last executing test programs: 2.661369998s ago: executing program 2 (id=2572): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800067c7c09e8fe0ba1bc0008000600000003600e120800110002000401a8000600200e02400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db79800951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920323f9a94100"/216, 0xd8}], 0x1}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000140)="635fb97ba8c106a4f7e2eda622df", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000010001fff684fa02277d97d2478040000040000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b000100627269646765000004000280"], 0x34}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = io_uring_setup(0x2753, &(0x7f0000000080)={0x0, 0x0, 0x4, 0xfffffffd, 0x145}) r5 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$selinux_access(r7, &(0x7f0000001a80)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x10, &(0x7f0000000200)={0x2, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000100)=""/34, 0x22}], &(0x7f0000000a80)=[0xb], 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYRES64=r3], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x7, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) io_uring_setup(0x7cac, &(0x7f00000000c0)={0x0, 0x753a, 0x8, 0x3, 0x1fd}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0xa0683, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x143bc2, 0x1c0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) 2.311772712s ago: executing program 0 (id=2575): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x5ea3, 0x8, 0x8000, 0x400250}, &(0x7f0000000080), &(0x7f0000000400)) 2.310027903s ago: executing program 0 (id=2577): syz_emit_ethernet(0x197, &(0x7f0000000a00)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x48}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00U\a', 0x161, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x42}, @local, {[@srh={0x1, 0xc, 0x4, 0x6, 0xd6, 0x48, 0x4, [@mcast2, @mcast2, @loopback, @rand_addr=' \x01\x00', @empty, @private2={0xfc, 0x2, '\x00', 0x1}]}, @hopopts={0x5e, 0xa, '\x00', [@calipso={0x7, 0x30, {0x2, 0xa, 0x5, 0x9, [0x100, 0x7, 0x3, 0x80, 0x1]}}, @generic={0x93, 0x1e, "1be79acc00146d3abd8c3ed347385fe25ad71b045d6ed27bdc5876822733"}]}], {{0x0, 0xc001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}, {"45d96770d38905617f1de2b1116c82bd0efca19991dbf88530282014a45078c039e7550f39b9c10c0d1a516549d1411d639bbaa9ed2efc2ee6d66bb8184c783ee1777d489a2fe01b2d056b7293fa1c142b249ed0b265c10c2272c9af9fce2a68a8277acf2b209616ddee23803867752c4fc32bb9cb37cec36b2dae8b43aee7e2ae96fc38ac"}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) unshare(0x22020400) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x24, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffa5, 0x21}, [@IFLA_XDP={0x4}]}, 0x24}}, 0x8000) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000001000/0x4000)=nil) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000c40)=0x0, &(0x7f0000000c80)=0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYRES64=r1], &(0x7f00000001c0)='GPL\x00', 0xfff, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000190081054e81f782db4cb9040220080006007c09e8fe55a10a0005000400142603600e120800120000000401a8101600200004400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0x12b}], 0x1}, 0x0) syz_usb_disconnect(0xffffffffffffffff) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000040000000000000000000300000a20000000000a05000000000000000000070000000900010073797a300000000044000000090a010400000000000000000700ffff08000a40000000030900020073797a31000000000900010073797a3000000000080005400000002105000d40930000005c0000000c0a01020000000000000000070000000900020073797a31000000000900010073797a3000000000300003802c0000800400018024000b80100001800c000100636f756e7465720010000180090001006c617374"], 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000010c30000000003000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000116608000000000000180000000000000000000000000010009500000000000000360a020000000001180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x1, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x8, 0xe, 0x100}]}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "69dcaf20127e9a854528f45826cb35be51ca73845d177dd8dba7221daeccfda56b75cfe286fdd14cb5b11b1cab614fec2236da7d88ea0f0700", 0x3f}, 0x48, 0xfffffffffffffffe) socket$nl_generic(0x10, 0x3, 0x10) 2.201043853s ago: executing program 2 (id=2580): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/134, 0x86}, {&(0x7f0000000340)=""/218, 0xda}, {&(0x7f00000006c0)=""/4096, 0x1000}], 0x3) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0x7) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) 2.149633748s ago: executing program 2 (id=2582): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x58130, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0x4}, 0x81203, 0x10000, 0xbdf7, 0x5, 0x4, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x14d9, &(0x7f0000000480)={0x0, 0x5121, 0x0, 0x0, 0x2cf}, 0x0, &(0x7f0000000600)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, r0, &(0x7f0000000080)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r3, &(0x7f0000000080)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @link_local}) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = signalfd(r5, &(0x7f00000000c0)={[0x7]}, 0x8) r7 = open_tree(r6, &(0x7f0000000100)='./file0\x00', 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f00000001c0)={0xa, [0x9, 0xc8, 0x3353, 0x81, 0x1000, 0x723, 0x3, 0x40, 0x7c3, 0x8cc]}, &(0x7f0000000200)=0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r8, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r8, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 2.149340138s ago: executing program 3 (id=2583): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x4340, &(0x7f0000000040)={0x0, 0xc8a3, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0xfffffffa, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="36400000260091"], 0xfe33) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 2.099805593s ago: executing program 4 (id=2585): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000070000002a00000005"], 0x50) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r1}, 0x10) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 2.099113473s ago: executing program 3 (id=2586): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@dioread_lock}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x35) pwrite64(r0, &(0x7f0000000300)='n', 0x1, 0x800) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) sendfile(r2, r1, 0x0, 0xfffa83) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) (async) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r3, 0x800, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80800}, 0x30) (async) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r3, 0x800, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80800}, 0x30) 2.097927803s ago: executing program 4 (id=2587): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x16, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x4) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) sched_getparam(0x0, 0x0) sendmmsg(r2, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20044000) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0100000000000000000004"], 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="78000000010101030000000000000000050000023c000d8014000400fe800000000000000000000000000000e00000011400050000000000000000000000ffffe000000208000c40000000020800074080000001080007400000f69826001240000400000800154000000000"], 0x78}, 0x1, 0x0, 0x0, 0x40814}, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) syz_emit_ethernet(0x36, &(0x7f0000000c40)={@local, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x0, 0x0, @mcast2, @local}}}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r3, @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="070000000477e1a7d02a6b750000000802000021000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000380)='rxrpc_client\x00', r7}, 0x18) r9 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r10 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain={'key_or_keyring:', r9}) keyctl$KEYCTL_MOVE(0x1e, r9, 0xffffffffffffffff, r10, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) getpid() 1.995971023s ago: executing program 3 (id=2588): syz_usb_connect$sierra_net(0x5, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x1199, 0x68a3, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x80, 0xfa, {{0x9, 0x4, 0x7, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, "", {{0x9, 0x5, 0x1, 0x2, 0x200, 0x62, 0x8, 0x85}, {0x9, 0x5, 0x9, 0x2, 0x8, 0xa3, 0xb9, 0xa2}, {0x9, 0x5, 0xf, 0x3, 0x3ff, 0x9, 0x9, 0xc1}}}}}}]}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="fc0000001900010000000000fcdbdf2500000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000004000000000000000000000000000000000000000000000000000000000000000200000000000000000000005e43bb387ffa6532000000000000000000000000000000000000000000000000002000000000000000000000000000000000000001000000000000004400050000000000000000000000000000000000000000022b0000000a000000fe8000000000000000000000000000aa0000000004"], 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="070000000400000000010000fe03000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000034033320d82c00"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000400)='sys_enter\x00', r5}, 0x18) r6 = inotify_init() r7 = inotify_add_watch(r6, &(0x7f0000000280)='.\x00', 0x25000001) inotify_rm_watch(r6, r7) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r2, &(0x7f0000004d00), 0x7fffffffffffd33, 0x20000890) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r9, 0x0, 0x8000000}, 0x18) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001bc0)=@newtaction={0x88c, 0x30, 0x12f, 0x0, 0x4, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0xffffffff, 0xffffffff, 0x0, 0x0, {0x7, 0x2, 0xfffc, 0x0, 0x0, 0x7}, {0x7, 0x2, 0x2, 0x0, 0x0, 0x7}}}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x80000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffc, 0x6e, 0x0, 0x2, 0x4, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x800000, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x11, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0xffffffff, 0x3, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, 0x0, 0x4, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0xffffff35, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x40001000, 0x0, 0xb8, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffeffa, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfffffffd, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x101, 0x7, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x2, 0x0, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100004, 0x0, 0xfffffffe, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x1, 0xfffffffc]}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x5, 0x0, 0x2, 0xb, 0xfffffffb, 0x0, 0x7, 0x401, 0x1, 0xffff8000, 0x90, 0x9fd, 0x2, 0xb8, 0xca2, 0x6, 0x3c, 0x7, 0x1, 0xa89c, 0x400, 0xc, 0x492217a4, 0x80000007, 0x5, 0x1, 0x1ff, 0xe5, 0x2f, 0xd, 0x3, 0xa, 0x3, 0x1, 0x9, 0x11, 0x9, 0x1, 0x402, 0x7, 0xd, 0x3, 0xc0000, 0x8, 0x8, 0xffffff40, 0x100, 0x3, 0x5, 0x7, 0xe0b2, 0xfffffffe, 0x8fb, 0x84, 0x9, 0x4, 0x9, 0x80000001, 0x6, 0x0, 0x8, 0x800, 0x9, 0x1, 0x100, 0x401, 0x8, 0x3, 0xb5, 0x10001, 0x4, 0x4, 0x7f, 0x0, 0x8, 0x2, 0x7f, 0x80000001, 0x2, 0x4004, 0x0, 0x4, 0x8000, 0x0, 0x9, 0x80, 0x7, 0xe9, 0x1, 0x0, 0x3, 0xeb22, 0xd, 0x8000, 0xfffffff7, 0x7fff, 0x3, 0x3ff, 0x400000, 0x10, 0x5, 0x3, 0x10000, 0x5, 0xffffffff, 0x0, 0x2, 0x7, 0x5, 0x6, 0x5, 0x4, 0x2, 0x81, 0x0, 0x10, 0x6, 0x7fff, 0x800, 0xfffffff4, 0x10000, 0x5, 0x8, 0xba, 0x4, 0x89, 0x2, 0x6, 0x100, 0x9, 0xffffa3e0, 0xfffffffe, 0xff, 0x1, 0x2, 0xf, 0x24b9, 0x6, 0xe01, 0x1, 0x6430, 0xd, 0x8, 0x81, 0x3, 0x7eb7, 0x3, 0xfffffffe, 0x200, 0xfffffeff, 0x9, 0xff, 0xa, 0x6, 0x7, 0x100, 0x1, 0x3, 0x100, 0xb, 0x8, 0x101, 0x6, 0x2, 0xfffffc00, 0x81, 0x81, 0x200, 0x80000001, 0x1, 0x1, 0x9, 0x9, 0x4, 0xb, 0x80, 0x0, 0x0, 0x1, 0x10005, 0x2, 0x65, 0x4, 0xfffffa0c, 0x3, 0x0, 0x4, 0x4, 0x35bc0, 0x9, 0xfffffffa, 0x7, 0x5, 0x3, 0x5, 0x9, 0x8, 0x28, 0x3, 0x5, 0x10001, 0x2, 0xf, 0x0, 0x1, 0x40000723, 0x0, 0xe, 0xe, 0x4, 0x6, 0x7, 0x200, 0xfffffbff, 0x7, 0x3, 0x8, 0x6, 0xffffffff, 0x2, 0x7f, 0x2, 0x80000001, 0x0, 0x20000009, 0x0, 0xfffffffe, 0x928, 0x5, 0x2, 0x5, 0xd1b, 0xb87, 0x3, 0x8d8d, 0x55, 0x101, 0x8, 0x64e8, 0x8, 0x82c, 0x772, 0x80a, 0xfff, 0x6, 0x3f7, 0x4, 0x8, 0x8, 0x1, 0x5d, 0x9, 0xd, 0x80]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x88c}}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kmem_cache_free\x00', r10}, 0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1b, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r11, 0x10e, 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.220158499s ago: executing program 3 (id=2601): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32], 0x0, 0x628, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) (fail_nth: 6) 1.171748975s ago: executing program 4 (id=2604): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x22020600) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000200), 0x80681, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwrite64(r0, 0x0, 0x0, 0x100000001) unshare(0x2020000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newtaction={0x48, 0x30, 0x727, 0x7ffffd, 0x0, {}, [{0x34, 0x1, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002ebd700000000000140000001800018014"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040800) 1.127592329s ago: executing program 0 (id=2605): r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000000)) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000040)={0x86, 0x8, 0x5}) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/194) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) ioctl$KDENABIO(r0, 0x4b36) process_vm_writev(r3, &(0x7f0000000400)=[{&(0x7f0000000280)=""/131, 0x83}, {&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/72, 0x48}], 0x3, &(0x7f0000000a00)=[{&(0x7f0000000440)=""/104, 0x68}, {&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/133, 0x85}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/81, 0x51}, {&(0x7f0000000700)=""/239, 0xef}, {&(0x7f0000000800)=""/226, 0xe2}, {&(0x7f0000000900)=""/210, 0xd2}], 0x8, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000ac0)='veth0_to_batadv\x00', 0x10) fstat(r1, &(0x7f0000000b00)) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000b80)) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000bc0)=@req3={0x65, 0x1, 0xfbe0, 0xa, 0x7, 0x1000, 0x7}, 0x1c) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000c00)=0x217) ioctl$SNAPSHOT_FREE(r2, 0x3305) syz_clone3(&(0x7f0000000ec0)={0x40020000, &(0x7f0000000d00)=0xffffffffffffffff, &(0x7f0000000d40)=0x0, &(0x7f0000000d80), {0x8}, &(0x7f0000000dc0)=""/7, 0x7, &(0x7f0000000e00)=""/102, &(0x7f0000000e80)=[r3, r3, r3], 0x3, {r2}}, 0x58) r6 = perf_event_open(&(0x7f0000000c80)={0x5, 0x80, 0x3, 0x90, 0x2c, 0x81, 0x0, 0x80000001, 0x80, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000c40), 0x3}, 0x7056, 0x6, 0x80000001, 0x7, 0x2dd73abc, 0xfffffff8, 0x0, 0x0, 0x5}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000f40)) r7 = open(&(0x7f0000000f80)='./file0\x00', 0x80, 0x46) socket$netlink(0x10, 0x3, 0x12) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000fc0), &(0x7f0000001000)={0x0, 0xfb, 0x108, 0x0, 0x8, "820c5fc7f44442a82ec1a4c01c3b8a3a", "e9acfbdcfe4179d8305fe04d40e5261e5943544885e7dbdc5c9e7a8b96000d5db9f877719acd853794627c46bbfc8b22ffc3e254a34093c76b531dd8b994e9b363ffc02f84def03b70df0ce882705caf04601def12314174fe68b1c0f2349e3ebd8df97d31829d2995237861c1e8cb466c75dcb1fa20b54a5681a2aaae15c1cfe6667c48a70e2e8fadbbfbf1e74c7b0c4e71adc978bca750228d07d21ee8073812a3dcb95d75e74ffca28e3591d27ec90fd6944173813a9bfdc5487c1544bcc2951355bbc2280f14dc4d5a5e997c4e08bcfaa8fef352d9470efffcd3cda514e97065eb83fd004884847d6b487f6448689efb8b"}, 0x108, 0x6) ioctl$int_in(r7, 0x5421, &(0x7f0000001140)=0x10000) ioctl$VT_RESIZE(r7, 0x5609, &(0x7f0000001180)={0x1, 0x9c, 0x401}) ioctl$BTRFS_IOC_BALANCE_V2(r6, 0xc4009420, &(0x7f0000001240)={0x1, 0x2, {0x4, @struct={0xd, 0x8001}, 0x0, 0x6, 0x9, 0xffffffffffffffff, 0x10001, 0x6, 0x20, @usage=0x2d, 0x4, 0x4, [0x8, 0x4, 0x7, 0xd, 0x0, 0x3]}, {0x0, @usage=0x40, 0x0, 0x8, 0x5, 0x100, 0x3, 0x7ff, 0x49, @struct={0x5, 0x3}, 0x0, 0x5, [0x4, 0x9, 0x2, 0x7fffffff, 0xfffffffffffffffe, 0x1000]}, {0x1, @usage=0xffffffffffffffff, 0x0, 0x7, 0xfffffffffffffff8, 0x3, 0x6, 0x7, 0x22, @struct={0x1, 0x8}, 0x6d65, 0x8, [0x2, 0x6, 0x6, 0x7, 0x4, 0x7]}, {0xffffffffffffff00, 0x8, 0x1}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f0000001640)={{r4}, 0x0, 0x6, @inherit={0x68, &(0x7f00000011c0)={0x1, 0x4, 0xffffffffffff8000, 0x0, {0x4, 0x6, 0x4, 0x1, 0x2}, [0x9, 0x9, 0x0, 0xd]}}, @devid=r8}) io_setup(0x1, &(0x7f0000002640)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002680), 0x600000, 0x0) 918.771089ms ago: executing program 3 (id=2607): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0xc000, 0xe, "0062ba7d8200000016001b000200f705096604"}) r1 = syz_open_pts(r0, 0x20000) dup3(r1, r0, 0x0) io_setup(0x8, &(0x7f0000004200)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') io_submit(r2, 0x0, &(0x7f0000004540)) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000040)={0x6, 0xffff, 0x3, 0x6, 0x4, "1dbc2e2db3983c75"}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x3c) 597.927921ms ago: executing program 4 (id=2608): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x800700, &(0x7f0000000580)={[{@grpjquota}, {@stripe={'stripe', 0x3d, 0x3}}, {@norecovery}, {@noinit_itable}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@minixdf}, {@usrjquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@errors_continue}, {@dioread_lock}, {@noblock_validity}, {@noquota}]}, 0x3, 0x465, &(0x7f0000000f00)="$eJzs3M9vFFUcAPDvzLYgP1sRf4CoVWJs/NHSgsrBi0YTDxhN9IDH2hZCWKihNRFCpBqDFxND1LPxaOJf4M2LUU8mXvVuSIhyAT3VzOwM7C67pYXtLnQ/n2SX92Ze+963b97Mm3m7BNC3RrK3JGJrRPwREUO1bGOBkdo/Vy+fnf738tnpJJaW3v47yctduXx2uixa/tyWIjOaRqSfJkUljeZPnzk+Va3Oniry4wsn3h+fP33muWMnpo7OHp09OXnw4IH9Ey++MPn8Mq3fuOI4s7iu7P5obs+u19+98Mb04Qvv/fJ91t6txf76ODplJAv8n6Vc3eYvs7cnO11Zj22rSycDPWwIq1KJiKy7BvPxPxSVuN55Q/HaJz1tHLCmsmvTMlfRxSVgHUtihcViZQWBu0V5oc/uf8tXl6Yed4RLL9dugLK4rxav2p6BSIsyg033t500EhGHF//7JnvFGj2HAACo9/n014fi2VbzvzQeqCu3vVhDGY6IeyNiR0TcFxE7I+L+iLzsgxHxUNuaNrTc2rw0dOP8J714y8GtQDb/e6lY22qc/5Wzv8pwpchty+MfTI4cq87uK/4mozG4MctPLFPHj6/+/kW7ffXzv+yV1V/OBYt2XBxoekA3M7UwlU9KO+DSxxG7B1rFn1xbCchu/XdFxO7V/ertZeLY09/taVfo5vEvowPrTEvfRjxV6//FaIq/lCy/Pjl+T1Rn942XR8WNfv3t/Fvt6r+t+Dsg6//Njcd/c5HhpH69dn71dZz/87O29zS3evxvSN7J+6U8q3w4tbBwaiJiQ3Iozzdsn7z+s2W+LJ/FP7q39fjfUUtsyt4ejojsIH4kIh6NiMeKtj8eEU9ExN5l4v/5lfb77oT+n2l5/rt2/Df1/+oTleM//dCu/pX1/4E8NVpsyc9/N7HSBt7O3w4AAADuFmn+GfgkHbuWTtOxsdpn+HfG5rQ6N7/wzJG5D07O1D4rPxyDafmka6jueehEslj8xlp+snhWXO7fXzw3/qqyKc+PTc9VZ3ocO/S7LW3Gf+avSq9bB6y5Vutoky3Xaxu+yAasA83jP23Mnnuzm40Busr3taF/3WT8p91qB9B9rv/Qv1qN/3NNeWsBsD65/kP/Mv6hfxn/0L+Mf+hLt/O9/n5OZKfMO6AZ1aGiH7tfe6S9jl1iLRKt/58mAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAu9X/AQAA//9l+OT1") socket$inet6(0xa, 0x802, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x6}, 0x18) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file1\x00', 0x100c085, &(0x7f0000000d00)=ANY=[@ANYRES8=0x0, @ANYBLOB="c0da5b74006e9c47add458a1bd748b7ffa5628dc52f84873cbe6a43cfd29e4198255a0610d383b0e46b2b6457282a9f3caef22979e54c145e6a0ce2850a890af7c4e1fa3628453c70aae32270b0042f1532cf08030eccdca96e2c97aae42cf5d9ec5f0afa4fcc53c8f9289677038d09ae2b1bd2271e0a76e6324df3a2b01a9ed0277d7e8d6f7d463ae62692faa55bdb43dc2bea18eea4a635951fd0a220a835fa24d0700c8f8c245d1d7638b2cae5ed3bec0d2f0415ddff7884bb34ab0cb1598e9c7b92a29005e4090ede480b3412f5c33da5e7c8672bda19fd3d989f8336d69d9e70de142973e7e1f53987b2d"], 0x10, 0x7f4, &(0x7f0000000e40)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r5) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x305200, 0x0) close(r7) r8 = socket$unix(0x1, 0x1, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0xb}, {0xffff, 0xffff}, {0xb}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xa, 0x7f61, 0x1, 0xc5, 0xe23, 0x1, 0x1, 0x7fff, 0x1}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x80000, {0x0, 0x0, 0x0, r10, {0x0, 0x9}, {0xffe6, 0xb}, {0xffe0, 0x3}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) 591.341251ms ago: executing program 2 (id=2609): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x4340, &(0x7f0000000040)={0x0, 0xc8a3, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0xfffffffa, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="36400000260091"], 0xfe33) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 537.771217ms ago: executing program 2 (id=2610): r0 = io_uring_setup(0x1d48, &(0x7f0000000340)={0x0, 0xb140, 0x1000, 0x6, 0x196}) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) sched_setscheduler(r1, 0x6, &(0x7f0000000100)=0x1) r2 = getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x8c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000000000000", 0x58}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7a0dd6bdeae36edcac070000000000000000905cd83a2746c932a20d7eb486e0465a0add49a0fcbb8f064257f80f874b791fc7955c19a73759f728715779c77e69c15af06682bd26a3ddd2de1f669204d853", @ANYRES32=0x0, @ANYBLOB="00000000003f00002800128009000100766574680000000018070080140001d14d3691c9", @ANYRES32=0x0, @ANYBLOB="400401000000000008001f00ff7f0000"], 0x50}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000", @ANYBLOB, @ANYRES32=0x0], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r7) listen(0xffffffffffffffff, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 537.153267ms ago: executing program 1 (id=2611): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001640)={{0x14}, [@NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_SREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x88}}, 0x0) 532.899437ms ago: executing program 3 (id=2612): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x38}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcb58c9f2fa78421b}, 0x40c0080) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) close_range(r2, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="3800000018000100000000000000000002000000000000090080100008800c0001800500020000000000"], 0x38}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000100c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) uname(&(0x7f0000000300)=""/178) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000100000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r7}, 0x10) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) syz_usb_connect$sierra_net(0x3, 0x3f, &(0x7f00000003c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x1199, 0x68a3, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x80, 0xfa, {{0x9, 0x4, 0x7, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, "", {{0x9, 0x5, 0x0, 0x2, 0x10, 0x8, 0x7f, 0x6}, {0x9, 0x5, 0x1, 0x2, 0x40, 0xf2, 0x11, 0x1b}, {0x9, 0x5, 0x1, 0x3, 0x400, 0x5, 0x63, 0x2}}}}}}]}}, 0x0) setsockopt$PNPIPE_INITSTATE(r8, 0x113, 0x4, &(0x7f0000000200), 0x4) syz_usb_connect$sierra_net(0x3, 0x3f, &(0x7f00000007c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x1199, 0x68a3, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x80, 0xfa, {{0x9, 0x4, 0x7, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, "", {{0x9, 0x5, 0xa, 0x2, 0x8, 0x3, 0xf6}, {0x9, 0x5, 0x1, 0x2, 0x200, 0x8, 0x5}, {0x9, 0x5, 0xc, 0x3, 0x3ff, 0x10, 0xa7, 0x8d}}}}}}]}}, 0x0) 485.429012ms ago: executing program 0 (id=2613): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='io_uring_register\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x223d, &(0x7f0000000100)={0x0, 0x57d9, 0x100, 0x2, 0x1cd}, &(0x7f0000000040), &(0x7f00000001c0)) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x325140, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) (async) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000002c0)={'team_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) umount2(&(0x7f0000000300)='./file0\x00', 0xc) (async) io_uring_register$IORING_REGISTER_NAPI(r2, 0x1b, &(0x7f0000000000)={0xffff, 0x6, '\x00', 0x100000000000000}, 0x1) (async) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000000)={0x34, r5, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x6048800) 484.651022ms ago: executing program 1 (id=2614): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) ptrace$setregset(0x4205, r0, 0x200, &(0x7f0000000100)={&(0x7f0000000480)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) inotify_init1(0x800) fsconfig$FSCONFIG_SET_BINARY(r3, 0x6, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 484.141632ms ago: executing program 4 (id=2615): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket(0x10, 0x3, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="02130f00050000002abd7000dedbdf25030007003c20000002"], 0x28}}, 0x4000800) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) eventfd2(0x8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) sched_setscheduler(0x0, 0x5, &(0x7f0000000080)=0x9) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x20000023896) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 483.615442ms ago: executing program 0 (id=2616): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3477, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x20000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 437.832317ms ago: executing program 0 (id=2617): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x2000000000000014, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xb643, 0x100}, 0x0) r5 = getpid() sched_setscheduler(r5, 0x1, &(0x7f0000000100)=0x7) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) r9 = fsmount(r8, 0x0, 0x20) symlinkat(&(0x7f00000004c0)='./file0\x00', r9, &(0x7f0000000140)='./file0\x00') futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x2) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r10}, 0x10) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000495000/0x2000)=nil, 0x2000, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) close(0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) r11 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r11, 0x89e2, &(0x7f0000000080)) get_mempolicy(0x0, 0x0, 0xdf8, &(0x7f0000ff9000/0x1000)=nil, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x10, &(0x7f0000000500)=ANY=[@ANYRES8=r6, @ANYRES16=r7, @ANYRES16=r4], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 437.395757ms ago: executing program 1 (id=2618): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c010005", @ANYRES16=r1, @ANYBLOB="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"], 0x11c}}, 0x8800) 436.644327ms ago: executing program 2 (id=2619): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564", @ANYRES8=0x0], 0xfc, 0x19c, &(0x7f0000000200)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xc2300, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a40)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x0, 0x6}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd2b, 0x1, {0x0, 0x0, 0x0, r4, {0x4, 0x6}, {}, {0x1, 0xf}}}, 0x24}}, 0x200080d4) r5 = socket(0x2, 0xa, 0x300) sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x800}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000480)={'batadv_slave_0\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000aa0000000060a0b0400000000000000000200000074000480700001800a0001006d617463680000006000028008000240000000000c0001007068797364657600460003007e6b92c43235dc7e977221f83c3f179e65022fc067b787cd67b6d9983b1bddafbdf6a37daeed337490ee94b31d2ec330ce34cc676c0783a4bcc1e966554b0470581100000900010073797a30000000000900020073797a32"], 0xc8}, 0x1, 0x0, 0x0, 0x4008011}, 0x4000800) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x30, 0x5, 0x1, 0xfffff034}, {0x6, 0x1, 0x6, 0x6}]}, 0x10) syz_emit_ethernet(0x2276, &(0x7f0000003d00)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000188a823008100000086dd6388896e223821"], 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200080, &(0x7f00000000c0)={[{@errors_remount}, {@delalloc}, {@bsdgroups}]}, 0x3, 0x56d, &(0x7f0000000c00)="$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") r7 = socket$can_bcm(0x1d, 0x2, 0x2) r8 = socket$can_bcm(0x1d, 0x2, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x10, 0x7fff0000}]}) dup3(r8, r7, 0x0) r9 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(r9, &(0x7f00000000c0)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000006c0)=""/83, 0x53, 0x0, 0x0, 0x0, 0x3, 0x10000000}}, 0x120) writev(r9, &(0x7f0000000780)=[{&(0x7f00000003c0)="0e000000", 0x4}], 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000100)=[{0x5}, {0x45}, {0x6}]}) r10 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x82) ioctl$FS_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000080)=0x100fb) 387.978042ms ago: executing program 1 (id=2620): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x4340, &(0x7f0000000040)={0x0, 0xc8a3, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0xfffffffa, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="36400000260091"], 0xfe33) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 82.250612ms ago: executing program 1 (id=2621): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) (async) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffff00f687000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x800) (async) madvise(&(0x7f00002a1000/0x3000)=nil, 0x3000, 0x12) (async, rerun: 64) madvise(&(0x7f0000000000/0x600000)=nil, 0x600707, 0x8) (async, rerun: 64) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xe0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x0, 0xd064db0e491fa98f}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_MEMORY={0x8, 0xa, 0x842}]}}]}, 0x3c}}, 0x4044080) (async, rerun: 32) bind$packet(r3, &(0x7f0000000140)={0x11, 0x1b, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async, rerun: 32) sendto$inet6(r0, &(0x7f0000000800)="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", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) 77.096212ms ago: executing program 4 (id=2622): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0xc000, 0xe, "0062ba7d8200000016001b000200f705096604"}) r1 = syz_open_pts(r0, 0x20000) dup3(r1, r0, 0x0) io_setup(0x8, &(0x7f0000004200)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') io_submit(r2, 0x0, &(0x7f0000004540)) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000040)={0x6, 0xffff, 0x3, 0x6, 0x4, "1dbc2e2db3983c75"}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x3c) 0s ago: executing program 1 (id=2623): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) syz_emit_ethernet(0x72, &(0x7f0000000440)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c002001fff2ff0000000000000000000000ff0200000000000000000000000000010004000000000000c910"], 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_IP_PROTO={0x5, 0x16, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) close(r0) r8 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet_opts(r8, 0x0, 0x12, 0x0, &(0x7f0000000040)) openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) kernel console output (not intermixed with test programs): 000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.173315][ T8645] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 139.173338][ T8645] [ 139.499120][ T8653] FAULT_INJECTION: forcing a failure. [ 139.499120][ T8653] name failslab, interval 1, probability 0, space 0, times 0 [ 139.514827][ T8653] CPU: 1 UID: 0 PID: 8653 Comm: syz.2.2186 Not tainted syzkaller #0 PREEMPT(voluntary) [ 139.514881][ T8653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 139.514899][ T8653] Call Trace: [ 139.514908][ T8653] [ 139.514918][ T8653] __dump_stack+0x1d/0x30 [ 139.514942][ T8653] dump_stack_lvl+0xe8/0x140 [ 139.514961][ T8653] dump_stack+0x15/0x1b [ 139.514977][ T8653] should_fail_ex+0x265/0x280 [ 139.515051][ T8653] should_failslab+0x8c/0xb0 [ 139.515078][ T8653] __kvmalloc_node_noprof+0x12e/0x670 [ 139.515114][ T8653] ? alloc_netdev_mqs+0xa5/0xa50 [ 139.515199][ T8653] ? __pfx_ipgre_tunnel_setup+0x10/0x10 [ 139.515257][ T8653] alloc_netdev_mqs+0xa5/0xa50 [ 139.515304][ T8653] ? sized_strscpy+0x157/0x1a0 [ 139.515333][ T8653] __ip_tunnel_create+0x2bc/0x450 [ 139.515360][ T8653] ? ip_tunnel_find+0x2b5/0x300 [ 139.515395][ T8653] ip_tunnel_ctl+0x38f/0x750 [ 139.515465][ T8653] ipgre_tunnel_ctl+0x22f/0x560 [ 139.515534][ T8653] ip_tunnel_siocdevprivate+0x74/0xe0 [ 139.515587][ T8653] dev_ifsioc+0x8f5/0xaa0 [ 139.515629][ T8653] dev_ioctl+0x78d/0x960 [ 139.515688][ T8653] sock_ioctl+0x593/0x610 [ 139.515726][ T8653] ? __pfx_sock_ioctl+0x10/0x10 [ 139.515760][ T8653] __se_sys_ioctl+0xcb/0x140 [ 139.515939][ T8653] __x64_sys_ioctl+0x43/0x50 [ 139.515984][ T8653] x64_sys_call+0x1816/0x3000 [ 139.516014][ T8653] do_syscall_64+0xd2/0x200 [ 139.516042][ T8653] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 139.516077][ T8653] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 139.516161][ T8653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.516184][ T8653] RIP: 0033:0x7f8d68f2eec9 [ 139.516200][ T8653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.516225][ T8653] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 139.516250][ T8653] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 139.516266][ T8653] RDX: 0000200000000280 RSI: 00000000000089f1 RDI: 0000000000000003 [ 139.516282][ T8653] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 139.516378][ T8653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.516394][ T8653] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 139.516413][ T8653] [ 139.864075][ T8664] FAULT_INJECTION: forcing a failure. [ 139.864075][ T8664] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.881109][ T8664] CPU: 1 UID: 0 PID: 8664 Comm: syz.3.2189 Not tainted syzkaller #0 PREEMPT(voluntary) [ 139.881145][ T8664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 139.881162][ T8664] Call Trace: [ 139.881202][ T8664] [ 139.881221][ T8664] __dump_stack+0x1d/0x30 [ 139.881248][ T8664] dump_stack_lvl+0xe8/0x140 [ 139.881274][ T8664] dump_stack+0x15/0x1b [ 139.881420][ T8664] should_fail_ex+0x265/0x280 [ 139.881459][ T8664] should_fail+0xb/0x20 [ 139.881527][ T8664] should_fail_usercopy+0x1a/0x20 [ 139.881555][ T8664] _copy_from_iter+0xd2/0xe80 [ 139.881585][ T8664] ? __build_skb_around+0x1ab/0x200 [ 139.881618][ T8664] ? __alloc_skb+0x223/0x320 [ 139.881643][ T8664] netlink_sendmsg+0x471/0x6b0 [ 139.881683][ T8664] ? __pfx_netlink_sendmsg+0x10/0x10 [ 139.881726][ T8664] __sock_sendmsg+0x145/0x180 [ 139.881751][ T8664] ____sys_sendmsg+0x31e/0x4e0 [ 139.881791][ T8664] ___sys_sendmsg+0x17b/0x1d0 [ 139.881880][ T8664] __x64_sys_sendmsg+0xd4/0x160 [ 139.881922][ T8664] x64_sys_call+0x191e/0x3000 [ 139.881951][ T8664] do_syscall_64+0xd2/0x200 [ 139.881977][ T8664] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 139.882070][ T8664] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 139.882112][ T8664] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.882133][ T8664] RIP: 0033:0x7f7c0ba8eec9 [ 139.882149][ T8664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.882233][ T8664] RSP: 002b:00007f7c0a4f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 139.882252][ T8664] RAX: ffffffffffffffda RBX: 00007f7c0bce5fa0 RCX: 00007f7c0ba8eec9 [ 139.882268][ T8664] RDX: 000000000404c004 RSI: 0000200000006040 RDI: 0000000000000003 [ 139.882285][ T8664] RBP: 00007f7c0a4f7090 R08: 0000000000000000 R09: 0000000000000000 [ 139.882302][ T8664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.882318][ T8664] R13: 00007f7c0bce6038 R14: 00007f7c0bce5fa0 R15: 00007ffca2614898 [ 139.882341][ T8664] [ 140.191193][ T8670] FAULT_INJECTION: forcing a failure. [ 140.191193][ T8670] name failslab, interval 1, probability 0, space 0, times 0 [ 140.208880][ T8670] CPU: 0 UID: 0 PID: 8670 Comm: syz.0.2193 Not tainted syzkaller #0 PREEMPT(voluntary) [ 140.208939][ T8670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 140.208958][ T8670] Call Trace: [ 140.208968][ T8670] [ 140.208980][ T8670] __dump_stack+0x1d/0x30 [ 140.209010][ T8670] dump_stack_lvl+0xe8/0x140 [ 140.209039][ T8670] dump_stack+0x15/0x1b [ 140.209060][ T8670] should_fail_ex+0x265/0x280 [ 140.209181][ T8670] should_failslab+0x8c/0xb0 [ 140.209268][ T8670] kmem_cache_alloc_noprof+0x50/0x480 [ 140.209375][ T8670] ? dst_alloc+0xbd/0x100 [ 140.209489][ T8670] dst_alloc+0xbd/0x100 [ 140.209583][ T8670] ip_route_output_key_hash_rcu+0xf29/0x1380 [ 140.209622][ T8670] ip_route_output_key_hash+0x63/0xa0 [ 140.209657][ T8670] tcp_v4_connect+0x3e2/0xad0 [ 140.209733][ T8670] tcp_v6_connect+0x82c/0xc30 [ 140.210037][ T8670] __inet_stream_connect+0x166/0x7d0 [ 140.210079][ T8670] ? _raw_spin_unlock_bh+0x36/0x40 [ 140.210182][ T8670] ? release_sock+0x116/0x150 [ 140.210214][ T8670] ? _raw_spin_unlock_bh+0x36/0x40 [ 140.210253][ T8670] ? lock_sock_nested+0x112/0x140 [ 140.210317][ T8670] ? selinux_netlbl_socket_connect+0x115/0x130 [ 140.210357][ T8670] inet_stream_connect+0x44/0x70 [ 140.210403][ T8670] ? __pfx_inet_stream_connect+0x10/0x10 [ 140.210473][ T8670] __sys_connect+0x1ef/0x2b0 [ 140.210524][ T8670] __x64_sys_connect+0x3f/0x50 [ 140.210573][ T8670] x64_sys_call+0x2c0c/0x3000 [ 140.210610][ T8670] do_syscall_64+0xd2/0x200 [ 140.210638][ T8670] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 140.210671][ T8670] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 140.210701][ T8670] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.210810][ T8670] RIP: 0033:0x7f023e20eec9 [ 140.210834][ T8670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.210864][ T8670] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 140.210943][ T8670] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 140.210961][ T8670] RDX: 000000000000001c RSI: 0000200000000000 RDI: 0000000000000006 [ 140.210978][ T8670] RBP: 00007f023cc77090 R08: 0000000000000000 R09: 0000000000000000 [ 140.210996][ T8670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.211011][ T8670] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 140.211032][ T8670] [ 140.620941][ T8685] FAULT_INJECTION: forcing a failure. [ 140.620941][ T8685] name failslab, interval 1, probability 0, space 0, times 0 [ 140.639045][ T8685] CPU: 1 UID: 0 PID: 8685 Comm: syz.2.2198 Not tainted syzkaller #0 PREEMPT(voluntary) [ 140.639121][ T8685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 140.639143][ T8685] Call Trace: [ 140.639150][ T8685] [ 140.639151][ T8687] sch_tbf: burst 2976 is lower than device lo mtu (65550) ! [ 140.639159][ T8685] __dump_stack+0x1d/0x30 [ 140.639188][ T8685] dump_stack_lvl+0xe8/0x140 [ 140.639281][ T8685] dump_stack+0x15/0x1b [ 140.639305][ T8685] should_fail_ex+0x265/0x280 [ 140.639349][ T8685] should_failslab+0x8c/0xb0 [ 140.639390][ T8685] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 140.639438][ T8685] ? sidtab_sid2str_get+0xa0/0x130 [ 140.639479][ T8685] kmemdup_noprof+0x2b/0x70 [ 140.639514][ T8685] sidtab_sid2str_get+0xa0/0x130 [ 140.639657][ T8685] security_sid_to_context_core+0x1eb/0x2e0 [ 140.639768][ T8685] security_sid_to_context+0x27/0x40 [ 140.639806][ T8685] selinux_lsmprop_to_secctx+0x67/0xf0 [ 140.639913][ T8685] security_lsmprop_to_secctx+0x1a0/0x1c0 [ 140.639995][ T8685] audit_log_subj_ctx+0xa4/0x3e0 [ 140.640049][ T8685] ? skb_put+0xa9/0xf0 [ 140.640087][ T8685] audit_log_task_context+0x48/0x70 [ 140.640117][ T8685] audit_log_task+0xf4/0x250 [ 140.640163][ T8685] ? kstrtouint+0x76/0xc0 [ 140.640237][ T8685] audit_seccomp+0x61/0x100 [ 140.640279][ T8685] ? __seccomp_filter+0x82d/0x1250 [ 140.640318][ T8685] __seccomp_filter+0x83e/0x1250 [ 140.640552][ T8685] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 140.640599][ T8685] ? vfs_write+0x7e8/0x960 [ 140.640630][ T8685] ? __rcu_read_unlock+0x4f/0x70 [ 140.640804][ T8685] ? __fget_files+0x184/0x1c0 [ 140.640844][ T8685] __secure_computing+0x82/0x150 [ 140.640885][ T8685] syscall_trace_enter+0xcf/0x1e0 [ 140.640924][ T8685] do_syscall_64+0xac/0x200 [ 140.641022][ T8685] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 140.641125][ T8685] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 140.641218][ T8685] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.641252][ T8685] RIP: 0033:0x7f8d68f2eec9 [ 140.641276][ T8685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.641355][ T8685] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 000000000000004f [ 140.641381][ T8685] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 140.641425][ T8685] RDX: 0000000000000000 RSI: 00000000000000f7 RDI: 0000200000000340 [ 140.641444][ T8685] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 140.641463][ T8685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.641547][ T8685] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 140.641573][ T8685] [ 140.780420][ T8691] FAULT_INJECTION: forcing a failure. [ 140.780420][ T8691] name failslab, interval 1, probability 0, space 0, times 0 [ 140.995823][ T8691] CPU: 1 UID: 0 PID: 8691 Comm: syz.0.2202 Not tainted syzkaller #0 PREEMPT(voluntary) [ 140.995860][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 140.995878][ T8691] Call Trace: [ 140.995888][ T8691] [ 140.995898][ T8691] __dump_stack+0x1d/0x30 [ 140.996004][ T8691] dump_stack_lvl+0xe8/0x140 [ 140.996098][ T8691] dump_stack+0x15/0x1b [ 140.996122][ T8691] should_fail_ex+0x265/0x280 [ 140.996169][ T8691] should_failslab+0x8c/0xb0 [ 140.996205][ T8691] kmem_cache_alloc_noprof+0x50/0x480 [ 140.996292][ T8691] ? getname_flags+0x80/0x3b0 [ 140.996332][ T8691] getname_flags+0x80/0x3b0 [ 140.996369][ T8691] user_path_at+0x28/0x130 [ 140.996420][ T8691] __se_sys_pivot_root+0xbf/0x700 [ 140.996496][ T8691] ? fput+0x8f/0xc0 [ 140.996537][ T8691] __x64_sys_pivot_root+0x31/0x40 [ 140.996561][ T8691] x64_sys_call+0x144/0x3000 [ 140.996589][ T8691] do_syscall_64+0xd2/0x200 [ 140.996621][ T8691] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 140.996665][ T8691] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 140.996740][ T8691] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.996839][ T8691] RIP: 0033:0x7f023e20eec9 [ 140.996859][ T8691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.996881][ T8691] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 140.996907][ T8691] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 140.996925][ T8691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000001c0 [ 140.996942][ T8691] RBP: 00007f023cc77090 R08: 0000000000000000 R09: 0000000000000000 [ 140.996959][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.997012][ T8691] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 140.997034][ T8691] [ 140.999626][ T8694] FAULT_INJECTION: forcing a failure. [ 140.999626][ T8694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.222784][ T8694] CPU: 0 UID: 0 PID: 8694 Comm: syz.2.2203 Not tainted syzkaller #0 PREEMPT(voluntary) [ 141.222818][ T8694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 141.222835][ T8694] Call Trace: [ 141.222844][ T8694] [ 141.222855][ T8694] __dump_stack+0x1d/0x30 [ 141.222885][ T8694] dump_stack_lvl+0xe8/0x140 [ 141.222988][ T8694] dump_stack+0x15/0x1b [ 141.223012][ T8694] should_fail_ex+0x265/0x280 [ 141.223055][ T8694] should_fail+0xb/0x20 [ 141.223152][ T8694] should_fail_usercopy+0x1a/0x20 [ 141.223179][ T8694] strncpy_from_user+0x25/0x230 [ 141.223217][ T8694] ? kmem_cache_alloc_noprof+0x242/0x480 [ 141.223254][ T8694] ? getname_flags+0x80/0x3b0 [ 141.223342][ T8694] getname_flags+0xae/0x3b0 [ 141.223374][ T8694] __x64_sys_symlink+0x40/0x60 [ 141.223406][ T8694] x64_sys_call+0x23d0/0x3000 [ 141.223492][ T8694] do_syscall_64+0xd2/0x200 [ 141.223525][ T8694] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 141.223561][ T8694] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 141.223592][ T8694] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.223623][ T8694] RIP: 0033:0x7f8d68f2eec9 [ 141.223642][ T8694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.223676][ T8694] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 141.223702][ T8694] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 141.223753][ T8694] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000200000001640 [ 141.223770][ T8694] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 141.223787][ T8694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.223804][ T8694] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 141.223829][ T8694] [ 141.518832][ T29] kauditd_printk_skb: 585 callbacks suppressed [ 141.518851][ T29] audit: type=1400 audit(1760049881.256:14123): avc: denied { create } for pid=8703 comm="syz.0.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 141.550407][ T29] audit: type=1400 audit(1760049881.266:14124): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.577809][ T29] audit: type=1326 audit(1760049881.266:14125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.603646][ T29] audit: type=1326 audit(1760049881.266:14126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.629461][ T29] audit: type=1326 audit(1760049881.266:14127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.655047][ T29] audit: type=1326 audit(1760049881.266:14128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.679955][ T29] audit: type=1326 audit(1760049881.266:14129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.708291][ T29] audit: type=1326 audit(1760049881.266:14130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=76 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.735973][ T29] audit: type=1326 audit(1760049881.266:14131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.765593][ T29] audit: type=1326 audit(1760049881.266:14132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8697 comm="syz.3.2205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 141.804519][ T8715] FAULT_INJECTION: forcing a failure. [ 141.804519][ T8715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.824691][ T8715] CPU: 1 UID: 0 PID: 8715 Comm: syz.2.2209 Not tainted syzkaller #0 PREEMPT(voluntary) [ 141.824786][ T8715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 141.824804][ T8715] Call Trace: [ 141.824813][ T8715] [ 141.824824][ T8715] __dump_stack+0x1d/0x30 [ 141.824852][ T8715] dump_stack_lvl+0xe8/0x140 [ 141.824880][ T8715] dump_stack+0x15/0x1b [ 141.824903][ T8715] should_fail_ex+0x265/0x280 [ 141.824968][ T8715] should_fail+0xb/0x20 [ 141.825030][ T8715] should_fail_usercopy+0x1a/0x20 [ 141.825092][ T8715] _copy_from_user+0x1c/0xb0 [ 141.825158][ T8715] io_submit_one+0x52/0x11d0 [ 141.825257][ T8715] __se_sys_io_submit+0xfb/0x280 [ 141.825288][ T8715] __x64_sys_io_submit+0x43/0x50 [ 141.825317][ T8715] x64_sys_call+0x2d6c/0x3000 [ 141.825347][ T8715] do_syscall_64+0xd2/0x200 [ 141.825448][ T8715] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 141.825486][ T8715] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 141.825515][ T8715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.825544][ T8715] RIP: 0033:0x7f8d68f2eec9 [ 141.825612][ T8715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.825646][ T8715] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 141.825734][ T8715] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 141.825748][ T8715] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007f8d69cbe000 [ 141.825763][ T8715] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 141.825779][ T8715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.825794][ T8715] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 141.825816][ T8715] [ 142.490523][ T8774] FAULT_INJECTION: forcing a failure. [ 142.490523][ T8774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.508074][ T8774] CPU: 1 UID: 0 PID: 8774 Comm: syz.1.2236 Not tainted syzkaller #0 PREEMPT(voluntary) [ 142.508108][ T8774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 142.508121][ T8774] Call Trace: [ 142.508127][ T8774] [ 142.508136][ T8774] __dump_stack+0x1d/0x30 [ 142.508222][ T8774] dump_stack_lvl+0xe8/0x140 [ 142.508248][ T8774] dump_stack+0x15/0x1b [ 142.508301][ T8774] should_fail_ex+0x265/0x280 [ 142.508354][ T8774] should_fail+0xb/0x20 [ 142.508388][ T8774] should_fail_usercopy+0x1a/0x20 [ 142.508412][ T8774] _copy_to_user+0x20/0xa0 [ 142.508447][ T8774] simple_read_from_buffer+0xb5/0x130 [ 142.508502][ T8774] proc_fail_nth_read+0x10e/0x150 [ 142.508539][ T8774] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 142.508575][ T8774] vfs_read+0x1a8/0x770 [ 142.508600][ T8774] ? __rcu_read_unlock+0x4f/0x70 [ 142.508698][ T8774] ? __fget_files+0x184/0x1c0 [ 142.508733][ T8774] ksys_read+0xda/0x1a0 [ 142.508761][ T8774] __x64_sys_read+0x40/0x50 [ 142.508785][ T8774] x64_sys_call+0x27c0/0x3000 [ 142.508823][ T8774] do_syscall_64+0xd2/0x200 [ 142.508845][ T8774] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 142.508875][ T8774] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 142.508902][ T8774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.508945][ T8774] RIP: 0033:0x7faeaf01d8dc [ 142.508964][ T8774] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 142.508989][ T8774] RSP: 002b:00007faeada87030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 142.509013][ T8774] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01d8dc [ 142.509026][ T8774] RDX: 000000000000000f RSI: 00007faeada870a0 RDI: 0000000000000003 [ 142.509107][ T8774] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 142.509119][ T8774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.509132][ T8774] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 142.509154][ T8774] [ 142.771192][ T8777] netlink: 'syz.3.2239': attribute type 32 has an invalid length. [ 142.780809][ T8777] __nla_validate_parse: 2 callbacks suppressed [ 142.780828][ T8777] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2239'. [ 142.829644][ T8777] bond1: Setting coupled_control to off (0) [ 142.845878][ T8788] FAULT_INJECTION: forcing a failure. [ 142.845878][ T8788] name failslab, interval 1, probability 0, space 0, times 0 [ 142.862484][ T8788] CPU: 0 UID: 0 PID: 8788 Comm: syz.0.2242 Not tainted syzkaller #0 PREEMPT(voluntary) [ 142.862577][ T8788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 142.862595][ T8788] Call Trace: [ 142.862603][ T8788] [ 142.862611][ T8788] __dump_stack+0x1d/0x30 [ 142.862683][ T8788] dump_stack_lvl+0xe8/0x140 [ 142.862703][ T8788] dump_stack+0x15/0x1b [ 142.862722][ T8788] should_fail_ex+0x265/0x280 [ 142.862760][ T8788] should_failslab+0x8c/0xb0 [ 142.862881][ T8788] kmem_cache_alloc_noprof+0x50/0x480 [ 142.862923][ T8788] ? getname_flags+0x80/0x3b0 [ 142.863006][ T8788] getname_flags+0x80/0x3b0 [ 142.863035][ T8788] user_path_at+0x28/0x130 [ 142.863095][ T8788] __se_sys_pivot_root+0xbf/0x700 [ 142.863123][ T8788] ? fput+0x8f/0xc0 [ 142.863243][ T8788] __x64_sys_pivot_root+0x31/0x40 [ 142.863329][ T8788] x64_sys_call+0x144/0x3000 [ 142.863503][ T8788] do_syscall_64+0xd2/0x200 [ 142.863528][ T8788] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 142.863559][ T8788] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 142.863581][ T8788] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.863604][ T8788] RIP: 0033:0x7f023e20eec9 [ 142.863641][ T8788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.863660][ T8788] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 142.863690][ T8788] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 142.863703][ T8788] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 00002000000001c0 [ 142.863779][ T8788] RBP: 00007f023cc77090 R08: 0000000000000000 R09: 0000000000000000 [ 142.863791][ T8788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.863804][ T8788] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 142.863822][ T8788] [ 143.316012][ T8806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2250'. [ 143.354643][ T8809] lo speed is unknown, defaulting to 1000 [ 143.614517][ T8832] FAULT_INJECTION: forcing a failure. [ 143.614517][ T8832] name failslab, interval 1, probability 0, space 0, times 0 [ 143.628338][ T8832] CPU: 1 UID: 0 PID: 8832 Comm: syz.1.2261 Not tainted syzkaller #0 PREEMPT(voluntary) [ 143.628418][ T8832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 143.628434][ T8832] Call Trace: [ 143.628443][ T8832] [ 143.628453][ T8832] __dump_stack+0x1d/0x30 [ 143.628479][ T8832] dump_stack_lvl+0xe8/0x140 [ 143.628505][ T8832] dump_stack+0x15/0x1b [ 143.628526][ T8832] should_fail_ex+0x265/0x280 [ 143.628574][ T8832] should_failslab+0x8c/0xb0 [ 143.628686][ T8832] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 143.628727][ T8832] ? sidtab_sid2str_get+0xa0/0x130 [ 143.628797][ T8832] kmemdup_noprof+0x2b/0x70 [ 143.628820][ T8832] sidtab_sid2str_get+0xa0/0x130 [ 143.628853][ T8832] security_sid_to_context_core+0x1eb/0x2e0 [ 143.628891][ T8832] security_sid_to_context+0x27/0x40 [ 143.628995][ T8832] avc_audit_post_callback+0x10f/0x520 [ 143.629038][ T8832] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 143.629083][ T8832] common_lsm_audit+0x1bb/0x230 [ 143.629108][ T8832] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 143.629201][ T8832] slow_avc_audit+0x104/0x140 [ 143.629250][ T8832] avc_has_perm+0x13a/0x180 [ 143.629363][ T8832] selinux_uring_allowed+0x74/0x80 [ 143.629396][ T8832] security_uring_allowed+0x2c/0x60 [ 143.629434][ T8832] __se_sys_io_uring_setup+0xe1/0x210 [ 143.629491][ T8832] ? fput+0x8f/0xc0 [ 143.629530][ T8832] ? ksys_write+0x192/0x1a0 [ 143.629562][ T8832] __x64_sys_io_uring_setup+0x31/0x40 [ 143.629622][ T8832] x64_sys_call+0x2b25/0x3000 [ 143.629651][ T8832] do_syscall_64+0xd2/0x200 [ 143.629677][ T8832] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 143.629759][ T8832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.629817][ T8832] RIP: 0033:0x7faeaf01eec9 [ 143.629837][ T8832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.629857][ T8832] RSP: 002b:00007faeada86fc8 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 143.629875][ T8832] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 143.629888][ T8832] RDX: 0000200000000300 RSI: 0000200000000140 RDI: 000000000000088f [ 143.629900][ T8832] RBP: 0000200000000140 R08: 0000000000000000 R09: 0000200000000300 [ 143.629915][ T8832] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 143.629932][ T8832] R13: 0000200000000000 R14: 000000000000088f R15: 0000200000000300 [ 143.630021][ T8832] [ 144.155469][ T8866] FAULT_INJECTION: forcing a failure. [ 144.155469][ T8866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.169355][ T8866] CPU: 0 UID: 0 PID: 8866 Comm: syz.0.2276 Not tainted syzkaller #0 PREEMPT(voluntary) [ 144.169385][ T8866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 144.169401][ T8866] Call Trace: [ 144.169409][ T8866] [ 144.169419][ T8866] __dump_stack+0x1d/0x30 [ 144.169577][ T8866] dump_stack_lvl+0xe8/0x140 [ 144.169708][ T8866] dump_stack+0x15/0x1b [ 144.169732][ T8866] should_fail_ex+0x265/0x280 [ 144.169855][ T8866] should_fail+0xb/0x20 [ 144.169962][ T8866] should_fail_usercopy+0x1a/0x20 [ 144.169985][ T8866] strncpy_from_user+0x25/0x230 [ 144.170083][ T8866] path_setxattrat+0xeb/0x310 [ 144.170136][ T8866] __x64_sys_lsetxattr+0x71/0x90 [ 144.170163][ T8866] x64_sys_call+0x287b/0x3000 [ 144.170211][ T8866] do_syscall_64+0xd2/0x200 [ 144.170243][ T8866] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 144.170351][ T8866] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 144.170375][ T8866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.170401][ T8866] RIP: 0033:0x7f023e20eec9 [ 144.170442][ T8866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.170468][ T8866] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 144.170489][ T8866] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 144.170503][ T8866] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 00002000000001c0 [ 144.170529][ T8866] RBP: 00007f023cc77090 R08: 0000000000000000 R09: 0000000000000000 [ 144.170573][ T8866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.170589][ T8866] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 144.170647][ T8866] [ 144.392097][ T8870] FAULT_INJECTION: forcing a failure. [ 144.392097][ T8870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.405639][ T8870] CPU: 0 UID: 0 PID: 8870 Comm: syz.0.2278 Not tainted syzkaller #0 PREEMPT(voluntary) [ 144.405674][ T8870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 144.405691][ T8870] Call Trace: [ 144.405699][ T8870] [ 144.405727][ T8870] __dump_stack+0x1d/0x30 [ 144.405755][ T8870] dump_stack_lvl+0xe8/0x140 [ 144.405805][ T8870] dump_stack+0x15/0x1b [ 144.405827][ T8870] should_fail_ex+0x265/0x280 [ 144.405872][ T8870] should_fail+0xb/0x20 [ 144.406049][ T8870] should_fail_usercopy+0x1a/0x20 [ 144.406076][ T8870] _copy_from_user+0x1c/0xb0 [ 144.406157][ T8870] memdup_user+0x5e/0xd0 [ 144.406244][ T8870] strndup_user+0x68/0xb0 [ 144.406276][ T8870] __se_sys_mount+0x4d/0x2e0 [ 144.406301][ T8870] ? fput+0x8f/0xc0 [ 144.406334][ T8870] ? ksys_write+0x192/0x1a0 [ 144.406394][ T8870] __x64_sys_mount+0x67/0x80 [ 144.406429][ T8870] x64_sys_call+0x2b51/0x3000 [ 144.406509][ T8870] do_syscall_64+0xd2/0x200 [ 144.406535][ T8870] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 144.406572][ T8870] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 144.406599][ T8870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.406638][ T8870] RIP: 0033:0x7f023e20eec9 [ 144.406654][ T8870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.406674][ T8870] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 144.406794][ T8870] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 144.406807][ T8870] RDX: 0000200000000180 RSI: 0000200000000000 RDI: 0000000000000000 [ 144.406824][ T8870] RBP: 00007f023cc77090 R08: 0000200000000740 R09: 0000000000000000 [ 144.406838][ T8870] R10: 0000000002004000 R11: 0000000000000246 R12: 0000000000000001 [ 144.406851][ T8870] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 144.406872][ T8870] [ 144.647467][ T8875] FAULT_INJECTION: forcing a failure. [ 144.647467][ T8875] name failslab, interval 1, probability 0, space 0, times 0 [ 144.660744][ T8875] CPU: 0 UID: 0 PID: 8875 Comm: Not tainted syzkaller #0 PREEMPT(voluntary) [ 144.660779][ T8875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 144.660814][ T8875] Call Trace: [ 144.660821][ T8875] [ 144.660829][ T8875] __dump_stack+0x1d/0x30 [ 144.660858][ T8875] dump_stack_lvl+0xe8/0x140 [ 144.660877][ T8875] dump_stack+0x15/0x1b [ 144.660929][ T8875] should_fail_ex+0x265/0x280 [ 144.661007][ T8875] should_failslab+0x8c/0xb0 [ 144.661041][ T8875] kmem_cache_alloc_noprof+0x50/0x480 [ 144.661068][ T8875] ? dup_fd+0x3a/0x540 [ 144.661147][ T8875] dup_fd+0x3a/0x540 [ 144.661177][ T8875] copy_files+0x98/0xf0 [ 144.661254][ T8875] copy_process+0xc5b/0x2000 [ 144.661371][ T8875] kernel_clone+0x16c/0x5c0 [ 144.661409][ T8875] ? vfs_write+0x7e8/0x960 [ 144.661439][ T8875] __x64_sys_clone+0xe6/0x120 [ 144.661474][ T8875] x64_sys_call+0x119c/0x3000 [ 144.661507][ T8875] do_syscall_64+0xd2/0x200 [ 144.661538][ T8875] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 144.661575][ T8875] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 144.661600][ T8875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.661624][ T8875] RIP: 0033:0x7faeaf01eec9 [ 144.661691][ T8875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.661710][ T8875] RSP: 002b:00007faeada86fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 144.661730][ T8875] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 144.661747][ T8875] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00000000a0001000 [ 144.661763][ T8875] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 144.661779][ T8875] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 144.661795][ T8875] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 144.661833][ T8875] [ 145.096077][ T8897] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5138 sclass=netlink_route_socket pid=8897 comm=syz.3.2290 [ 145.144160][ T8902] netlink: 'syz.0.2292': attribute type 5 has an invalid length. [ 145.155347][ T8902] netlink: 168 bytes leftover after parsing attributes in process `syz.0.2292'. [ 145.282872][ T8920] netlink: 'syz.2.2298': attribute type 1 has an invalid length. [ 145.293409][ T8918] FAULT_INJECTION: forcing a failure. [ 145.293409][ T8918] name failslab, interval 1, probability 0, space 0, times 0 [ 145.301298][ T8920] 8021q: adding VLAN 0 to HW filter on device bond4 [ 145.309688][ T8918] CPU: 1 UID: 0 PID: 8918 Comm: syz.3.2297 Not tainted syzkaller #0 PREEMPT(voluntary) [ 145.309805][ T8918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 145.309849][ T8918] Call Trace: [ 145.309859][ T8918] [ 145.309870][ T8918] __dump_stack+0x1d/0x30 [ 145.309949][ T8918] dump_stack_lvl+0xe8/0x140 [ 145.309975][ T8918] dump_stack+0x15/0x1b [ 145.309999][ T8918] should_fail_ex+0x265/0x280 [ 145.310047][ T8918] ? __pfx_cond_bools_destroy+0x10/0x10 [ 145.310144][ T8918] should_failslab+0x8c/0xb0 [ 145.310191][ T8918] __kmalloc_noprof+0xa5/0x570 [ 145.310229][ T8918] ? hashtab_duplicate+0x55/0x360 [ 145.310265][ T8918] ? __pfx_cond_bools_destroy+0x10/0x10 [ 145.310313][ T8918] hashtab_duplicate+0x55/0x360 [ 145.310407][ T8918] ? __kmalloc_noprof+0x2a2/0x570 [ 145.310444][ T8918] ? cond_policydb_dup+0xa3/0x4e0 [ 145.310491][ T8918] ? __pfx_cond_bools_copy+0x10/0x10 [ 145.310528][ T8918] cond_policydb_dup+0xd2/0x4e0 [ 145.310601][ T8918] security_set_bools+0xa0/0x340 [ 145.310647][ T8918] sel_commit_bools_write+0x1ea/0x270 [ 145.310744][ T8918] vfs_writev+0x403/0x8b0 [ 145.310785][ T8918] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 145.310919][ T8918] ? mutex_lock+0xd/0x30 [ 145.311015][ T8918] do_writev+0xe7/0x210 [ 145.311092][ T8918] __x64_sys_writev+0x45/0x50 [ 145.311131][ T8918] x64_sys_call+0x1e9a/0x3000 [ 145.311207][ T8918] do_syscall_64+0xd2/0x200 [ 145.311240][ T8918] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 145.311278][ T8918] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 145.311325][ T8918] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.311364][ T8918] RIP: 0033:0x7f7c0ba8eec9 [ 145.311387][ T8918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.311415][ T8918] RSP: 002b:00007f7c0a4f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 145.311442][ T8918] RAX: ffffffffffffffda RBX: 00007f7c0bce5fa0 RCX: 00007f7c0ba8eec9 [ 145.311460][ T8918] RDX: 0000000000000002 RSI: 00002000000025c0 RDI: 0000000000000003 [ 145.311516][ T8918] RBP: 00007f7c0a4f7090 R08: 0000000000000000 R09: 0000000000000000 [ 145.311597][ T8918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.311615][ T8918] R13: 00007f7c0bce6038 R14: 00007f7c0bce5fa0 R15: 00007ffca2614898 [ 145.311641][ T8918] [ 145.616817][ T8922] 8021q: adding VLAN 0 to HW filter on device bond4 [ 145.627699][ T8922] bond4: (slave vxcan3): The slave device specified does not support setting the MAC address [ 145.643594][ T8922] bond4: (slave vxcan3): Error -95 calling set_mac_address [ 145.661638][ T8923] ip6erspan0: entered promiscuous mode [ 145.670743][ T8923] bond4: (slave ip6erspan0): making interface the new active one [ 145.681991][ T8923] bond4: (slave ip6erspan0): Enslaving as an active interface with an up link [ 145.818414][ T8944] FAULT_INJECTION: forcing a failure. [ 145.818414][ T8944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.836818][ T8944] CPU: 1 UID: 0 PID: 8944 Comm: syz.2.2304 Not tainted syzkaller #0 PREEMPT(voluntary) [ 145.836859][ T8944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 145.836873][ T8944] Call Trace: [ 145.836880][ T8944] [ 145.836932][ T8944] __dump_stack+0x1d/0x30 [ 145.836956][ T8944] dump_stack_lvl+0xe8/0x140 [ 145.836977][ T8944] dump_stack+0x15/0x1b [ 145.836994][ T8944] should_fail_ex+0x265/0x280 [ 145.837070][ T8944] should_fail+0xb/0x20 [ 145.837174][ T8944] should_fail_usercopy+0x1a/0x20 [ 145.837293][ T8944] _copy_from_user+0x1c/0xb0 [ 145.837326][ T8944] kstrtouint_from_user+0x69/0xf0 [ 145.837400][ T8944] ? 0xffffffff81000000 [ 145.837414][ T8944] ? selinux_file_permission+0x1e4/0x320 [ 145.837485][ T8944] proc_fail_nth_write+0x50/0x160 [ 145.837526][ T8944] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 145.837560][ T8944] vfs_write+0x269/0x960 [ 145.837588][ T8944] ? vfs_read+0x4e6/0x770 [ 145.837656][ T8944] ? __rcu_read_unlock+0x4f/0x70 [ 145.837686][ T8944] ? __fget_files+0x184/0x1c0 [ 145.837716][ T8944] ? finish_task_switch+0xad/0x2b0 [ 145.837750][ T8944] ksys_write+0xda/0x1a0 [ 145.837840][ T8944] __x64_sys_write+0x40/0x50 [ 145.837873][ T8944] x64_sys_call+0x2802/0x3000 [ 145.837902][ T8944] do_syscall_64+0xd2/0x200 [ 145.837962][ T8944] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 145.837994][ T8944] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 145.838022][ T8944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.838051][ T8944] RIP: 0033:0x7f8d68f2d97f [ 145.838070][ T8944] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 145.838112][ T8944] RSP: 002b:00007f8d6796e030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 145.838139][ T8944] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d68f2d97f [ 145.838157][ T8944] RDX: 0000000000000001 RSI: 00007f8d6796e0a0 RDI: 0000000000000009 [ 145.838174][ T8944] RBP: 00007f8d6796e090 R08: 0000000000000000 R09: 0000000000000000 [ 145.838189][ T8944] R10: ffffffffffffffff R11: 0000000000000293 R12: 0000000000000001 [ 145.838205][ T8944] R13: 00007f8d69186128 R14: 00007f8d69186090 R15: 00007ffc854f2808 [ 145.838230][ T8944] [ 146.149923][ T8950] FAULT_INJECTION: forcing a failure. [ 146.149923][ T8950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.168181][ T8950] CPU: 1 UID: 0 PID: 8950 Comm: syz.1.2308 Not tainted syzkaller #0 PREEMPT(voluntary) [ 146.168218][ T8950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 146.168314][ T8950] Call Trace: [ 146.168321][ T8950] [ 146.168329][ T8950] __dump_stack+0x1d/0x30 [ 146.168351][ T8950] dump_stack_lvl+0xe8/0x140 [ 146.168370][ T8950] dump_stack+0x15/0x1b [ 146.168390][ T8950] should_fail_ex+0x265/0x280 [ 146.168435][ T8950] should_fail+0xb/0x20 [ 146.168569][ T8950] should_fail_usercopy+0x1a/0x20 [ 146.168590][ T8950] strncpy_from_user+0x25/0x230 [ 146.168619][ T8950] ? kmem_cache_alloc_noprof+0x242/0x480 [ 146.168654][ T8950] ? getname_flags+0x80/0x3b0 [ 146.168709][ T8950] getname_flags+0xae/0x3b0 [ 146.168744][ T8950] __x64_sys_link+0x33/0x70 [ 146.168768][ T8950] x64_sys_call+0x12a7/0x3000 [ 146.168833][ T8950] do_syscall_64+0xd2/0x200 [ 146.168858][ T8950] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 146.168893][ T8950] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 146.168921][ T8950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.169011][ T8950] RIP: 0033:0x7faeaf01eec9 [ 146.169031][ T8950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.169056][ T8950] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 146.169082][ T8950] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 146.169099][ T8950] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 146.169116][ T8950] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 146.169165][ T8950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.169179][ T8950] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 146.169203][ T8950] [ 146.527649][ T29] kauditd_printk_skb: 999 callbacks suppressed [ 146.527720][ T29] audit: type=1400 audit(1760049886.306:15130): avc: denied { map_create } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.573635][ T29] audit: type=1400 audit(1760049886.306:15131): avc: denied { prog_load } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.594584][ T29] audit: type=1400 audit(1760049886.306:15132): avc: denied { map_create } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.616530][ T29] audit: type=1400 audit(1760049886.306:15133): avc: denied { prog_load } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.636158][ T29] audit: type=1400 audit(1760049886.306:15134): avc: denied { create } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 146.657789][ T8982] lo speed is unknown, defaulting to 1000 [ 146.657809][ T29] audit: type=1400 audit(1760049886.316:15135): avc: denied { mac_admin } for pid=8971 comm="syz.1.2317" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 146.687771][ T29] audit: type=1401 audit(1760049886.316:15136): op=setxattr invalid_context="system_u:object" [ 146.698971][ T29] audit: type=1400 audit(1760049886.316:15137): avc: denied { create } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 146.721784][ T29] audit: type=1400 audit(1760049886.316:15138): avc: denied { create } for pid=8971 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 146.743056][ T29] audit: type=1400 audit(1760049886.326:15139): avc: denied { read write } for pid=8964 comm="syz.0.2314" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 146.970978][ T8991] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 147.018976][ T8991] -1: renamed from syzkaller0 [ 147.175367][ T8999] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.183871][ T8999] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.204596][ T8999] bond_slave_0: left promiscuous mode [ 147.210279][ T8999] bond_slave_1: left promiscuous mode [ 147.304031][ T8999] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 147.316347][ T8999] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 147.335635][ T8999] batman_adv: batadv0: Interface deactivated: veth1_vlan [ 147.392928][ T8999] bond3: left promiscuous mode [ 147.411155][ T3393] lo speed is unknown, defaulting to 1000 [ 147.417198][ T3393] syz0: Port: 1 Link DOWN [ 147.421897][ T3532] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.441022][ T3532] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.450475][ T3532] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.467649][ T3532] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.659338][ T9017] FAULT_INJECTION: forcing a failure. [ 147.659338][ T9017] name failslab, interval 1, probability 0, space 0, times 0 [ 147.666239][ T9019] FAULT_INJECTION: forcing a failure. [ 147.666239][ T9019] name failslab, interval 1, probability 0, space 0, times 0 [ 147.673638][ T9017] CPU: 0 UID: 0 PID: 9017 Comm: syz.3.2333 Not tainted syzkaller #0 PREEMPT(voluntary) [ 147.673756][ T9017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 147.673772][ T9017] Call Trace: [ 147.673780][ T9017] [ 147.673789][ T9017] __dump_stack+0x1d/0x30 [ 147.673851][ T9017] dump_stack_lvl+0xe8/0x140 [ 147.673874][ T9017] dump_stack+0x15/0x1b [ 147.673898][ T9017] should_fail_ex+0x265/0x280 [ 147.673942][ T9017] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 147.673996][ T9017] should_failslab+0x8c/0xb0 [ 147.674091][ T9017] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 147.674123][ T9017] ? shmem_alloc_inode+0x34/0x50 [ 147.674150][ T9017] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 147.674174][ T9017] shmem_alloc_inode+0x34/0x50 [ 147.674283][ T9017] alloc_inode+0x40/0x170 [ 147.674311][ T9017] new_inode+0x1d/0xe0 [ 147.674342][ T9017] shmem_get_inode+0x244/0x750 [ 147.674369][ T9017] shmem_mknod+0x46/0x180 [ 147.674487][ T9017] vfs_mknod+0x2ce/0x310 [ 147.674511][ T9017] unix_bind+0x321/0x920 [ 147.674544][ T9017] __sys_bind+0x1ce/0x2a0 [ 147.674647][ T9017] __x64_sys_bind+0x3f/0x50 [ 147.674675][ T9017] x64_sys_call+0x2b72/0x3000 [ 147.674717][ T9017] do_syscall_64+0xd2/0x200 [ 147.674807][ T9017] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 147.674844][ T9017] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 147.674867][ T9017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.674902][ T9017] RIP: 0033:0x7f7c0ba8eec9 [ 147.674922][ T9017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.674977][ T9017] RSP: 002b:00007f7c0a4f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 147.675002][ T9017] RAX: ffffffffffffffda RBX: 00007f7c0bce5fa0 RCX: 00007f7c0ba8eec9 [ 147.675014][ T9017] RDX: 000000000000006e RSI: 00002000000000c0 RDI: 0000000000000003 [ 147.675030][ T9017] RBP: 00007f7c0a4f7090 R08: 0000000000000000 R09: 0000000000000000 [ 147.675045][ T9017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.675102][ T9017] R13: 00007f7c0bce6038 R14: 00007f7c0bce5fa0 R15: 00007ffca2614898 [ 147.675128][ T9017] [ 147.939981][ T9019] CPU: 1 UID: 0 PID: 9019 Comm: syz.1.2334 Not tainted syzkaller #0 PREEMPT(voluntary) [ 147.940028][ T9019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 147.940045][ T9019] Call Trace: [ 147.940054][ T9019] [ 147.940064][ T9019] __dump_stack+0x1d/0x30 [ 147.940136][ T9019] dump_stack_lvl+0xe8/0x140 [ 147.940161][ T9019] dump_stack+0x15/0x1b [ 147.940204][ T9019] should_fail_ex+0x265/0x280 [ 147.940249][ T9019] should_failslab+0x8c/0xb0 [ 147.940284][ T9019] kmem_cache_alloc_noprof+0x50/0x480 [ 147.940386][ T9019] ? getname_flags+0x80/0x3b0 [ 147.940415][ T9019] getname_flags+0x80/0x3b0 [ 147.940448][ T9019] path_setxattrat+0x223/0x310 [ 147.940500][ T9019] __x64_sys_lsetxattr+0x71/0x90 [ 147.940609][ T9019] x64_sys_call+0x287b/0x3000 [ 147.940630][ T9019] do_syscall_64+0xd2/0x200 [ 147.940691][ T9019] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 147.940719][ T9019] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 147.940740][ T9019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.940762][ T9019] RIP: 0033:0x7faeaf01eec9 [ 147.940781][ T9019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.940925][ T9019] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 147.940952][ T9019] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 147.940965][ T9019] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000080 [ 147.940977][ T9019] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 147.940989][ T9019] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 147.941002][ T9019] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 147.941076][ T9019] [ 148.783713][ T9050] xt_CONNSECMARK: invalid mode: 66 [ 148.834281][ T9058] FAULT_INJECTION: forcing a failure. [ 148.834281][ T9058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.848769][ T9058] CPU: 0 UID: 0 PID: 9058 Comm: syz.2.2351 Not tainted syzkaller #0 PREEMPT(voluntary) [ 148.848802][ T9058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 148.848819][ T9058] Call Trace: [ 148.848829][ T9058] [ 148.848840][ T9058] __dump_stack+0x1d/0x30 [ 148.848869][ T9058] dump_stack_lvl+0xe8/0x140 [ 148.848894][ T9058] dump_stack+0x15/0x1b [ 148.848945][ T9058] should_fail_ex+0x265/0x280 [ 148.848991][ T9058] should_fail+0xb/0x20 [ 148.849021][ T9058] should_fail_usercopy+0x1a/0x20 [ 148.849101][ T9058] _copy_to_user+0x20/0xa0 [ 148.849128][ T9058] simple_read_from_buffer+0xb5/0x130 [ 148.849152][ T9058] proc_fail_nth_read+0x10e/0x150 [ 148.849202][ T9058] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 148.849314][ T9058] vfs_read+0x1a8/0x770 [ 148.849390][ T9058] ? __rcu_read_unlock+0x4f/0x70 [ 148.849432][ T9058] ? __fget_files+0x184/0x1c0 [ 148.849468][ T9058] ksys_read+0xda/0x1a0 [ 148.849499][ T9058] __x64_sys_read+0x40/0x50 [ 148.849529][ T9058] x64_sys_call+0x27c0/0x3000 [ 148.849622][ T9058] do_syscall_64+0xd2/0x200 [ 148.849709][ T9058] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 148.849757][ T9058] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 148.849786][ T9058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.849817][ T9058] RIP: 0033:0x7f8d68f2d8dc [ 148.849837][ T9058] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 148.849869][ T9058] RSP: 002b:00007f8d6798f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 148.849893][ T9058] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2d8dc [ 148.849906][ T9058] RDX: 000000000000000f RSI: 00007f8d6798f0a0 RDI: 0000000000000003 [ 148.849935][ T9058] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 148.849950][ T9058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.850003][ T9058] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 148.850026][ T9058] [ 149.190643][ T9055] netlink: 'syz.0.2350': attribute type 10 has an invalid length. [ 149.209816][ T9055] team0: Device dummy0 is up. Set it down before adding it as a team port [ 149.264210][ T9066] netlink: 'syz.2.2354': attribute type 27 has an invalid length. [ 149.310613][ T9066] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.318429][ T9066] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.390656][ T9066] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 149.413594][ T9066] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 149.452661][ T9066] veth1_vlan: left allmulticast mode [ 149.477604][ T9066] veth3: left promiscuous mode [ 149.483863][ T9066] bond2: left promiscuous mode [ 149.488828][ T9066] bond2: left allmulticast mode [ 149.498234][ T9066] ip6erspan0: left promiscuous mode [ 149.504114][ T9079] netlink: 'syz.1.2360': attribute type 6 has an invalid length. [ 149.521186][ T3536] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.532234][ T3536] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.553430][ T3536] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.564892][ T3536] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.688741][ T9093] FAULT_INJECTION: forcing a failure. [ 149.688741][ T9093] name failslab, interval 1, probability 0, space 0, times 0 [ 149.701934][ T9093] CPU: 0 UID: 0 PID: 9093 Comm: syz.2.2365 Not tainted syzkaller #0 PREEMPT(voluntary) [ 149.701962][ T9093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 149.701978][ T9093] Call Trace: [ 149.701987][ T9093] [ 149.702057][ T9093] __dump_stack+0x1d/0x30 [ 149.702078][ T9093] dump_stack_lvl+0xe8/0x140 [ 149.702101][ T9093] dump_stack+0x15/0x1b [ 149.702132][ T9093] should_fail_ex+0x265/0x280 [ 149.702218][ T9093] should_failslab+0x8c/0xb0 [ 149.702245][ T9093] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 149.702362][ T9093] ? __alloc_skb+0x101/0x320 [ 149.702392][ T9093] __alloc_skb+0x101/0x320 [ 149.702444][ T9093] netlink_ack+0xfd/0x500 [ 149.702471][ T9093] ? avc_has_perm_noaudit+0x1b1/0x200 [ 149.702508][ T9093] netlink_rcv_skb+0x192/0x220 [ 149.702585][ T9093] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 149.702700][ T9093] rtnetlink_rcv+0x1c/0x30 [ 149.702731][ T9093] netlink_unicast+0x5bd/0x690 [ 149.702762][ T9093] netlink_sendmsg+0x58b/0x6b0 [ 149.702871][ T9093] ? __pfx_netlink_sendmsg+0x10/0x10 [ 149.702909][ T9093] __sock_sendmsg+0x145/0x180 [ 149.702933][ T9093] ____sys_sendmsg+0x31e/0x4e0 [ 149.703035][ T9093] ___sys_sendmsg+0x17b/0x1d0 [ 149.703085][ T9093] __x64_sys_sendmsg+0xd4/0x160 [ 149.703199][ T9093] x64_sys_call+0x191e/0x3000 [ 149.703229][ T9093] do_syscall_64+0xd2/0x200 [ 149.703321][ T9093] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 149.703411][ T9093] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 149.703432][ T9093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.703459][ T9093] RIP: 0033:0x7f8d68f2eec9 [ 149.703475][ T9093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.703493][ T9093] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.703557][ T9093] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 149.703571][ T9093] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 149.703589][ T9093] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 149.703605][ T9093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.703622][ T9093] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 149.703645][ T9093] [ 150.001005][ T9099] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2369'. [ 150.017086][ T9099] 8021q: adding VLAN 0 to HW filter on device bond3 [ 150.037432][ T9099] vlan2: entered allmulticast mode [ 150.043467][ T9099] bond3: entered allmulticast mode [ 150.457412][ T9127] FAULT_INJECTION: forcing a failure. [ 150.457412][ T9127] name failslab, interval 1, probability 0, space 0, times 0 [ 150.471646][ T9127] CPU: 0 UID: 0 PID: 9127 Comm: syz.0.2378 Not tainted syzkaller #0 PREEMPT(voluntary) [ 150.471750][ T9127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 150.471765][ T9127] Call Trace: [ 150.471774][ T9127] [ 150.471785][ T9127] __dump_stack+0x1d/0x30 [ 150.471810][ T9127] dump_stack_lvl+0xe8/0x140 [ 150.471829][ T9127] dump_stack+0x15/0x1b [ 150.471858][ T9127] should_fail_ex+0x265/0x280 [ 150.471963][ T9127] should_failslab+0x8c/0xb0 [ 150.471992][ T9127] __kmalloc_noprof+0xa5/0x570 [ 150.472039][ T9127] ? nla_strdup+0x78/0xc0 [ 150.472067][ T9127] nla_strdup+0x78/0xc0 [ 150.472091][ T9127] rtnl_linkprop+0x3ab/0x570 [ 150.472195][ T9127] ? __pfx_rtnl_dellinkprop+0x10/0x10 [ 150.472214][ T9127] rtnl_dellinkprop+0x2a/0x40 [ 150.472376][ T9127] rtnetlink_rcv_msg+0x657/0x6d0 [ 150.472424][ T9127] netlink_rcv_skb+0x120/0x220 [ 150.472454][ T9127] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 150.472534][ T9127] rtnetlink_rcv+0x1c/0x30 [ 150.472571][ T9127] netlink_unicast+0x5bd/0x690 [ 150.472597][ T9127] netlink_sendmsg+0x58b/0x6b0 [ 150.472656][ T9127] ? __pfx_netlink_sendmsg+0x10/0x10 [ 150.472689][ T9127] __sock_sendmsg+0x145/0x180 [ 150.472716][ T9127] ____sys_sendmsg+0x31e/0x4e0 [ 150.472752][ T9127] ___sys_sendmsg+0x17b/0x1d0 [ 150.472830][ T9127] __x64_sys_sendmsg+0xd4/0x160 [ 150.472881][ T9127] x64_sys_call+0x191e/0x3000 [ 150.472910][ T9127] do_syscall_64+0xd2/0x200 [ 150.473009][ T9127] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 150.473042][ T9127] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 150.473063][ T9127] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 150.473115][ T9127] RIP: 0033:0x7f023e20eec9 [ 150.473135][ T9127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.473159][ T9127] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 150.473180][ T9127] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 150.473197][ T9127] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 150.473216][ T9127] RBP: 00007f023cc77090 R08: 0000000000000000 R09: 0000000000000000 [ 150.473233][ T9127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.473249][ T9127] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 150.473268][ T9127] [ 150.737740][ T9125] netlink: 'syz.1.2380': attribute type 13 has an invalid length. [ 150.794563][ T9125] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.802701][ T9125] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.856505][ T9125] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 150.868247][ T9125] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 150.940365][ T3536] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 150.965894][ T3536] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 150.985137][ T3536] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.002547][ T9132] x_tables: duplicate underflow at hook 1 [ 151.008763][ T3536] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.534160][ T29] kauditd_printk_skb: 1494 callbacks suppressed [ 151.534176][ T29] audit: type=1400 audit(1760049891.316:16015): avc: denied { prog_load } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.562935][ T29] audit: type=1400 audit(1760049891.316:16016): avc: denied { open } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 151.584292][ T29] audit: type=1400 audit(1760049891.316:16017): avc: denied { map_create } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.605210][ T29] audit: type=1400 audit(1760049891.366:16018): avc: denied { prog_load } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.627259][ T29] audit: type=1400 audit(1760049891.416:16019): avc: denied { prog_load } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.648744][ T29] audit: type=1326 audit(1760049891.416:16020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9164 comm="syz.3.2395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f7c0bac1785 code=0x7ffc0000 [ 151.675050][ T29] audit: type=1400 audit(1760049891.416:16021): avc: denied { create } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 151.695846][ T29] audit: type=1400 audit(1760049891.416:16022): avc: denied { prog_load } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.716902][ T29] audit: type=1400 audit(1760049891.416:16023): avc: denied { create } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 151.743807][ T29] audit: type=1400 audit(1760049891.526:16024): avc: denied { prog_load } for pid=9171 comm="syz.4.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.813437][ T9179] FAULT_INJECTION: forcing a failure. [ 151.813437][ T9179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.827835][ T9179] CPU: 1 UID: 0 PID: 9179 Comm: syz.4.2399 Not tainted syzkaller #0 PREEMPT(voluntary) [ 151.827926][ T9179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 151.827943][ T9179] Call Trace: [ 151.827951][ T9179] [ 151.827959][ T9179] __dump_stack+0x1d/0x30 [ 151.827987][ T9179] dump_stack_lvl+0xe8/0x140 [ 151.828012][ T9179] dump_stack+0x15/0x1b [ 151.828086][ T9179] should_fail_ex+0x265/0x280 [ 151.828182][ T9179] should_fail+0xb/0x20 [ 151.828222][ T9179] should_fail_usercopy+0x1a/0x20 [ 151.828249][ T9179] _copy_from_user+0x1c/0xb0 [ 151.828299][ T9179] kstrtouint_from_user+0x69/0xf0 [ 151.828345][ T9179] ? 0xffffffff81000000 [ 151.828362][ T9179] ? selinux_file_permission+0x1e4/0x320 [ 151.828416][ T9179] proc_fail_nth_write+0x50/0x160 [ 151.828483][ T9179] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 151.828520][ T9179] vfs_write+0x269/0x960 [ 151.828555][ T9179] ? vfs_read+0x4e6/0x770 [ 151.828582][ T9179] ? __rcu_read_unlock+0x4f/0x70 [ 151.828642][ T9179] ? __fget_files+0x184/0x1c0 [ 151.828677][ T9179] ksys_write+0xda/0x1a0 [ 151.828708][ T9179] __x64_sys_write+0x40/0x50 [ 151.828738][ T9179] x64_sys_call+0x2802/0x3000 [ 151.828807][ T9179] do_syscall_64+0xd2/0x200 [ 151.828930][ T9179] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 151.829031][ T9179] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 151.829059][ T9179] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.829092][ T9179] RIP: 0033:0x7efdfa7cd97f [ 151.829111][ T9179] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 151.829212][ T9179] RSP: 002b:00007efdf9237030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 151.829238][ T9179] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efdfa7cd97f [ 151.829331][ T9179] RDX: 0000000000000001 RSI: 00007efdf92370a0 RDI: 0000000000000003 [ 151.829347][ T9179] RBP: 00007efdf9237090 R08: 0000000000000000 R09: 0000000000000000 [ 151.829364][ T9179] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 151.829381][ T9179] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 151.829405][ T9179] [ 152.313731][ T9209] netdevsim netdevsim1: Direct firmware load for ./bus failed with error -2 [ 152.417386][ T9214] netlink: 'syz.1.2413': attribute type 4 has an invalid length. [ 152.654756][ T9230] FAULT_INJECTION: forcing a failure. [ 152.654756][ T9230] name failslab, interval 1, probability 0, space 0, times 0 [ 152.667984][ T9230] CPU: 1 UID: 0 PID: 9230 Comm: syz.1.2421 Not tainted syzkaller #0 PREEMPT(voluntary) [ 152.668011][ T9230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 152.668025][ T9230] Call Trace: [ 152.668083][ T9230] [ 152.668092][ T9230] __dump_stack+0x1d/0x30 [ 152.668119][ T9230] dump_stack_lvl+0xe8/0x140 [ 152.668145][ T9230] dump_stack+0x15/0x1b [ 152.668166][ T9230] should_fail_ex+0x265/0x280 [ 152.668284][ T9230] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 152.668383][ T9230] should_failslab+0x8c/0xb0 [ 152.668425][ T9230] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 152.668496][ T9230] ? shmem_alloc_inode+0x34/0x50 [ 152.668521][ T9230] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 152.668540][ T9230] shmem_alloc_inode+0x34/0x50 [ 152.668561][ T9230] alloc_inode+0x40/0x170 [ 152.668590][ T9230] new_inode+0x1d/0xe0 [ 152.668693][ T9230] shmem_get_inode+0x244/0x750 [ 152.668714][ T9230] __shmem_file_setup+0x113/0x210 [ 152.668746][ T9230] shmem_file_setup+0x3b/0x50 [ 152.668786][ T9230] __se_sys_memfd_create+0x2c3/0x590 [ 152.668817][ T9230] __x64_sys_memfd_create+0x31/0x40 [ 152.668842][ T9230] x64_sys_call+0x2ac2/0x3000 [ 152.668863][ T9230] do_syscall_64+0xd2/0x200 [ 152.668943][ T9230] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 152.668978][ T9230] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 152.669003][ T9230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.669094][ T9230] RIP: 0033:0x7faeaf01eec9 [ 152.669110][ T9230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.669142][ T9230] RSP: 002b:00007faeada86e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 152.669166][ T9230] RAX: ffffffffffffffda RBX: 00000000000004ea RCX: 00007faeaf01eec9 [ 152.669334][ T9230] RDX: 00007faeada86ef0 RSI: 0000000000000000 RDI: 00007faeaf0a2960 [ 152.669360][ T9230] RBP: 00002000000009c0 R08: 00007faeada86bb7 R09: 00007faeada86e40 [ 152.669403][ T9230] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 152.669418][ T9230] R13: 00007faeada86ef0 R14: 00007faeada86eb0 R15: 0000200000000900 [ 152.669441][ T9230] [ 152.969683][ T9239] FAULT_INJECTION: forcing a failure. [ 152.969683][ T9239] name failslab, interval 1, probability 0, space 0, times 0 [ 152.984396][ T9239] CPU: 0 UID: 0 PID: 9239 Comm: syz.1.2425 Not tainted syzkaller #0 PREEMPT(voluntary) [ 152.984453][ T9239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 152.984471][ T9239] Call Trace: [ 152.984489][ T9239] [ 152.984571][ T9239] __dump_stack+0x1d/0x30 [ 152.984601][ T9239] dump_stack_lvl+0xe8/0x140 [ 152.984623][ T9239] dump_stack+0x15/0x1b [ 152.984661][ T9239] should_fail_ex+0x265/0x280 [ 152.984709][ T9239] should_failslab+0x8c/0xb0 [ 152.984755][ T9239] kmem_cache_alloc_noprof+0x50/0x480 [ 152.984795][ T9239] ? fcntl_setlk+0x53/0x950 [ 152.984895][ T9239] fcntl_setlk+0x53/0x950 [ 152.984940][ T9239] ? should_fail_ex+0xdb/0x280 [ 152.984988][ T9239] do_fcntl+0x5dd/0xdf0 [ 152.985061][ T9239] ? selinux_file_fcntl+0x1cb/0x1e0 [ 152.985097][ T9239] __se_sys_fcntl+0xb1/0x120 [ 152.985142][ T9239] __x64_sys_fcntl+0x43/0x50 [ 152.985187][ T9239] x64_sys_call+0x29a4/0x3000 [ 152.985278][ T9239] do_syscall_64+0xd2/0x200 [ 152.985311][ T9239] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 152.985353][ T9239] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 152.985384][ T9239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.985475][ T9239] RIP: 0033:0x7faeaf01eec9 [ 152.985493][ T9239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.985514][ T9239] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 152.985536][ T9239] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 152.985627][ T9239] RDX: 0000200000000080 RSI: 0000000000000026 RDI: 0000000000000003 [ 152.985641][ T9239] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 152.985654][ T9239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.985670][ T9239] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 152.985696][ T9239] [ 153.322180][ T9251] FAULT_INJECTION: forcing a failure. [ 153.322180][ T9251] name failslab, interval 1, probability 0, space 0, times 0 [ 153.335265][ T9251] CPU: 0 UID: 0 PID: 9251 Comm: syz.2.2429 Not tainted syzkaller #0 PREEMPT(voluntary) [ 153.335302][ T9251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 153.335319][ T9251] Call Trace: [ 153.335328][ T9251] [ 153.335338][ T9251] __dump_stack+0x1d/0x30 [ 153.335441][ T9251] dump_stack_lvl+0xe8/0x140 [ 153.335467][ T9251] dump_stack+0x15/0x1b [ 153.335486][ T9251] should_fail_ex+0x265/0x280 [ 153.335519][ T9251] should_failslab+0x8c/0xb0 [ 153.335608][ T9251] kmem_cache_alloc_noprof+0x50/0x480 [ 153.335644][ T9251] ? getname_flags+0x80/0x3b0 [ 153.335747][ T9251] getname_flags+0x80/0x3b0 [ 153.335777][ T9251] user_path_at+0x28/0x130 [ 153.335809][ T9251] __se_sys_mount+0x25b/0x2e0 [ 153.335833][ T9251] ? fput+0x8f/0xc0 [ 153.335924][ T9251] __x64_sys_mount+0x67/0x80 [ 153.335983][ T9251] x64_sys_call+0x2b51/0x3000 [ 153.336074][ T9251] do_syscall_64+0xd2/0x200 [ 153.336099][ T9251] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 153.336144][ T9251] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 153.336172][ T9251] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.336194][ T9251] RIP: 0033:0x7f8d68f2eec9 [ 153.336209][ T9251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.336288][ T9251] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 153.336308][ T9251] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 153.336326][ T9251] RDX: 0000200000000180 RSI: 0000200000000000 RDI: 0000000000000000 [ 153.336343][ T9251] RBP: 00007f8d6798f090 R08: 0000200000000340 R09: 0000000000000000 [ 153.336360][ T9251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.336377][ T9251] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 153.336400][ T9251] [ 153.568641][ T9253] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2430'. [ 153.580521][ T9253] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2430'. [ 154.025923][ T9286] lo speed is unknown, defaulting to 1000 [ 154.219587][ T9307] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9307 comm=syz.1.2451 [ 154.264753][ T9313] netlink: 44 bytes leftover after parsing attributes in process `syz.1.2454'. [ 154.327720][ T9319] netlink: 'syz.0.2457': attribute type 13 has an invalid length. [ 154.336426][ T9319] netlink: 'syz.0.2457': attribute type 17 has an invalid length. [ 154.392024][ T9319] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.405295][ T9319] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 154.518214][ T9338] netlink: 'syz.1.2464': attribute type 4 has an invalid length. [ 154.529877][ T9338] netlink: 'syz.1.2464': attribute type 4 has an invalid length. [ 154.552139][ T9341] FAULT_INJECTION: forcing a failure. [ 154.552139][ T9341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.567472][ T9341] CPU: 0 UID: 0 PID: 9341 Comm: syz.0.2465 Not tainted syzkaller #0 PREEMPT(voluntary) [ 154.567507][ T9341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 154.567521][ T9341] Call Trace: [ 154.567528][ T9341] [ 154.567536][ T9341] __dump_stack+0x1d/0x30 [ 154.567604][ T9341] dump_stack_lvl+0xe8/0x140 [ 154.567624][ T9341] dump_stack+0x15/0x1b [ 154.567641][ T9341] should_fail_ex+0x265/0x280 [ 154.567677][ T9341] should_fail+0xb/0x20 [ 154.567757][ T9341] should_fail_usercopy+0x1a/0x20 [ 154.567799][ T9341] _copy_from_user+0x1c/0xb0 [ 154.567825][ T9341] set_selection_user+0x4a/0xe0 [ 154.567863][ T9341] tioclinux+0x347/0x460 [ 154.567885][ T9341] vt_ioctl+0x75f/0x18a0 [ 154.567904][ T9341] ? tty_jobctrl_ioctl+0x29e/0x810 [ 154.567937][ T9341] tty_ioctl+0x7d8/0xb80 [ 154.567985][ T9341] ? __pfx_tty_ioctl+0x10/0x10 [ 154.568008][ T9341] __se_sys_ioctl+0xcb/0x140 [ 154.568045][ T9341] __x64_sys_ioctl+0x43/0x50 [ 154.568079][ T9341] x64_sys_call+0x1816/0x3000 [ 154.568131][ T9341] do_syscall_64+0xd2/0x200 [ 154.568156][ T9341] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 154.568185][ T9341] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 154.568210][ T9341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.568233][ T9341] RIP: 0033:0x7f023e20eec9 [ 154.568249][ T9341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.568269][ T9341] RSP: 002b:00007f023cc77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.568289][ T9341] RAX: ffffffffffffffda RBX: 00007f023e465fa0 RCX: 00007f023e20eec9 [ 154.568302][ T9341] RDX: 0000200000000100 RSI: 000000000000541c RDI: 0000000000000006 [ 154.568315][ T9341] RBP: 00007f023cc77090 R08: 0000000000000000 R09: 0000000000000000 [ 154.568337][ T9341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.568351][ T9341] R13: 00007f023e466038 R14: 00007f023e465fa0 R15: 00007fffe3bda4b8 [ 154.568370][ T9341] [ 154.848190][ T9352] netlink: 'syz.4.2470': attribute type 5 has an invalid length. [ 154.856997][ T9352] netlink: 168 bytes leftover after parsing attributes in process `syz.4.2470'. [ 154.994566][ T9375] FAULT_INJECTION: forcing a failure. [ 154.994566][ T9375] name failslab, interval 1, probability 0, space 0, times 0 [ 154.994601][ T9375] CPU: 0 UID: 0 PID: 9375 Comm: syz.1.2481 Not tainted syzkaller #0 PREEMPT(voluntary) [ 154.994633][ T9375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 154.994648][ T9375] Call Trace: [ 154.994656][ T9375] [ 154.994703][ T9375] __dump_stack+0x1d/0x30 [ 154.994732][ T9375] dump_stack_lvl+0xe8/0x140 [ 154.994761][ T9375] dump_stack+0x15/0x1b [ 154.994819][ T9375] should_fail_ex+0x265/0x280 [ 154.994862][ T9375] should_failslab+0x8c/0xb0 [ 154.994901][ T9375] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 154.994945][ T9375] ? sidtab_sid2str_get+0xa0/0x130 [ 154.995051][ T9375] kmemdup_noprof+0x2b/0x70 [ 154.995149][ T9375] sidtab_sid2str_get+0xa0/0x130 [ 154.995187][ T9375] security_sid_to_context_core+0x1eb/0x2e0 [ 154.995288][ T9375] security_sid_to_context+0x27/0x40 [ 154.995325][ T9375] avc_audit_post_callback+0x9d/0x520 [ 154.995371][ T9375] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 154.995492][ T9375] common_lsm_audit+0x1bb/0x230 [ 154.995522][ T9375] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 154.995717][ T9375] slow_avc_audit+0x104/0x140 [ 154.995763][ T9375] audit_inode_permission+0x111/0x150 [ 154.995847][ T9375] selinux_inode_permission+0x69b/0x740 [ 154.995889][ T9375] security_inode_permission+0x6d/0xb0 [ 154.995920][ T9375] inode_permission+0x106/0x310 [ 154.996081][ T9375] ? may_open+0x243/0x350 [ 154.996104][ T9375] may_open+0x255/0x350 [ 154.996130][ T9375] path_openat+0x1b4a/0x2170 [ 154.996159][ T9375] ? mntput+0x4b/0x80 [ 154.996202][ T9375] ? terminate_walk+0x27f/0x2a0 [ 154.996295][ T9375] do_filp_open+0x109/0x230 [ 154.996330][ T9375] do_open_execat+0xd8/0x260 [ 154.996358][ T9375] alloc_bprm+0x25/0x350 [ 154.996387][ T9375] do_execveat_common+0x12e/0x750 [ 154.996464][ T9375] ? getname_flags+0x154/0x3b0 [ 154.996623][ T9375] __x64_sys_execveat+0x73/0x90 [ 154.996654][ T9375] x64_sys_call+0x1fec/0x3000 [ 154.996741][ T9375] do_syscall_64+0xd2/0x200 [ 154.996775][ T9375] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 154.996813][ T9375] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 154.996842][ T9375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.996880][ T9375] RIP: 0033:0x7faeaf01eec9 [ 154.996901][ T9375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.996979][ T9375] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 154.997006][ T9375] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 154.997025][ T9375] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 154.997041][ T9375] RBP: 00007faeada87090 R08: 0000000000001000 R09: 0000000000000000 [ 154.997058][ T9375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.997076][ T9375] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 154.997151][ T9375] [ 155.163219][ T9383] sock: sock_timestamping_bind_phc: sock not bind to device [ 155.223688][ T9389] FAULT_INJECTION: forcing a failure. [ 155.223688][ T9389] name failslab, interval 1, probability 0, space 0, times 0 [ 155.344488][ T9389] CPU: 1 UID: 0 PID: 9389 Comm: syz.1.2485 Not tainted syzkaller #0 PREEMPT(voluntary) [ 155.344526][ T9389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 155.344552][ T9389] Call Trace: [ 155.344562][ T9389] [ 155.344620][ T9389] __dump_stack+0x1d/0x30 [ 155.344652][ T9389] dump_stack_lvl+0xe8/0x140 [ 155.344680][ T9389] dump_stack+0x15/0x1b [ 155.344760][ T9389] should_fail_ex+0x265/0x280 [ 155.344813][ T9389] should_failslab+0x8c/0xb0 [ 155.344852][ T9389] kmem_cache_alloc_noprof+0x50/0x480 [ 155.344967][ T9389] ? alloc_empty_file+0x76/0x200 [ 155.345015][ T9389] alloc_empty_file+0x76/0x200 [ 155.345130][ T9389] path_openat+0x68/0x2170 [ 155.345151][ T9389] ? _parse_integer_limit+0x170/0x190 [ 155.345185][ T9389] ? _parse_integer+0x27/0x40 [ 155.345256][ T9389] ? kstrtoull+0x111/0x140 [ 155.345377][ T9389] ? kstrtouint+0x76/0xc0 [ 155.345425][ T9389] do_filp_open+0x109/0x230 [ 155.345507][ T9389] do_sys_openat2+0xa6/0x110 [ 155.345546][ T9389] __x64_sys_open+0xe6/0x110 [ 155.345604][ T9389] x64_sys_call+0x1457/0x3000 [ 155.345634][ T9389] do_syscall_64+0xd2/0x200 [ 155.345732][ T9389] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 155.345771][ T9389] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 155.345800][ T9389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.345854][ T9389] RIP: 0033:0x7faeaf01eec9 [ 155.345877][ T9389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.345902][ T9389] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 155.345929][ T9389] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 155.345974][ T9389] RDX: 0000000000000000 RSI: 0000000000060840 RDI: 00002000009e1000 [ 155.345992][ T9389] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 155.346009][ T9389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.346027][ T9389] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 155.346084][ T9389] [ 155.616755][ T9399] FAULT_INJECTION: forcing a failure. [ 155.616755][ T9399] name failslab, interval 1, probability 0, space 0, times 0 [ 155.616791][ T9399] CPU: 0 UID: 0 PID: 9399 Comm: syz.4.2489 Not tainted syzkaller #0 PREEMPT(voluntary) [ 155.616823][ T9399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 155.616837][ T9399] Call Trace: [ 155.616843][ T9399] [ 155.616918][ T9399] __dump_stack+0x1d/0x30 [ 155.617001][ T9399] dump_stack_lvl+0xe8/0x140 [ 155.617023][ T9399] dump_stack+0x15/0x1b [ 155.617126][ T9399] should_fail_ex+0x265/0x280 [ 155.617162][ T9399] ? bpf_prog_create_from_user+0x16b/0x260 [ 155.617192][ T9399] should_failslab+0x8c/0xb0 [ 155.617282][ T9399] __kmalloc_cache_noprof+0x4c/0x4a0 [ 155.617321][ T9399] bpf_prog_create_from_user+0x16b/0x260 [ 155.617421][ T9399] ? __pfx_seccomp_check_filter+0x10/0x10 [ 155.617451][ T9399] do_seccomp+0x5ef/0xa40 [ 155.617530][ T9399] ? fput+0x8f/0xc0 [ 155.617568][ T9399] ? ksys_write+0x192/0x1a0 [ 155.617674][ T9399] __x64_sys_seccomp+0x40/0x50 [ 155.617748][ T9399] x64_sys_call+0x2ad8/0x3000 [ 155.617787][ T9399] do_syscall_64+0xd2/0x200 [ 155.617830][ T9399] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 155.617918][ T9399] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 155.617956][ T9399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.618031][ T9399] RIP: 0033:0x7efdfa7ceec9 [ 155.618047][ T9399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.618151][ T9399] RSP: 002b:00007efdf9237038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 155.618175][ T9399] RAX: ffffffffffffffda RBX: 00007efdfaa25fa0 RCX: 00007efdfa7ceec9 [ 155.618191][ T9399] RDX: 0000200000002140 RSI: 000000000000000c RDI: 0000000000000001 [ 155.618206][ T9399] RBP: 00007efdf9237090 R08: 0000000000000000 R09: 0000000000000000 [ 155.618267][ T9399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.618386][ T9399] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 155.618411][ T9399] [ 155.713850][ T9406] FAULT_INJECTION: forcing a failure. [ 155.713850][ T9406] name failslab, interval 1, probability 0, space 0, times 0 [ 155.713887][ T9406] CPU: 1 UID: 0 PID: 9406 Comm: syz.4.2491 Not tainted syzkaller #0 PREEMPT(voluntary) [ 155.713918][ T9406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 155.713931][ T9406] Call Trace: [ 155.713938][ T9406] [ 155.713946][ T9406] __dump_stack+0x1d/0x30 [ 155.713967][ T9406] dump_stack_lvl+0xe8/0x140 [ 155.713992][ T9406] dump_stack+0x15/0x1b [ 155.714013][ T9406] should_fail_ex+0x265/0x280 [ 155.714049][ T9406] should_failslab+0x8c/0xb0 [ 155.714075][ T9406] kmem_cache_alloc_noprof+0x50/0x480 [ 155.714102][ T9406] ? mas_alloc_nodes+0x1a2/0x210 [ 155.714132][ T9406] mas_alloc_nodes+0x1a2/0x210 [ 155.714160][ T9406] mas_preallocate+0x2ca/0x510 [ 155.714193][ T9406] commit_merge+0x3a5/0x730 [ 155.714222][ T9406] vma_modify+0xad7/0xc80 [ 155.714250][ T9406] vma_modify_policy+0x101/0x130 [ 155.714277][ T9406] mbind_range+0x1b8/0x440 [ 155.714298][ T9406] ? mas_find+0x5d5/0x700 [ 155.714321][ T9406] __se_sys_mbind+0x648/0xac0 [ 155.714368][ T9406] __x64_sys_mbind+0x78/0x90 [ 155.714407][ T9406] x64_sys_call+0x2936/0x3000 [ 155.714434][ T9406] do_syscall_64+0xd2/0x200 [ 155.714463][ T9406] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 155.714508][ T9406] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 155.714529][ T9406] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.714552][ T9406] RIP: 0033:0x7efdfa7ceec9 [ 155.714571][ T9406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.714594][ T9406] RSP: 002b:00007efdf9237038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 155.714618][ T9406] RAX: ffffffffffffffda RBX: 00007efdfaa25fa0 RCX: 00007efdfa7ceec9 [ 155.714632][ T9406] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000001000 [ 155.714646][ T9406] RBP: 00007efdf9237090 R08: 0000000000000000 R09: 0000000000000000 [ 155.714660][ T9406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.714672][ T9406] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 155.714689][ T9406] [ 155.984965][ T9426] FAULT_INJECTION: forcing a failure. [ 155.984965][ T9426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.077886][ T9435] FAULT_INJECTION: forcing a failure. [ 156.077886][ T9435] name failslab, interval 1, probability 0, space 0, times 0 [ 156.082517][ T9426] CPU: 1 UID: 0 PID: 9426 Comm: syz.1.2500 Not tainted syzkaller #0 PREEMPT(voluntary) [ 156.082544][ T9426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.082561][ T9426] Call Trace: [ 156.082568][ T9426] [ 156.082585][ T9426] __dump_stack+0x1d/0x30 [ 156.082615][ T9426] dump_stack_lvl+0xe8/0x140 [ 156.082644][ T9426] dump_stack+0x15/0x1b [ 156.082669][ T9426] should_fail_ex+0x265/0x280 [ 156.082718][ T9426] should_fail+0xb/0x20 [ 156.082840][ T9426] should_fail_usercopy+0x1a/0x20 [ 156.082868][ T9426] strncpy_from_user+0x25/0x230 [ 156.082909][ T9426] ? kmem_cache_alloc_noprof+0x242/0x480 [ 156.083039][ T9426] ? getname_flags+0x80/0x3b0 [ 156.083081][ T9426] getname_flags+0xae/0x3b0 [ 156.083235][ T9426] __se_sys_newstat+0x4b/0x280 [ 156.083286][ T9426] ? fput+0x8f/0xc0 [ 156.083328][ T9426] ? ksys_write+0x192/0x1a0 [ 156.083417][ T9426] __x64_sys_newstat+0x31/0x40 [ 156.083468][ T9426] x64_sys_call+0x73e/0x3000 [ 156.083499][ T9426] do_syscall_64+0xd2/0x200 [ 156.083531][ T9426] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.083584][ T9426] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 156.083682][ T9426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.083712][ T9426] RIP: 0033:0x7faeaf01eec9 [ 156.083733][ T9426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.083759][ T9426] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 156.083828][ T9426] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 156.083846][ T9426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000004c0 [ 156.083864][ T9426] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 156.083882][ T9426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.083929][ T9426] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 156.083955][ T9426] [ 156.266129][ T9441] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2506'. [ 156.271091][ T9435] CPU: 0 UID: 0 PID: 9435 Comm: syz.4.2504 Not tainted syzkaller #0 PREEMPT(voluntary) [ 156.271301][ T9435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.271319][ T9435] Call Trace: [ 156.271327][ T9435] [ 156.271336][ T9435] __dump_stack+0x1d/0x30 [ 156.271365][ T9435] dump_stack_lvl+0xe8/0x140 [ 156.271389][ T9435] dump_stack+0x15/0x1b [ 156.271410][ T9435] should_fail_ex+0x265/0x280 [ 156.271466][ T9435] should_failslab+0x8c/0xb0 [ 156.271509][ T9435] __kvmalloc_node_noprof+0x12e/0x670 [ 156.271558][ T9435] ? vmemdup_user+0x2b/0xd0 [ 156.271588][ T9435] ? should_fail_usercopy+0x1a/0x20 [ 156.271614][ T9435] vmemdup_user+0x2b/0xd0 [ 156.271645][ T9435] path_setxattrat+0x1b6/0x310 [ 156.271747][ T9435] __x64_sys_lsetxattr+0x71/0x90 [ 156.271780][ T9435] x64_sys_call+0x287b/0x3000 [ 156.271872][ T9435] do_syscall_64+0xd2/0x200 [ 156.271896][ T9435] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.271922][ T9435] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 156.272019][ T9435] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.272051][ T9435] RIP: 0033:0x7efdfa7ceec9 [ 156.272074][ T9435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.272181][ T9435] RSP: 002b:00007efdf9237038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 156.272209][ T9435] RAX: ffffffffffffffda RBX: 00007efdfaa25fa0 RCX: 00007efdfa7ceec9 [ 156.272227][ T9435] RDX: 0000200000000980 RSI: 0000200000000940 RDI: 0000200000000900 [ 156.272244][ T9435] RBP: 00007efdf9237090 R08: 0000000000000000 R09: 0000000000000000 [ 156.272260][ T9435] R10: 000000000000000f R11: 0000000000000246 R12: 0000000000000001 [ 156.272356][ T9435] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 156.272382][ T9435] [ 156.432529][ T9450] FAULT_INJECTION: forcing a failure. [ 156.432529][ T9450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.574989][ T29] kauditd_printk_skb: 1190 callbacks suppressed [ 156.575009][ T29] audit: type=1400 audit(1760049896.356:17213): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.575604][ T9450] CPU: 0 UID: 0 PID: 9450 Comm: syz.1.2510 Not tainted syzkaller #0 PREEMPT(voluntary) [ 156.575641][ T9450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.575660][ T9450] Call Trace: [ 156.575672][ T9450] [ 156.575683][ T9450] __dump_stack+0x1d/0x30 [ 156.575713][ T9450] dump_stack_lvl+0xe8/0x140 [ 156.575809][ T9450] dump_stack+0x15/0x1b [ 156.575825][ T9450] should_fail_ex+0x265/0x280 [ 156.575860][ T9450] should_fail+0xb/0x20 [ 156.575932][ T9450] should_fail_usercopy+0x1a/0x20 [ 156.575961][ T9450] _copy_from_user+0x1c/0xb0 [ 156.575996][ T9450] io_submit_one+0x52/0x11d0 [ 156.576046][ T9450] __se_sys_io_submit+0xfb/0x280 [ 156.576123][ T9450] __x64_sys_io_submit+0x43/0x50 [ 156.576170][ T9450] x64_sys_call+0x2d6c/0x3000 [ 156.576202][ T9450] do_syscall_64+0xd2/0x200 [ 156.576261][ T9450] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.576300][ T9450] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 156.576330][ T9450] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.576362][ T9450] RIP: 0033:0x7faeaf01eec9 [ 156.576383][ T9450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.576472][ T9450] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 156.576499][ T9450] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 156.576538][ T9450] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007faeafdb0000 [ 156.576556][ T9450] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 156.576574][ T9450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.576591][ T9450] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 156.576692][ T9450] [ 156.850816][ T29] audit: type=1400 audit(1760049896.376:17214): avc: denied { read } for pid=9454 comm="syz.4.2512" dev="nsfs" ino=4026532712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 156.851762][ T29] audit: type=1400 audit(1760049896.376:17215): avc: denied { map_create } for pid=9454 comm="syz.4.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.851795][ T29] audit: type=1400 audit(1760049896.376:17216): avc: denied { prog_load } for pid=9454 comm="syz.4.2512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.874979][ T29] audit: type=1400 audit(1760049896.636:17217): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.896966][ T29] audit: type=1400 audit(1760049896.666:17218): avc: denied { prog_load } for pid=9456 comm="syz.3.2513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.897006][ T29] audit: type=1326 audit(1760049896.666:17219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9456 comm="syz.3.2513" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 156.897040][ T29] audit: type=1326 audit(1760049896.666:17220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9456 comm="syz.3.2513" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 156.897094][ T29] audit: type=1326 audit(1760049896.666:17221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9456 comm="syz.3.2513" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 156.897129][ T29] audit: type=1326 audit(1760049896.666:17222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9456 comm="syz.3.2513" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f7c0ba8eec9 code=0x7ffc0000 [ 156.967827][ T9465] FAULT_INJECTION: forcing a failure. [ 156.967827][ T9465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.967860][ T9465] CPU: 0 UID: 0 PID: 9465 Comm: syz.4.2516 Not tainted syzkaller #0 PREEMPT(voluntary) [ 156.967928][ T9465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.967946][ T9465] Call Trace: [ 156.967955][ T9465] [ 156.967965][ T9465] __dump_stack+0x1d/0x30 [ 156.967991][ T9465] dump_stack_lvl+0xe8/0x140 [ 156.968013][ T9465] dump_stack+0x15/0x1b [ 156.968029][ T9465] should_fail_ex+0x265/0x280 [ 156.968112][ T9465] should_fail+0xb/0x20 [ 156.968228][ T9465] should_fail_usercopy+0x1a/0x20 [ 156.968249][ T9465] strncpy_from_user+0x25/0x230 [ 156.968285][ T9465] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 156.968326][ T9465] __se_sys_memfd_create+0x1ff/0x590 [ 156.968405][ T9465] __x64_sys_memfd_create+0x31/0x40 [ 156.968433][ T9465] x64_sys_call+0x2ac2/0x3000 [ 156.968458][ T9465] do_syscall_64+0xd2/0x200 [ 156.968482][ T9465] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.968540][ T9465] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 156.968560][ T9465] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.968582][ T9465] RIP: 0033:0x7efdfa7ceec9 [ 156.968596][ T9465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.968615][ T9465] RSP: 002b:00007efdf9236e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 156.968651][ T9465] RAX: ffffffffffffffda RBX: 0000000000000519 RCX: 00007efdfa7ceec9 [ 156.968668][ T9465] RDX: 00007efdf9236ef0 RSI: 0000000000000000 RDI: 00007efdfa852960 [ 156.968682][ T9465] RBP: 00002000000009c0 R08: 00007efdf9236bb7 R09: 00007efdf9236e40 [ 156.968693][ T9465] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000980 [ 156.968709][ T9465] R13: 00007efdf9236ef0 R14: 00007efdf9236eb0 R15: 0000200000000240 [ 156.968732][ T9465] [ 157.038528][ T9475] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2519'. [ 157.109611][ T9476] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2519'. [ 157.386157][ T9483] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.2521'. [ 157.458315][ T9497] FAULT_INJECTION: forcing a failure. [ 157.458315][ T9497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.471764][ T9497] CPU: 0 UID: 0 PID: 9497 Comm: syz.4.2528 Not tainted syzkaller #0 PREEMPT(voluntary) [ 157.471848][ T9497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 157.471865][ T9497] Call Trace: [ 157.471873][ T9497] [ 157.471883][ T9497] __dump_stack+0x1d/0x30 [ 157.471970][ T9497] dump_stack_lvl+0xe8/0x140 [ 157.471990][ T9497] dump_stack+0x15/0x1b [ 157.472009][ T9497] should_fail_ex+0x265/0x280 [ 157.472093][ T9497] should_fail+0xb/0x20 [ 157.472139][ T9497] should_fail_usercopy+0x1a/0x20 [ 157.472204][ T9497] strncpy_from_user+0x25/0x230 [ 157.472239][ T9497] ? kmem_cache_alloc_noprof+0x242/0x480 [ 157.472272][ T9497] ? getname_flags+0x80/0x3b0 [ 157.472364][ T9497] getname_flags+0xae/0x3b0 [ 157.472401][ T9497] __x64_sys_mknodat+0x4f/0x70 [ 157.472427][ T9497] x64_sys_call+0x2ed7/0x3000 [ 157.472449][ T9497] do_syscall_64+0xd2/0x200 [ 157.472472][ T9497] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 157.472503][ T9497] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 157.472532][ T9497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.472561][ T9497] RIP: 0033:0x7efdfa7ceec9 [ 157.472581][ T9497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.472677][ T9497] RSP: 002b:00007efdf9237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 157.472700][ T9497] RAX: ffffffffffffffda RBX: 00007efdfaa25fa0 RCX: 00007efdfa7ceec9 [ 157.472717][ T9497] RDX: 00000000000021c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 157.472733][ T9497] RBP: 00007efdf9237090 R08: 0000000000000000 R09: 0000000000000000 [ 157.472750][ T9497] R10: 0000000000000103 R11: 0000000000000246 R12: 0000000000000001 [ 157.472796][ T9497] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 157.472819][ T9497] [ 157.718041][ T9506] macvtap1: entered promiscuous mode [ 157.725141][ T9506] syz_tun: entered promiscuous mode [ 157.732911][ T9506] syz_tun: left promiscuous mode [ 157.861734][ T9516] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2535'. [ 157.924684][ T9519] netlink: 44 bytes leftover after parsing attributes in process `syz.2.2536'. [ 158.023248][ T9530] FAULT_INJECTION: forcing a failure. [ 158.023248][ T9530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.036663][ T9530] CPU: 0 UID: 0 PID: 9530 Comm: syz.2.2540 Not tainted syzkaller #0 PREEMPT(voluntary) [ 158.036746][ T9530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 158.036763][ T9530] Call Trace: [ 158.036771][ T9530] [ 158.036807][ T9530] __dump_stack+0x1d/0x30 [ 158.036901][ T9530] dump_stack_lvl+0xe8/0x140 [ 158.036936][ T9530] dump_stack+0x15/0x1b [ 158.036971][ T9530] should_fail_ex+0x265/0x280 [ 158.037005][ T9530] should_fail+0xb/0x20 [ 158.037045][ T9530] should_fail_usercopy+0x1a/0x20 [ 158.037132][ T9530] _copy_from_iter+0xd2/0xe80 [ 158.037179][ T9530] ? alloc_pages_mpol+0x217/0x260 [ 158.037224][ T9530] copy_page_from_iter+0x178/0x2a0 [ 158.037258][ T9530] tun_get_user+0x679/0x26e0 [ 158.037361][ T9530] ? ref_tracker_alloc+0x1f2/0x2f0 [ 158.037456][ T9530] tun_chr_write_iter+0x15e/0x210 [ 158.037492][ T9530] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 158.037521][ T9530] vfs_write+0x52a/0x960 [ 158.037620][ T9530] ksys_write+0xda/0x1a0 [ 158.037643][ T9530] __x64_sys_write+0x40/0x50 [ 158.037671][ T9530] x64_sys_call+0x2802/0x3000 [ 158.037763][ T9530] do_syscall_64+0xd2/0x200 [ 158.037861][ T9530] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 158.037892][ T9530] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 158.037914][ T9530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 158.037937][ T9530] RIP: 0033:0x7f8d68f2d97f [ 158.037958][ T9530] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 158.038026][ T9530] RSP: 002b:00007f8d6798f000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 158.038052][ T9530] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2d97f [ 158.038141][ T9530] RDX: 000000000000004a RSI: 0000200000000300 RDI: 00000000000000c8 [ 158.038155][ T9530] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 158.038168][ T9530] R10: 000000000000004a R11: 0000000000000293 R12: 0000000000000001 [ 158.038184][ T9530] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 158.038206][ T9530] [ 158.320458][ T9536] lo speed is unknown, defaulting to 1000 [ 158.328732][ T9537] FAULT_INJECTION: forcing a failure. [ 158.328732][ T9537] name failslab, interval 1, probability 0, space 0, times 0 [ 158.341662][ T9537] CPU: 0 UID: 0 PID: 9537 Comm: syz.2.2543 Not tainted syzkaller #0 PREEMPT(voluntary) [ 158.341689][ T9537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 158.341776][ T9537] Call Trace: [ 158.341784][ T9537] [ 158.341793][ T9537] __dump_stack+0x1d/0x30 [ 158.341815][ T9537] dump_stack_lvl+0xe8/0x140 [ 158.341835][ T9537] dump_stack+0x15/0x1b [ 158.341857][ T9537] should_fail_ex+0x265/0x280 [ 158.341905][ T9537] ? alloc_pipe_info+0xae/0x350 [ 158.341950][ T9537] should_failslab+0x8c/0xb0 [ 158.341985][ T9537] __kmalloc_cache_noprof+0x4c/0x4a0 [ 158.342077][ T9537] alloc_pipe_info+0xae/0x350 [ 158.342109][ T9537] splice_direct_to_actor+0x592/0x680 [ 158.342150][ T9537] ? kstrtouint_from_user+0x9f/0xf0 [ 158.342191][ T9537] ? __pfx_direct_splice_actor+0x10/0x10 [ 158.342211][ T9537] ? __rcu_read_unlock+0x4f/0x70 [ 158.342323][ T9537] ? get_pid_task+0x96/0xd0 [ 158.342379][ T9537] ? avc_policy_seqno+0x15/0x30 [ 158.342556][ T9537] ? selinux_file_permission+0x1e4/0x320 [ 158.342587][ T9537] do_splice_direct+0xda/0x150 [ 158.342606][ T9537] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 158.342640][ T9537] do_sendfile+0x380/0x650 [ 158.342726][ T9537] __x64_sys_sendfile64+0x105/0x150 [ 158.342756][ T9537] x64_sys_call+0x2bb4/0x3000 [ 158.342777][ T9537] do_syscall_64+0xd2/0x200 [ 158.342859][ T9537] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 158.342894][ T9537] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 158.342921][ T9537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 158.343003][ T9537] RIP: 0033:0x7f8d68f2eec9 [ 158.343025][ T9537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.343051][ T9537] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 158.343145][ T9537] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 158.343161][ T9537] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 158.343225][ T9537] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 158.343247][ T9537] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 158.343263][ T9537] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 158.343353][ T9537] [ 158.595935][ T9540] netlink: 68 bytes leftover after parsing attributes in process `syz.1.2544'. [ 158.656992][ T9546] FAULT_INJECTION: forcing a failure. [ 158.656992][ T9546] name failslab, interval 1, probability 0, space 0, times 0 [ 158.670628][ T9546] CPU: 0 UID: 0 PID: 9546 Comm: syz.3.2542 Not tainted syzkaller #0 PREEMPT(voluntary) [ 158.670665][ T9546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 158.670683][ T9546] Call Trace: [ 158.670692][ T9546] [ 158.670700][ T9546] __dump_stack+0x1d/0x30 [ 158.670750][ T9546] dump_stack_lvl+0xe8/0x140 [ 158.670769][ T9546] dump_stack+0x15/0x1b [ 158.670790][ T9546] should_fail_ex+0x265/0x280 [ 158.670833][ T9546] should_failslab+0x8c/0xb0 [ 158.670899][ T9546] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 158.670933][ T9546] ? __alloc_skb+0x101/0x320 [ 158.670967][ T9546] __alloc_skb+0x101/0x320 [ 158.670998][ T9546] rtmsg_ifinfo_build_skb+0x5f/0x1b0 [ 158.671120][ T9546] ? kvfree_call_rcu+0x389/0x430 [ 158.671157][ T9546] ? __pfx_rtnetlink_event+0x10/0x10 [ 158.671191][ T9546] rtnetlink_event+0x18c/0x200 [ 158.671267][ T9546] raw_notifier_call_chain+0x6f/0x1b0 [ 158.671297][ T9546] ? call_netdevice_notifiers_info+0x9c/0x100 [ 158.671392][ T9546] call_netdevice_notifiers_info+0xae/0x100 [ 158.671448][ T9546] __netdev_upper_dev_unlink+0x17f/0x760 [ 158.671510][ T9546] ? cred_has_capability+0x210/0x280 [ 158.671619][ T9546] netdev_upper_dev_unlink+0x1d/0x30 [ 158.671640][ T9546] unregister_vlan_dev+0x1f4/0x2b0 [ 158.671677][ T9546] vlan_ioctl_handler+0x226/0x4f0 [ 158.671774][ T9546] ? __pfx_vlan_ioctl_handler+0x10/0x10 [ 158.671802][ T9546] sock_ioctl+0x4a4/0x610 [ 158.671838][ T9546] ? __pfx_sock_ioctl+0x10/0x10 [ 158.671930][ T9546] __se_sys_ioctl+0xcb/0x140 [ 158.671964][ T9546] __x64_sys_ioctl+0x43/0x50 [ 158.672008][ T9546] x64_sys_call+0x1816/0x3000 [ 158.672030][ T9546] do_syscall_64+0xd2/0x200 [ 158.672060][ T9546] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 158.672096][ T9546] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 158.672127][ T9546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 158.672150][ T9546] RIP: 0033:0x7f7c0ba8eec9 [ 158.672237][ T9546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.672415][ T9546] RSP: 002b:00007f7c0a4d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.672438][ T9546] RAX: ffffffffffffffda RBX: 00007f7c0bce6090 RCX: 00007f7c0ba8eec9 [ 158.672504][ T9546] RDX: 0000200000002800 RSI: 0000000000008982 RDI: 0000000000000006 [ 158.672520][ T9546] RBP: 00007f7c0a4d6090 R08: 0000000000000000 R09: 0000000000000000 [ 158.672535][ T9546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 158.672549][ T9546] R13: 00007f7c0bce6128 R14: 00007f7c0bce6090 R15: 00007ffca2614898 [ 158.672567][ T9546] [ 158.948369][ T9548] FAULT_INJECTION: forcing a failure. [ 158.948369][ T9548] name failslab, interval 1, probability 0, space 0, times 0 [ 158.963268][ T9548] CPU: 1 UID: 0 PID: 9548 Comm: syz.1.2547 Not tainted syzkaller #0 PREEMPT(voluntary) [ 158.963378][ T9548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 158.963459][ T9548] Call Trace: [ 158.963465][ T9548] [ 158.963473][ T9548] __dump_stack+0x1d/0x30 [ 158.963495][ T9548] dump_stack_lvl+0xe8/0x140 [ 158.963514][ T9548] dump_stack+0x15/0x1b [ 158.963614][ T9548] should_fail_ex+0x265/0x280 [ 158.963712][ T9548] should_failslab+0x8c/0xb0 [ 158.963741][ T9548] __kmalloc_noprof+0xa5/0x570 [ 158.963769][ T9548] ? sock_kmalloc+0x85/0xc0 [ 158.963877][ T9548] sock_kmalloc+0x85/0xc0 [ 158.963910][ T9548] __ip_mc_join_group+0x1be/0x2b0 [ 158.963941][ T9548] ip_mc_join_group+0x1f/0x30 [ 158.963967][ T9548] ip_mcast_join_leave+0x132/0x180 [ 158.964081][ T9548] do_ip_setsockopt+0x18e0/0x2240 [ 158.964112][ T9548] ip_setsockopt+0x58/0x110 [ 158.964139][ T9548] udp_setsockopt+0x99/0xb0 [ 158.964240][ T9548] sock_common_setsockopt+0x69/0x80 [ 158.964260][ T9548] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 158.964285][ T9548] __sys_setsockopt+0x184/0x200 [ 158.964355][ T9548] __x64_sys_setsockopt+0x64/0x80 [ 158.964385][ T9548] x64_sys_call+0x20ec/0x3000 [ 158.964409][ T9548] do_syscall_64+0xd2/0x200 [ 158.964433][ T9548] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 158.964511][ T9548] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 158.964532][ T9548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 158.964553][ T9548] RIP: 0033:0x7faeaf01eec9 [ 158.964570][ T9548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.964608][ T9548] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 158.964644][ T9548] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 158.964657][ T9548] RDX: 000000000000002a RSI: 0000000000000000 RDI: 0000000000000004 [ 158.964669][ T9548] RBP: 00007faeada87090 R08: 0000000000000088 R09: 0000000000000000 [ 158.964683][ T9548] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 158.964774][ T9548] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 158.964793][ T9548] [ 158.968460][ T9552] lo speed is unknown, defaulting to 1000 [ 159.220837][ T9562] netlink: 'syz.4.2549': attribute type 5 has an invalid length. [ 159.229234][ T9562] netlink: 168 bytes leftover after parsing attributes in process `syz.4.2549'. [ 159.631914][ T9589] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2561'. [ 159.642074][ T9589] bridge_slave_1: left allmulticast mode [ 159.647979][ T9589] bridge_slave_1: left promiscuous mode [ 159.654962][ T9589] FAULT_INJECTION: forcing a failure. [ 159.654962][ T9589] name failslab, interval 1, probability 0, space 0, times 0 [ 159.668399][ T9589] CPU: 1 UID: 0 PID: 9589 Comm: syz.2.2561 Not tainted syzkaller #0 PREEMPT(voluntary) [ 159.668430][ T9589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 159.668453][ T9589] Call Trace: [ 159.668460][ T9589] [ 159.668467][ T9589] __dump_stack+0x1d/0x30 [ 159.668489][ T9589] dump_stack_lvl+0xe8/0x140 [ 159.668510][ T9589] dump_stack+0x15/0x1b [ 159.668532][ T9589] should_fail_ex+0x265/0x280 [ 159.668606][ T9589] ? __pfx_switchdev_port_attr_set_deferred+0x10/0x10 [ 159.668657][ T9589] should_failslab+0x8c/0xb0 [ 159.668763][ T9589] __kmalloc_noprof+0xa5/0x570 [ 159.668799][ T9589] ? switchdev_deferred_enqueue+0x2d/0x1c0 [ 159.668860][ T9589] ? __pfx_switchdev_port_attr_set_deferred+0x10/0x10 [ 159.668898][ T9589] switchdev_deferred_enqueue+0x2d/0x1c0 [ 159.668995][ T9589] switchdev_port_attr_set+0x6c/0xe0 [ 159.669023][ T9589] br_set_state+0x205/0x390 [ 159.669065][ T9589] ? _raw_spin_unlock_bh+0x36/0x40 [ 159.669112][ T9589] br_stp_disable_port+0x5d/0x150 [ 159.669220][ T9589] del_nbp+0xdc/0x790 [ 159.669257][ T9589] br_dev_delete+0x4e/0xe0 [ 159.669285][ T9589] ? __pfx_br_dev_delete+0x10/0x10 [ 159.669358][ T9589] rtnl_dellink+0x3ba/0x550 [ 159.669487][ T9589] ? selinux_capable+0x31/0x40 [ 159.669560][ T9589] ? security_capable+0x83/0x90 [ 159.669590][ T9589] ? ns_capable+0x7d/0xb0 [ 159.669617][ T9589] ? __pfx_rtnl_dellink+0x10/0x10 [ 159.669698][ T9589] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 159.669732][ T9589] ? avc_has_perm_noaudit+0x1b1/0x200 [ 159.669773][ T9589] netlink_rcv_skb+0x120/0x220 [ 159.669836][ T9589] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 159.669944][ T9589] rtnetlink_rcv+0x1c/0x30 [ 159.669984][ T9589] netlink_unicast+0x5bd/0x690 [ 159.670017][ T9589] netlink_sendmsg+0x58b/0x6b0 [ 159.670112][ T9589] ? __pfx_netlink_sendmsg+0x10/0x10 [ 159.670140][ T9589] __sock_sendmsg+0x145/0x180 [ 159.670160][ T9589] sock_write_iter+0x1a7/0x1f0 [ 159.670283][ T9589] ? __pfx_sock_write_iter+0x10/0x10 [ 159.670315][ T9589] vfs_write+0x52a/0x960 [ 159.670350][ T9589] ksys_write+0xda/0x1a0 [ 159.670381][ T9589] __x64_sys_write+0x40/0x50 [ 159.670431][ T9589] x64_sys_call+0x2802/0x3000 [ 159.670454][ T9589] do_syscall_64+0xd2/0x200 [ 159.670501][ T9589] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 159.670534][ T9589] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 159.670560][ T9589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 159.670635][ T9589] RIP: 0033:0x7f8d68f2eec9 [ 159.670654][ T9589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.670678][ T9589] RSP: 002b:00007f8d6798f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 159.670715][ T9589] RAX: ffffffffffffffda RBX: 00007f8d69185fa0 RCX: 00007f8d68f2eec9 [ 159.670732][ T9589] RDX: 0000000000000024 RSI: 0000200000000000 RDI: 0000000000000004 [ 159.670746][ T9589] RBP: 00007f8d6798f090 R08: 0000000000000000 R09: 0000000000000000 [ 159.670758][ T9589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.670772][ T9589] R13: 00007f8d69186038 R14: 00007f8d69185fa0 R15: 00007ffc854f2808 [ 159.670789][ T9589] [ 159.670797][ T9589] bridge0: error setting offload STP state on port 2(bridge_slave_1) [ 159.850457][ T9585] netlink: 'syz.0.2560': attribute type 4 has an invalid length. [ 160.022002][ T9589] bridge_slave_0: left allmulticast mode [ 160.028369][ T9589] bridge_slave_0: left promiscuous mode [ 160.035771][ T9589] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.072193][ T9599] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2566'. [ 160.089393][ T9607] FAULT_INJECTION: forcing a failure. [ 160.089393][ T9607] name failslab, interval 1, probability 0, space 0, times 0 [ 160.105066][ T9607] CPU: 1 UID: 0 PID: 9607 Comm: syz.4.2569 Not tainted syzkaller #0 PREEMPT(voluntary) [ 160.105161][ T9607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 160.105178][ T9607] Call Trace: [ 160.105187][ T9607] [ 160.105197][ T9607] __dump_stack+0x1d/0x30 [ 160.105222][ T9607] dump_stack_lvl+0xe8/0x140 [ 160.105246][ T9607] dump_stack+0x15/0x1b [ 160.105266][ T9607] should_fail_ex+0x265/0x280 [ 160.105367][ T9607] should_failslab+0x8c/0xb0 [ 160.105398][ T9607] kmem_cache_alloc_noprof+0x50/0x480 [ 160.105431][ T9607] ? getname_flags+0x80/0x3b0 [ 160.105530][ T9607] getname_flags+0x80/0x3b0 [ 160.105593][ T9607] user_path_at+0x28/0x130 [ 160.105652][ T9607] __se_sys_mount+0x25b/0x2e0 [ 160.105698][ T9607] ? fput+0x8f/0xc0 [ 160.105794][ T9607] __x64_sys_mount+0x67/0x80 [ 160.105824][ T9607] x64_sys_call+0x2b51/0x3000 [ 160.105851][ T9607] do_syscall_64+0xd2/0x200 [ 160.105874][ T9607] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 160.105984][ T9607] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 160.106057][ T9607] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.106079][ T9607] RIP: 0033:0x7efdfa7ceec9 [ 160.106097][ T9607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.106206][ T9607] RSP: 002b:00007efdf9237038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 160.106295][ T9607] RAX: ffffffffffffffda RBX: 00007efdfaa25fa0 RCX: 00007efdfa7ceec9 [ 160.106313][ T9607] RDX: 0000200000000180 RSI: 0000200000000000 RDI: 0000000000000000 [ 160.106330][ T9607] RBP: 00007efdf9237090 R08: 0000200000000340 R09: 0000000000000000 [ 160.106347][ T9607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.106364][ T9607] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 160.106388][ T9607] [ 160.393279][ T9619] FAULT_INJECTION: forcing a failure. [ 160.393279][ T9619] name failslab, interval 1, probability 0, space 0, times 0 [ 160.407939][ T9619] CPU: 1 UID: 0 PID: 9619 Comm: syz.4.2574 Not tainted syzkaller #0 PREEMPT(voluntary) [ 160.407980][ T9619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 160.407997][ T9619] Call Trace: [ 160.408007][ T9619] [ 160.408017][ T9619] __dump_stack+0x1d/0x30 [ 160.408085][ T9619] dump_stack_lvl+0xe8/0x140 [ 160.408104][ T9619] dump_stack+0x15/0x1b [ 160.408161][ T9619] should_fail_ex+0x265/0x280 [ 160.408203][ T9619] ? audit_log_d_path+0x8d/0x150 [ 160.408229][ T9619] should_failslab+0x8c/0xb0 [ 160.408265][ T9619] __kmalloc_cache_noprof+0x4c/0x4a0 [ 160.408311][ T9619] audit_log_d_path+0x8d/0x150 [ 160.408339][ T9619] audit_log_d_path_exe+0x42/0x70 [ 160.408367][ T9619] audit_log_task+0x1e9/0x250 [ 160.408433][ T9619] ? kstrtouint+0x76/0xc0 [ 160.408477][ T9619] audit_seccomp+0x61/0x100 [ 160.408512][ T9619] ? __seccomp_filter+0x82d/0x1250 [ 160.408537][ T9619] __seccomp_filter+0x83e/0x1250 [ 160.408621][ T9619] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 160.408662][ T9619] ? vfs_write+0x7e8/0x960 [ 160.408692][ T9619] ? __rcu_read_unlock+0x4f/0x70 [ 160.408786][ T9619] ? __fget_files+0x184/0x1c0 [ 160.408815][ T9619] __secure_computing+0x82/0x150 [ 160.408851][ T9619] syscall_trace_enter+0xcf/0x1e0 [ 160.408887][ T9619] do_syscall_64+0xac/0x200 [ 160.408919][ T9619] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 160.409029][ T9619] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 160.409053][ T9619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.409082][ T9619] RIP: 0033:0x7efdfa7ceec9 [ 160.409103][ T9619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.409196][ T9619] RSP: 002b:00007efdf9237038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 160.409222][ T9619] RAX: ffffffffffffffda RBX: 00007efdfaa25fa0 RCX: 00007efdfa7ceec9 [ 160.409259][ T9619] RDX: 00000000000002f9 RSI: 9999999999999999 RDI: 0000000000000000 [ 160.409271][ T9619] RBP: 00007efdf9237090 R08: 0000000000000002 R09: 0000000000000000 [ 160.409283][ T9619] R10: 00002000005e2000 R11: 0000000000000246 R12: 0000000000000001 [ 160.409296][ T9619] R13: 00007efdfaa26038 R14: 00007efdfaa25fa0 R15: 00007fff335c6798 [ 160.409319][ T9619] [ 160.713785][ T9625] 8021q: VLANs not supported on sit0 [ 160.720203][ T9626] netlink: 'syz.0.2577': attribute type 5 has an invalid length. [ 160.758130][ T9627] lo speed is unknown, defaulting to 1000 [ 161.321785][ T9672] __nla_validate_parse: 8 callbacks suppressed [ 161.321799][ T9672] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2597'. [ 161.388701][ T9678] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2600'. [ 161.398126][ T9678] FAULT_INJECTION: forcing a failure. [ 161.398126][ T9678] name failslab, interval 1, probability 0, space 0, times 0 [ 161.412522][ T9678] CPU: 1 UID: 0 PID: 9678 Comm: syz.1.2600 Not tainted syzkaller #0 PREEMPT(voluntary) [ 161.412555][ T9678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 161.412567][ T9678] Call Trace: [ 161.412574][ T9678] [ 161.412588][ T9678] __dump_stack+0x1d/0x30 [ 161.412607][ T9678] dump_stack_lvl+0xe8/0x140 [ 161.412624][ T9678] dump_stack+0x15/0x1b [ 161.412671][ T9678] should_fail_ex+0x265/0x280 [ 161.412702][ T9678] should_failslab+0x8c/0xb0 [ 161.412726][ T9678] __kvmalloc_node_noprof+0x12e/0x670 [ 161.412754][ T9678] ? alloc_netdev_mqs+0xa5/0xa50 [ 161.412845][ T9678] ? __pfx_macsec_setup+0x10/0x10 [ 161.412871][ T9678] alloc_netdev_mqs+0xa5/0xa50 [ 161.412912][ T9678] rtnl_create_link+0x239/0x710 [ 161.412938][ T9678] rtnl_newlink_create+0x14c/0x620 [ 161.412959][ T9678] ? __schedule+0x6b9/0xb30 [ 161.413063][ T9678] rtnl_newlink+0xf29/0x12d0 [ 161.413100][ T9678] ? xas_load+0x413/0x430 [ 161.413128][ T9678] ? __rcu_read_unlock+0x4f/0x70 [ 161.413150][ T9678] ? xa_load+0xb1/0xe0 [ 161.413169][ T9678] ? __rcu_read_unlock+0x4f/0x70 [ 161.413245][ T9678] ? avc_has_perm_noaudit+0x1b1/0x200 [ 161.413276][ T9678] ? cred_has_capability+0x210/0x280 [ 161.413368][ T9678] ? selinux_capable+0x31/0x40 [ 161.413387][ T9678] ? security_capable+0x83/0x90 [ 161.413427][ T9678] ? ns_capable+0x7d/0xb0 [ 161.413500][ T9678] ? __pfx_rtnl_newlink+0x10/0x10 [ 161.413538][ T9678] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 161.413570][ T9678] ? avc_has_perm_noaudit+0x1b1/0x200 [ 161.413601][ T9678] netlink_rcv_skb+0x120/0x220 [ 161.413674][ T9678] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 161.413794][ T9678] rtnetlink_rcv+0x1c/0x30 [ 161.413883][ T9678] netlink_unicast+0x5bd/0x690 [ 161.413908][ T9678] netlink_sendmsg+0x58b/0x6b0 [ 161.413936][ T9678] ? __pfx_netlink_sendmsg+0x10/0x10 [ 161.414021][ T9678] __sock_sendmsg+0x145/0x180 [ 161.414041][ T9678] ____sys_sendmsg+0x31e/0x4e0 [ 161.414078][ T9678] ___sys_sendmsg+0x17b/0x1d0 [ 161.414190][ T9678] __x64_sys_sendmsg+0xd4/0x160 [ 161.414219][ T9678] x64_sys_call+0x191e/0x3000 [ 161.414240][ T9678] do_syscall_64+0xd2/0x200 [ 161.414311][ T9678] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 161.414336][ T9678] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 161.414355][ T9678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.414424][ T9678] RIP: 0033:0x7faeaf01eec9 [ 161.414438][ T9678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.414460][ T9678] RSP: 002b:00007faeada87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 161.414485][ T9678] RAX: ffffffffffffffda RBX: 00007faeaf275fa0 RCX: 00007faeaf01eec9 [ 161.414502][ T9678] RDX: 0000000000008000 RSI: 0000200000000280 RDI: 0000000000000003 [ 161.414519][ T9678] RBP: 00007faeada87090 R08: 0000000000000000 R09: 0000000000000000 [ 161.414530][ T9678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.414541][ T9678] R13: 00007faeaf276038 R14: 00007faeaf275fa0 R15: 00007ffcd2b8cce8 [ 161.414588][ T9678] [ 161.752587][ T29] kauditd_printk_skb: 1159 callbacks suppressed [ 161.752604][ T29] audit: type=1400 audit(1760049901.536:18161): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.789006][ T29] audit: type=1400 audit(1760049901.546:18162): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.820485][ T29] audit: type=1400 audit(1760049901.556:18163): avc: denied { prog_load } for pid=9679 comm="syz.3.2601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.844048][ T29] audit: type=1400 audit(1760049901.556:18164): avc: denied { prog_load } for pid=9679 comm="syz.3.2601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.865392][ T29] audit: type=1400 audit(1760049901.566:18165): avc: denied { prog_load } for pid=9681 comm="syz.1.2602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.887088][ T29] audit: type=1400 audit(1760049901.566:18166): avc: denied { read } for pid=9681 comm="syz.1.2602" name="usbmon0" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 161.910767][ T29] audit: type=1400 audit(1760049901.566:18167): avc: denied { prog_load } for pid=9681 comm="syz.1.2602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.911150][ T9680] $Hÿ: renamed from bond0 [ 161.932353][ T29] audit: type=1400 audit(1760049901.606:18168): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.947931][ T9680] FAULT_INJECTION: forcing a failure. [ 161.947931][ T9680] name failslab, interval 1, probability 0, space 0, times 0 [ 161.959744][ T29] audit: type=1400 audit(1760049901.626:18169): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.972556][ T9680] CPU: 0 UID: 0 PID: 9680 Comm: syz.3.2601 Not tainted syzkaller #0 PREEMPT(voluntary) [ 161.972634][ T9680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 161.972651][ T9680] Call Trace: [ 161.972660][ T9680] [ 161.972670][ T9680] __dump_stack+0x1d/0x30 [ 161.972697][ T9680] dump_stack_lvl+0xe8/0x140 [ 161.972722][ T9680] dump_stack+0x15/0x1b [ 161.972739][ T9680] should_fail_ex+0x265/0x280 [ 161.972813][ T9680] should_failslab+0x8c/0xb0 [ 161.972848][ T9680] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 161.972912][ T9680] ? device_rename+0x82/0x180 [ 161.972938][ T9680] kstrdup+0x3e/0xd0 [ 161.972968][ T9680] device_rename+0x82/0x180 [ 161.972994][ T9680] netif_change_name+0x1eb/0x6b0 [ 161.973077][ T9680] ? xfd_validate_state+0x45/0xf0 [ 161.973121][ T9680] ? nla_strscpy+0xec/0x120 [ 161.973149][ T9680] do_setlink+0x80b/0x2810 [ 161.973195][ T9680] ? __schedule+0x6b9/0xb30 [ 161.973231][ T9680] ? __list_del_entry_valid_or_report+0x65/0x130 [ 161.973265][ T9680] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 161.973320][ T9680] ? __mutex_lock+0x25d/0xcc0 [ 161.973407][ T9680] rtnl_newlink+0xe75/0x12d0 [ 161.973457][ T9680] ? xas_load+0x413/0x430 [ 161.973484][ T9680] ? xas_load+0x413/0x430 [ 161.973504][ T9680] ? __rcu_read_unlock+0x4f/0x70 [ 161.973613][ T9680] ? xa_load+0xb1/0xe0 [ 161.973699][ T9680] ? __rcu_read_unlock+0x4f/0x70 [ 161.973730][ T9680] ? avc_has_perm_noaudit+0x1b1/0x200 [ 161.973782][ T9680] ? cred_has_capability+0x210/0x280 [ 161.973900][ T9680] ? selinux_capable+0x31/0x40 [ 161.973926][ T9680] ? security_capable+0x83/0x90 [ 161.973965][ T9680] ? ns_capable+0x7d/0xb0 [ 161.973992][ T9680] ? __pfx_rtnl_newlink+0x10/0x10 [ 161.974028][ T9680] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 161.974097][ T9680] ? avc_has_perm_noaudit+0x1b1/0x200 [ 161.974170][ T9680] netlink_rcv_skb+0x120/0x220 [ 161.974209][ T9680] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 161.974329][ T9680] rtnetlink_rcv+0x1c/0x30 [ 161.974388][ T9680] netlink_unicast+0x5bd/0x690 [ 161.974438][ T9680] netlink_sendmsg+0x58b/0x6b0 [ 161.974541][ T9680] ? __pfx_netlink_sendmsg+0x10/0x10 [ 161.974581][ T9680] __sock_sendmsg+0x145/0x180 [ 161.974609][ T9680] ____sys_sendmsg+0x31e/0x4e0 [ 161.974701][ T9680] ___sys_sendmsg+0x17b/0x1d0 [ 161.974782][ T9680] __x64_sys_sendmsg+0xd4/0x160 [ 161.974828][ T9680] x64_sys_call+0x191e/0x3000 [ 161.974957][ T9680] do_syscall_64+0xd2/0x200 [ 161.975017][ T9680] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 161.975050][ T9680] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 161.975081][ T9680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.975133][ T9680] RIP: 0033:0x7f7c0ba8eec9 [ 161.975155][ T9680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.975181][ T9680] RSP: 002b:00007f7c0a4f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 161.975208][ T9680] RAX: ffffffffffffffda RBX: 00007f7c0bce5fa0 RCX: 00007f7c0ba8eec9 [ 161.975234][ T9680] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 161.975251][ T9680] RBP: 00007f7c0a4f7090 R08: 0000000000000000 R09: 0000000000000000 [ 161.975268][ T9680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.975286][ T9680] R13: 00007f7c0bce6038 R14: 00007f7c0bce5fa0 R15: 00007ffca2614898 [ 161.975334][ T9680] [ 162.009366][ T9688] lo speed is unknown, defaulting to 1000 [ 162.011297][ T29] audit: type=1400 audit(1760049901.656:18170): avc: denied { create } for pid=9683 comm="syz.1.2603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 162.436297][ T9703] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.2609'. [ 162.489888][ T9709] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2612'. [ 162.647777][ T9729] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2620'. [ 162.946603][ T9733] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2621'. [ 162.990987][ C1] ================================================================== [ 162.999776][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 163.007311][ C1] [ 163.009932][ C1] read-write to 0xffff8881000732b8 of 8 bytes by interrupt on cpu 0: [ 163.019195][ C1] wq_worker_tick+0x60/0x230 [ 163.024470][ C1] sched_tick+0x11a/0x270 [ 163.029565][ C1] update_process_times+0x15f/0x190 [ 163.035412][ C1] tick_nohz_handler+0x249/0x2d0 [ 163.041256][ C1] __hrtimer_run_queues+0x20c/0x5a0 [ 163.046706][ C1] hrtimer_interrupt+0x21a/0x460 [ 163.051731][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 163.058004][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 163.063764][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 163.069781][ C1] _raw_spin_unlock_irqrestore+0x3c/0x60 [ 163.075591][ C1] tty_insert_flip_string_and_push_buffer+0x1aa/0x1f0 [ 163.082394][ C1] pty_write+0x70/0x90 [ 163.086581][ C1] tty_put_char+0x8f/0xc0 [ 163.091121][ C1] __process_echoes+0x309/0x6b0 [ 163.096282][ C1] n_tty_receive_buf_common+0x8e4/0xbe0 [ 163.102467][ C1] n_tty_receive_buf2+0x33/0x40 [ 163.108100][ C1] tty_ldisc_receive_buf+0x66/0xf0 [ 163.114213][ C1] tty_port_default_receive_buf+0x59/0x90 [ 163.120316][ C1] flush_to_ldisc+0x145/0x340 [ 163.125556][ C1] process_scheduled_works+0x4cb/0x9d0 [ 163.131877][ C1] worker_thread+0x582/0x770 [ 163.136598][ C1] kthread+0x486/0x510 [ 163.140723][ C1] ret_from_fork+0x122/0x1b0 [ 163.145528][ C1] ret_from_fork_asm+0x1a/0x30 [ 163.150595][ C1] [ 163.153014][ C1] read-write to 0xffff8881000732b8 of 8 bytes by interrupt on cpu 1: [ 163.161544][ C1] wq_worker_tick+0x60/0x230 [ 163.166493][ C1] sched_tick+0x11a/0x270 [ 163.170881][ C1] update_process_times+0x15f/0x190 [ 163.176311][ C1] tick_nohz_handler+0x249/0x2d0 [ 163.181626][ C1] __hrtimer_run_queues+0x20c/0x5a0 [ 163.187302][ C1] hrtimer_interrupt+0x21a/0x460 [ 163.192386][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 163.198499][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 163.204774][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 163.210866][ C1] _raw_spin_unlock_irq+0x2f/0x50 [ 163.216550][ C1] process_scheduled_works+0x486/0x9d0 [ 163.222335][ C1] worker_thread+0x582/0x770 [ 163.227384][ C1] kthread+0x486/0x510 [ 163.231873][ C1] ret_from_fork+0x122/0x1b0 [ 163.236669][ C1] ret_from_fork_asm+0x1a/0x30 [ 163.241847][ C1] [ 163.244715][ C1] value changed: 0x00000000001f20c0 -> 0x00000000001f47d0 [ 163.252999][ C1] [ 163.255434][ C1] Reported by Kernel Concurrency Sanitizer on: [ 163.261915][ C1] CPU: 1 UID: 0 PID: 3515 Comm: kworker/u8:8 Not tainted syzkaller #0 PREEMPT(voluntary) [ 163.272809][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 163.287442][ C1] Workqueue: events_unbound flush_to_ldisc [ 163.293608][ C1] ==================================================================