 276.326961][T12651] common_lsm_audit+0x1b8/0x230 [ 276.326985][T12651] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 276.327079][T12651] slow_avc_audit+0x104/0x140 [ 276.327112][T12651] audit_inode_permission+0x111/0x150 [ 276.327179][T12651] selinux_inode_permission+0x3d8/0x400 [ 276.327212][T12651] security_inode_permission+0x6d/0xb0 [ 276.327268][T12651] inode_permission+0xb5/0x300 [ 276.327299][T12651] ? may_open+0x243/0x350 [ 276.327321][T12651] may_open+0x255/0x350 [ 276.327387][T12651] path_openat+0x1b4a/0x2170 [ 276.327408][T12651] ? mntput+0x4b/0x80 [ 276.327425][T12651] ? terminate_walk+0x27f/0x2a0 [ 276.327496][T12651] do_filp_open+0x109/0x230 [ 276.327526][T12651] do_open_execat+0xd8/0x260 [ 276.327605][T12651] alloc_bprm+0x28/0x660 [ 276.327628][T12651] do_execveat_common+0x12e/0x750 [ 276.327656][T12651] __x64_sys_execve+0x5c/0x70 [ 276.327716][T12651] x64_sys_call+0x13ab/0x2fb0 [ 276.327763][T12651] do_syscall_64+0xd0/0x1a0 [ 276.327795][T12651] ? clear_bhb_loop+0x40/0x90 [ 276.327823][T12651] ? clear_bhb_loop+0x40/0x90 [ 276.327925][T12651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.327950][T12651] RIP: 0033:0x7f6ba2afe969 [ 276.327969][T12651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.327993][T12651] RSP: 002b:00007f6ba1167038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 276.328010][T12651] RAX: ffffffffffffffda RBX: 00007f6ba2d25fa0 RCX: 00007f6ba2afe969 [ 276.328071][T12651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000400 [ 276.328082][T12651] RBP: 00007f6ba1167090 R08: 0000000000000000 R09: 0000000000000000 [ 276.328093][T12651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.328103][T12651] R13: 0000000000000000 R14: 00007f6ba2d25fa0 R15: 00007ffe9db61498 [ 276.328121][T12651] [ 276.397852][T12652] IPVS: using max 1920 ests per chain, 96000 per kthread [ 276.709306][T12654] FAULT_INJECTION: forcing a failure. [ 276.709306][T12654] name failslab, interval 1, probability 0, space 0, times 0 [ 276.722145][T12654] CPU: 1 UID: 0 PID: 12654 Comm: syz.1.3312 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 276.722182][T12654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 276.722251][T12654] Call Trace: [ 276.722257][T12654] [ 276.722263][T12654] __dump_stack+0x1d/0x30 [ 276.722342][T12654] dump_stack_lvl+0xe8/0x140 [ 276.722369][T12654] dump_stack+0x15/0x1b [ 276.722427][T12654] should_fail_ex+0x265/0x280 [ 276.722486][T12654] ? xdp_umem_create+0x3c/0x5c0 [ 276.722524][T12654] should_failslab+0x8c/0xb0 [ 276.722633][T12654] __kmalloc_cache_noprof+0x4c/0x320 [ 276.722673][T12654] xdp_umem_create+0x3c/0x5c0 [ 276.722708][T12654] ? should_fail_ex+0xdb/0x280 [ 276.722751][T12654] xsk_setsockopt+0x4b2/0x510 [ 276.722787][T12654] ? __pfx_xsk_setsockopt+0x10/0x10 [ 276.722838][T12654] __sys_setsockopt+0x181/0x200 [ 276.722867][T12654] __x64_sys_setsockopt+0x64/0x80 [ 276.722893][T12654] x64_sys_call+0x2bd5/0x2fb0 [ 276.722922][T12654] do_syscall_64+0xd0/0x1a0 [ 276.723016][T12654] ? clear_bhb_loop+0x40/0x90 [ 276.723045][T12654] ? clear_bhb_loop+0x40/0x90 [ 276.723134][T12654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.723162][T12654] RIP: 0033:0x7f2a075fe969 [ 276.723181][T12654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.723205][T12654] RSP: 002b:00007f2a05c67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 276.723257][T12654] RAX: ffffffffffffffda RBX: 00007f2a07825fa0 RCX: 00007f2a075fe969 [ 276.723273][T12654] RDX: 0000000000000004 RSI: 000000000000011b RDI: 0000000000000007 [ 276.723288][T12654] RBP: 00007f2a05c67090 R08: 0000000000000020 R09: 0000000000000000 [ 276.723303][T12654] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 276.723316][T12654] R13: 0000000000000000 R14: 00007f2a07825fa0 R15: 00007ffc4b96d438 [ 276.723336][T12654] [ 276.727007][T12663] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 276.947336][T12667] ip6gretap1: entered allmulticast mode [ 277.012280][T12677] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 277.210000][T12687] lo speed is unknown, defaulting to 1000 [ 277.213202][ T29] kauditd_printk_skb: 1897 callbacks suppressed [ 277.213220][ T29] audit: type=1400 audit(2000002811.385:28935): avc: denied { ioctl } for pid=12685 comm="syz.4.3323" path="socket:[39085]" dev="sockfs" ino=39085 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 277.300237][T12694] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3324'. [ 277.310153][T12694] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3324'. [ 277.815961][T12707] netlink: 'syz.0.3329': attribute type 27 has an invalid length. [ 277.940287][T12714] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 277.972597][T12707] bridge0: port 3(dummy0) entered disabled state [ 277.999485][T12707] ipvlan0: left allmulticast mode [ 278.004577][T12707] veth0_vlan: left allmulticast mode [ 278.135969][T12708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.145702][T12708] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.154505][T12708] bridge0: port 3(dummy0) entered blocking state [ 278.161396][T12708] bridge0: port 3(dummy0) entered forwarding state [ 278.177704][T12708] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 278.216734][ T29] audit: type=1326 audit(2000002812.385:28936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.240566][ T29] audit: type=1326 audit(2000002812.385:28937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.264185][ T29] audit: type=1326 audit(2000002812.385:28938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.287953][ T29] audit: type=1326 audit(2000002812.385:28939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.312039][ T29] audit: type=1326 audit(2000002812.385:28940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.335746][ T29] audit: type=1326 audit(2000002812.385:28941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.359512][ T29] audit: type=1326 audit(2000002812.385:28942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.383219][ T29] audit: type=1326 audit(2000002812.385:28943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.406945][ T29] audit: type=1326 audit(2000002812.385:28944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12723 comm="syz.3.3335" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 278.433082][T12727] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3334'. [ 278.442702][T12727] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3334'. [ 278.925551][T12738] ip6gretap1: entered allmulticast mode [ 278.964187][T12738] syz!: rxe_newlink: already configured on team_slave_0 [ 279.040288][T12743] netlink: 'syz.3.3341': attribute type 27 has an invalid length. [ 279.056116][T12743] bridge0: port 3(dummy0) entered disabled state [ 279.102177][T12745] xt_hashlimit: max too large, truncated to 1048576 [ 279.110487][T12745] siw: device registration error -23 [ 279.401880][T12751] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3344'. [ 279.402302][T12751] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3344'. [ 279.514571][T12753] xt_hashlimit: max too large, truncated to 1048576 [ 279.535154][T12753] siw: device registration error -23 [ 279.792814][T12757] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3347'. [ 279.849249][T12761] FAULT_INJECTION: forcing a failure. [ 279.849249][T12761] name failslab, interval 1, probability 0, space 0, times 0 [ 279.862090][T12761] CPU: 0 UID: 0 PID: 12761 Comm: syz.4.3349 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 279.862152][T12761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 279.862163][T12761] Call Trace: [ 279.862168][T12761] [ 279.862175][T12761] __dump_stack+0x1d/0x30 [ 279.862195][T12761] dump_stack_lvl+0xe8/0x140 [ 279.862213][T12761] dump_stack+0x15/0x1b [ 279.862299][T12761] should_fail_ex+0x265/0x280 [ 279.862336][T12761] should_failslab+0x8c/0xb0 [ 279.862371][T12761] kmem_cache_alloc_noprof+0x50/0x310 [ 279.862412][T12761] ? audit_log_start+0x365/0x6c0 [ 279.862491][T12761] audit_log_start+0x365/0x6c0 [ 279.862538][T12761] audit_seccomp+0x48/0x100 [ 279.862634][T12761] ? __seccomp_filter+0x68c/0x10d0 [ 279.862669][T12761] __seccomp_filter+0x69d/0x10d0 [ 279.862700][T12761] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 279.862738][T12761] ? vfs_write+0x75e/0x8d0 [ 279.862761][T12761] ? __rcu_read_unlock+0x4f/0x70 [ 279.862791][T12761] ? __fget_files+0x184/0x1c0 [ 279.862819][T12761] __secure_computing+0x82/0x150 [ 279.862839][T12761] syscall_trace_enter+0xcf/0x1e0 [ 279.862941][T12761] do_syscall_64+0xaa/0x1a0 [ 279.862984][T12761] ? clear_bhb_loop+0x40/0x90 [ 279.863003][T12761] ? clear_bhb_loop+0x40/0x90 [ 279.863023][T12761] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.863042][T12761] RIP: 0033:0x7f6e079de969 [ 279.863067][T12761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.863084][T12761] RSP: 002b:00007f6e06047038 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 279.863101][T12761] RAX: ffffffffffffffda RBX: 00007f6e07c05fa0 RCX: 00007f6e079de969 [ 279.863112][T12761] RDX: 0000000000000001 RSI: 0000000000800000 RDI: 0000200000000000 [ 279.863124][T12761] RBP: 00007f6e06047090 R08: 0000000000000000 R09: 0000000000000000 [ 279.863152][T12761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.863170][T12761] R13: 0000000000000000 R14: 00007f6e07c05fa0 R15: 00007ffec48dca28 [ 279.863188][T12761] [ 280.149429][T12765] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3350'. [ 280.191572][T12765] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3350'. [ 280.326515][T12770] netlink: 'syz.1.3352': attribute type 27 has an invalid length. [ 280.412893][T12770] bridge0: port 3(dummy0) entered disabled state [ 280.589032][T12779] vlan2: entered allmulticast mode [ 280.614986][T12781] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 280.644602][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.652461][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.660427][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.668301][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.676069][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.683861][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.691796][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.699595][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.707384][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.715210][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.722999][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.730803][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.738737][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.746497][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.754337][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.762114][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.769981][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.777819][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.785593][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.793457][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.801243][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.809080][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.816851][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.824630][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.832462][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.840309][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.848192][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.856006][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.863797][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.863830][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.863860][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.863958][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.863989][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.864019][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.864117][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.918512][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.926277][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.934217][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.941989][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.949776][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.957543][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.965316][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.973147][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: unknown main item tag 0x0 [ 280.982206][ T3391] hid-generic 0000:007F:FFFFFFFE.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 281.132911][T12798] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 281.216399][T12804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.228843][T12804] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.237508][T12804] bridge0: port 3(dummy0) entered blocking state [ 281.243960][T12804] bridge0: port 3(dummy0) entered forwarding state [ 281.245550][T12809] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 281.263145][T12804] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 281.595902][T12819] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3369'. [ 281.605290][T12819] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3369'. [ 281.756246][T12821] vlan2: entered allmulticast mode [ 281.945060][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.953069][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.960897][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.968668][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.976457][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.984261][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.992021][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 281.999809][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.007710][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.015545][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.023439][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.031363][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.039202][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.047192][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.054951][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.062740][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.070613][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.078409][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.086202][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.094362][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.102358][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.110393][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.118213][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.126126][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.133967][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.141826][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.149616][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.157415][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.165395][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.173246][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.181152][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.188943][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.196830][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.204616][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.212410][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.220206][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.228021][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.235808][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.240976][ T29] kauditd_printk_skb: 1472 callbacks suppressed [ 282.241071][ T29] audit: type=1326 audit(2000002816.405:30403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6e079d5927 code=0x7ffc0000 [ 282.243613][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.251425][ T29] audit: type=1326 audit(2000002816.425:30404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6e0797ab39 code=0x7ffc0000 [ 282.274154][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.296314][ T29] audit: type=1326 audit(2000002816.455:30405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 282.305372][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.305403][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.313141][ T29] audit: type=1326 audit(2000002816.455:30406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6e079d5927 code=0x7ffc0000 [ 282.336727][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: unknown main item tag 0x0 [ 282.344424][ T29] audit: type=1326 audit(2000002816.455:30407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6e0797ab39 code=0x7ffc0000 [ 282.344482][ T29] audit: type=1326 audit(2000002816.455:30408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6e079d5927 code=0x7ffc0000 [ 282.364589][ T1049] hid-generic 0000:007F:FFFFFFFE.0008: hidraw0: HID v0.00 Device [syz1] on syz0 [ 282.376436][ T29] audit: type=1326 audit(2000002816.455:30409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6e0797ab39 code=0x7ffc0000 [ 282.465008][ T29] audit: type=1326 audit(2000002816.455:30410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6e079d5927 code=0x7ffc0000 [ 282.488573][ T29] audit: type=1326 audit(2000002816.455:30411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6e0797ab39 code=0x7ffc0000 [ 282.512372][ T29] audit: type=1326 audit(2000002816.455:30412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12826 comm="syz.4.3374" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6e079d5927 code=0x7ffc0000 [ 282.583892][T12836] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 282.624138][T12839] Cannot find set identified by id 0 to match [ 282.831800][T12854] FAULT_INJECTION: forcing a failure. [ 282.831800][T12854] name failslab, interval 1, probability 0, space 0, times 0 [ 282.844590][T12854] CPU: 0 UID: 0 PID: 12854 Comm: syz.1.3382 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 282.844694][T12854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 282.844705][T12854] Call Trace: [ 282.844711][T12854] [ 282.844717][T12854] __dump_stack+0x1d/0x30 [ 282.844770][T12854] dump_stack_lvl+0xe8/0x140 [ 282.844788][T12854] dump_stack+0x15/0x1b [ 282.844803][T12854] should_fail_ex+0x265/0x280 [ 282.844874][T12854] should_failslab+0x8c/0xb0 [ 282.844903][T12854] kmem_cache_alloc_noprof+0x50/0x310 [ 282.844921][T12854] ? getname_flags+0x80/0x3b0 [ 282.844951][T12854] getname_flags+0x80/0x3b0 [ 282.845041][T12854] __x64_sys_unlink+0x21/0x40 [ 282.845132][T12854] x64_sys_call+0x22a6/0x2fb0 [ 282.845151][T12854] do_syscall_64+0xd0/0x1a0 [ 282.845173][T12854] ? clear_bhb_loop+0x40/0x90 [ 282.845194][T12854] ? clear_bhb_loop+0x40/0x90 [ 282.845240][T12854] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.845359][T12854] RIP: 0033:0x7f2a075fe969 [ 282.845372][T12854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.845389][T12854] RSP: 002b:00007f2a05c67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 282.845466][T12854] RAX: ffffffffffffffda RBX: 00007f2a07825fa0 RCX: 00007f2a075fe969 [ 282.845478][T12854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 282.845489][T12854] RBP: 00007f2a05c67090 R08: 0000000000000000 R09: 0000000000000000 [ 282.845500][T12854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.845518][T12854] R13: 0000000000000001 R14: 00007f2a07825fa0 R15: 00007ffc4b96d438 [ 282.845596][T12854] [ 282.872057][T12845] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3379'. [ 283.033878][T12857] netlink: 'syz.1.3383': attribute type 13 has an invalid length. [ 283.041790][T12857] netlink: 'syz.1.3383': attribute type 27 has an invalid length. [ 283.088323][T12856] bridge0: port 3(dummy0) entered disabled state [ 283.089399][T12859] netlink: 'syz.1.3383': attribute type 10 has an invalid length. [ 283.103176][T12859] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3383'. [ 283.167593][T12857] bridge0: port 3(dummy0) entered blocking state [ 283.174085][T12857] bridge0: port 3(dummy0) entered forwarding state [ 283.183413][T12857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.192079][T12857] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.203272][T12857] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 283.431728][T12870] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 283.561188][T12879] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3387'. [ 283.652486][T12882] dccp_invalid_packet: P.Data Offset(172) too large [ 283.938235][T12888] lo speed is unknown, defaulting to 1000 [ 284.052078][T12893] vlan2: entered allmulticast mode [ 284.252846][T12902] xt_TCPMSS: Only works on TCP SYN packets [ 284.457316][T12915] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 284.477629][T12922] __nla_validate_parse: 1 callbacks suppressed [ 284.477647][T12922] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3396'. [ 284.488530][T12923] xt_CT: You must specify a L4 protocol and not use inversions on it [ 284.512533][T12922] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3396'. [ 284.807165][T12935] dccp_invalid_packet: P.Data Offset(172) too large [ 284.972526][T12938] bridge0: port 3(dummy0) entered disabled state [ 284.992077][ T3398] lo speed is unknown, defaulting to 1000 [ 284.997897][ T3398] syz0: Port: 1 Link DOWN [ 285.031366][T12938] netlink: 'syz.2.3411': attribute type 13 has an invalid length. [ 285.039362][T12938] netlink: 'syz.2.3411': attribute type 27 has an invalid length. [ 285.058304][T12943] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 285.061383][T12938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.083478][T12944] netlink: 'syz.2.3411': attribute type 10 has an invalid length. [ 285.091342][T12944] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3411'. [ 285.123628][T12938] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.155247][T12938] bridge0: port 3(dummy0) entered blocking state [ 285.161763][T12938] bridge0: port 3(dummy0) entered forwarding state [ 285.190084][T12938] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.205613][ T3398] lo speed is unknown, defaulting to 1000 [ 285.211622][ T3398] syz0: Port: 1 Link ACTIVE [ 285.279406][T12957] xt_hashlimit: max too large, truncated to 1048576 [ 285.327199][T12960] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3418'. [ 285.336143][T12960] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3418'. [ 285.359612][T12957] siw: device registration error -23 [ 285.435088][T12968] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.519891][T12975] usb usb8: selecting invalid altsetting 7 [ 285.530529][T12976] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 285.569668][T12979] vlan2: entered allmulticast mode [ 285.707672][T12989] netlink: 'syz.0.3429': attribute type 13 has an invalid length. [ 285.707742][T12989] netlink: 'syz.0.3429': attribute type 27 has an invalid length. [ 285.738211][T12986] bridge0: port 3(dummy0) entered disabled state [ 285.775886][T12989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.785839][T12989] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.794963][T12989] bridge0: port 3(dummy0) entered blocking state [ 285.801426][T12989] bridge0: port 3(dummy0) entered forwarding state [ 285.810479][T12989] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.877821][T12986] netlink: 'syz.0.3429': attribute type 10 has an invalid length. [ 285.877849][T12986] netlink: 40 bytes leftover after parsing attributes in process `syz.0.3429'. [ 286.017975][T12994] xt_hashlimit: max too large, truncated to 1048576 [ 286.028887][T12994] siw: device registration error -23 [ 286.332825][T13002] netlink: 'syz.3.3436': attribute type 27 has an invalid length. [ 286.352746][T13002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.362817][T13002] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.371461][T13002] bridge0: port 3(dummy0) entered blocking state [ 286.377917][T13002] bridge0: port 3(dummy0) entered forwarding state [ 286.389920][T13002] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 286.437504][T13000] dccp_invalid_packet: P.Data Offset(172) too large [ 286.462112][T13006] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 286.526424][T13010] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 286.598348][T13013] dccp_invalid_packet: P.Data Offset(172) too large [ 286.730461][T13026] netlink: 48 bytes leftover after parsing attributes in process `gtp'. [ 286.820832][T13029] usb usb8: selecting invalid altsetting 7 [ 287.937939][T13066] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 288.017562][T13070] bridge0: port 3(dummy0) entered disabled state [ 288.092311][T13070] netlink: 'syz.0.3461': attribute type 13 has an invalid length. [ 288.092337][T13070] netlink: 'syz.0.3461': attribute type 27 has an invalid length. [ 288.134147][T13070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.137508][T13070] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.170204][T13074] netlink: 'syz.0.3461': attribute type 10 has an invalid length. [ 288.170229][T13074] netlink: 40 bytes leftover after parsing attributes in process `syz.0.3461'. [ 288.170778][T13070] bridge0: port 3(dummy0) entered blocking state [ 288.193724][T13070] bridge0: port 3(dummy0) entered forwarding state [ 288.221360][ T29] kauditd_printk_skb: 1927 callbacks suppressed [ 288.221379][ T29] audit: type=1400 audit(2000002822.396:32340): avc: denied { sqpoll } for pid=13077 comm="syz.2.3464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 288.233214][T13070] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 288.491067][T13097] vlan2: entered allmulticast mode [ 288.599889][ T29] audit: type=1326 audit(2000002822.776:32341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13101 comm="syz.2.3473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 288.624050][ T29] audit: type=1326 audit(2000002822.796:32342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13101 comm="syz.2.3473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 288.660436][ T29] audit: type=1326 audit(2000002822.826:32343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 288.684097][ T29] audit: type=1326 audit(2000002822.836:32344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 288.707762][ T29] audit: type=1326 audit(2000002822.836:32345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 288.730925][T13115] FAULT_INJECTION: forcing a failure. [ 288.730925][T13115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.731470][ T29] audit: type=1326 audit(2000002822.836:32346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 288.744570][T13115] CPU: 1 UID: 0 PID: 13115 Comm: syz.1.3477 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 288.744599][T13115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 288.744616][T13115] Call Trace: [ 288.744624][T13115] [ 288.744634][T13115] __dump_stack+0x1d/0x30 [ 288.744674][T13115] dump_stack_lvl+0xe8/0x140 [ 288.744700][T13115] dump_stack+0x15/0x1b [ 288.744723][T13115] should_fail_ex+0x265/0x280 [ 288.744851][T13115] should_fail+0xb/0x20 [ 288.744892][T13115] should_fail_usercopy+0x1a/0x20 [ 288.744921][T13115] _copy_to_user+0x20/0xa0 [ 288.744952][T13115] simple_read_from_buffer+0xb5/0x130 [ 288.745008][T13115] proc_fail_nth_read+0x100/0x140 [ 288.745047][T13115] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 288.745149][T13115] vfs_read+0x19d/0x6f0 [ 288.745248][T13115] ? __rcu_read_unlock+0x4f/0x70 [ 288.745325][T13115] ? __fget_files+0x184/0x1c0 [ 288.745368][T13115] ksys_read+0xda/0x1a0 [ 288.745405][T13115] __x64_sys_read+0x40/0x50 [ 288.745501][T13115] x64_sys_call+0x2d77/0x2fb0 [ 288.745605][T13115] do_syscall_64+0xd0/0x1a0 [ 288.745645][T13115] ? clear_bhb_loop+0x40/0x90 [ 288.745675][T13115] ? clear_bhb_loop+0x40/0x90 [ 288.745705][T13115] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.745757][T13115] RIP: 0033:0x7f2a075fd37c [ 288.745783][T13115] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 288.745808][T13115] RSP: 002b:00007f2a05c46030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 288.745835][T13115] RAX: ffffffffffffffda RBX: 00007f2a07826080 RCX: 00007f2a075fd37c [ 288.745852][T13115] RDX: 000000000000000f RSI: 00007f2a05c460a0 RDI: 0000000000000003 [ 288.745869][T13115] RBP: 00007f2a05c46090 R08: 0000000000000000 R09: 0000000000000000 [ 288.745885][T13115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.745972][T13115] R13: 0000000000000001 R14: 00007f2a07826080 R15: 00007ffc4b96d438 [ 288.745998][T13115] [ 288.815513][T13117] netlink: 'syz.1.3479': attribute type 27 has an invalid length. [ 288.818969][ T29] audit: type=1326 audit(2000002822.836:32347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 288.819005][ T29] audit: type=1326 audit(2000002822.836:32348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 288.819050][ T29] audit: type=1326 audit(2000002822.836:32349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13106 comm="syz.4.3476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e079de969 code=0x7ffc0000 [ 289.055954][T13119] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.099979][T13117] bridge0: port 3(dummy0) entered disabled state [ 289.234478][T13124] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3481'. [ 289.243461][T13124] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3481'. [ 289.370029][T13131] bridge0: port 3(dummy0) entered disabled state [ 289.398428][T13131] netlink: 'syz.3.3484': attribute type 13 has an invalid length. [ 289.406337][T13131] netlink: 'syz.3.3484': attribute type 27 has an invalid length. [ 289.425943][T13131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.433856][T13131] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.442120][T13131] bridge0: port 3(dummy0) entered blocking state [ 289.448549][T13131] bridge0: port 3(dummy0) entered forwarding state [ 289.468628][T13131] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.499227][T13141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.508585][T13141] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.517929][T13141] bridge0: port 3(dummy0) entered blocking state [ 289.524404][T13141] bridge0: port 3(dummy0) entered forwarding state [ 289.548846][T13141] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.687835][T13158] __nla_validate_parse: 1 callbacks suppressed [ 289.687856][T13158] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3495'. [ 289.687890][T13158] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3495'. [ 289.707617][T13156] usb usb8: selecting invalid altsetting 7 [ 289.780500][T13160] dccp_invalid_packet: P.Data Offset(172) too large [ 289.891606][T13168] usb usb8: selecting invalid altsetting 7 [ 291.011604][T13197] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3508'. [ 291.022201][T13197] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3508'. [ 291.737334][T13206] ±ÿ: renamed from bond_slave_0 [ 291.743402][T13206] FAULT_INJECTION: forcing a failure. [ 291.743402][T13206] name failslab, interval 1, probability 0, space 0, times 0 [ 291.756083][T13206] CPU: 0 UID: 0 PID: 13206 Comm: syz.4.3511 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 291.756120][T13206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 291.756161][T13206] Call Trace: [ 291.756169][T13206] [ 291.756178][T13206] __dump_stack+0x1d/0x30 [ 291.756202][T13206] dump_stack_lvl+0xe8/0x140 [ 291.756221][T13206] dump_stack+0x15/0x1b [ 291.756244][T13206] should_fail_ex+0x265/0x280 [ 291.756298][T13206] should_failslab+0x8c/0xb0 [ 291.756406][T13206] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 291.756429][T13206] ? kstrdup_const+0x3e/0x50 [ 291.756449][T13206] kstrdup+0x3e/0xd0 [ 291.756498][T13206] kstrdup_const+0x3e/0x50 [ 291.756523][T13206] kernfs_rename_ns+0x261/0x410 [ 291.756596][T13206] sysfs_rename_dir_ns+0x4d/0x70 [ 291.756618][T13206] kobject_rename+0x28b/0x350 [ 291.756650][T13206] ? sysfs_rename_link_ns+0x106/0x120 [ 291.756703][T13206] device_rename+0x11f/0x180 [ 291.756764][T13206] netif_change_name+0x1eb/0x6b0 [ 291.756806][T13206] dev_change_name+0xc0/0x170 [ 291.756836][T13206] dev_ifsioc+0x302/0xaa0 [ 291.756861][T13206] dev_ioctl+0x4a7/0x960 [ 291.756891][T13206] sock_do_ioctl+0x197/0x220 [ 291.756925][T13206] sock_ioctl+0x41b/0x610 [ 291.756950][T13206] ? __pfx_sock_ioctl+0x10/0x10 [ 291.757000][T13206] __se_sys_ioctl+0xcb/0x140 [ 291.757030][T13206] __x64_sys_ioctl+0x43/0x50 [ 291.757105][T13206] x64_sys_call+0x19a8/0x2fb0 [ 291.757130][T13206] do_syscall_64+0xd0/0x1a0 [ 291.757153][T13206] ? clear_bhb_loop+0x40/0x90 [ 291.757176][T13206] ? clear_bhb_loop+0x40/0x90 [ 291.757206][T13206] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.757238][T13206] RIP: 0033:0x7f6e079de969 [ 291.757257][T13206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.757274][T13206] RSP: 002b:00007f6e06047038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.757293][T13206] RAX: ffffffffffffffda RBX: 00007f6e07c05fa0 RCX: 00007f6e079de969 [ 291.757309][T13206] RDX: 00002000000000c0 RSI: 0000000000008923 RDI: 0000000000000007 [ 291.757325][T13206] RBP: 00007f6e06047090 R08: 0000000000000000 R09: 0000000000000000 [ 291.757342][T13206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.757412][T13206] R13: 0000000000000000 R14: 00007f6e07c05fa0 R15: 00007ffec48dca28 [ 291.757432][T13206] [ 292.003478][T13210] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3509'. [ 292.041874][T13210] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3509'. [ 292.235748][T13212] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(9) [ 292.242294][T13212] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 292.250591][T13212] vhci_hcd vhci_hcd.0: Device attached [ 292.279284][T13219] vhci_hcd vhci_hcd.0: port 0 already used [ 292.438153][T13226] usb usb8: selecting invalid altsetting 7 [ 292.460435][T13215] vhci_hcd: connection closed [ 292.460728][ T2000] vhci_hcd: stop threads [ 292.460738][ T2000] vhci_hcd: release socket [ 292.460752][ T2000] vhci_hcd: disconnect device [ 292.518726][T13233] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 292.718569][T13241] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3516'. [ 292.785023][T13242] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3516'. [ 293.162624][T13245] FAULT_INJECTION: forcing a failure. [ 293.162624][T13245] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 293.175958][T13245] CPU: 1 UID: 0 PID: 13245 Comm: syz.3.3522 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 293.176146][T13245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 293.176165][T13245] Call Trace: [ 293.176178][T13245] [ 293.176189][T13245] __dump_stack+0x1d/0x30 [ 293.176219][T13245] dump_stack_lvl+0xe8/0x140 [ 293.176290][T13245] dump_stack+0x15/0x1b [ 293.176313][T13245] should_fail_ex+0x265/0x280 [ 293.176359][T13245] should_fail_alloc_page+0xf2/0x100 [ 293.176447][T13245] __alloc_frozen_pages_noprof+0xff/0x360 [ 293.176491][T13245] alloc_pages_mpol+0xb3/0x250 [ 293.176524][T13245] alloc_pages_noprof+0x90/0x130 [ 293.176557][T13245] pte_alloc_one+0x2a/0x110 [ 293.176650][T13245] __pte_alloc+0x32/0x290 [ 293.176683][T13245] handle_mm_fault+0x1d74/0x2ae0 [ 293.176780][T13245] ? __rcu_read_unlock+0x4f/0x70 [ 293.176846][T13245] ? check_vma_flags+0x2e1/0x340 [ 293.176874][T13245] __get_user_pages+0xde2/0x1d20 [ 293.176973][T13245] __gup_longterm_locked+0x9c9/0x1010 [ 293.176997][T13245] ? path_openat+0x1bf8/0x2170 [ 293.177032][T13245] ? _parse_integer+0x27/0x40 [ 293.177079][T13245] ? kstrtoull+0x111/0x140 [ 293.177124][T13245] gup_fast_fallback+0x1134/0x1500 [ 293.177164][T13245] get_user_pages_fast+0x5f/0x90 [ 293.177194][T13245] __se_sys_get_mempolicy+0x37d/0xd70 [ 293.177228][T13245] __x64_sys_get_mempolicy+0x67/0x80 [ 293.177257][T13245] x64_sys_call+0x749/0x2fb0 [ 293.177340][T13245] do_syscall_64+0xd0/0x1a0 [ 293.177372][T13245] ? clear_bhb_loop+0x40/0x90 [ 293.177449][T13245] ? clear_bhb_loop+0x40/0x90 [ 293.177478][T13245] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.177553][T13245] RIP: 0033:0x7f969773e969 [ 293.177572][T13245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.177600][T13245] RSP: 002b:00007f9695d86038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 293.177707][T13245] RAX: ffffffffffffffda RBX: 00007f9697966080 RCX: 00007f969773e969 [ 293.177724][T13245] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000000 [ 293.177741][T13245] RBP: 00007f9695d86090 R08: 0000000000000003 R09: 0000000000000000 [ 293.177758][T13245] R10: 0000200000a03000 R11: 0000000000000246 R12: 0000000000000001 [ 293.177774][T13245] R13: 0000000000000001 R14: 00007f9697966080 R15: 00007fff8ee4f788 [ 293.177874][T13245] [ 293.480793][T13253] xt_hashlimit: max too large, truncated to 1048576 [ 293.497039][T13248] validate_nla: 1 callbacks suppressed [ 293.497089][T13248] netlink: 'syz.4.3523': attribute type 13 has an invalid length. [ 293.510795][T13248] netlink: 'syz.4.3523': attribute type 27 has an invalid length. [ 293.547503][T13257] siw: device registration error -23 [ 293.565001][T13249] netlink: 'syz.4.3523': attribute type 10 has an invalid length. [ 293.568654][T13247] bridge0: port 3(dummy0) entered disabled state [ 293.572887][T13249] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3523'. [ 293.642190][T13248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.651110][T13248] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.660186][T13248] bridge0: port 3(dummy0) entered blocking state [ 293.666643][T13248] bridge0: port 3(dummy0) entered forwarding state [ 293.678997][ T29] kauditd_printk_skb: 580 callbacks suppressed [ 293.679016][ T29] audit: type=1400 audit(2000002827.857:32930): avc: denied { create } for pid=13258 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 293.717648][T13248] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 293.721968][ T29] audit: type=1400 audit(2000002827.887:32931): avc: denied { write } for pid=13258 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 293.781904][T13260] pim6reg1: entered promiscuous mode [ 293.787438][T13260] pim6reg1: entered allmulticast mode [ 293.828423][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.836815][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.844580][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.852550][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.860351][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.868159][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.875949][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.883712][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.891560][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.899367][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.907172][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.914979][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.922767][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.930592][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.938386][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.946161][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.946210][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.961708][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.969492][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.969927][T13274] netlink: 'syz.3.3530': attribute type 27 has an invalid length. [ 293.977267][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 293.977300][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.000696][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.008490][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.016387][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.024201][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.032046][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.039798][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.047540][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.055326][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.063123][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.070935][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.078689][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.086477][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.094299][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.102089][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.109885][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.117643][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.125759][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.133558][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.141336][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.149160][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.156972][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.164796][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: unknown main item tag 0x0 [ 294.173127][ T3888] hid-generic 0000:007F:FFFFFFFE.0009: hidraw0: HID v0.00 Device [syz1] on syz0 [ 294.190552][T13274] bridge0: port 3(dummy0) entered disabled state [ 294.215714][ T29] audit: type=1326 audit(2000002828.387:32932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.239459][ T29] audit: type=1326 audit(2000002828.387:32933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.263798][T13276] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.271999][T13276] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.278984][ T29] audit: type=1326 audit(2000002828.457:32934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.280919][T13276] bridge0: port 3(dummy0) entered blocking state [ 294.302776][ T29] audit: type=1326 audit(2000002828.457:32935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.309059][T13276] bridge0: port 3(dummy0) entered forwarding state [ 294.339685][ T29] audit: type=1326 audit(2000002828.517:32936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.363362][ T29] audit: type=1326 audit(2000002828.517:32937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.363405][ T29] audit: type=1326 audit(2000002828.517:32938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.410713][ T29] audit: type=1326 audit(2000002828.567:32939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13278 comm="syz.2.3532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 294.434861][T13276] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 294.451679][T13279] dccp_invalid_packet: P.Data Offset(172) too large [ 294.517053][T13290] FAULT_INJECTION: forcing a failure. [ 294.517053][T13290] name failslab, interval 1, probability 0, space 0, times 0 [ 294.529802][T13290] CPU: 0 UID: 0 PID: 13290 Comm: syz.2.3537 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 294.529837][T13290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 294.529853][T13290] Call Trace: [ 294.529860][T13290] [ 294.529869][T13290] __dump_stack+0x1d/0x30 [ 294.529923][T13290] dump_stack_lvl+0xe8/0x140 [ 294.529944][T13290] dump_stack+0x15/0x1b [ 294.529961][T13290] should_fail_ex+0x265/0x280 [ 294.530010][T13290] should_failslab+0x8c/0xb0 [ 294.530043][T13290] kmem_cache_alloc_noprof+0x50/0x310 [ 294.530106][T13290] ? radix_tree_node_alloc+0x8a/0x1f0 [ 294.530130][T13290] radix_tree_node_alloc+0x8a/0x1f0 [ 294.530195][T13290] idr_get_free+0x1fa/0x550 [ 294.530225][T13290] idr_alloc_u32+0xca/0x180 [ 294.530254][T13290] tcf_idr_check_alloc+0x193/0x240 [ 294.530303][T13290] tcf_pedit_init+0x1cf/0x970 [ 294.530340][T13290] ? should_fail_ex+0xdb/0x280 [ 294.530432][T13290] tcf_action_init_1+0x36a/0x4a0 [ 294.530533][T13290] tcf_action_init+0x1be/0x5f0 [ 294.530585][T13290] tc_ctl_action+0x291/0x830 [ 294.530697][T13290] ? __pfx_tc_ctl_action+0x10/0x10 [ 294.530803][T13290] rtnetlink_rcv_msg+0x657/0x6d0 [ 294.530865][T13290] netlink_rcv_skb+0x123/0x220 [ 294.530899][T13290] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 294.530933][T13290] rtnetlink_rcv+0x1c/0x30 [ 294.530966][T13290] netlink_unicast+0x5a1/0x670 [ 294.531001][T13290] netlink_sendmsg+0x58b/0x6b0 [ 294.531032][T13290] ? __pfx_netlink_sendmsg+0x10/0x10 [ 294.531054][T13290] __sock_sendmsg+0x145/0x180 [ 294.531084][T13290] ____sys_sendmsg+0x31e/0x4e0 [ 294.531109][T13290] ___sys_sendmsg+0x17b/0x1d0 [ 294.531168][T13290] __x64_sys_sendmsg+0xd4/0x160 [ 294.531195][T13290] x64_sys_call+0x2999/0x2fb0 [ 294.531218][T13290] do_syscall_64+0xd0/0x1a0 [ 294.531242][T13290] ? clear_bhb_loop+0x40/0x90 [ 294.531270][T13290] ? clear_bhb_loop+0x40/0x90 [ 294.531311][T13290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.531365][T13290] RIP: 0033:0x7ff5c6fae969 [ 294.531386][T13290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.531406][T13290] RSP: 002b:00007ff5c5617038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 294.531425][T13290] RAX: ffffffffffffffda RBX: 00007ff5c71d5fa0 RCX: 00007ff5c6fae969 [ 294.531439][T13290] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000005 [ 294.531452][T13290] RBP: 00007ff5c5617090 R08: 0000000000000000 R09: 0000000000000000 [ 294.531543][T13290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.531556][T13290] R13: 0000000000000000 R14: 00007ff5c71d5fa0 R15: 00007ffe2aeb65a8 [ 294.531622][T13290] [ 294.863362][T13299] xt_hashlimit: max too large, truncated to 1048576 [ 294.875175][T13292] dccp_invalid_packet: P.Data Offset(172) too large [ 294.876051][T13299] siw: device registration error -23 [ 294.931527][T13305] vlan2: entered allmulticast mode [ 294.940905][T13307] netlink: 'syz.3.3544': attribute type 27 has an invalid length. [ 294.963252][T13307] bridge0: port 3(dummy0) entered disabled state [ 294.965812][T13302] dccp_invalid_packet: P.Data Offset(172) too large [ 294.994487][T13307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.003723][T13307] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.017730][T13307] bridge0: port 3(dummy0) entered blocking state [ 295.024199][T13307] bridge0: port 3(dummy0) entered forwarding state [ 295.033541][T13307] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 295.052643][T13312] vlan2: entered allmulticast mode [ 295.072838][T13309] dccp_invalid_packet: P.Data Offset(172) too large [ 295.171230][T13325] xt_hashlimit: max too large, truncated to 1048576 [ 295.355050][T13325] siw: device registration error -23 [ 295.459217][T13336] FAULT_INJECTION: forcing a failure. [ 295.459217][T13336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.472622][T13336] CPU: 1 UID: 0 PID: 13336 Comm: syz.4.3555 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 295.472660][T13336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 295.472677][T13336] Call Trace: [ 295.472684][T13336] [ 295.472691][T13336] __dump_stack+0x1d/0x30 [ 295.472713][T13336] dump_stack_lvl+0xe8/0x140 [ 295.472784][T13336] dump_stack+0x15/0x1b [ 295.472807][T13336] should_fail_ex+0x265/0x280 [ 295.472850][T13336] should_fail+0xb/0x20 [ 295.472880][T13336] should_fail_usercopy+0x1a/0x20 [ 295.472962][T13336] _copy_from_user+0x1c/0xb0 [ 295.472993][T13336] ___sys_sendmsg+0xc1/0x1d0 [ 295.473040][T13336] __x64_sys_sendmsg+0xd4/0x160 [ 295.473069][T13336] x64_sys_call+0x2999/0x2fb0 [ 295.473091][T13336] do_syscall_64+0xd0/0x1a0 [ 295.473144][T13336] ? clear_bhb_loop+0x40/0x90 [ 295.473174][T13336] ? clear_bhb_loop+0x40/0x90 [ 295.473204][T13336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.473242][T13336] RIP: 0033:0x7f6e079de969 [ 295.473261][T13336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.473293][T13336] RSP: 002b:00007f6e06047038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 295.473319][T13336] RAX: ffffffffffffffda RBX: 00007f6e07c05fa0 RCX: 00007f6e079de969 [ 295.473336][T13336] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 295.473353][T13336] RBP: 00007f6e06047090 R08: 0000000000000000 R09: 0000000000000000 [ 295.473367][T13336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 295.473403][T13336] R13: 0000000000000000 R14: 00007f6e07c05fa0 R15: 00007ffec48dca28 [ 295.473424][T13336] [ 295.662411][T13338] xt_TCPMSS: Only works on TCP SYN packets [ 295.785732][T13341] dccp_invalid_packet: P.Data Offset(172) too large [ 295.848229][T13346] FAULT_INJECTION: forcing a failure. [ 295.848229][T13346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.861422][T13346] CPU: 1 UID: 0 PID: 13346 Comm: syz.1.3558 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 295.861461][T13346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 295.861474][T13346] Call Trace: [ 295.861479][T13346] [ 295.861486][T13346] __dump_stack+0x1d/0x30 [ 295.861555][T13346] dump_stack_lvl+0xe8/0x140 [ 295.861581][T13346] dump_stack+0x15/0x1b [ 295.861604][T13346] should_fail_ex+0x265/0x280 [ 295.861644][T13346] should_fail+0xb/0x20 [ 295.861674][T13346] should_fail_usercopy+0x1a/0x20 [ 295.861696][T13346] _copy_from_user+0x1c/0xb0 [ 295.861730][T13346] do_ipv6_setsockopt+0x220/0x22e0 [ 295.861755][T13346] ? kstrtoull+0x111/0x140 [ 295.861873][T13346] ? __rcu_read_unlock+0x4f/0x70 [ 295.861896][T13346] ? avc_has_perm_noaudit+0x1b1/0x200 [ 295.861918][T13346] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 295.861996][T13346] ipv6_setsockopt+0x59/0x130 [ 295.862026][T13346] rawv6_setsockopt+0x1d2/0x420 [ 295.862052][T13346] sock_common_setsockopt+0x66/0x80 [ 295.862118][T13346] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 295.862148][T13346] __sys_setsockopt+0x181/0x200 [ 295.862168][T13346] __x64_sys_setsockopt+0x64/0x80 [ 295.862195][T13346] x64_sys_call+0x2bd5/0x2fb0 [ 295.862218][T13346] do_syscall_64+0xd0/0x1a0 [ 295.862245][T13346] ? clear_bhb_loop+0x40/0x90 [ 295.862309][T13346] ? clear_bhb_loop+0x40/0x90 [ 295.862382][T13346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.862411][T13346] RIP: 0033:0x7f2a075fe969 [ 295.862430][T13346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.862460][T13346] RSP: 002b:00007f2a05c67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 295.862486][T13346] RAX: ffffffffffffffda RBX: 00007f2a07825fa0 RCX: 00007f2a075fe969 [ 295.862523][T13346] RDX: 0000000000000016 RSI: 0000000000000029 RDI: 0000000000000003 [ 295.862535][T13346] RBP: 00007f2a05c67090 R08: 0000000000000004 R09: 0000000000000000 [ 295.862548][T13346] R10: 0000200000fcb000 R11: 0000000000000246 R12: 0000000000000001 [ 295.862560][T13346] R13: 0000000000000000 R14: 00007f2a07825fa0 R15: 00007ffc4b96d438 [ 295.862578][T13346] [ 296.103581][T13348] netlink: 'syz.3.3559': attribute type 27 has an invalid length. [ 296.129370][T13348] bridge0: port 3(dummy0) entered disabled state [ 296.162096][T13351] vlan2: entered allmulticast mode [ 296.200929][T13348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.208674][T13352] dccp_invalid_packet: P.Data Offset(172) too large [ 296.209409][T13348] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.223776][T13348] bridge0: port 3(dummy0) entered blocking state [ 296.230164][T13348] bridge0: port 3(dummy0) entered forwarding state [ 296.239960][T13348] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 296.319018][T13358] ip6gretap1: entered allmulticast mode [ 296.382224][T13358] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 296.810940][T13382] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3569'. [ 296.910412][T13382] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3569'. [ 297.089192][T13384] vlan2: entered allmulticast mode [ 297.215004][T13386] netlink: 'syz.2.3574': attribute type 27 has an invalid length. [ 297.235361][T13386] bridge0: port 3(dummy0) entered disabled state [ 297.261493][ T10] lo speed is unknown, defaulting to 1000 [ 297.267390][ T10] syz0: Port: 1 Link DOWN [ 297.273341][T13390] FAULT_INJECTION: forcing a failure. [ 297.273341][T13390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.286583][T13390] CPU: 0 UID: 0 PID: 13390 Comm: syz.3.3576 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 297.286621][T13390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 297.286637][T13390] Call Trace: [ 297.286645][T13390] [ 297.286711][T13390] __dump_stack+0x1d/0x30 [ 297.286739][T13390] dump_stack_lvl+0xe8/0x140 [ 297.286765][T13390] dump_stack+0x15/0x1b [ 297.286787][T13390] should_fail_ex+0x265/0x280 [ 297.286878][T13390] should_fail+0xb/0x20 [ 297.286917][T13390] should_fail_usercopy+0x1a/0x20 [ 297.286943][T13390] _copy_from_user+0x1c/0xb0 [ 297.287027][T13390] __sys_connect+0xd0/0x2b0 [ 297.287086][T13390] __x64_sys_connect+0x3f/0x50 [ 297.287129][T13390] x64_sys_call+0x1daa/0x2fb0 [ 297.287186][T13390] do_syscall_64+0xd0/0x1a0 [ 297.287217][T13390] ? clear_bhb_loop+0x40/0x90 [ 297.287245][T13390] ? clear_bhb_loop+0x40/0x90 [ 297.287271][T13390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.287363][T13390] RIP: 0033:0x7f969773e969 [ 297.287382][T13390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.287406][T13390] RSP: 002b:00007f9695da7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 297.287430][T13390] RAX: ffffffffffffffda RBX: 00007f9697965fa0 RCX: 00007f969773e969 [ 297.287446][T13390] RDX: 0000000000000010 RSI: 0000200000000280 RDI: 0000000000000003 [ 297.287580][T13390] RBP: 00007f9695da7090 R08: 0000000000000000 R09: 0000000000000000 [ 297.287597][T13390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.287613][T13390] R13: 0000000000000000 R14: 00007f9697965fa0 R15: 00007fff8ee4f788 [ 297.287639][T13390] [ 297.478576][T13386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.492478][T13386] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.514641][T13386] bridge0: port 3(dummy0) entered blocking state [ 297.521128][T13386] bridge0: port 3(dummy0) entered forwarding state [ 297.556856][T12018] lo speed is unknown, defaulting to 1000 [ 297.562627][T12018] syz0: Port: 1 Link ACTIVE [ 297.703678][T13419] ip6gretap1: entered allmulticast mode [ 297.742159][T13419] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 298.509968][T13427] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3591'. [ 298.522307][T13427] bridge0: entered promiscuous mode [ 298.528527][T13427] bridge0: port 4(macvlan2) entered blocking state [ 298.535202][T13427] bridge0: port 4(macvlan2) entered disabled state [ 298.541995][T13427] macvlan2: entered allmulticast mode [ 298.547539][T13427] bridge0: entered allmulticast mode [ 298.553718][T13427] macvlan2: left allmulticast mode [ 298.558955][T13427] bridge0: left allmulticast mode [ 298.564768][T13427] bridge0: left promiscuous mode [ 298.574651][T13433] netlink: 'syz.1.3593': attribute type 27 has an invalid length. [ 298.613651][T13433] bridge0: port 3(dummy0) entered disabled state [ 298.636397][T13435] xt_TCPMSS: Only works on TCP SYN packets [ 298.760256][T13433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.819451][T13433] 8021q: adding VLAN 0 to HW filter on device team0 [ 298.842654][ T29] kauditd_printk_skb: 390 callbacks suppressed [ 298.842672][ T29] audit: type=1326 audit(2000002833.007:33330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 298.844454][T13433] bridge0: port 3(dummy0) entered blocking state [ 298.848923][ T29] audit: type=1326 audit(2000002833.007:33331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=199 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 298.872464][T13433] bridge0: port 3(dummy0) entered forwarding state [ 298.878816][ T29] audit: type=1326 audit(2000002833.007:33332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 298.932952][ T29] audit: type=1326 audit(2000002833.007:33333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 298.956591][ T29] audit: type=1326 audit(2000002833.007:33334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 298.980160][ T29] audit: type=1326 audit(2000002833.007:33335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 299.003831][ T29] audit: type=1326 audit(2000002833.007:33336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 299.027573][ T29] audit: type=1326 audit(2000002833.007:33337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 299.051161][ T29] audit: type=1326 audit(2000002833.007:33338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 299.074914][ T29] audit: type=1326 audit(2000002833.007:33339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13434 comm="syz.3.3594" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f969773e969 code=0x7ffc0000 [ 299.100728][T13433] net_ratelimit: 3 callbacks suppressed [ 299.100742][T13433] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 299.161331][T13445] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3596'. [ 299.180498][T13445] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3596'. [ 299.250748][T13447] netlink: 76 bytes leftover after parsing attributes in process `syz.1.3597'. [ 299.329009][T13447] IPVS: set_ctl: invalid protocol: 60 172.20.20.187:19996 [ 299.861332][T13461] ip6gretap1: entered allmulticast mode [ 299.902371][T13461] syz!: rxe_newlink: already configured on team_slave_0 [ 300.412792][T13463] vlan2: entered allmulticast mode [ 300.429899][T13465] binfmt_misc: register: failed to install interpreter file ./file2 [ 300.430147][T13467] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3606'. [ 300.457125][T13467] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3606'. [ 300.471238][T13469] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 300.551484][T13477] xt_TCPMSS: Only works on TCP SYN packets [ 300.739412][T13483] dccp_invalid_packet: P.Data Offset(172) too large [ 300.787578][T13485] dccp_invalid_packet: P.Data Offset(172) too large [ 300.820594][T13496] netlink: 76 bytes leftover after parsing attributes in process `syz.3.3618'. [ 300.834064][T13496] IPVS: set_ctl: invalid protocol: 60 172.20.20.187:19996 [ 300.883298][T13498] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 301.042905][T13503] dccp_invalid_packet: P.Data Offset(172) too large [ 301.152869][T13506] lo speed is unknown, defaulting to 1000 [ 301.500748][T13514] ip6gretap1: entered allmulticast mode [ 301.542734][T13517] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 301.638311][T13521] dccp_invalid_packet: P.Data Offset(172) too large [ 302.662655][T13546] xt_TCPMSS: Only works on TCP SYN packets [ 303.414952][T13558] dccp_invalid_packet: P.Data Offset(172) too large [ 303.540156][T13562] netlink: 'syz.4.3642': attribute type 27 has an invalid length. [ 303.606563][T13562] bridge0: port 3(dummy0) entered disabled state [ 303.636449][T13563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.645188][T13563] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.675336][T13563] bridge0: port 3(dummy0) entered blocking state [ 303.681783][T13563] bridge0: port 3(dummy0) entered forwarding state [ 303.705951][T13563] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 303.799135][T13572] netlink: 76 bytes leftover after parsing attributes in process `syz.4.3646'. [ 303.811986][T13572] IPVS: set_ctl: invalid protocol: 60 172.20.20.187:19996 [ 303.957671][T13574] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3644'. [ 303.967280][T13574] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3644'. [ 304.102545][T13576] netlink: 'syz.4.3647': attribute type 27 has an invalid length. [ 304.145911][T13576] bridge0: port 3(dummy0) entered disabled state [ 304.204513][ T29] kauditd_printk_skb: 620 callbacks suppressed [ 304.204535][ T29] audit: type=1326 audit(2000002838.348:33960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13556 comm="syz.0.3640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ba2afe969 code=0x7ffc0000 [ 304.234449][ T29] audit: type=1326 audit(2000002838.348:33961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13556 comm="syz.0.3640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ba2afe969 code=0x7ffc0000 [ 304.277535][T13577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.294261][T13577] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.311544][T13577] bridge0: port 3(dummy0) entered blocking state [ 304.318040][T13577] bridge0: port 3(dummy0) entered forwarding state [ 304.329208][T13577] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 304.348441][T13579] vlan2: entered allmulticast mode [ 304.381172][T13581] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3649'. [ 304.403715][ T29] audit: type=1400 audit(2000002838.568:33962): avc: denied { write } for pid=13580 comm="syz.4.3649" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 304.480577][T13585] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3651'. [ 304.494219][T13585] bond0: entered promiscuous mode [ 304.499395][T13585] bond_slave_0: entered promiscuous mode [ 304.505441][T13585] bond_slave_1: entered promiscuous mode [ 304.512182][T13585] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 304.520636][T13585] bond0: left promiscuous mode [ 304.525588][T13585] bond_slave_0: left promiscuous mode [ 304.531049][T13585] bond_slave_1: left promiscuous mode [ 304.558508][T13588] xt_TCPMSS: Only works on TCP SYN packets [ 304.653643][ T29] audit: type=1326 audit(2000002838.818:33963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.695525][ T29] audit: type=1326 audit(2000002838.848:33964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=136 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.719276][ T29] audit: type=1326 audit(2000002838.848:33965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.742996][ T29] audit: type=1326 audit(2000002838.848:33966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.766591][ T29] audit: type=1326 audit(2000002838.848:33967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.790412][ T29] audit: type=1326 audit(2000002838.848:33968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.814033][ T29] audit: type=1326 audit(2000002838.848:33969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13591 comm="syz.2.3653" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 304.887673][T13599] ip6gretap1: entered allmulticast mode [ 304.941313][T13599] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 305.644218][T13613] dccp_invalid_packet: P.Data Offset(172) too large [ 305.797101][T13616] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3661'. [ 305.806145][T13616] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3661'. [ 305.821401][T13617] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3658'. [ 305.859152][T13617] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3658'. [ 306.157730][T13622] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3660'. [ 307.040696][T13634] binfmt_misc: register: failed to install interpreter file ./file2 [ 307.242713][T13646] binfmt_misc: register: failed to install interpreter file ./file2 [ 307.269621][T13648] FAULT_INJECTION: forcing a failure. [ 307.269621][T13648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 307.282803][T13648] CPU: 0 UID: 0 PID: 13648 Comm: syz.0.3673 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 307.282841][T13648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 307.282858][T13648] Call Trace: [ 307.282867][T13648] [ 307.282912][T13648] __dump_stack+0x1d/0x30 [ 307.283015][T13648] dump_stack_lvl+0xe8/0x140 [ 307.283041][T13648] dump_stack+0x15/0x1b [ 307.283063][T13648] should_fail_ex+0x265/0x280 [ 307.283108][T13648] should_fail+0xb/0x20 [ 307.283182][T13648] should_fail_usercopy+0x1a/0x20 [ 307.283206][T13648] _copy_from_user+0x1c/0xb0 [ 307.283252][T13648] do_ipv6_setsockopt+0x220/0x22e0 [ 307.283282][T13648] ? kstrtoull+0x111/0x140 [ 307.283311][T13648] ? __rcu_read_unlock+0x4f/0x70 [ 307.283367][T13648] ? avc_has_perm_noaudit+0x1b1/0x200 [ 307.283392][T13648] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 307.283439][T13648] ipv6_setsockopt+0x59/0x130 [ 307.283470][T13648] rawv6_setsockopt+0x1d2/0x420 [ 307.283504][T13648] sock_common_setsockopt+0x66/0x80 [ 307.283536][T13648] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 307.283567][T13648] __sys_setsockopt+0x181/0x200 [ 307.283667][T13648] __x64_sys_setsockopt+0x64/0x80 [ 307.283689][T13648] x64_sys_call+0x2bd5/0x2fb0 [ 307.283710][T13648] do_syscall_64+0xd0/0x1a0 [ 307.283752][T13648] ? clear_bhb_loop+0x40/0x90 [ 307.283774][T13648] ? clear_bhb_loop+0x40/0x90 [ 307.283795][T13648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 307.283859][T13648] RIP: 0033:0x7f6ba2afe969 [ 307.283873][T13648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.283892][T13648] RSP: 002b:00007f6ba1167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 307.283911][T13648] RAX: ffffffffffffffda RBX: 00007f6ba2d25fa0 RCX: 00007f6ba2afe969 [ 307.283936][T13648] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 307.283954][T13648] RBP: 00007f6ba1167090 R08: 0000000000000520 R09: 0000000000000000 [ 307.283971][T13648] R10: 0000200000000600 R11: 0000000000000246 R12: 0000000000000001 [ 307.283988][T13648] R13: 0000000000000000 R14: 00007f6ba2d25fa0 R15: 00007ffe9db61498 [ 307.284013][T13648] [ 307.293504][T13644] dccp_invalid_packet: P.Data Offset(172) too large [ 308.643601][T13682] binfmt_misc: register: failed to install interpreter file ./file2 [ 308.731323][T13689] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 308.955083][T13696] vlan2: entered allmulticast mode [ 309.079674][T13702] ip6gretap1: entered allmulticast mode [ 309.127116][T13703] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 309.213590][T13705] netlink: 'syz.3.3694': attribute type 27 has an invalid length. [ 309.233973][T13705] bridge0: port 3(dummy0) entered disabled state [ 309.259411][T13705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.267591][T13705] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.277346][T13705] bridge0: port 3(dummy0) entered blocking state [ 309.283730][T13705] bridge0: port 3(dummy0) entered forwarding state [ 309.292711][T13705] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 309.343586][T13708] xt_TCPMSS: Only works on TCP SYN packets [ 310.486474][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 310.486494][ T29] audit: type=1326 audit(2000002844.659:34114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.516735][ T29] audit: type=1326 audit(2000002844.659:34115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.540920][ T29] audit: type=1326 audit(2000002844.659:34116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.549779][T13721] binfmt_misc: register: failed to install interpreter file ./file2 [ 310.564547][ T29] audit: type=1326 audit(2000002844.659:34117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.564584][ T29] audit: type=1326 audit(2000002844.659:34118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.619850][ T29] audit: type=1326 audit(2000002844.709:34119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.643513][ T29] audit: type=1326 audit(2000002844.709:34120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.667251][ T29] audit: type=1326 audit(2000002844.719:34121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=246 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.690955][ T29] audit: type=1326 audit(2000002844.719:34122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.714585][ T29] audit: type=1326 audit(2000002844.719:34123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13720 comm="syz.1.3699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 310.747679][T13723] xt_TCPMSS: Only works on TCP SYN packets [ 311.006754][T13732] __nla_validate_parse: 11 callbacks suppressed [ 311.006769][T13732] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3701'. [ 311.022622][T13732] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3701'. [ 311.191807][T13737] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3704'. [ 311.200825][T13737] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3704'. [ 311.529212][T13743] vlan2: entered allmulticast mode [ 311.792937][T13751] binfmt_misc: register: failed to install interpreter file ./file2 [ 311.880956][T13759] dccp_invalid_packet: P.Data Offset(172) too large [ 312.467904][T13773] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3718'. [ 312.482368][T13773] IPVS: set_ctl: invalid protocol: 60 172.20.20.187:19996 [ 312.638619][T13778] vlan2: entered allmulticast mode [ 312.740635][T13784] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3719'. [ 312.779968][T13784] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3719'. [ 312.905375][T13788] xt_TCPMSS: Only works on TCP SYN packets [ 313.088312][T13792] FAULT_INJECTION: forcing a failure. [ 313.088312][T13792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.101545][T13792] CPU: 1 UID: 0 PID: 13792 Comm: syz.2.3725 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 313.101588][T13792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 313.101602][T13792] Call Trace: [ 313.101609][T13792] [ 313.101641][T13792] __dump_stack+0x1d/0x30 [ 313.101671][T13792] dump_stack_lvl+0xe8/0x140 [ 313.101697][T13792] dump_stack+0x15/0x1b [ 313.101720][T13792] should_fail_ex+0x265/0x280 [ 313.101760][T13792] should_fail+0xb/0x20 [ 313.101844][T13792] should_fail_usercopy+0x1a/0x20 [ 313.101869][T13792] _copy_from_user+0x1c/0xb0 [ 313.101951][T13792] __sys_bpf+0x178/0x790 [ 313.102027][T13792] __x64_sys_bpf+0x41/0x50 [ 313.102065][T13792] x64_sys_call+0x2478/0x2fb0 [ 313.102094][T13792] do_syscall_64+0xd0/0x1a0 [ 313.102125][T13792] ? clear_bhb_loop+0x40/0x90 [ 313.102229][T13792] ? clear_bhb_loop+0x40/0x90 [ 313.102259][T13792] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.102288][T13792] RIP: 0033:0x7ff5c6fae969 [ 313.102308][T13792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.102361][T13792] RSP: 002b:00007ff5c5617038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 313.102382][T13792] RAX: ffffffffffffffda RBX: 00007ff5c71d5fa0 RCX: 00007ff5c6fae969 [ 313.102405][T13792] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 313.102422][T13792] RBP: 00007ff5c5617090 R08: 0000000000000000 R09: 0000000000000000 [ 313.102439][T13792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.102456][T13792] R13: 0000000000000001 R14: 00007ff5c71d5fa0 R15: 00007ffe2aeb65a8 [ 313.102536][T13792] [ 313.312143][T13795] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 313.452549][T13800] netlink: 'syz.2.3728': attribute type 27 has an invalid length. [ 313.542507][T13800] bridge0: port 3(dummy0) entered disabled state [ 313.561522][T11361] lo speed is unknown, defaulting to 1000 [ 313.567352][T11361] syz0: Port: 1 Link DOWN [ 313.617648][T13800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.649212][T13800] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.659648][T13800] bridge0: port 3(dummy0) entered blocking state [ 313.666100][T13800] bridge0: port 3(dummy0) entered forwarding state [ 313.676394][T13800] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 313.705608][T11361] lo speed is unknown, defaulting to 1000 [ 313.711396][T11361] syz0: Port: 1 Link ACTIVE [ 313.895444][T13816] vlan2: entered allmulticast mode [ 313.944418][T13811] ±ÿ: renamed from bond_slave_0 [ 314.117202][T13821] netlink: 'syz.4.3736': attribute type 27 has an invalid length. [ 314.185942][T13821] bridge0: port 3(dummy0) entered disabled state [ 314.249685][T13823] dccp_invalid_packet: P.Data Offset(172) too large [ 314.361814][T13824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.381640][T13824] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.397864][T13824] bridge0: port 3(dummy0) entered blocking state [ 314.397952][T13824] bridge0: port 3(dummy0) entered forwarding state [ 314.433175][T13824] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 314.786502][T13849] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 314.806359][T13849] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 314.897763][T13849] block device autoloading is deprecated and will be removed. [ 315.068368][T13875] dccp_invalid_packet: P.Data Offset(172) too large [ 315.220634][T13883] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3752'. [ 315.229996][T13883] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 315.238260][T13883] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 315.648100][ T29] kauditd_printk_skb: 324 callbacks suppressed [ 315.654369][ T29] audit: type=1326 audit(2000002849.819:34448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.678040][ T29] audit: type=1326 audit(2000002849.819:34449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.793304][ T29] audit: type=1326 audit(2000002849.939:34450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.816970][ T29] audit: type=1326 audit(2000002849.939:34451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.840589][ T29] audit: type=1326 audit(2000002849.939:34452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.864292][ T29] audit: type=1326 audit(2000002849.939:34453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=434 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.887890][ T29] audit: type=1326 audit(2000002849.939:34454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.911580][ T29] audit: type=1326 audit(2000002849.939:34455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.935299][ T29] audit: type=1326 audit(2000002849.939:34456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 315.958908][ T29] audit: type=1326 audit(2000002849.949:34457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13897 comm="syz.1.3757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a075fe969 code=0x7ffc0000 [ 316.026179][T13902] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3758'. [ 316.036255][T13902] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3758'. [ 316.294029][T13909] netlink: 'syz.0.3759': attribute type 39 has an invalid length. [ 316.476322][T13914] dccp_invalid_packet: P.Data Offset(172) too large [ 316.557591][T13923] binfmt_misc: register: failed to install interpreter file ./file2 [ 317.429559][T13946] x_tables: ip6_tables: tcpmss match: only valid for protocol 6 [ 317.526364][T13949] FAULT_INJECTION: forcing a failure. [ 317.526364][T13949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.539828][T13949] CPU: 1 UID: 0 PID: 13949 Comm: syz.0.3775 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 317.539858][T13949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 317.539875][T13949] Call Trace: [ 317.539882][T13949] [ 317.539892][T13949] __dump_stack+0x1d/0x30 [ 317.539950][T13949] dump_stack_lvl+0xe8/0x140 [ 317.539976][T13949] dump_stack+0x15/0x1b [ 317.540057][T13949] should_fail_ex+0x265/0x280 [ 317.540165][T13949] should_fail+0xb/0x20 [ 317.540196][T13949] should_fail_usercopy+0x1a/0x20 [ 317.540218][T13949] _copy_from_user+0x1c/0xb0 [ 317.540340][T13949] copy_from_sockptr+0x48/0x70 [ 317.540382][T13949] raw_setsockopt+0x49f/0xbf0 [ 317.540433][T13949] ? __pfx_raw_setsockopt+0x10/0x10 [ 317.540463][T13949] __sys_setsockopt+0x181/0x200 [ 317.540552][T13949] __x64_sys_setsockopt+0x64/0x80 [ 317.540662][T13949] x64_sys_call+0x2bd5/0x2fb0 [ 317.540683][T13949] do_syscall_64+0xd0/0x1a0 [ 317.540710][T13949] ? clear_bhb_loop+0x40/0x90 [ 317.540782][T13949] ? clear_bhb_loop+0x40/0x90 [ 317.540806][T13949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.540873][T13949] RIP: 0033:0x7f6ba2afe969 [ 317.540933][T13949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.540959][T13949] RSP: 002b:00007f6ba1167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 317.540984][T13949] RAX: ffffffffffffffda RBX: 00007f6ba2d25fa0 RCX: 00007f6ba2afe969 [ 317.541001][T13949] RDX: 0000000000000001 RSI: 0000000000000065 RDI: 0000000000000003 [ 317.541036][T13949] RBP: 00007f6ba1167090 R08: 0000000000000008 R09: 0000000000000000 [ 317.541048][T13949] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 317.541061][T13949] R13: 0000000000000000 R14: 00007f6ba2d25fa0 R15: 00007ffe9db61498 [ 317.541081][T13949] [ 317.805700][T13955] vlan2: entered allmulticast mode [ 317.850782][T13957] dccp_invalid_packet: P.Data Offset(172) too large [ 317.886026][T13959] ip6erspan0: entered promiscuous mode [ 317.960949][T13964] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3776'. [ 317.970558][T13964] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3776'. [ 318.941212][T13976] xt_TCPMSS: Only works on TCP SYN packets [ 319.026281][T13978] dccp_invalid_packet: P.Data Offset(172) too large [ 319.495641][T13988] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3788'. [ 319.504685][T13988] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3788'. [ 319.535559][T13990] netlink: 'syz.0.3789': attribute type 27 has an invalid length. [ 319.543660][T13990] netlink: 'syz.0.3789': attribute type 3 has an invalid length. [ 319.551410][T13990] netlink: 132 bytes leftover after parsing attributes in process `syz.0.3789'. [ 319.645610][T13997] vlan2: entered allmulticast mode [ 319.894413][T14007] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 319.959833][T14013] netlink: 'syz.2.3799': attribute type 27 has an invalid length. [ 319.978903][T14013] bridge0: port 3(dummy0) entered disabled state [ 319.990140][ T10] lo speed is unknown, defaulting to 1000 [ 319.995958][ T10] syz0: Port: 1 Link DOWN [ 320.025150][T14013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.033532][T14013] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.042029][T14013] bridge0: port 3(dummy0) entered blocking state [ 320.048449][T14013] bridge0: port 3(dummy0) entered forwarding state [ 320.057781][T14013] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 320.073813][ T10] lo speed is unknown, defaulting to 1000 [ 320.079601][ T10] syz0: Port: 1 Link ACTIVE [ 320.504183][T14023] xt_hashlimit: max too large, truncated to 1048576 [ 320.515850][T14023] siw: device registration error -23 [ 320.702858][ T29] kauditd_printk_skb: 350 callbacks suppressed [ 320.702876][ T29] audit: type=1326 audit(2000002854.880:34808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14024 comm="syz.0.3803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ba2afe969 code=0x7ffc0000 [ 320.732969][ T29] audit: type=1326 audit(2000002854.880:34809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14024 comm="syz.0.3803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ba2afe969 code=0x7ffc0000 [ 320.905229][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.913070][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.920825][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.928597][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.936355][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.944121][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.951862][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.959701][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.967517][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.975541][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.983319][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.991159][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 320.998985][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.006792][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.014589][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.022392][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.030193][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.037952][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.045703][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.053465][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.061226][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.069122][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.076973][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.084808][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.092603][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.100355][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.108105][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.115875][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.123628][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.131366][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.139207][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.146964][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.154779][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.162601][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.170348][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.178102][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.185981][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.193771][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.201506][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.209348][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.217135][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.224932][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.232702][ T10] hid-generic 0000:007F:FFFFFFFE.000A: unknown main item tag 0x0 [ 321.241061][ T10] hid-generic 0000:007F:FFFFFFFE.000A: hidraw0: HID v0.00 Device [syz1] on syz0 [ 321.262877][ T29] audit: type=1326 audit(2000002855.440:34810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.287105][ T29] audit: type=1326 audit(2000002855.460:34811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.310897][ T29] audit: type=1326 audit(2000002855.460:34812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.334921][ T29] audit: type=1326 audit(2000002855.460:34813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.358704][ T29] audit: type=1326 audit(2000002855.460:34814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.382329][ T29] audit: type=1326 audit(2000002855.460:34815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.397189][T14036] netlink: 'syz.3.3806': attribute type 13 has an invalid length. [ 321.405968][ T29] audit: type=1326 audit(2000002855.460:34816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.413832][T14036] netlink: 'syz.3.3806': attribute type 27 has an invalid length. [ 321.437490][ T29] audit: type=1326 audit(2000002855.460:34817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14032 comm="syz.2.3805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7ff5c6fae969 code=0x7ffc0000 [ 321.470608][T14035] bridge0: port 3(dummy0) entered disabled state [ 321.492078][T14036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.500249][T14036] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.508323][T14036] bridge0: port 3(dummy0) entered blocking state [ 321.511386][T14035] netlink: 'syz.3.3806': attribute type 10 has an invalid length. [ 321.514873][T14036] bridge0: port 3(dummy0) entered forwarding state [ 321.522766][T14035] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3806'. [ 321.538850][T14036] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 321.577039][T14038] FAULT_INJECTION: forcing a failure. [ 321.577039][T14038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.590239][T14038] CPU: 1 UID: 0 PID: 14038 Comm: syz.3.3807 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 321.590306][T14038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 321.590318][T14038] Call Trace: [ 321.590323][T14038] [ 321.590330][T14038] __dump_stack+0x1d/0x30 [ 321.590383][T14038] dump_stack_lvl+0xe8/0x140 [ 321.590407][T14038] dump_stack+0x15/0x1b [ 321.590463][T14038] should_fail_ex+0x265/0x280 [ 321.590507][T14038] should_fail+0xb/0x20 [ 321.590535][T14038] should_fail_usercopy+0x1a/0x20 [ 321.590570][T14038] _copy_from_user+0x1c/0xb0 [ 321.590654][T14038] __sys_bpf+0x178/0x790 [ 321.590689][T14038] __x64_sys_bpf+0x41/0x50 [ 321.590774][T14038] x64_sys_call+0x2478/0x2fb0 [ 321.590794][T14038] do_syscall_64+0xd0/0x1a0 [ 321.590816][T14038] ? clear_bhb_loop+0x40/0x90 [ 321.590836][T14038] ? clear_bhb_loop+0x40/0x90 [ 321.590867][T14038] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 321.590886][T14038] RIP: 0033:0x7f969773e969 [ 321.590956][T14038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.590974][T14038] RSP: 002b:00007f9695da7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.590991][T14038] RAX: ffffffffffffffda RBX: 00007f9697965fa0 RCX: 00007f969773e969 [ 321.591003][T14038] RDX: 0000000000000090 RSI: 0000200000000380 RDI: 0000000000000005 [ 321.591014][T14038] RBP: 00007f9695da7090 R08: 0000000000000000 R09: 0000000000000000 [ 321.591096][T14038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.591111][T14038] R13: 0000000000000001 R14: 00007f9697965fa0 R15: 00007fff8ee4f788 [ 321.591128][T14038] [ 321.848467][T14043] usb usb8: selecting invalid altsetting 7 [ 322.274744][T14052] vlan2: entered allmulticast mode [ 322.655852][T14057] rdma_rxe: rxe_newlink: failed to add veth0_to_bridge [ 322.750241][T14062] xt_TCPMSS: Only works on TCP SYN packets [ 323.088868][T14067] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3818'. [ 323.157993][T14071] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 323.263107][T14070] dccp_invalid_packet: P.Data Offset(172) too large [ 323.512262][T14063] ================================================================== [ 323.520412][T14063] BUG: KCSAN: data-race in touch_atime / touch_atime [ 323.527134][T14063] [ 323.529464][T14063] write to 0xffff8881190266b8 of 4 bytes by task 14062 on cpu 0: [ 323.537201][T14063] touch_atime+0x1e8/0x330 [ 323.541664][T14063] shmem_file_splice_read+0x582/0x5d0 [ 323.547081][T14063] splice_direct_to_actor+0x26f/0x680 [ 323.552519][T14063] do_splice_direct+0xda/0x150 [ 323.557307][T14063] do_sendfile+0x380/0x640 [ 323.561740][T14063] __x64_sys_sendfile64+0x105/0x150 [ 323.566992][T14063] x64_sys_call+0xb39/0x2fb0 [ 323.571620][T14063] do_syscall_64+0xd0/0x1a0 [ 323.576150][T14063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.582069][T14063] [ 323.584415][T14063] read to 0xffff8881190266b8 of 4 bytes by task 14063 on cpu 1: [ 323.592061][T14063] touch_atime+0x194/0x330 [ 323.596516][T14063] shmem_file_splice_read+0x582/0x5d0 [ 323.601928][T14063] splice_direct_to_actor+0x26f/0x680 [ 323.607324][T14063] do_splice_direct+0xda/0x150 [ 323.612112][T14063] do_sendfile+0x380/0x640 [ 323.616558][T14063] __x64_sys_sendfile64+0x105/0x150 [ 323.621792][T14063] x64_sys_call+0xb39/0x2fb0 [ 323.626411][T14063] do_syscall_64+0xd0/0x1a0 [ 323.630942][T14063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.636857][T14063] [ 323.639192][T14063] value changed: 0x28913eda -> 0x2929d9fd [ 323.644913][T14063] [ 323.647246][T14063] Reported by Kernel Concurrency Sanitizer on: [ 323.653413][T14063] CPU: 1 UID: 0 PID: 14063 Comm: syz.3.3817 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) [ 323.665932][T14063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.675994][T14063] ==================================================================