last executing test programs: 6m33.05292534s ago: executing program 1 (id=2731): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0xc8101339d8526c63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) sync() personality(0x40000) 6m32.940933771s ago: executing program 1 (id=2735): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x24000080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000004c0)='kfree\x00', r1}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000000f8c0000000c0a01080000000000000000010000000900020073797a3200000000600003805c000080080003400000000250000b80200001800a00010071756f7461000000100002800c0001400000000000000000140001800c000100636f756e74657200000000000000058011e70000666c6f775f6f66666c6f6164000000000900010073797a30"], 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 6m32.852419052s ago: executing program 1 (id=2737): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000540), 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x7, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 6m32.648392115s ago: executing program 1 (id=2746): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)='./file0/../file0/../file0/../file0\x00', 0x0, 0x1b73404, 0x0) chroot(0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r1 = inotify_init1(0x800) r2 = inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0x2000775) inotify_rm_watch(r1, r2) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0/../file0/../file0/../file0\x00') 6m32.553274786s ago: executing program 1 (id=2748): openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) pipe(&(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x80801c, &(0x7f0000000580), 0x1, 0x503, &(0x7f0000000880)="$eJzs3c9vI1cdAPDvOL+cNG3S0gMgoEspLGi1TuJto6oHWE4IoUqIHkHahsQbRbHjKHZKE/aQ/g9IVOIER/4Azj1x54LgxmU5IPEjAm1W4mA040nWm7U3ZpPYUfz5SKN5b2bs73trzXv21xu/AEbWjYg4iIjJiPgwIuby40m+xd32ll736PDB6tHhg9UkWq0P/plk59Nj0fGY1Ev5cxYj4kffi/hp8mzcxt7+5kq1WtlpV6cXmrXthcbe/u2N2sp6Zb2yVS4vLy0vvnvnnfKF9fWN2mRe+vLDPxx86+dps2bzI539uEjtrk+cxEmNR8QPLiPYEIzl/ZkcdkN4IYWIeC0i3szu/7kYy15NAOA6a7XmojXXWQcArrtClgNLCqU8FzAbhUKp1M7hvR4zhWq90bx1v767tdbOlc3HROH+RrWymOcK52MiSetLWflJvXyqficiXo2IX0xNZ/XSar26Nsw3PgAwwl46Nf//Z6o9/wMA11xx2A0AAAbO/A8Ao8f8DwCjx/wPAKPnyfx/d6jtAAAGx+d/ABg95n8AGCk/fP/9dGsd5b9/vfbR3u5m/aPba5XGZqm2u1pare9sl9br9fXsN3tqZz1ftV7fXno7dj+e//Z2o7nQ2Nu/V6vvbjXvZb/rfa8yMZBeAQDP8+obn/05iYiD96azLTrWcjBXw/VWGHYDgKEZG3YDgKGx2heMrnN8xpcegGuiyxK9TylGxPTpg61Wq3V5TQIu2c0vyP/DqOrI//tfwDBi5P9hdMn/w+hqtZJ+1/yPfi8EAK42OX6gx/f/r+X73+ZfDvxk7fQVn15mqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBqO17/t5SvBT4bhUKpFPFyRMzHRHJ/o1pZjIhXIuJPUxNTaX1pyG0GAM6r8LckX//r5txbs6fPTiaPp7J9RPzsVx/88uOVZnPnj+nxf50cb36aHy8Po/0AwFmO5+ls3/FB/tHhg9XjbZDt+ft3I6LYjn90OBlHJ/HHYzzbF2MiImb+neT1tqQjd3EeB59ExOe79T+J2SwH0l759HT8NPbLA41feCp+ITvX3qf/Fp+7gLbAqPksHX/udrv/CnEj23e//4vZCHV++fiXPtXqUTYGPol/PP6N9Rj/bvQb4+3ff79dmn723CcRXxyPOI591DH+HMdPesR/q8/4f/nSV97sda7164ib0T1+Z6yFZm17obG3f3ujtrJeWa9slcvLS8uL7955p7yQ5agXes8G/3jv1itZocslaf9nesQvntH/r/fZ/9/898Mff7XHuTT+N7/WLX4hXn9O/HRO/Eaf8VdmflfsdS6Nv9aj/2e9/rf6jP/wr/vPLBsOAAxPY29/c6VarewMsnD8RmKgQRX6K0zlL85Vac9ThSvbsM2V6ncGFWsy/q9HtVovFKvXiHERWTfgKji56SPi8bAbAwAAAAAAAAAAAAAAdHWpf6iUtAvD7iMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADX1/8CAAD//8jOyzo=") bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000004c0), 0x208e24b) 6m32.533220827s ago: executing program 1 (id=2749): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r2) 6m32.501666357s ago: executing program 32 (id=2749): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r2) 18.306495768s ago: executing program 4 (id=10060): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x0) 18.292333338s ago: executing program 4 (id=10061): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc4800, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xba98575a95aeb701) socket$unix(0x1, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x1000}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$eJzs3c9vFFUcAPDvTLeFUrWVEBUPptEQSJSWFjD44wB3QvDHzYuVFoIsP0JrtGhiSfBiYrx4IPHkQfwvlOjVk4kHD148GRI0hovG6JrZzi5Lu9tuS5epnc8nmd335s32vYF++97OvLcbQGmN1h93xe6IuJREDLeUVeqPaf2g7Lg7f3xwKtuSqNVe+z2JJN/XOD7Jn4fyF/8zHPHDt0ns7Fte7+z8lXNT1erM5Tw/Pnf+0vjs/JX9Z89PnZk5M3Nh8vnJI4cPHT4yceC+zi9tSR+/9va7wx+feOPLz/9OJr76+UQSR+O304tlreexUUZjNP6s1T5cuj/7dz2y0ZUVpK/5e3JXsnQHm1Ylj5GBiHg8hqOv5X9zOD56pdDGAT1VSyJqQEkl4h9KqjEOaLy37+59cNrjUQnwINw+lj32t4n/Sn5tcCT6I2LPkte1uaS3Llkd33934lq2RY+uwwHtLVzdlqeWxn9Sj82R2F7P7biT3nOdNxsBnMyfs/2vrrP+0SV58Q8PzsLViHii3fh/9fh/syX+31pn/eIfAAAAAAAANs7NYxHxXLv7f2l+b257PF2//5cs3v/78e4KwaMbUP/q9//SWxtQDdDG7WMRL7ed/9uc4zvSl+ceXpwNmJw+W505EBGPRMS+6N+W5SdWqGP/Jzuvdyprnf+XbVn9jbmAeTtuVbbd+5rpqbmp+zlnYNHtqxFPVjrP/8n6/6S1/89lfw8udVnHzj03TnYqWz3+gV6pfRGxt23/nzSPSVb+fI7x+nhgvDEqWO6p9z/9ulP94h+Kk/X/O1aO/5Gk9fN6Ztf28wci4uB8pdapfL3j/4Hk9b7Gz8+8NzU3d3kiYiA5vnz/5NraDFtVIx4a8ZLF/75nVr7+1xz/t8ThYEQsdFnnY/8O/dKpTP8Pxcnif3pN/f/aE5M3Rr7pVH93/f+hep++L9/j+h+srNsALbqdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPB/lEbEQ5GkY810mo6NRQxFxK7YkVYvzs49e/riOxems7L69/+njW/6HV7MJ43v/x9pyU8uyR+MiEcj4rO+wXp+7NTF6nTRJw8AAAAAAAAAAAAAAAAAAACbxFCH9f+ZX/uKbh3Qc5X8WbxD+VSKbgBQGPEP5SX+obzEP5SX+IfyWmf8u10AW4D+H8qqv7vDtve6HUAR9P8AAAAAALCl3HzphetJRCy8OFjfMgN5WfPG4GBRrQN6KS26AUBhzOGF8jL1B8qry8m/wBaWNFN/1dqVd579n/SmQQAAAAAAAAAAAADAMnt33/xp1fX/wJZk/T+Ul/X/UF7W/0N5eY8PrLaK3/p/AAAAAAAAAAAAACje7PyVc1PV6sxlCYnNluiPiE3QjAISA8WHZ8F/mAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgKb/AgAA//8LDSUP") socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) 18.220305789s ago: executing program 4 (id=10062): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) 18.219950619s ago: executing program 4 (id=10063): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8d, @void, @value}, 0x94) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$loop(r2, &(0x7f0000000080)='./file1\x00', 0xc000, 0x1) renameat2(r2, &(0x7f0000000540)='./file1\x00', r2, &(0x7f0000000040)='./file0\x00', 0x5) unlinkat(r2, &(0x7f00000000c0)='./file1\x00', 0x0) getdents64(r2, &(0x7f0000000040)=""/131, 0x83) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = socket$inet6(0xa, 0x3, 0xfa) setsockopt$inet6_int(r4, 0x29, 0x3e, &(0x7f0000000380)=0x3, 0x4) sendto$inet6(r4, 0x0, 0xfffffffffffffd2f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e21, 0x9, @local, 0x8}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x2000001, 0x40010, 0xffffffffffffffff, 0x0) unshare(0x22020600) r5 = socket(0x27, 0x5, 0x0) getsockopt(r5, 0x200000000114, 0x2710, 0x0, &(0x7f0000000040)) r6 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SCSI_IOCTL_STOP_UNIT(r6, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x7ff}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) 18.12070057s ago: executing program 4 (id=10066): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x50) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x40c80, 0x3c) fspick(r2, &(0x7f0000000680)='./file0\x00', 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r1, @ANYBLOB="0000000000000000b7080000000000007bfffffffb020000f8ffffffb7ac878b99000000c80c6fe93bf57862850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000003c0)={&(0x7f0000000580)="2606bc6e555eda6b591c6da01479ae1e45d1c64b3151cdb30af003ea990d43e2b85a914307ffbb2f3bba2eda520e28112d855400fbe80238829f6326695375d85daf6b62b28bc8ddfc277fa344bc70f2cadab57c51ed2a6cef3c7aa4d3a74ab65e2d3dcb13df79dec26728527940ad6e892415aa3a1e83d8d2ece5efa0069c4b7a57e7040e0f4129d6ac1e729665bab7a210ad986fc9508480cdb50d7c57338fa718a2ec17764c7756ab4070f029f0bc7349dd1d039299", &(0x7f00000008c0)=""/178, &(0x7f0000000a00)="cccf3e1ac448ca236b117b8474ec0dec1cfe6e48b624e35c868838e4e08203ee8d92b3d99cb28d8b47c9d39f021e07444bb1bdcbeb90f3eb1d0e239f5134d8fe490b9f713f9551bc2580340ebbc80cba894d54a12af45789a30bbdab42149297ad76fa734bb62abbf6bff013b85afe507e1a7f650e68b0fb61b3302c0d8b5bca17184ad4f0b4011b6732e135c86f4a28045bb7a1089bc09af459f2e8f6ee251b1c9b43bd011f20f8a892b2530607c0cf742c1c34361c057aa98c1f17", &(0x7f00000001c0)="682f71ca45ffdd15e596a3ed", 0x3, r1, 0x4}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x13, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="6eaa000000000000711039000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) ioctl$F2FS_IOC_FLUSH_DEVICE(r4, 0x4008f50a, &(0x7f0000000040)={0x1, 0x2}) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xfffff891, '\x00', r5, r6, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f00000006c0)=@v3={0x3000000, [{0xffffffff, 0x2}, {0x8009, 0x56}], 0xee01}, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/current\x00') writev(r7, &(0x7f00000015c0)=[{&(0x7f00000000c0)='w', 0x1}], 0x1) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000400), 0x4) 17.796393395s ago: executing program 4 (id=10083): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000300)=ANY=[@ANYRES8], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4, 0x0, 0xd212}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000160a0103000000000000000002000000540003804000038014000100626f6e645f736c6176655f300000000014000100736974300000000000000000000000001400010073697430000000000000000000000000080002400000000008000140000000000900020073797a31000000000900010073797a30"], 0xa8}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r6) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x80000009, 0x2}, 0x10) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500), 0x40401, 0x0) ppoll(&(0x7f0000000380)=[{r2, 0x4044}, {r8, 0x4000}, {0xffffffffffffffff, 0x88}], 0x3, 0x0, 0x0, 0x0) write$cgroup_subtree(r8, &(0x7f0000000d80)=ANY=[@ANYBLOB="b6dba37220957db2b336181a"], 0xc) socket$inet6_sctp(0xa, 0x1, 0x84) r9 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) r11 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r11, &(0x7f0000000080)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t root'], 0x27) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) 17.785665205s ago: executing program 33 (id=10083): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000300)=ANY=[@ANYRES8], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4, 0x0, 0xd212}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000160a0103000000000000000002000000540003804000038014000100626f6e645f736c6176655f300000000014000100736974300000000000000000000000001400010073697430000000000000000000000000080002400000000008000140000000000900020073797a31000000000900010073797a30"], 0xa8}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r6) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x80000009, 0x2}, 0x10) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500), 0x40401, 0x0) ppoll(&(0x7f0000000380)=[{r2, 0x4044}, {r8, 0x4000}, {0xffffffffffffffff, 0x88}], 0x3, 0x0, 0x0, 0x0) write$cgroup_subtree(r8, &(0x7f0000000d80)=ANY=[@ANYBLOB="b6dba37220957db2b336181a"], 0xc) socket$inet6_sctp(0xa, 0x1, 0x84) r9 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) r11 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r11, &(0x7f0000000080)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t root'], 0x27) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) 9.452833965s ago: executing program 2 (id=10125): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x54, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x11}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x54}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x8000) 8.166192452s ago: executing program 0 (id=10127): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) r2 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0, 0x7800, 0x20, 0xd3ba, 0xfff, {{0xa, 0x4, 0x0, 0x13, 0x28, 0x65, 0x0, 0x5, 0x29, 0x0, @multicast1, @multicast2, {[@ssrr={0x89, 0x13, 0x14, [@private=0xa010100, @rand_addr=0x64010101, @empty, @local]}]}}}}}) sendmsg$nl_route_sched(r2, &(0x7f0000000ec0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)=@gettfilter={0x34, 0x2e, 0x800, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x8, 0xffe2}, {0xffe0, 0x5}, {0x10, 0x10}}, [{0x8}, {0x8, 0xb, 0x7fff}]}, 0x34}}, 0x4044041) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000003680)=@filter={'filter\x00', 0x42, 0x4, 0x378, 0xffffffff, 0x210, 0x318, 0x318, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x5, 0x0, {[{{@ip={@multicast2, @private, 0x0, 0x0, 'wg1\x00', 'nr0\x00'}, 0x74000002, 0x70, 0x198, 0x1ba, {0x46010000, 0x2c000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:removable_device_t:s0\x00'}}}, {{@uncond, 0x287, 0x70, 0x98}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d8) r4 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000040)=0x3, 0x4) sendto(r4, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000d40)='./file1\x00', 0x3a08014, &(0x7f0000001040)=ANY=[@ANYRES8=0x0, @ANYRESDEC=0x0, @ANYBLOB="98578424a2ace03c10f4631bb7ecf4995ba38b52625f6ed652f8256f0b174958cb71048eeeb06a4b6ff257f5387ad9528ccc6ea45ccfb415d8f3e76e3111267f2b3c183ddad789353b641c9cab107e8ec771974f703413e085cb25adc9434092474b892f2d0b0bc2b3eb90faa79d54adc7097365b411d9ffefbf08218f051e622ff75401086c81c358fde689f2ff07c7163f0556d086b4829e4ae689c5e206f18b31e3f8384ad531b1962d2f76c3c38951afb2e5168d3771dc27d830526a24c6d29499", @ANYRESOCT, @ANYRES64, @ANYRESHEX, @ANYRESOCT, @ANYRES32, @ANYRES8], 0x1, 0x7db, &(0x7f0000002540)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b70400000800000085000000780000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r5}, 0x10) r6 = creat(&(0x7f00000003c0)='./file1/file0\x00', 0x115) recvmmsg(r4, &(0x7f0000000c40)=[{{0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=""/23, 0x17}, 0x80009}], 0x16c, 0x10002, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004740), 0x8200, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r7}, 0x10) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000000d00)={&(0x7f0000000640)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000800)="327015d8f961e38a1ed9ee618212a5a3daa47747ba207b3072e92497bbe64a8276deccf3a2ead9d582dd2e5220dafd681aff3f2c57c084ca16cece4b33b50fa0865078f09a3e4918c17c18b9117e0023493c4740cbbca3db023a1e14f537c0abe0228a4db067649df25f0447a9a0acb77ba0d07d5795c871b2d11ebc8fbbcc72f270c42a", 0x84}, {&(0x7f0000000680)="7a9f6a9ec465f15094095eb823c1d0a0da25f6da", 0x14}, {&(0x7f00000008c0)="00e25095da4fbaa0524f0f8966c056bcae09fd206fcee1d5cfbdc4f49c801f3ba9b2fe8b4d2d54c7820d9cfe480fc0ceeb600823581088c66290b7bc9c15d684c4e7de8de00c82090ca4b6e7fce843d6ae38b7c4b924301dcb814ab4f9a6c7c3d5f3a84be49d7cd95649", 0x6a}, {&(0x7f0000000940)="14ae88b76e4bd35832bbe77630188a7eb65d11977d4fc8d050ef773be41dc9e4b610e2721650429e91fd2df917ceb15ff861558ee67ec69b368de4545895bd406b04127c785ba753cd3155d24ad767b185165bd521515e63420cdf549563f16ea98760354b3249f1dda3ec54c4a9ce24e49395f117f895d142c4e67688c4933add14a98167f567be83c923d818ec4c3cc2ba1f6d5fd6b5a5357e68bf432280dd4b5ce5f331ba2355782ca1e230e29049b5ac86ac6d745f51c78e44af2386242cef1185c1e47dd0ac065187a7fe6c17fa795a92f28af85af2bd", 0xd9}, {&(0x7f0000000a40)="16636ed908122c9f40d1ff08cf5405cc7ba3da87ad04f8d7993abacfb9ebd9b3fe77253aad1c4953cfc1453a5ed63d6348d8e50890ca09868ac7ddf65122493dc3f7906e3a9f63ddb8b7775352ede813804e135971a5a22a38aef986a52a8586af1f7860aa7ebad33bbfb4561ae89b1c9b98e9bd68f20196afe871804c2f14dff024c5c93497bcffafc6c8a61d63880fc77f88892a8fd1e2ac29ff3c94c77dc1d7a2d72044be90fe0c1637c1290348b08d5692df6d92234a08b76e5759c1133b999404054e41ba43b69c1ef671f12243c17d4094d3831d90d354457106e0913fd590e7d8f255583e280e44dca95c57b661f5a4e0bcabddf7b4", 0xf9}, {&(0x7f0000000b40)="9e07650246680adc606bab27fbe9b07db38d807b1e0c3d3c3373130eefd5ac4fc26fa755db040a9ade69b301d4b9a989b18ebb9677f314a65ae9c5fc525b0e728f26584bff4721f5c85fb56a8fae20ed7f1884d9f57f94a545be644bbb469784d55bf98cca674bfc9c4754dbe2fc671eb7c3f506d163191f276d53ad7b87a451d3f43ee4070172fe6bf0aa70e28340a43c33a644f87ba27c26452f3a4f78971996959f6c2d90633f990c02e833eec8903ac1c1948f8802d0829a4d777dd3b26e4e0d57a1464a97fde47f0f9ca5af0a3c88ae935d1301468a1caa16dc9415ff60035046b8a7b3ecea1c33b869c31c462314f23455e8a4b4cc6c8847", 0xfb}], 0x6, &(0x7f0000000740)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x30}, 0x4040000) bind$rds(r8, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r8, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) set_mempolicy_home_node(&(0x7f0000349000/0xa000)=nil, 0xa000, 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e0, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) 8.164819052s ago: executing program 2 (id=10129): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c001085bf204aacec36c03a00001000010027bd", @ANYRES32=r2, @ANYBLOB="104e0600016201002c001280110001006272696467655f736c617665000000001400058008002200", @ANYRES32=0x0, @ANYBLOB="06001f0001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x404c000}, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000c22f79e2521054fa993e7c9f00000000e99f8e4a426a12b5000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x100000000000}, 0x18) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r8, 0x29, 0xc8, &(0x7f0000000000), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0001}]}) r9 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000bbdffc)=0x0) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) syz_read_part_table(0x5f8, &(0x7f0000000bc0)="$eJzs0zGIU3ccB/Bf0jNXBRE7uTVchliXEzJer2BDfBwBcwSLDiK62SGLTh1iAoaKg2eHiOByDpbCGSq0TiKCIOLFQcgkinZREYciuFjFpuTu3XItB4UctPD5wHuP/+//+70vfx4v+F/Lxu/D4TATEcPJDdqGrdE9t778zVJl/1x+fl/9YEQmjkTE9+//+GG0k1kbTN86la6fpevSrYnG+aXk7EJ3+64b+Q8PsrEa0I5YuV72Lx8d5znZHLtP7bmTaQ923qzGlU9jeWZb4/CJXvGLbO/h+9H2n+nn3rJuLD+u/Ouz93ac6ZxMvsxFPEqaz5NX2bdvkgOXFqdzF1r14uu9ad+xcQWu0/h4KHft6t1y58XW0v1qrdb9+cnFQrNyu3N60C88fnfueNr3dKO/CwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA/4zdp/bc+Twz2HmzGleWv1qe2dY4fKJXLLd6D+d//frH/E9TkVnpm96k/Ouz93ac6ZxMFr6b/fZR0nyevMq+fZMcuLQ4nbvQqhdf7037jv3DbG4M+Y2Ph3LXrt4td15sLd2v1mrdLXGx0Kzc7pwe9AuP3507Hp/9Uq5GPJ0cxWXHkAgAAAAAAAAAAAAAAAAAAAB/V9k/l5/fVz8YkYkjETGzOPdkVB9Ormx/stY3lT6frdajdGuicX4pObvQ3b7rRv7Dg9/Sejsb0Y6Il/3LRzdOnticA/Gv/BUAAP//FI2HuA==") r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb01001800000000000000f8000000f8000000040000001000000000000009010000000300000008000006040000000100cf0007000000070000000500000007000000f9ffffff030000000500000006000000080000000e000000e00f0000050000007f0000000d000000480000001000000000000002000000000a0000000000000e02000000020000000200000005000013080000000d0000000b000000000400000300000081000000f103000007000000ff7f14ea65c7f0aef6af38c5231024d9ff0000090000000100004008000000010000000600000008000000030000000000000002000085070000001000000005000000060000000b00000005000000fdffffff0700000000000008050000000f000000000000090000000000300000"], &(0x7f0000000040)=""/76, 0x114, 0x4c, 0x0, 0xff, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=r11, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x18, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r7}, 0x8) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b"], 0x24}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000069000305000000000000000000000000000000000800010002"], 0x20}}, 0x0) ioctl$KDSKBENT(r6, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYRES8=r10, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 8.164075672s ago: executing program 3 (id=10130): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) sched_setscheduler(0x0, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001580), 0x0, 0x0) pread64(r0, &(0x7f00000005c0)=""/29, 0x1d, 0x5f) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000240)="6e2f1aee75744f803f312b2f3e949e5f4607278cca070f7e8a40093b104a982bce7a478859ca7e17031099441c731bbcce1e609c483d2909dd9a824fa0fd33e2cd09", 0x42) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r6}, 0x10) r7 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r7, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r7, 0x0) accept4$tipc(r7, &(0x7f0000000100)=@id, &(0x7f0000000180)=0x10, 0x80800) r8 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r8, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000d, 0x4008031, 0xffffffffffffffff, 0x2000) munmap(&(0x7f000045e000/0x1000)=nil, 0x1000) mmap$usbfs(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x2000001, 0x10010, r0, 0xe) mremap(&(0x7f00006bd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) socket$rds(0x15, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r6, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x87, &(0x7f0000000100), 0x0, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES64=r2, @ANYRES32=r3], 0x20}}, 0x0) setreuid(0x0, 0x0) 6.730412761s ago: executing program 0 (id=10131): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8915, &(0x7f0000001cc0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = io_uring_setup(0x6b3, &(0x7f0000000000)={0x0, 0x200f324, 0x2, 0x2, 0xb9}) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x16, &(0x7f0000000140)={&(0x7f0000001000)={[{0x0}]}, 0x1}, 0x1) io_uring_register$IORING_UNREGISTER_PBUF_RING(r3, 0x17, &(0x7f00000075c0)={0x0}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = mq_open(&(0x7f0000000600)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdF\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1b\xf4\xce\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|9\x90\x8d\xf4r\xd9*\xd1\x83\n\x1a\xa8fa2\xd4:^\xd7a\x0f\x12}\a\x9d\xc9h\x02\xbe\xeb\x01\xd39LS\xefJ\xcc<\xc4\xc0\xb4A\xab{\x1b\x15<\x95\x02\xae\xfdT\x98\xf4\x85\a\x01@\x12\xe0<3\xb4\x97\xb6W\x84K\xd7\xc5\xf47\xed\xda4\xe2W\xb6r\xca\x1e\x90\xef\x13\xf1&~\x97n\x9f\x8eS\xa8R\xf6\x9d{9\x1bN\x81\x18~\xd7{', 0x42, 0x0, 0x0) mq_timedreceive(r7, &(0x7f000001a3c0)=""/102381, 0xffffffffffffff32, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r4, 0x0, 0x178}, 0x18) r8 = gettid() r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x280000, 0x0) close(r9) syz_clone(0xd000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x101) ioctl$TUNSETOWNER(r9, 0xff07, 0x0) process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 6.729318661s ago: executing program 5 (id=10132): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000040000000800", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffff0000000000001000"/24, @ANYRES32=r0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000240), &(0x7f0000000280)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='thermal_power_cpu_get_power\x00', r2, 0x0, 0xfffffffffffffffa}, 0x20) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') syz_io_uring_setup(0xd2, &(0x7f0000000200)={0x0, 0x83ae, 0x800, 0x2}, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d000014000000000000000000000005000600000000000a00030000000000fc0100000000000000000000ea2fa43c00000000"], 0xa0}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x20000c4, &(0x7f0000000080), 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") lsetxattr$security_ima(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "5211eb8e5ce6935e9bbd76e32c4c956e"}, 0x11, 0x1) lsetxattr(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000700)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x1) setxattr$incfs_metadata(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180), &(0x7f00000001c0)="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", 0x36d, 0x1) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0xfdffffff, 0x0, {0x0, 0x0, 0x74, r8, {}, {}, {0x8, 0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x8881}, 0x0) madvise(&(0x7f0000bc0000/0x400000)=nil, 0x400000, 0x9) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000880)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x62, 0xe12f}, 0x0, 0x0, 0xb, 0xfffffffffffffff7, 0xf3b8, 0xe640, 0x7, 0x5, 0x9, 0x6b}) r9 = syz_io_uring_setup(0x6265, 0x0, &(0x7f0000000100)=0x0, &(0x7f00000007c0)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, 0xf, 0x0, {0x1}}) io_uring_enter(r9, 0x4d10, 0x2, 0x2, 0x0, 0x0) 6.728378401s ago: executing program 2 (id=10133): getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xb0, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x4, @remote, 0x1}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e23, 0xe, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x96}, @in6={0xa, 0x4e24, 0xffff8001, @local, 0x3}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0x4, @mcast1, 0x6}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000100)=0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r3, &(0x7f00000000c0)={0x1a, 0x0, 0x2, 0x8, 0x20, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}, 0x10) listen(r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000000)={[{@noquota}, {@debug}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x40}}, {@noauto_da_alloc}, {@user_xattr}]}, 0x3, 0x4d7, &(0x7f0000001480)="$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") renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x2) setgid(0xee01) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket(0x10, 0x80003, 0x0) socket$nl_route(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) r5 = gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socket$inet6_udp(0xa, 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r5, 0x0, 0x7, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, 0x0) 6.727761751s ago: executing program 3 (id=10134): openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x40000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400000, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x82000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000180)={0x0, 0x18, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x198) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2$9p(&(0x7f0000000000), 0x80) write$P9_RVERSION(r6, &(0x7f0000000000)=ANY=[], 0x15) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = dup(r6) write$P9_RLERRORu(r9, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 5.177032781s ago: executing program 0 (id=10135): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfe, 0x0, 0x7ffc0002}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f0000000440)={[{@bsdgroups}, {@noblock_validity}, {@grpjquota}, {@init_itable_val={'init_itable', 0x3d, 0x6}}, {@debug}, {@errors_remount}]}, 0x1, 0x5fc, &(0x7f0000000600)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="cc0000000001010200000000000000000700000628000d8024000380060001004e210000060001004e200000060002004e240000060002004e2100001c000f800800014000000000080001400000000408000340000000920800034b000024020c001880080001400000000806001240000000002c0010800800034000000004080001400000000808000140000000ee0800034000000007080002400000800108001a40000000ff24000f800800014000000002080003400000000008000140000000010800034000000009"], 0xcc}, 0x1, 0x0, 0x0, 0x20008010}, 0x4048810) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = msgget$private(0x0, 0x0) futex(&(0x7f0000000300), 0x2, 0x1, &(0x7f0000000400)={0x77359400}, 0x0, 0x2) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x400000000000}) msgsnd(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="030000"], 0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x3, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0x1}, 0x0, 0x0, 0x800000000000000, 0x7, 0x2, 0x0, 0x3, 0xe8, 0x0, 0x0, 0x0, 0xffffffffffffffff}) msgctl$IPC_INFO(r3, 0x3, &(0x7f00000002c0)=""/14) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) symlinkat(0x0, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) io_setup(0xf, &(0x7f0000002400)=0x0) io_submit(r6, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r5, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, &(0x7f00000003c0), 0xff, 0x52e, &(0x7f0000000f00)="$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") 5.176426541s ago: executing program 5 (id=10136): setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYRES8=0x0, @ANYRES8=r1, @ANYRES16=r0, @ANYBLOB="953bca76b59d70d146b3dd8ca025cf9a1060f7eb642812dfc036bec8224f4263e095411902b9ffc19e40fd0875e947250425f49d78d367b39fb3bab95cf1fc78dc340e46fe7760ede2bb21a8217381225a3ec35d427b2805ac5072", @ANYRES64, @ANYRES8, @ANYRESDEC=r1], &(0x7f0000000880)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f00000007c0)='kfree\x00', r2, 0x0, 0x6}, 0x18) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000500)={0x18, 0x0, {0x2, @broadcast, 'veth0_vlan\x00'}}, 0x1e) connect$pppoe(r3, &(0x7f0000000340)={0x18, 0x0, {0x0, @multicast, 'macvlan0\x00'}}, 0x1e) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x5f, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0207a20802"], 0x10}}, 0x0) close(r6) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x10, &(0x7f0000000600), 0x1, 0x58a, &(0x7f0000000b40)="$eJzs3V1rHFUcB+D/2d2kL2lNKoLWXhgo2IKaNGlFEcEW650XvhS8KhiTtJRu29BEsLViC/Ub6AcQvBNEvCwiRb3x1jvBDyDFIm1uvFuZzUy6bXfTvGw6tfM8sM2cORnOmSy/npmzM7MBVNZo9k8tYndEzKWI4Y66RuSVo0u/d/vWpenFW5emU7Ra7/+TIuXrit9P+c+hfOOtEfH7zymerN/f7vyFi6enms3Z83l5fOHM3Pj8hYsvnTozdXL25OzZyYlXJl4+dHDy0IG+7OfOiPh17Gjj6ok393w//c2uz3/89lqKw7Ejr+/cj34ZjdHlv0mn7O/6ar8bK0k935/Otzg1SuwQa1K8fwMR8XQMRz3uvHnD8cW7pXYO2FStFNECKirJP1RUcRyQnf8Wr3KPSICH5eaRpQmA22lpbm9xOf+NpbnB2NqeG9i+mKJzWidFRD9m5rI25p5Pw9krNmkeDuju8pWIeKbb+J/a2Rxpz+Jn+a/dlf9aRLyT/8zWv7fO9kfvKcs/PDwbyf+HHfn/aJ3tyz8AAAAAAAD0z/UjEfFit8//asvX/0SX63+GIuJwH9p/8Od/tRt9aAbo4uaRiNcjorj2b7Ej/7mRel7a2b4eYCCdONWcPRART0TE/hjYkpUnVmhjdM9vAz3rOq7/y15Z+8W1gHk/bjS23L3NzNTC1Eb2GVhy80rEs41u+U/L43/qMv5nY//cKttoHX3jl151D84/sFlaX0fs6zr+33lyRVr5+Rzj7eOB8eKo4H6fHr/2Q6/25R/Kk43/21fO/0jqfF7P/Nrb+OzvPzeQ/+7H/4PpWPuRM4P5uk+mFhbOT0QMprfvXz+59j7D46jIQ5GXLP/793Y//1/p+H9bRFxeZZvHfnrraq864z+UJ8v/zJrG/7Uv7P3gq397tb+68f9Qe0zfn68x/wcrW21Ay+4nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPwf1SJiR6Ta2PJyrTY2FjEUEU/F9lrz3PzCCyfOfXx2Jqtrf/9/rfim3+Glciq+/3+kozx5T/lgROyKiC/r29rlselzzZmydx4AAAAAAAAAAAAAAAAAAAAeEUM97v/P/FUvu3fApmuU3QGgNPIP1SX/UF3yD9Ul/1Bd8g/VJf9QXfIP1SX/UF311nfHy+4DAAAAAADQN7ueu/5HiojLr21rvzKDed1AqT0DNtvhsjsAlMYjfqC6XPoH1eUcH0gPqN+67i0BAAAAAAAAAAAAgH7Zt9v9/1BVtbI7AJSm9/3/ngwAjzv3/0N1OccH3P8PAAAAAAAAAAAAAI+++QsXT081m7Pn17uwZWObW7BQnYVIfUjcQ1oo+38mAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg8F8AAAD//8rF+L8=") syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@orlov}, {@abort}, {@nombcache}, {@stripe={'stripe', 0x3d, 0x10}}]}, 0x64, 0x50a, &(0x7f0000000200)="$eJzs3VFrHFsdAPD/bHZr06Y3ueqDXvB6tZW0aHeTxrbBh1pB9Kmg1vcak00I2WRDdtM2oWiKH0AQUcEnffFF8AMIUvDFRxEK+qyoKKKtPvigncvuTtI03U227TabZn8/mMw5Z2b2f86GmZ0zc5gJYGC9FxHXI+JJmqYXImI0K89lU2y1psZ6jx/dm21MSaTpzX8mkWRl25+VZPPT2WYnI+JrX474ZvJ83NrG5tJMpVJey/Kl+vJqqbaxeXFxeWahvFBemZqavDJ9dfry9ERP2nkmIq598a8/+O7PvnTtV5+586dbfz//rUa1RrLlu9vxgvL7LWw1vdD8LnZvsPaSwY6ifLOFmeF2aww9V3L/NdcJAID2Guf4H4yIT0bEhRiNof1PZwEAAIA3UPr5kfhfEpG2d6JDOQAAAPAGyTXHwCa5YjYWYCRyuWKxNYb3w3EqV6nW6p+er66vzLXGyo5FITe/WClPZGOFx6KQNPKTzfTT/KU9+amIeDsivj863MwXZ6uVuX5f/AAAAIABcXpP//8/o63+PwAAAHDMjPW7AgAAAMBrp/8PAAAAx5/+PwAAABxrX7lxozGl2++/nru9sb5UvX1xrlxbKi6vzxZnq2urxYVqdaH5zL7lgz6vUq2ufjZW1u+W6uVavVTb2Ly1XF1fqd9afOYV2AAAAMAhevvjD/6QRMTW54abU8OJ7jbtcjXgqMrvpJJs3ma3/uNbrflfDqlSwKEY6ncFgL7J97sCQN8U+l0BoO+SA5Z3HLzz22z+id7WBwAA6L3xj3a+/5/bd8ut/RcDR56dGAaX+/8wuJr3/7sdyetkAY6VgjMAGHivfP//QGn6QhUCAAB6bqQ5JblidnlvJHK5YjHiTPO1AIVkfrFSnoiItyLi96OFDzTyk80tkwP7DAAAAAAAAAAAAAAAAAAAAAAAAABAS5omkQIAAADHWkTub8mvW8/yHx89N7L3+sCJ5L+jkb0i9M6Pb/7w7ky9vjbZKP/XTnn9R1n5pX5cwQAAAICB8EIv8N/up2/34wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACglx4/uje7PR1m3H98ISLG2sXPx8nm/GQUIuLUv5PI79ouiYihHsQfbvz5SLv4SaNaOyHbxR/uQfyt+/vGj7HsW2gX/3QP4sMge9A4/lxvt//l4r3mvP3+l494Jv+yOh//Yuf4N9Rh/z/TZYx3Hv6i1DH+/Yh38u2PP9vxkw7xz3YZ/xtf39zstCz9ScR429+f5JlYpfryaqm2sXlxcXlmobxQXpmamrwyfXX68vREaX6xUs7+to3xvY/98sl+7T/VIf7YAe0/12X7///w7qMPtZKFdvHPn20T/zc/zdZ4Pn4u++37VJZuLB/fTm+10ru9+/Pfvbtf++c6tP+g///5Ltt/4avf+XOXqwIAh6C2sbk0U6mU145totFLPwLVkDiCiW/39APTNE0b+9QrfE4SR+FraSb6fWQCAAB67elJf79rAgAAAAAAAAAAAAAAAAAAAIPrMB4ntjfm1k4q6cUjtAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeuL9AAAA//+GAdlV") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1a4a438, &(0x7f00000008c0)=ANY=[], 0xb, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000acf29300000000000000009500000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, 0x0, 0x0) setpriority(0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r7, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061122900000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 5.175913951s ago: executing program 2 (id=10137): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0x1d}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext3\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb95, &(0x7f00000017c0)="$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") arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffff7ffffffd]}, 0x0, 0x8) r2 = gettid() timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000044000)) timer_settime(0x0, 0x236bd4336e4642df, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) poll(0x0, 0x0, 0xffffffffffbffff8) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r7) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="796100000000fddbdf2507"], 0x1c}}, 0x24040050) sendmsg$NL80211_CMD_ADD_TX_TS(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='-\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="040027bd7000fddbdf25690000000c009900050000002a0000000a00060008021100000000000600d400ff0300000a000600ffffffffffff00000600d40005000000"], 0x48}}, 0x8005) ioctl$int_in(r4, 0x5452, &(0x7f0000000440)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x2c, 0xffffffffffbffff8) dup2(r4, r5) tkill(r3, 0x13) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000400)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$nfc(&(0x7f00000003c0), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9, 0x0, 0x1}, 0x18) r10 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) 5.175293011s ago: executing program 3 (id=10138): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x13, &(0x7f00000010c0)=ANY=[@ANYBLOB="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", @ANYRES8=0x0, @ANYBLOB="e58e10d372b5823e9b2e015bebb82a9e49fe5eff83801650a3589b4bf8f183531e0755b287a8842fb72ba5f418d99bc3", @ANYRESOCT, @ANYRESDEC, @ANYRES32=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x5, 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb01001800000000000000840000008400000004000000060000000000000b0300000009000000000000100c0000000100000031af0008030000000d0000000000000c0300f1010000000000000004ffffffdf0b000000000000002a0000000b0000a904000000010000000f000000010000000500000007000000040000000268f4fcc20000000000000b000000000b0000000000000805000004000000000da47c300fb3cb8c9bc1b0dc4cf21fcb84fc88d4c2dd15d8c7a626234b114ff7e459c294c7c419c7fb"], &(0x7f0000000300)=""/172, 0xa0, 0xac, 0x0, 0x72, 0x10000, @value}, 0x28) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="b9c5d70331c350cd1131ad99d584d8ec462c37b82d3471d03d8bd3c8086e8bcdcec54d80addf09e93ec4facf76", @ANYBLOB="0180000000000000000001000000000000000b"], 0x28}}, 0x40000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x248) close(r8) socket$rds(0x15, 0x5, 0x0) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r9, &(0x7f0000000300)="8b", 0x34000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYBLOB="2c7766646e6f3d4421a791508a144082079fe50d257ea662e28e9464b8f98fe5cc007876ad4ada38d5b11e4a7042b982f1837074b9fbeeca44f300ab4bd9aa1b7878b9c0eb3b7ad98fb7e1c9cd352c2bb50495aaf449035c4ac0a9e0d803486e2b357bf17cf36eeb9ecff52990f73205517178e2280efd522a93272f19e871042c1ed651a8ae6ecc4d8d5d38fb757c2f319e641c7c25c7ed6503e5bfb9", @ANYRESHEX=r9, @ANYBLOB=',\x00']) sendto$packet(r5, &(0x7f0000000100)="f257a8ea7bc273dfaeab96850806", 0x2a, 0x0, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_size', 0x80082, 0x138) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="13002e97c5fec0df276400000dfa0538eae75e42a2e38deaf53a08d4d492d4d20b6856388dba634797998bdd3eac2802bb7611fe584903acf7bf1cd207bd8a3b0c8b0875617cf26284ec7125d110b47e7a3a93905c2287dd103f1a8fbf5ffd51cae3ac8e5630fae6e9082a94fea7624349a7c2000022b0a8240700000000000000004000", @ANYRES32, @ANYBLOB="ff0700"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="020000000200"/28], 0x50) listen(r3, 0x0) io_setup(0x1, &(0x7f0000001080)=0x0) io_submit(r10, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x0, 0x84) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000a80)={'broute\x00', 0x0, 0x3, 0xd9, [0xfffffffffffffd0f, 0x9, 0x5, 0x0, 0x90, 0x1], 0xa, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000980)=""/217}, &(0x7f0000000480)=0x78) 3.558371742s ago: executing program 0 (id=10139): syz_emit_ethernet(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) statfs(&(0x7f0000000200)='.\x00', &(0x7f0000000440)=""/137) 3.557845793s ago: executing program 5 (id=10140): r0 = socket(0x2, 0x80805, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0xac1414bb}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)}}], 0x2, 0x0) 3.557605653s ago: executing program 3 (id=10141): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x54, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x11}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x54}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x8000) 1.842740475s ago: executing program 0 (id=10142): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) r3 = socket(0x1e, 0x4, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0xf0b, 0x13, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x5}, {0xffff, 0xffff}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x8000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0x2c}, 0x1, 0x0, 0x0, 0x8044}, 0x60040050) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) r5 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x43) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r8, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000980)=@delchain={0x24, 0x66, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvfrom(r5, &(0x7f00000005c0)=""/229, 0xe5, 0x40, 0x0, 0x0) 1.842442065s ago: executing program 5 (id=10143): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000e00)={0x0}, 0x1, 0x0, 0x0, 0x880}, 0x0) 1.841900175s ago: executing program 2 (id=10144): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000020085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x21680, 0x1, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRES8=r1, @ANYRES64=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="5a02af0de0c0c3dd2818d7504da570b2260790494e787c8dacc0c099860bf6dc8702e55a33dd30aa8817bb5a446d1dcc96d666922d90b1c14f505b6403398a76a4dbb62898461b725c4d0300f77f87d5ffd3336286a06f1ceac20d192102a1d1f7b27938cca71aa8ef2d7466de3660469612da29b89f1d530a1096d3424b30fa3f619104a8fdf49d5dd93cf09f1b18287c9905c3070561efbbacb7726dd143ce54b9062442f544d19cbe351d", @ANYRES16=r1, @ANYRES16=r2, @ANYRESDEC=r1], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000680)='kfree\x00', r7}, 0x18) r8 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r8, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r8, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r9 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r9, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x4}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x5, 0x4, 0x3f0, 0x220, 0x0, 0x220, 0x220, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @private, @empty}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @private}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) r10 = syz_clone(0x20300000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r10) ptrace$cont(0x20, r10, 0x7, 0xf57) write$cgroup_int(r4, &(0x7f0000000000)=0xfffffffffffffffc, 0x12) r11 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000f0000000401a80016002000014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) 1.841540175s ago: executing program 3 (id=10145): socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f00000000c0)={[{@noquota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x3, 0x4c5, &(0x7f0000001cc0)="$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") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:hwdata_t:s0\x00', 0x1e, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="59bb22bd7000000020001100000008002b01"], 0x28}}, 0x0) setsockopt(0xffffffffffffffff, 0x10d, 0xf, 0x0, 0x0) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)) ioprio_set$pid(0x2, 0x0, 0x0) 4.419719ms ago: executing program 0 (id=10146): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 3.95241ms ago: executing program 5 (id=10147): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000006800010000000000000000000a00000000000000060007000800000008000500", @ANYRES32=r1, @ANYBLOB="18000880"], 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100cb3a, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) (async) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) (async) sendto$packet(r3, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) 340.13µs ago: executing program 2 (id=10148): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@private0, 0x8000000, 0x0, 0xff, 0x42dc0d294d53a643, 0x20}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback={0xfec0ffff00000000}, 0x8000600, 0x0, 0xff, 0x0, 0x0, 0x9}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a80)={&(0x7f0000000100)='rxrpc_rx_lose\x00', r0}, 0x18) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0xb7) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0), r4) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x1, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x8410) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022cbd7000fedbdf25120000003c000980080001000b0000000800020003000000000000004b7e00000800020033360000080001000500000008000100ce04000008000100060000002400098008000100fdffffff080001000600000008000100f7ffffff08000200e1980000"], 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x840) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r6 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000840)='fsi_master_gpio_poll_response_busy\x00', r3, 0x0, 0x7}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f3, &(0x7f0000000080)) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r4) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000980)={'wpan3\x00', 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r1, @ANYRES64=r6], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r13}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r14 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r11, 0x8933, &(0x7f0000000500)={'wpan4\x00', 0x0}) r16 = gettid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r11, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x500, 0x0, 0x2000040}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r14, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r15}, @NL802154_ATTR_PID={0x8, 0x1c, r16}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000540)='./file1/file0\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES16=r15, @ANYBLOB="f6f9fdf61e6cbce36b15c3fbc0a2aea9b851ea8b5a18440b826835a974592e95b16c446e723369b614930a779aef", @ANYRES16=r10, @ANYRES8=r15], 0xf, 0x2a9, &(0x7f0000000580)="$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") sendmsg$IEEE802154_LLSEC_GETPARAMS(r4, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r8, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r15}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4804}, 0x4008000) 0s ago: executing program 3 (id=10149): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) personality(0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) kernel console output (not intermixed with test programs): allowed } for pid=23888 comm="syz.5.8106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 446.796646][ T29] audit: type=1400 audit(1747079106.494:103995): avc: denied { map_create } for pid=23888 comm="syz.5.8106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 446.816183][ T29] audit: type=1400 audit(1747079106.494:103996): avc: denied { prog_load } for pid=23888 comm="syz.5.8106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 446.836251][ T29] audit: type=1400 audit(1747079106.494:103997): avc: denied { prog_load } for pid=23888 comm="syz.5.8106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 446.855599][ T29] audit: type=1400 audit(1747079106.494:103998): avc: denied { prog_load } for pid=23888 comm="syz.5.8106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 446.875564][ T29] audit: type=1400 audit(1747079106.505:103999): avc: denied { read write } for pid=9985 comm="syz-executor" name="loop5" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 446.999930][T23913] bond1: entered promiscuous mode [ 447.005131][T23913] bond1: entered allmulticast mode [ 447.011574][T23913] 8021q: adding VLAN 0 to HW filter on device bond1 [ 447.454978][T23986] FAULT_INJECTION: forcing a failure. [ 447.454978][T23986] name failslab, interval 1, probability 0, space 0, times 0 [ 447.467696][T23986] CPU: 1 UID: 0 PID: 23986 Comm: syz.0.8145 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 447.467750][T23986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 447.467761][T23986] Call Trace: [ 447.467767][T23986] [ 447.467791][T23986] __dump_stack+0x1d/0x30 [ 447.467899][T23986] dump_stack_lvl+0xe8/0x140 [ 447.467917][T23986] dump_stack+0x15/0x1b [ 447.467932][T23986] should_fail_ex+0x265/0x280 [ 447.468089][T23986] should_failslab+0x8c/0xb0 [ 447.468114][T23986] kmem_cache_alloc_noprof+0x50/0x310 [ 447.468193][T23986] ? getname_flags+0x80/0x3b0 [ 447.468223][T23986] getname_flags+0x80/0x3b0 [ 447.468251][T23986] __se_sys_quotactl+0x16a/0x670 [ 447.468284][T23986] ? fput+0x8f/0xc0 [ 447.468322][T23986] __x64_sys_quotactl+0x55/0x70 [ 447.468355][T23986] x64_sys_call+0x2886/0x2fb0 [ 447.468378][T23986] do_syscall_64+0xd0/0x1a0 [ 447.468401][T23986] ? clear_bhb_loop+0x25/0x80 [ 447.468431][T23986] ? clear_bhb_loop+0x25/0x80 [ 447.468452][T23986] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.468475][T23986] RIP: 0033:0x7fd13790e969 [ 447.468493][T23986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.468540][T23986] RSP: 002b:00007fd135f77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 447.468613][T23986] RAX: ffffffffffffffda RBX: 00007fd137b35fa0 RCX: 00007fd13790e969 [ 447.468627][T23986] RDX: 0000000000000000 RSI: 0000200000003040 RDI: 0000000000000000 [ 447.468639][T23986] RBP: 00007fd135f77090 R08: 0000000000000000 R09: 0000000000000000 [ 447.468711][T23986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.468723][T23986] R13: 0000000000000001 R14: 00007fd137b35fa0 R15: 00007fff8d59b978 [ 447.468743][T23986] [ 447.662513][T23997] __nla_validate_parse: 70 callbacks suppressed [ 447.662529][T23997] netlink: 152 bytes leftover after parsing attributes in process `syz.0.8150'. [ 447.683455][T23997] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 447.748979][T24002] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(5) [ 447.755543][T24002] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 447.763253][T24002] vhci_hcd vhci_hcd.0: Device attached [ 447.771116][T24004] usbip_core: unknown command [ 447.775853][T24004] vhci_hcd: unknown pdu 771751936 [ 447.780937][T24004] usbip_core: unknown command [ 447.787888][T12706] vhci_hcd: stop threads [ 447.792267][T12706] vhci_hcd: release socket [ 447.796810][T12706] vhci_hcd: disconnect device [ 447.850464][T24014] netlink: 44 bytes leftover after parsing attributes in process `syz.0.8156'. [ 447.853291][T24012] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8154'. [ 448.138106][T24038] netlink: 24 bytes leftover after parsing attributes in process `syz.3.8162'. [ 448.173827][T24042] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8166'. [ 448.252822][T24052] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8170'. [ 448.265473][T24052] ipvlan0: entered promiscuous mode [ 448.329495][T24057] vlan2: entered promiscuous mode [ 448.334779][T24057] bridge0: entered promiscuous mode [ 448.340255][T24057] vlan2: entered allmulticast mode [ 448.345393][T24057] bridge0: entered allmulticast mode [ 448.386495][T24062] 0ªX¹¦À: left allmulticast mode [ 448.391948][T24062] wg2: left promiscuous mode [ 448.396744][T24062] wg2: left allmulticast mode [ 448.403283][T24062] vlan0: left promiscuous mode [ 448.408310][T24062] vlan0: left allmulticast mode [ 448.413294][T24062] @ÿ: left allmulticast mode [ 448.418587][T24062] geneve0: left promiscuous mode [ 448.423715][T24062] ip6gre1: left allmulticast mode [ 448.428997][T24062] bond0: left promiscuous mode [ 448.443811][T24062] bond1: (slave bond2): Releasing backup interface [ 448.504625][T24072] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8180'. [ 448.532733][T24077] FAULT_INJECTION: forcing a failure. [ 448.532733][T24077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 448.545967][T24077] CPU: 1 UID: 0 PID: 24077 Comm: syz.5.8182 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 448.545996][T24077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 448.546016][T24077] Call Trace: [ 448.546021][T24077] [ 448.546027][T24077] __dump_stack+0x1d/0x30 [ 448.546130][T24077] dump_stack_lvl+0xe8/0x140 [ 448.546147][T24077] dump_stack+0x15/0x1b [ 448.546162][T24077] should_fail_ex+0x265/0x280 [ 448.546207][T24077] should_fail+0xb/0x20 [ 448.546232][T24077] should_fail_usercopy+0x1a/0x20 [ 448.546292][T24077] _copy_to_user+0x20/0xa0 [ 448.546316][T24077] simple_read_from_buffer+0xb5/0x130 [ 448.546340][T24077] proc_fail_nth_read+0x100/0x140 [ 448.546369][T24077] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 448.546413][T24077] vfs_read+0x19d/0x6f0 [ 448.546494][T24077] ? __rcu_read_unlock+0x4f/0x70 [ 448.546515][T24077] ? __fget_files+0x184/0x1c0 [ 448.546539][T24077] ksys_read+0xda/0x1a0 [ 448.546561][T24077] __x64_sys_read+0x40/0x50 [ 448.546584][T24077] x64_sys_call+0x2d77/0x2fb0 [ 448.546632][T24077] do_syscall_64+0xd0/0x1a0 [ 448.546661][T24077] ? clear_bhb_loop+0x25/0x80 [ 448.546682][T24077] ? clear_bhb_loop+0x25/0x80 [ 448.546701][T24077] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 448.546760][T24077] RIP: 0033:0x7f56ae18d37c [ 448.546776][T24077] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 448.546793][T24077] RSP: 002b:00007f56ac7f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 448.546815][T24077] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18d37c [ 448.546829][T24077] RDX: 000000000000000f RSI: 00007f56ac7f70a0 RDI: 0000000000000003 [ 448.546853][T24077] RBP: 00007f56ac7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 448.546867][T24077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.546880][T24077] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 448.546900][T24077] [ 450.010390][T24137] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8206'. [ 450.060340][T24139] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8203'. [ 450.509547][T24169] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8219'. [ 450.892369][T24201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=24201 comm=syz.4.8233 [ 450.933300][T24201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24201 comm=syz.4.8233 [ 451.070229][T24221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24221 comm=syz.2.8241 [ 451.083494][T24221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=24221 comm=syz.2.8241 [ 451.417214][T24264] validate_nla: 59 callbacks suppressed [ 451.417236][T24264] netlink: 'syz.4.8259': attribute type 8 has an invalid length. [ 451.425234][ T29] kauditd_printk_skb: 1093 callbacks suppressed [ 451.425250][ T29] audit: type=1400 audit(1747079367.515:105093): avc: denied { prog_load } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 451.491340][ T29] audit: type=1400 audit(1747079367.557:105094): avc: denied { open } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 451.511663][ T29] audit: type=1400 audit(1747079367.557:105095): avc: denied { map_create } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 451.531351][ T29] audit: type=1400 audit(1747079367.557:105096): avc: denied { prog_load } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 451.551246][ T29] audit: type=1400 audit(1747079367.557:105097): avc: denied { prog_load } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 451.570586][ T29] audit: type=1400 audit(1747079367.557:105098): avc: denied { prog_load } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 451.591307][ T29] audit: type=1400 audit(1747079367.557:105099): avc: denied { create } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 451.612241][ T29] audit: type=1400 audit(1747079367.557:105100): avc: denied { create } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 451.633741][ T29] audit: type=1400 audit(1747079367.557:105101): avc: denied { create } for pid=24266 comm="syz.5.8257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 451.654814][ T29] audit: type=1400 audit(1747079367.568:105102): avc: denied { read write } for pid=9985 comm="syz-executor" name="loop5" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 451.967048][T24324] lo: entered promiscuous mode [ 452.045224][T24342] x_tables: duplicate underflow at hook 2 [ 452.063906][T24343] ipvlan0: entered promiscuous mode [ 452.309547][T24365] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 452.584911][T24399] netlink: 'syz.3.8314': attribute type 10 has an invalid length. [ 452.665360][T24412] __nla_validate_parse: 11 callbacks suppressed [ 452.665378][T24412] netlink: 132 bytes leftover after parsing attributes in process `syz.0.8319'. [ 452.681016][T24411] netlink: 132 bytes leftover after parsing attributes in process `syz.0.8319'. [ 453.188260][T24469] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8341'. [ 453.740500][T24500] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 454.011752][T24531] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 454.145924][T24540] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8370'. [ 454.205094][T24542] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8371'. [ 454.226612][T24540] ipvlan0: entered promiscuous mode [ 454.890105][T24614] netlink: 24 bytes leftover after parsing attributes in process `syz.2.8399'. [ 455.066775][T24637] netlink: 'syz.5.8410': attribute type 10 has an invalid length. [ 455.295222][T24659] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 455.451312][T24684] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8430'. [ 455.516402][T24684] netem: change failed [ 455.603141][T24710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=24710 comm=syz.2.8443 [ 455.740676][T24725] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8447'. [ 455.750228][T24725] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8447'. [ 455.759255][T24725] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8447'. [ 455.802672][T24729] ipvlan2: entered promiscuous mode [ 455.947796][T24734] netlink: 'syz.4.8453': attribute type 6 has an invalid length. [ 456.146523][T24751] xt_addrtype: output interface limitation not valid in PREROUTING and INPUT [ 456.193207][ T29] kauditd_printk_skb: 1911 callbacks suppressed [ 456.193221][ T29] audit: type=1400 audit(1747079628.526:106993): avc: denied { open } for pid=24759 comm="syz.3.8464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 456.225040][ T29] audit: type=1400 audit(1747079628.558:106994): avc: denied { prog_load } for pid=24759 comm="syz.3.8464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 456.244507][ T29] audit: type=1400 audit(1747079628.558:106995): avc: denied { prog_load } for pid=24761 comm="syz.4.8465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 456.264031][ T29] audit: type=1400 audit(1747079628.558:106996): avc: denied { create } for pid=24761 comm="syz.4.8465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 456.284216][ T29] audit: type=1400 audit(1747079628.558:106997): avc: denied { create } for pid=24759 comm="syz.3.8464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 456.304373][ T29] audit: type=1400 audit(1747079628.568:106998): avc: denied { map_create } for pid=24759 comm="syz.3.8464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 456.324116][ T29] audit: type=1400 audit(1747079628.568:106999): avc: denied { prog_load } for pid=24759 comm="syz.3.8464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 456.347140][T24776] audit: audit_backlog=65 > audit_backlog_limit=64 [ 456.353758][T24776] audit: audit_lost=94 audit_rate_limit=0 audit_backlog_limit=64 [ 456.361650][T24776] audit: backlog limit exceeded [ 456.476298][T24791] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(9) [ 456.482861][T24791] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 456.490299][T24791] vhci_hcd vhci_hcd.0: Device attached [ 456.635306][T24803] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(12) [ 456.641959][T24803] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 456.649558][T24803] vhci_hcd vhci_hcd.0: Device attached [ 456.689007][T24791] vhci_hcd vhci_hcd.0: pdev(0) rhport(2) sockfd(11) [ 456.695799][T24791] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 456.703527][T24791] vhci_hcd vhci_hcd.0: Device attached [ 456.751964][T24803] vhci_hcd vhci_hcd.0: pdev(0) rhport(3) sockfd(14) [ 456.758650][T24803] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 456.766349][T24803] vhci_hcd vhci_hcd.0: Device attached [ 456.845838][T24791] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 456.895065][T24791] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 456.942655][T24803] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 456.962750][T24803] vhci_hcd vhci_hcd.0: pdev(0) rhport(7) sockfd(24) [ 456.969387][T24803] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 456.977061][T24803] vhci_hcd vhci_hcd.0: Device attached [ 457.002599][T24818] vhci_hcd: connection closed [ 457.002862][T24811] vhci_hcd: connection closed [ 457.015222][T24809] vhci_hcd: connection closed [ 457.020309][T24792] vhci_hcd: connection closed [ 457.034640][T12706] vhci_hcd: stop threads [ 457.043730][T12706] vhci_hcd: release socket [ 457.048159][T12706] vhci_hcd: disconnect device [ 457.092910][T12706] vhci_hcd: stop threads [ 457.097208][T12706] vhci_hcd: release socket [ 457.101704][T12706] vhci_hcd: disconnect device [ 457.193960][T24804] vhci_hcd: connection closed [ 457.209767][T12706] vhci_hcd: stop threads [ 457.219074][T12706] vhci_hcd: release socket [ 457.223548][T12706] vhci_hcd: disconnect device [ 457.279277][T12706] vhci_hcd: stop threads [ 457.283713][T12706] vhci_hcd: release socket [ 457.288297][T12706] vhci_hcd: disconnect device [ 457.294068][T12706] vhci_hcd: stop threads [ 457.298349][T12706] vhci_hcd: release socket [ 457.302823][T12706] vhci_hcd: disconnect device [ 457.401832][T24856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=24856 comm=syz.2.8500 [ 457.490361][T24868] __nla_validate_parse: 4 callbacks suppressed [ 457.490380][T24868] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8506'. [ 457.586212][T24884] netlink: 32 bytes leftover after parsing attributes in process `syz.0.8514'. [ 457.607797][T24887] macvlan2: entered promiscuous mode [ 457.613156][T24887] macvlan2: entered allmulticast mode [ 457.620549][T24887] bond0: (slave macvlan2): Opening slave failed [ 457.775551][T24900] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8519'. [ 457.784571][T24900] netlink: 28 bytes leftover after parsing attributes in process `syz.4.8519'. [ 457.797281][T24900] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.805651][T24900] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.813847][T24900] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.822100][T24900] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.830700][T24900] geneve2: entered promiscuous mode [ 457.835986][T24900] geneve2: entered allmulticast mode [ 457.937419][T24912] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8523'. [ 457.944396][T24911] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8524'. [ 457.994101][T24911] bond3: entered promiscuous mode [ 457.999232][T24911] bond3: entered allmulticast mode [ 458.004561][T24911] 8021q: adding VLAN 0 to HW filter on device bond3 [ 458.062642][T24921] netlink: 'syz.0.8527': attribute type 8 has an invalid length. [ 458.422265][T24984] netem: change failed [ 458.559487][T24980] Cannot find del_set index 3 as target [ 458.624110][T25001] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8560'. [ 458.636701][T25001] ipvlan3: entered promiscuous mode [ 458.959020][T25043] netlink: 'syz.5.8575': attribute type 8 has an invalid length. [ 459.185306][T25075] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 459.191539][T25075] syzkaller0: linktype set to 768 [ 459.605636][T25091] wireguard2: entered promiscuous mode [ 459.808094][T25103] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8598'. [ 459.871897][T25109] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8600'. [ 460.132346][T25158] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8620'. [ 460.261545][T25179] serio: Serial port ptm1 [ 460.345781][T25203] FAULT_INJECTION: forcing a failure. [ 460.345781][T25203] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.359573][T25203] CPU: 0 UID: 0 PID: 25203 Comm: syz.4.8638 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 460.359604][T25203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 460.359616][T25203] Call Trace: [ 460.359623][T25203] [ 460.359632][T25203] __dump_stack+0x1d/0x30 [ 460.359696][T25203] dump_stack_lvl+0xe8/0x140 [ 460.359714][T25203] dump_stack+0x15/0x1b [ 460.359728][T25203] should_fail_ex+0x265/0x280 [ 460.359757][T25203] should_fail+0xb/0x20 [ 460.359820][T25203] should_fail_usercopy+0x1a/0x20 [ 460.359841][T25203] _copy_to_user+0x20/0xa0 [ 460.359935][T25203] simple_read_from_buffer+0xb5/0x130 [ 460.359961][T25203] proc_fail_nth_read+0x100/0x140 [ 460.359989][T25203] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 460.360013][T25203] vfs_read+0x19d/0x6f0 [ 460.360033][T25203] ? __rcu_read_unlock+0x4f/0x70 [ 460.360131][T25203] ? __fget_files+0x184/0x1c0 [ 460.360178][T25203] ksys_read+0xda/0x1a0 [ 460.360205][T25203] __x64_sys_read+0x40/0x50 [ 460.360230][T25203] x64_sys_call+0x2d77/0x2fb0 [ 460.360252][T25203] do_syscall_64+0xd0/0x1a0 [ 460.360285][T25203] ? clear_bhb_loop+0x25/0x80 [ 460.360307][T25203] ? clear_bhb_loop+0x25/0x80 [ 460.360327][T25203] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.360347][T25203] RIP: 0033:0x7f13dfe1d37c [ 460.360364][T25203] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 460.360428][T25203] RSP: 002b:00007f13de487030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 460.360449][T25203] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1d37c [ 460.360462][T25203] RDX: 000000000000000f RSI: 00007f13de4870a0 RDI: 0000000000000003 [ 460.360475][T25203] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 460.360487][T25203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.360499][T25203] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 460.360517][T25203] [ 460.962808][ T29] kauditd_printk_skb: 1672 callbacks suppressed [ 460.962861][ T29] audit: type=1326 audit(1747080402.539:108666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.010469][ T29] audit: type=1326 audit(1747080402.570:108667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.034253][ T29] audit: type=1326 audit(1747080402.570:108668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.058267][ T29] audit: type=1326 audit(1747080402.570:108669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.081991][ T29] audit: type=1326 audit(1747080402.570:108670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=163 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.105700][ T29] audit: type=1326 audit(1747080402.570:108671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.129661][ T29] audit: type=1326 audit(1747080402.570:108672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.153505][ T29] audit: type=1326 audit(1747080402.570:108673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.177306][ T29] audit: type=1326 audit(1747080402.570:108674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.201037][ T29] audit: type=1326 audit(1747080402.570:108675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25250 comm="syz.2.8658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 461.348704][T25271] ipvlan0: entered promiscuous mode [ 461.590894][T25284] bond2: entered promiscuous mode [ 461.595989][T25284] bond2: entered allmulticast mode [ 461.606713][T25284] 8021q: adding VLAN 0 to HW filter on device bond2 [ 461.622813][T25284] bond2 (unregistering): Released all slaves [ 461.650205][T25293] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 461.902858][T25295] cgroup: fork rejected by pids controller in /syz4 [ 462.270401][T25365] __nla_validate_parse: 5 callbacks suppressed [ 462.270419][T25365] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8692'. [ 462.566494][T25442] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8708'. [ 462.805904][T25453] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8713'. [ 463.041060][T25464] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8716'. [ 463.109099][T25467] netlink: 'syz.2.8718': attribute type 8 has an invalid length. [ 463.160532][T25470] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8719'. [ 463.209336][T25470] ipvlan3: entered promiscuous mode [ 464.359779][T25533] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 464.365706][T25533] syzkaller0: linktype set to 776 [ 464.488470][T25546] xt_TPROXY: Can be used only with -p tcp or -p udp [ 464.510470][T25552] netlink: 'syz.0.8751': attribute type 8 has an invalid length. [ 464.778460][T25593] netlink: 'syz.3.8769': attribute type 8 has an invalid length. [ 464.868850][T25606] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8775'. [ 464.881637][T25606] ipvlan0: entered promiscuous mode [ 464.928149][T25590] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.937018][T25590] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.945509][T25590] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.953800][T25590] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.964157][T25590] geneve2: entered promiscuous mode [ 464.969429][T25590] geneve2: entered allmulticast mode [ 464.981370][T25590] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.990451][T25590] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.998987][T25590] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 465.007382][T25590] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 465.145925][T25633] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8788'. [ 465.400363][T25644] netlink: 'syz.3.8791': attribute type 8 has an invalid length. [ 465.732558][ T29] kauditd_printk_skb: 1472 callbacks suppressed [ 465.732577][ T29] audit: type=1400 audit(1747081431.553:110148): avc: denied { read write } for pid=25664 comm="syz.5.8798" name="loop5" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 465.812997][ T29] audit: type=1400 audit(1747081687.619:110149): avc: denied { read write } for pid=9985 comm="syz-executor" name="loop5" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 465.877516][T25677] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8804'. [ 465.898772][T25680] xt_hashlimit: max too large, truncated to 1048576 [ 465.925116][ T29] audit: type=1400 audit(1747081687.661:110150): avc: denied { prog_load } for pid=25668 comm="syz.5.8800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 465.944517][ T29] audit: type=1400 audit(1747081687.671:110151): avc: denied { read write } for pid=9985 comm="syz-executor" name="loop5" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 465.967960][ T29] audit: type=1400 audit(1747081943.686:110152): avc: denied { prog_load } for pid=25671 comm="syz.2.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 465.989186][ T29] audit: type=1400 audit(1747081943.686:110153): avc: denied { map_create } for pid=25671 comm="syz.2.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 466.008939][ T29] audit: type=1400 audit(1747081943.686:110154): avc: denied { prog_load } for pid=25671 comm="syz.2.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 466.028452][ T29] audit: type=1400 audit(1747081943.686:110155): avc: denied { prog_load } for pid=25671 comm="syz.2.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 466.047844][ T29] audit: type=1400 audit(1747081943.686:110156): avc: denied { map_create } for pid=25671 comm="syz.2.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 466.067302][ T29] audit: type=1400 audit(1747081943.686:110157): avc: denied { prog_load } for pid=25671 comm="syz.2.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 466.093959][T25691] macvlan1: entered promiscuous mode [ 466.099840][T25691] ipvlan0: entered promiscuous mode [ 466.110183][T25694] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8811'. [ 466.111816][T25691] ipvlan0: left promiscuous mode [ 466.135115][T25691] macvlan1: left promiscuous mode [ 466.173818][T25694] ipvlan0: entered promiscuous mode [ 466.280523][T25713] netlink: 16 bytes leftover after parsing attributes in process `syz.5.8819'. [ 466.525903][T25751] netlink: 'syz.2.8834': attribute type 15 has an invalid length. [ 466.534411][T25751] netlink: 'syz.2.8834': attribute type 18 has an invalid length. [ 466.566317][T25751] bond4 (unregistering): Released all slaves [ 466.877255][T25781] netlink: 'syz.3.8846': attribute type 17 has an invalid length. [ 466.885181][T25781] netlink: 'syz.3.8846': attribute type 41 has an invalid length. [ 466.920597][T25786] xt_hashlimit: overflow, try lower: 18446744073709551615/7 [ 466.969562][T25790] kernel profiling enabled (shift: 63) [ 466.975171][T25790] profiling shift: 63 too large [ 467.131385][T25806] __nla_validate_parse: 4 callbacks suppressed [ 467.131402][T25806] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8858'. [ 467.237554][T25827] netlink: 'syz.3.8867': attribute type 13 has an invalid length. [ 467.249467][T25827] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 467.524075][T25849] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8877'. [ 467.551667][T25849] ipvlan3: entered promiscuous mode [ 467.702361][T25874] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 467.709449][T25872] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 467.743005][T25878] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8888'. [ 467.867168][T25886] netlink: 'syz.4.8892': attribute type 8 has an invalid length. [ 467.941095][T25890] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8894'. [ 467.973406][T25890] netlink: 'syz.4.8894': attribute type 8 has an invalid length. [ 468.230764][T25915] 8021q: adding VLAN 0 to HW filter on device bond4 [ 468.237972][T25913] netlink: 'syz.3.8902': attribute type 8 has an invalid length. [ 468.268044][T25913] x_tables: ip6_tables: sctp match: only valid for protocol 132 [ 468.339105][T25922] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8906'. [ 468.480894][T25933] vlan0: entered promiscuous mode [ 468.486120][T25933] bridge0: entered promiscuous mode [ 468.491457][T25933] vlan0: entered allmulticast mode [ 468.496615][T25933] bridge0: entered allmulticast mode [ 468.522632][T25938] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8912'. [ 468.543977][T25939] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(11) [ 468.550613][T25939] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 468.558178][T25939] vhci_hcd vhci_hcd.0: Device attached [ 468.572192][T25939] vhci_hcd vhci_hcd.0: pdev(3) rhport(1) sockfd(13) [ 468.574439][T25940] wg2: left promiscuous mode [ 468.578845][T25939] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 468.583529][T25940] wg2: left allmulticast mode [ 468.591477][T25939] vhci_hcd vhci_hcd.0: Device attached [ 468.626406][T25939] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 468.636360][T25939] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(17) [ 468.643047][T25939] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 468.650730][T25939] vhci_hcd vhci_hcd.0: Device attached [ 468.665545][T25940] bond0: (slave bond_slave_0): Releasing backup interface [ 468.725413][T25940] bond0: (slave bond_slave_1): Releasing backup interface [ 468.733334][ T3367] vhci_hcd: vhci_device speed not set [ 468.762495][T25940] batadv1: left allmulticast mode [ 468.768045][T25939] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(19) [ 468.774666][T25939] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 468.782401][T25939] vhci_hcd vhci_hcd.0: Device attached [ 468.783591][T25940] ip6gre1: left promiscuous mode [ 468.789811][ T3367] usb 7-1: new full-speed USB device number 3 using vhci_hcd [ 468.793204][T25952] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(20) [ 468.806924][T25952] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 468.814569][T25952] vhci_hcd vhci_hcd.0: Device attached [ 468.830167][T25940] bond1: left promiscuous mode [ 468.834998][T25940] bond1: left allmulticast mode [ 468.840779][T25960] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 468.853785][T25938] ipvlan3: entered promiscuous mode [ 468.888362][T25939] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 468.897073][T25939] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 468.908331][T25939] vhci_hcd vhci_hcd.0: port 0 already used [ 468.916252][T25954] vhci_hcd: connection closed [ 468.916337][T25950] vhci_hcd: connection closed [ 468.916404][T12664] vhci_hcd: stop threads [ 468.921195][T25942] vhci_hcd: connection reset by peer [ 468.925772][T12664] vhci_hcd: release socket [ 468.925788][T12664] vhci_hcd: disconnect device [ 468.930270][T25945] vhci_hcd: connection closed [ 468.945537][T25953] vhci_hcd: connection closed [ 468.952750][T12664] vhci_hcd: stop threads [ 468.962365][T12664] vhci_hcd: release socket [ 468.966804][T12664] vhci_hcd: disconnect device [ 468.973642][T12664] vhci_hcd: stop threads [ 468.977910][T12664] vhci_hcd: release socket [ 468.982383][T12664] vhci_hcd: disconnect device [ 468.995587][T12664] vhci_hcd: stop threads [ 468.999997][T12664] vhci_hcd: release socket [ 469.004452][T12664] vhci_hcd: disconnect device [ 469.010292][T12664] vhci_hcd: stop threads [ 469.010863][T25974] netlink: 'syz.2.8920': attribute type 8 has an invalid length. [ 469.014555][T12664] vhci_hcd: release socket [ 469.027422][T12664] vhci_hcd: disconnect device [ 469.111625][T25988] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8925'. [ 469.176911][T26000] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8931'. [ 469.358110][T26034] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8945'. [ 469.382145][T26034] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 469.390987][T26034] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 469.399833][T26034] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 469.409040][T26034] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 469.704855][T26080] vlan2: entered promiscuous mode [ 469.710145][T26080] vlan2: entered allmulticast mode [ 469.802062][T26083] netlink: 'GPL': attribute type 8 has an invalid length. [ 470.196593][T26106] vlan2: entered promiscuous mode [ 470.201755][T26106] bridge0: entered promiscuous mode [ 470.207073][T26106] vlan2: entered allmulticast mode [ 470.212254][T26106] bridge0: entered allmulticast mode [ 470.373470][T26122] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8983'. [ 470.384908][T26122] ipvlan0: entered promiscuous mode [ 470.512826][ T29] kauditd_printk_skb: 1568 callbacks suppressed [ 470.512845][ T29] audit: type=1400 audit(1747084764.551:111699): avc: denied { prog_load } for pid=26136 comm="syz.4.8988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.544878][T26142] netlink: 'syz.4.8989': attribute type 8 has an invalid length. [ 470.582591][ T29] audit: type=1400 audit(1747084764.635:111700): avc: denied { prog_load } for pid=26132 comm="syz.3.8985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.628392][ T29] audit: type=1400 audit(1747084764.666:111701): avc: denied { map_create } for pid=26145 comm="syz.4.8990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.647900][ T29] audit: type=1400 audit(1747084764.677:111702): avc: denied { prog_load } for pid=26145 comm="syz.4.8990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.667869][ T29] audit: type=1400 audit(1747084764.677:111703): avc: denied { prog_load } for pid=26145 comm="syz.4.8990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.687231][ T29] audit: type=1400 audit(1747084764.677:111704): avc: denied { create } for pid=26145 comm="syz.4.8990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 470.707719][ T29] audit: type=1400 audit(1747084764.677:111705): avc: denied { prog_load } for pid=26145 comm="syz.4.8990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.727138][ T29] audit: type=1400 audit(1747084764.677:111706): avc: denied { kexec_image_load } for pid=26145 comm="syz.4.8990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=0 [ 470.748178][ T29] audit: type=1400 audit(1747084764.687:111707): avc: denied { create } for pid=26134 comm="syz.0.8987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 470.769159][ T29] audit: type=1400 audit(1747084764.771:111708): avc: denied { prog_load } for pid=26148 comm="syz.4.8991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 471.192763][T26204] netlink: 'syz.4.9013': attribute type 8 has an invalid length. [ 471.469925][T26225] bridge0: port 1() entered blocking state [ 471.476595][T26225] bridge0: port 1() entered disabled state [ 471.498941][T26225] : entered allmulticast mode [ 471.505454][T26225] : entered promiscuous mode [ 471.667053][T26247] lo: entered promiscuous mode [ 471.671950][T26247] lo: entered allmulticast mode [ 471.681995][T26250] ipvlan3: entered promiscuous mode [ 471.862856][T26268] macvlan0: entered promiscuous mode [ 471.868379][T26268] macvlan0: entered allmulticast mode [ 471.885084][T26268] bond0: (slave macvlan0): Opening slave failed [ 472.117334][T26295] bridge0: port 1() entered blocking state [ 472.123382][T26295] bridge0: port 1() entered disabled state [ 472.257883][T26328] FAULT_INJECTION: forcing a failure. [ 472.257883][T26328] name failslab, interval 1, probability 0, space 0, times 0 [ 472.270657][T26328] CPU: 1 UID: 0 PID: 26328 Comm: syz.4.9052 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 472.270682][T26328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 472.270693][T26328] Call Trace: [ 472.270751][T26328] [ 472.270758][T26328] __dump_stack+0x1d/0x30 [ 472.270806][T26328] dump_stack_lvl+0xe8/0x140 [ 472.270829][T26328] dump_stack+0x15/0x1b [ 472.270848][T26328] should_fail_ex+0x265/0x280 [ 472.270891][T26328] should_failslab+0x8c/0xb0 [ 472.270998][T26328] kmem_cache_alloc_noprof+0x50/0x310 [ 472.271041][T26328] ? audit_log_start+0x365/0x6c0 [ 472.271068][T26328] audit_log_start+0x365/0x6c0 [ 472.271096][T26328] audit_seccomp+0x48/0x100 [ 472.271121][T26328] ? __seccomp_filter+0x68c/0x10d0 [ 472.271145][T26328] __seccomp_filter+0x69d/0x10d0 [ 472.271303][T26328] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 472.271333][T26328] ? vfs_write+0x75e/0x8d0 [ 472.271418][T26328] __secure_computing+0x82/0x150 [ 472.271441][T26328] syscall_trace_enter+0xcf/0x1e0 [ 472.271466][T26328] do_syscall_64+0xaa/0x1a0 [ 472.271489][T26328] ? clear_bhb_loop+0x25/0x80 [ 472.271512][T26328] ? clear_bhb_loop+0x25/0x80 [ 472.271560][T26328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.271582][T26328] RIP: 0033:0x7f13dfe1e969 [ 472.271599][T26328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.271639][T26328] RSP: 002b:00007f13de487038 EFLAGS: 00000246 ORIG_RAX: 0000000000000087 [ 472.271680][T26328] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1e969 [ 472.271693][T26328] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 472.271707][T26328] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 472.271779][T26328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.271792][T26328] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 472.271812][T26328] [ 472.600457][T26376] __nla_validate_parse: 4 callbacks suppressed [ 472.600473][T26376] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9056'. [ 473.128458][T26419] macvlan0: entered promiscuous mode [ 473.133903][T26419] macvlan0: entered allmulticast mode [ 473.139915][T26419] bond0: (slave macvlan0): Opening slave failed [ 473.183698][T26421] FAULT_INJECTION: forcing a failure. [ 473.183698][T26421] name failslab, interval 1, probability 0, space 0, times 0 [ 473.196432][T26421] CPU: 1 UID: 0 PID: 26421 Comm: syz.5.9076 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 473.196490][T26421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 473.196498][T26421] Call Trace: [ 473.196502][T26421] [ 473.196507][T26421] __dump_stack+0x1d/0x30 [ 473.196522][T26421] dump_stack_lvl+0xe8/0x140 [ 473.196534][T26421] dump_stack+0x15/0x1b [ 473.196544][T26421] should_fail_ex+0x265/0x280 [ 473.196621][T26421] should_failslab+0x8c/0xb0 [ 473.196771][T26421] __kvmalloc_node_noprof+0x126/0x4d0 [ 473.196827][T26421] ? traverse+0x9d/0x3a0 [ 473.196840][T26421] traverse+0x9d/0x3a0 [ 473.196850][T26421] ? _parse_integer_limit+0x170/0x190 [ 473.196901][T26421] seq_read_iter+0x853/0x940 [ 473.196983][T26421] ? kstrtoull+0x111/0x140 [ 473.197000][T26421] seq_read+0x1f7/0x240 [ 473.197022][T26421] ? __pfx_seq_read+0x10/0x10 [ 473.197032][T26421] proc_reg_read+0x125/0x1c0 [ 473.197063][T26421] ? __pfx_proc_reg_read+0x10/0x10 [ 473.197082][T26421] vfs_read+0x19d/0x6f0 [ 473.197096][T26421] ? __rcu_read_unlock+0x4f/0x70 [ 473.197110][T26421] ? __fget_files+0x184/0x1c0 [ 473.197178][T26421] __x64_sys_pread64+0xfd/0x150 [ 473.197234][T26421] x64_sys_call+0x296d/0x2fb0 [ 473.197257][T26421] do_syscall_64+0xd0/0x1a0 [ 473.197274][T26421] ? clear_bhb_loop+0x25/0x80 [ 473.197325][T26421] ? clear_bhb_loop+0x25/0x80 [ 473.197338][T26421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.197379][T26421] RIP: 0033:0x7f56ae18e969 [ 473.197390][T26421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.197435][T26421] RSP: 002b:00007f56ac7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 473.197449][T26421] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18e969 [ 473.197457][T26421] RDX: 00000000fffffe9c RSI: 0000200000000180 RDI: 0000000000000003 [ 473.197466][T26421] RBP: 00007f56ac7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 473.197474][T26421] R10: 00000000000000b6 R11: 0000000000000246 R12: 0000000000000001 [ 473.197482][T26421] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 473.197494][T26421] [ 473.491854][T26428] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9079'. [ 473.505533][T26428] ipvlan0: entered promiscuous mode [ 473.563648][T26439] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9083'. [ 473.578593][T26439] ipvlan2: entered promiscuous mode [ 473.587627][T26440] netlink: 60 bytes leftover after parsing attributes in process `syz.2.9084'. [ 473.640743][ T3367] usb 7-1: enqueue for inactive port 0 [ 473.646332][ T3367] usb 7-1: enqueue for inactive port 0 [ 473.733192][ T3367] vhci_hcd: vhci_device speed not set [ 473.748583][T26476] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9102'. [ 473.920225][T26507] FAULT_INJECTION: forcing a failure. [ 473.920225][T26507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 473.933601][T26507] CPU: 0 UID: 0 PID: 26507 Comm: syz.4.9114 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 473.933631][T26507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 473.933642][T26507] Call Trace: [ 473.933648][T26507] [ 473.933656][T26507] __dump_stack+0x1d/0x30 [ 473.933677][T26507] dump_stack_lvl+0xe8/0x140 [ 473.933717][T26507] dump_stack+0x15/0x1b [ 473.933734][T26507] should_fail_ex+0x265/0x280 [ 473.933856][T26507] should_fail+0xb/0x20 [ 473.933889][T26507] should_fail_usercopy+0x1a/0x20 [ 473.933908][T26507] _copy_to_user+0x20/0xa0 [ 473.933933][T26507] simple_read_from_buffer+0xb5/0x130 [ 473.933955][T26507] proc_fail_nth_read+0x100/0x140 [ 473.934049][T26507] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 473.934135][T26507] vfs_read+0x19d/0x6f0 [ 473.934154][T26507] ? __rcu_read_unlock+0x4f/0x70 [ 473.934173][T26507] ? __fget_files+0x184/0x1c0 [ 473.934198][T26507] ? __rcu_read_unlock+0x4f/0x70 [ 473.934289][T26507] ksys_read+0xda/0x1a0 [ 473.934318][T26507] __x64_sys_read+0x40/0x50 [ 473.934343][T26507] x64_sys_call+0x2d77/0x2fb0 [ 473.934387][T26507] do_syscall_64+0xd0/0x1a0 [ 473.934489][T26507] ? clear_bhb_loop+0x25/0x80 [ 473.934513][T26507] ? clear_bhb_loop+0x25/0x80 [ 473.934574][T26507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.934594][T26507] RIP: 0033:0x7f13dfe1d37c [ 473.934609][T26507] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 473.934629][T26507] RSP: 002b:00007f13de487030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 473.934652][T26507] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1d37c [ 473.934707][T26507] RDX: 000000000000000f RSI: 00007f13de4870a0 RDI: 0000000000000004 [ 473.934718][T26507] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 473.934796][T26507] R10: 00000000000000b6 R11: 0000000000000246 R12: 0000000000000001 [ 473.934811][T26507] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 473.934829][T26507] [ 474.207934][T26513] netlink: 112 bytes leftover after parsing attributes in process `syz.4.9117'. [ 474.217953][T26513] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9117'. [ 474.745264][T26552] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9130'. [ 474.754314][T26552] netlink: 'syz.5.9130': attribute type 18 has an invalid length. [ 474.762776][T26552] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9130'. [ 474.794562][T26555] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9131'. [ 474.936679][T26577] netlink: 'syz.5.9143': attribute type 8 has an invalid length. [ 475.752436][ T29] kauditd_printk_skb: 1094 callbacks suppressed [ 475.752452][ T29] audit: type=1400 audit(1747085282.068:112801): avc: denied { map_create } for pid=26609 comm="syz.3.9156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 475.778256][ T29] audit: type=1400 audit(1747085282.068:112802): avc: denied { map_create } for pid=26611 comm="syz.0.9155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 475.797701][ T29] audit: type=1326 audit(1747085282.068:112803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 475.821512][ T29] audit: type=1326 audit(1747085282.068:112804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 475.845244][ T29] audit: type=1326 audit(1747085282.068:112805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 475.869075][ T29] audit: type=1326 audit(1747085282.068:112806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 475.892986][ T29] audit: type=1326 audit(1747085282.068:112807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 475.916691][ T29] audit: type=1400 audit(1747085282.068:112808): avc: denied { map_create } for pid=26611 comm="syz.0.9155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 475.936433][ T29] audit: type=1326 audit(1747085282.068:112809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 475.960227][ T29] audit: type=1326 audit(1747085282.068:112810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26611 comm="syz.0.9155" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 476.042109][T26648] ipvlan0: entered promiscuous mode [ 476.240337][T26692] netlink: 'syz.5.9181': attribute type 8 has an invalid length. [ 476.588850][T26713] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26713 comm=syz.3.9188 [ 476.955046][T26743] netlink: 'syz.0.9197': attribute type 8 has an invalid length. [ 476.994879][T26751] macvlan2: entered promiscuous mode [ 477.000510][T26751] bond0: entered promiscuous mode [ 477.007459][T26751] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 477.074409][T26764] wireguard0: entered promiscuous mode [ 477.080677][T26764] wireguard0: entered allmulticast mode [ 477.135435][T26776] ipvlan0: entered promiscuous mode [ 477.241405][T26794] macvlan0: entered promiscuous mode [ 477.248344][T26794] bond0: entered promiscuous mode [ 477.254599][T26794] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 477.310743][T26801] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 477.327654][T26801] gretap1: entered promiscuous mode [ 477.339307][T26801] gretap1: entered allmulticast mode [ 477.354909][T26801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26801 comm=syz.0.9217 [ 477.629018][T26881] FAULT_INJECTION: forcing a failure. [ 477.629018][T26881] name failslab, interval 1, probability 0, space 0, times 0 [ 477.645271][T26881] CPU: 1 UID: 0 PID: 26881 Comm: syz.3.9229 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 477.645313][T26881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 477.645324][T26881] Call Trace: [ 477.645331][T26881] [ 477.645340][T26881] __dump_stack+0x1d/0x30 [ 477.645375][T26881] dump_stack_lvl+0xe8/0x140 [ 477.645396][T26881] dump_stack+0x15/0x1b [ 477.645414][T26881] should_fail_ex+0x265/0x280 [ 477.645448][T26881] should_failslab+0x8c/0xb0 [ 477.645473][T26881] __kmalloc_cache_node_noprof+0x54/0x320 [ 477.645503][T26881] ? __get_vm_area_node+0x106/0x1d0 [ 477.645528][T26881] __get_vm_area_node+0x106/0x1d0 [ 477.645553][T26881] __vmalloc_node_range_noprof+0x26a/0xdf0 [ 477.645657][T26881] ? copy_process+0x399/0x1f90 [ 477.645722][T26881] ? mod_objcg_state+0x40e/0x530 [ 477.645749][T26881] ? copy_process+0x399/0x1f90 [ 477.645776][T26881] __vmalloc_node_noprof+0x63/0x80 [ 477.645835][T26881] ? copy_process+0x399/0x1f90 [ 477.645861][T26881] dup_task_struct+0x449/0x6a0 [ 477.645882][T26881] ? _parse_integer+0x27/0x40 [ 477.645907][T26881] copy_process+0x399/0x1f90 [ 477.645996][T26881] ? kstrtouint+0x76/0xc0 [ 477.646019][T26881] ? kstrtouint_from_user+0x9f/0xf0 [ 477.646051][T26881] ? __rcu_read_unlock+0x4f/0x70 [ 477.646091][T26881] kernel_clone+0x16c/0x5b0 [ 477.646194][T26881] ? vfs_write+0x75e/0x8d0 [ 477.646297][T26881] __x64_sys_clone+0xe6/0x120 [ 477.646332][T26881] x64_sys_call+0x2c59/0x2fb0 [ 477.646355][T26881] do_syscall_64+0xd0/0x1a0 [ 477.646449][T26881] ? clear_bhb_loop+0x25/0x80 [ 477.646469][T26881] ? clear_bhb_loop+0x25/0x80 [ 477.646489][T26881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 477.646510][T26881] RIP: 0033:0x7f0c283de969 [ 477.646549][T26881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.646569][T26881] RSP: 002b:00007f0c26a46fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 477.646591][T26881] RAX: ffffffffffffffda RBX: 00007f0c28605fa0 RCX: 00007f0c283de969 [ 477.646602][T26881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000045128480 [ 477.646614][T26881] RBP: 00007f0c26a47090 R08: 0000000000000000 R09: 0000000000000000 [ 477.646625][T26881] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 477.646690][T26881] R13: 0000000000000001 R14: 00007f0c28605fa0 R15: 00007ffe733616e8 [ 477.646710][T26881] [ 477.646719][T26881] syz.3.9229: vmalloc error: size 16384, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 477.854817][T26883] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.861087][T26881] ,cpuset=syz3,mems_allowed=0 [ 477.861152][T26881] CPU: 1 UID: 0 PID: 26881 Comm: syz.3.9229 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 477.861180][T26881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 477.861194][T26881] Call Trace: [ 477.861201][T26881] [ 477.861210][T26881] __dump_stack+0x1d/0x30 [ 477.861308][T26881] dump_stack_lvl+0xe8/0x140 [ 477.861328][T26881] dump_stack+0x15/0x1b [ 477.861346][T26881] warn_alloc+0x12b/0x1a0 [ 477.861375][T26881] __vmalloc_node_range_noprof+0x28e/0xdf0 [ 477.861450][T26881] ? mod_objcg_state+0x40e/0x530 [ 477.861476][T26881] ? copy_process+0x399/0x1f90 [ 477.861504][T26881] __vmalloc_node_noprof+0x63/0x80 [ 477.861596][T26881] ? copy_process+0x399/0x1f90 [ 477.861622][T26881] dup_task_struct+0x449/0x6a0 [ 477.861646][T26881] ? _parse_integer+0x27/0x40 [ 477.861676][T26881] copy_process+0x399/0x1f90 [ 477.861735][T26881] ? kstrtouint+0x76/0xc0 [ 477.861762][T26881] ? kstrtouint_from_user+0x9f/0xf0 [ 477.861792][T26881] ? __rcu_read_unlock+0x4f/0x70 [ 477.861848][T26881] kernel_clone+0x16c/0x5b0 [ 477.861873][T26881] ? vfs_write+0x75e/0x8d0 [ 477.861960][T26881] __x64_sys_clone+0xe6/0x120 [ 477.862001][T26881] x64_sys_call+0x2c59/0x2fb0 [ 477.862021][T26881] do_syscall_64+0xd0/0x1a0 [ 477.862042][T26881] ? clear_bhb_loop+0x25/0x80 [ 477.862062][T26881] ? clear_bhb_loop+0x25/0x80 [ 477.862127][T26881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 477.862207][T26881] RIP: 0033:0x7f0c283de969 [ 477.862224][T26881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.862283][T26881] RSP: 002b:00007f0c26a46fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 477.862302][T26881] RAX: ffffffffffffffda RBX: 00007f0c28605fa0 RCX: 00007f0c283de969 [ 477.862314][T26881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000045128480 [ 477.862327][T26881] RBP: 00007f0c26a47090 R08: 0000000000000000 R09: 0000000000000000 [ 477.862338][T26881] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 477.862350][T26881] R13: 0000000000000001 R14: 00007f0c28605fa0 R15: 00007ffe733616e8 [ 477.862368][T26881] [ 477.862374][T26881] Mem-Info: [ 477.868256][T26883] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.878585][T26881] active_anon:11794 inactive_anon:68 isolated_anon:0 [ 477.878585][T26881] active_file:14209 inactive_file:14745 isolated_file:0 [ 477.878585][T26881] unevictable:0 dirty:267 writeback:0 [ 477.878585][T26881] slab_reclaimable:3470 slab_unreclaimable:188870 [ 477.878585][T26881] mapped:29418 shmem:223 pagetables:1723 [ 477.878585][T26881] sec_pagetables:0 bounce:0 [ 477.878585][T26881] kernel_misc_reclaimable:0 [ 477.878585][T26881] free:1690160 free_pcp:4819 free_cma:0 [ 477.903222][T26883] bridge_slave_0: entered allmulticast mode [ 477.906904][T26881] Node 0 active_anon:47176kB inactive_anon:272kB active_file:56836kB inactive_file:58980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117672kB dirty:1068kB writeback:0kB shmem:892kB writeback_tmp:0kB kernel_stack:5632kB pagetables:7008kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 477.916535][T26883] bridge_slave_0: entered promiscuous mode [ 477.923762][T26881] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 477.923873][T26881] lowmem_reserve[]: 0 2884 7863 7863 [ 477.923903][T26881] Node 0 DMA32 free:2949936kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953568kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:3532kB free_cma:0kB [ 477.923995][T26881] lowmem_reserve[]: 0 0 4978 4978 [ 477.924023][T26881] Node 0 Normal free:3795344kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:47176kB inactive_anon:272kB active_file:56836kB inactive_file:58980kB unevictable:0kB writepending:1068kB present:5242880kB managed:5098244kB mlocked:0kB bounce:0kB free_pcp:15460kB local_pcp:1412kB free_cma:0kB [ 477.924130][T26881] lowmem_reserve[]: 0 0 0 0 [ 477.924157][T26881] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 477.924346][T26881] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 1*16kB (M) 4*32kB (M) 2*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949936kB [ 478.419060][T26881] Node 0 Normal: 1572*4kB (UME) 953*8kB (M) 740*16kB (UME) 1263*32kB (UME) 730*64kB (UME) 544*128kB (UME) 457*256kB (UM) 370*512kB (UME) 255*1024kB (UM) 159*2048kB (UM) 661*4096kB (UM) = 3783160kB [ 478.438950][T26881] Node 0 hugepages_total=8 hugepages_free=2 hugepages_surp=4 hugepages_size=2048kB [ 478.440327][T26936] netlink: 'syz.0.9254': attribute type 8 has an invalid length. [ 478.448409][T26881] 29271 total pagecache pages [ 478.448421][T26881] 61 pages in swap cache [ 478.448429][T26881] Free swap = 55772kB [ 478.448436][T26881] Total swap = 124996kB [ 478.448512][T26881] 2097051 pages RAM [ 478.448518][T26881] 0 pages HighMem/MovableOnly [ 478.448525][T26881] 80258 pages reserved [ 478.646747][T26984] __nla_validate_parse: 11 callbacks suppressed [ 478.646766][T26984] netlink: 24 bytes leftover after parsing attributes in process `syz.4.9267'. [ 478.792394][T27019] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9271'. [ 479.005402][T27041] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9280'. [ 479.443180][T27097] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9293'. [ 479.481684][T27102] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9294'. [ 479.533879][T27097] ipvlan0: entered promiscuous mode [ 479.609276][T27126] netlink: 132 bytes leftover after parsing attributes in process `syz.4.9302'. [ 479.658805][T27132] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9305'. [ 479.705863][T27134] netlink: 'syz.0.9306': attribute type 8 has an invalid length. [ 479.765901][T27148] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9307'. [ 479.958088][T27179] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9319'. [ 480.027006][T27195] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9322'. [ 480.288164][T27283] netlink: 'syz.5.9334': attribute type 4 has an invalid length. [ 480.521739][ T29] kauditd_printk_skb: 2128 callbacks suppressed [ 480.521756][ T29] audit: type=1400 audit(1747086055.086:114939): avc: denied { create } for pid=27329 comm="syz.4.9352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 480.548715][ T29] audit: type=1400 audit(1747086055.086:114940): avc: denied { create } for pid=27329 comm="syz.4.9352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 480.568535][ T29] audit: type=1400 audit(1747086055.086:114941): avc: denied { create } for pid=27329 comm="syz.4.9352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 480.660771][T27362] ipvlan3: entered promiscuous mode [ 480.670696][T27370] netlink: 'syz.3.9359': attribute type 8 has an invalid length. [ 480.680679][T27371] audit: audit_lost=107 audit_rate_limit=0 audit_backlog_limit=64 [ 480.688704][T27371] audit: out of memory in audit_log_start [ 480.694940][ T29] audit: type=1400 audit(1747086055.086:114942): avc: denied { create } for pid=27329 comm="syz.4.9352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 480.714837][ T29] audit: type=1400 audit(1747086055.086:114943): avc: denied { prog_load } for pid=27329 comm="syz.4.9352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 480.734212][ T29] audit: type=1400 audit(1747086055.086:114944): avc: denied { prog_load } for pid=27333 comm="syz.5.9350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 480.753665][ T29] audit: type=1400 audit(1747086055.086:114945): avc: denied { allowed } for pid=27333 comm="syz.5.9350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 480.773362][ T29] audit: type=1400 audit(1747086055.086:114946): avc: denied { prog_load } for pid=27333 comm="syz.5.9350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 480.842232][T27381] macvlan0: entered promiscuous mode [ 480.847706][T27381] macvlan0: entered allmulticast mode [ 480.856236][T27381] bond0: (slave macvlan0): Opening slave failed [ 481.113816][T27428] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=27428 comm=syz.2.9377 [ 481.571550][T27493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65392 sclass=netlink_route_socket pid=27493 comm=syz.5.9388 [ 481.857009][T27530] macvlan2: entered promiscuous mode [ 481.862401][T27530] macvlan2: entered allmulticast mode [ 481.911538][T27530] bond0: (slave macvlan2): Opening slave failed [ 482.021702][T27548] netlink: 'syz.0.9409': attribute type 8 has an invalid length. [ 482.120681][T27562] ipvlan0: entered promiscuous mode [ 482.357531][T27622] serio: Serial port ptm1 [ 483.010276][T27766] pim6reg1: entered promiscuous mode [ 483.015708][T27766] pim6reg1: entered allmulticast mode [ 483.168333][T27781] macvlan0: entered promiscuous mode [ 483.173733][T27781] macvlan0: entered allmulticast mode [ 483.180251][T27781] bond0: (slave macvlan0): Opening slave failed [ 483.314314][T27819] netlink: 'syz.4.9483': attribute type 10 has an invalid length. [ 483.324811][T27819] dummy0: entered promiscuous mode [ 483.330236][T27819] dummy0: entered allmulticast mode [ 483.336253][T27819] : (slave dummy0): Enslaving as an active interface with an up link [ 483.416204][T27835] __nla_validate_parse: 33 callbacks suppressed [ 483.416222][T27835] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9489'. [ 483.481348][T27837] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9490'. [ 483.542813][T27843] macvlan1: entered promiscuous mode [ 483.548233][T27843] macvlan1: entered allmulticast mode [ 483.549305][T27857] netlink: 'syz.4.9492': attribute type 8 has an invalid length. [ 483.565662][T27843] bond0: (slave macvlan1): Opening slave failed [ 483.654717][T27876] netlink: 'syz.3.9501': attribute type 8 has an invalid length. [ 483.675561][T27880] netlink: 28 bytes leftover after parsing attributes in process `syz.5.9503'. [ 483.684635][T27880] netlink: 28 bytes leftover after parsing attributes in process `syz.5.9503'. [ 483.693948][T27880] netlink: 52 bytes leftover after parsing attributes in process `syz.5.9503'. [ 483.715543][T27880] netlink: 'syz.5.9503': attribute type 10 has an invalid length. [ 483.752167][T27896] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9507'. [ 483.852794][T27914] macsec0: entered promiscuous mode [ 483.858717][T27914] veth1_to_bridge: entered promiscuous mode [ 483.865068][T27914] macsec0: entered allmulticast mode [ 483.870436][T27914] veth1_to_bridge: entered allmulticast mode [ 483.883573][T27914] veth1_to_bridge: left allmulticast mode [ 483.889424][T27914] veth1_to_bridge: left promiscuous mode [ 483.919864][T27933] macvlan0: entered promiscuous mode [ 483.925312][T27933] macvlan0: entered allmulticast mode [ 483.936088][T27933] bond0: (slave macvlan0): Opening slave failed [ 483.969690][T27937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=27937 comm=syz.4.9515 [ 484.008763][T27954] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9520'. [ 484.063767][T27956] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9521'. [ 484.119705][T27980] SELinux: syz.0.9527 (27980) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 484.202434][T27999] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9534'. [ 484.216570][T27991] macvlan0: entered promiscuous mode [ 484.222042][T27991] macvlan0: entered allmulticast mode [ 484.228403][T27991] bond0: (slave macvlan0): Opening slave failed [ 484.322783][T28029] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9541'. [ 484.498386][T28092] macvlan0: entered promiscuous mode [ 484.503800][T28092] macvlan0: entered allmulticast mode [ 484.512865][T28092] bond0: (slave macvlan0): Opening slave failed [ 484.636972][T28112] FAULT_INJECTION: forcing a failure. [ 484.636972][T28112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 484.650096][T28112] CPU: 0 UID: 0 PID: 28112 Comm: syz.3.9560 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 484.650121][T28112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 484.650187][T28112] Call Trace: [ 484.650229][T28112] [ 484.650237][T28112] __dump_stack+0x1d/0x30 [ 484.650257][T28112] dump_stack_lvl+0xe8/0x140 [ 484.650274][T28112] dump_stack+0x15/0x1b [ 484.650292][T28112] should_fail_ex+0x265/0x280 [ 484.650327][T28112] should_fail+0xb/0x20 [ 484.650434][T28112] should_fail_usercopy+0x1a/0x20 [ 484.650456][T28112] _copy_from_user+0x1c/0xb0 [ 484.650481][T28112] ___sys_sendmsg+0xc1/0x1d0 [ 484.650516][T28112] __x64_sys_sendmsg+0xd4/0x160 [ 484.650540][T28112] x64_sys_call+0x2999/0x2fb0 [ 484.650592][T28112] do_syscall_64+0xd0/0x1a0 [ 484.650617][T28112] ? clear_bhb_loop+0x25/0x80 [ 484.650642][T28112] ? clear_bhb_loop+0x25/0x80 [ 484.650664][T28112] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 484.650684][T28112] RIP: 0033:0x7f0c283de969 [ 484.650760][T28112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.650823][T28112] RSP: 002b:00007f0c26a47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 484.650870][T28112] RAX: ffffffffffffffda RBX: 00007f0c28605fa0 RCX: 00007f0c283de969 [ 484.650884][T28112] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 484.650905][T28112] RBP: 00007f0c26a47090 R08: 0000000000000000 R09: 0000000000000000 [ 484.650919][T28112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.650944][T28112] R13: 0000000000000000 R14: 00007f0c28605fa0 R15: 00007ffe733616e8 [ 484.650964][T28112] [ 484.935496][T28124] macsec0: entered promiscuous mode [ 484.940878][T28124] veth1_to_bridge: entered promiscuous mode [ 484.947594][T28124] macsec0: entered allmulticast mode [ 484.952914][T28124] veth1_to_bridge: entered allmulticast mode [ 484.966214][T28124] veth1_to_bridge: left allmulticast mode [ 484.972006][T28124] veth1_to_bridge: left promiscuous mode [ 485.179922][T28181] netlink: 'syz.3.9576': attribute type 8 has an invalid length. [ 485.190787][T28182] binfmt_misc: register: failed to install interpreter file ./file0 [ 485.282656][ T29] kauditd_printk_skb: 1888 callbacks suppressed [ 485.282682][ T29] audit: type=1326 audit(1747086572.099:116831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28193 comm="syz.0.9581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 485.312601][ T29] audit: type=1326 audit(1747086572.099:116832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28193 comm="syz.0.9581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 485.336430][ T29] audit: type=1326 audit(1747086572.099:116833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28193 comm="syz.0.9581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 485.438118][ T29] audit: type=1326 audit(1747086572.183:116834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28193 comm="syz.0.9581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 485.461851][ T29] audit: type=1326 audit(1747086572.183:116835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28193 comm="syz.0.9581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 485.485670][ T29] audit: type=1326 audit(1747086572.183:116836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28193 comm="syz.0.9581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 485.522342][ T29] audit: type=1400 audit(1747086572.268:116837): avc: denied { open } for pid=28197 comm="syz.0.9582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 485.542016][ T29] audit: type=1400 audit(1747086572.268:116838): avc: denied { create } for pid=28197 comm="syz.0.9582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 485.562922][ T29] audit: type=1400 audit(1747086572.268:116839): avc: denied { execmem } for pid=28197 comm="syz.0.9582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 485.582498][ T29] audit: type=1400 audit(1747086572.289:116840): avc: denied { map_create } for pid=28197 comm="syz.0.9582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 485.649248][T28203] ipvlan2: entered promiscuous mode [ 485.780199][T28239] xt_socket: unknown flags 0xc [ 486.929244][T28427] FAULT_INJECTION: forcing a failure. [ 486.929244][T28427] name failslab, interval 1, probability 0, space 0, times 0 [ 486.942218][T28427] CPU: 1 UID: 0 PID: 28427 Comm: syz.4.9635 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 486.942259][T28427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 486.942282][T28427] Call Trace: [ 486.942288][T28427] [ 486.942295][T28427] __dump_stack+0x1d/0x30 [ 486.942319][T28427] dump_stack_lvl+0xe8/0x140 [ 486.942339][T28427] dump_stack+0x15/0x1b [ 486.942399][T28427] should_fail_ex+0x265/0x280 [ 486.942433][T28427] should_failslab+0x8c/0xb0 [ 486.942466][T28427] kmem_cache_alloc_node_noprof+0x57/0x320 [ 486.942565][T28427] ? __alloc_skb+0x101/0x320 [ 486.942599][T28427] __alloc_skb+0x101/0x320 [ 486.942631][T28427] netlink_alloc_large_skb+0xba/0xf0 [ 486.942656][T28427] netlink_sendmsg+0x3cf/0x6b0 [ 486.942808][T28427] ? __pfx_netlink_sendmsg+0x10/0x10 [ 486.942929][T28427] __sock_sendmsg+0x142/0x180 [ 486.942958][T28427] ____sys_sendmsg+0x31e/0x4e0 [ 486.942982][T28427] ___sys_sendmsg+0x17b/0x1d0 [ 486.943092][T28427] __x64_sys_sendmsg+0xd4/0x160 [ 486.943175][T28427] x64_sys_call+0x2999/0x2fb0 [ 486.943199][T28427] do_syscall_64+0xd0/0x1a0 [ 486.943298][T28427] ? clear_bhb_loop+0x25/0x80 [ 486.943322][T28427] ? clear_bhb_loop+0x25/0x80 [ 486.943400][T28427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.943421][T28427] RIP: 0033:0x7f13dfe1e969 [ 486.943438][T28427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.943458][T28427] RSP: 002b:00007f13de487038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 486.943532][T28427] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1e969 [ 486.943543][T28427] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 486.943555][T28427] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 486.943565][T28427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.943579][T28427] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 486.943599][T28427] [ 487.181528][T28433] sch_fq: defrate 2048 ignored. [ 487.258985][T28462] macvlan2: entered promiscuous mode [ 487.265019][T28462] macvlan2: entered allmulticast mode [ 487.271655][T28462] bond0: (slave macvlan2): Opening slave failed [ 487.676072][T28521] netlink: 'syz.4.9667': attribute type 13 has an invalid length. [ 487.694091][T28521] 8021q: adding VLAN 0 to HW filter on device  [ 487.705631][T28521] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 487.909316][T28554] ipvlan2: entered promiscuous mode [ 488.162186][T28603] __nla_validate_parse: 29 callbacks suppressed [ 488.162204][T28603] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9699'. [ 488.180306][T28604] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9681'. [ 488.216735][T28609] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9701'. [ 488.484604][T28635] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9711'. [ 488.527464][T28614] x_tables: unsorted underflow at hook 3 [ 488.944484][T28684] netlink: 16 bytes leftover after parsing attributes in process `syz.4.9719'. [ 489.021682][T28696] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9722'. [ 489.095769][T28710] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9732'. [ 489.151518][T28730] netlink: 48 bytes leftover after parsing attributes in process `syz.3.9736'. [ 489.194271][T28739] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 489.201298][T28741] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9740'. [ 489.282066][T28755] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9744'. [ 489.882139][T28885] ipvlan2: entered promiscuous mode [ 490.020373][ T29] kauditd_printk_skb: 1273 callbacks suppressed [ 490.020389][ T29] audit: type=1326 audit(1747086833.110:118114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.050556][ T29] audit: type=1326 audit(1747086833.110:118115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.074811][ T29] audit: type=1326 audit(1747086833.110:118116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.098531][ T29] audit: type=1326 audit(1747086833.110:118117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.122424][ T29] audit: type=1326 audit(1747086833.110:118118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.146054][ T29] audit: type=1326 audit(1747086833.110:118119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.170007][ T29] audit: type=1326 audit(1747086833.110:118120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.193786][ T29] audit: type=1326 audit(1747086833.110:118121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.217955][ T29] audit: type=1326 audit(1747086833.110:118122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=240 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.242006][ T29] audit: type=1326 audit(1747086833.110:118123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28906 comm="syz.5.9780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56ae18e969 code=0x7ffc0000 [ 490.288609][T28943] FAULT_INJECTION: forcing a failure. [ 490.288609][T28943] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.301872][T28943] CPU: 0 UID: 0 PID: 28943 Comm: syz.5.9796 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 490.301909][T28943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 490.301922][T28943] Call Trace: [ 490.301928][T28943] [ 490.301936][T28943] __dump_stack+0x1d/0x30 [ 490.302023][T28943] dump_stack_lvl+0xe8/0x140 [ 490.302043][T28943] dump_stack+0x15/0x1b [ 490.302060][T28943] should_fail_ex+0x265/0x280 [ 490.302088][T28943] should_fail+0xb/0x20 [ 490.302183][T28943] should_fail_usercopy+0x1a/0x20 [ 490.302200][T28943] _copy_from_user+0x1c/0xb0 [ 490.302298][T28943] __x64_sys_sendfile64+0x88/0x150 [ 490.302331][T28943] x64_sys_call+0xb39/0x2fb0 [ 490.302353][T28943] do_syscall_64+0xd0/0x1a0 [ 490.302425][T28943] ? clear_bhb_loop+0x25/0x80 [ 490.302444][T28943] ? clear_bhb_loop+0x25/0x80 [ 490.302462][T28943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 490.302483][T28943] RIP: 0033:0x7f56ae18e969 [ 490.302500][T28943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.302528][T28943] RSP: 002b:00007f56ac7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 490.302549][T28943] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18e969 [ 490.302562][T28943] RDX: 0000200000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 490.302573][T28943] RBP: 00007f56ac7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 490.302584][T28943] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 490.302627][T28943] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 490.302645][T28943] [ 490.582309][T28976] FAULT_INJECTION: forcing a failure. [ 490.582309][T28976] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.586268][T28977] netlink: 'syz.0.9808': attribute type 13 has an invalid length. [ 490.595454][T28976] CPU: 1 UID: 0 PID: 28976 Comm: syz.4.9809 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 490.595538][T28976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 490.595550][T28976] Call Trace: [ 490.595599][T28976] [ 490.595607][T28976] __dump_stack+0x1d/0x30 [ 490.595636][T28976] dump_stack_lvl+0xe8/0x140 [ 490.595656][T28976] dump_stack+0x15/0x1b [ 490.595672][T28976] should_fail_ex+0x265/0x280 [ 490.595702][T28976] should_fail+0xb/0x20 [ 490.595729][T28976] should_fail_usercopy+0x1a/0x20 [ 490.595747][T28976] _copy_from_iter+0xcf/0xdd0 [ 490.595764][T28976] ? __build_skb_around+0x1a0/0x200 [ 490.595793][T28976] ? __alloc_skb+0x223/0x320 [ 490.595821][T28976] netlink_sendmsg+0x471/0x6b0 [ 490.595970][T28976] ? __pfx_netlink_sendmsg+0x10/0x10 [ 490.596035][T28976] __sock_sendmsg+0x142/0x180 [ 490.596060][T28976] ____sys_sendmsg+0x31e/0x4e0 [ 490.596170][T28976] ___sys_sendmsg+0x17b/0x1d0 [ 490.596204][T28976] __x64_sys_sendmsg+0xd4/0x160 [ 490.596226][T28976] x64_sys_call+0x2999/0x2fb0 [ 490.596246][T28976] do_syscall_64+0xd0/0x1a0 [ 490.596269][T28976] ? clear_bhb_loop+0x25/0x80 [ 490.596365][T28976] ? clear_bhb_loop+0x25/0x80 [ 490.596386][T28976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 490.596406][T28976] RIP: 0033:0x7f13dfe1e969 [ 490.596422][T28976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.596505][T28976] RSP: 002b:00007f13de487038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 490.596525][T28976] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1e969 [ 490.596537][T28976] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 490.596589][T28976] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 490.596601][T28976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.596612][T28976] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 490.596636][T28976] [ 490.663325][T28984] SELinux: syz.5.9806 (28984) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 490.834048][T28977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 490.843575][T28977] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 490.907841][T28993] FAULT_INJECTION: forcing a failure. [ 490.907841][T28993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.921065][T28993] CPU: 0 UID: 0 PID: 28993 Comm: syz.0.9814 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 490.921099][T28993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 490.921112][T28993] Call Trace: [ 490.921118][T28993] [ 490.921125][T28993] __dump_stack+0x1d/0x30 [ 490.921166][T28993] dump_stack_lvl+0xe8/0x140 [ 490.921186][T28993] dump_stack+0x15/0x1b [ 490.921202][T28993] should_fail_ex+0x265/0x280 [ 490.921317][T28993] should_fail+0xb/0x20 [ 490.921424][T28993] should_fail_usercopy+0x1a/0x20 [ 490.921444][T28993] strncpy_from_user+0x25/0x230 [ 490.921500][T28993] __x64_sys_lgetxattr+0xa5/0x140 [ 490.921551][T28993] x64_sys_call+0x1b0e/0x2fb0 [ 490.921599][T28993] do_syscall_64+0xd0/0x1a0 [ 490.921623][T28993] ? clear_bhb_loop+0x25/0x80 [ 490.921645][T28993] ? clear_bhb_loop+0x25/0x80 [ 490.921667][T28993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 490.921729][T28993] RIP: 0033:0x7fd13790e969 [ 490.921746][T28993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.921765][T28993] RSP: 002b:00007fd135f77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 490.921786][T28993] RAX: ffffffffffffffda RBX: 00007fd137b35fa0 RCX: 00007fd13790e969 [ 490.921799][T28993] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000200000000000 [ 490.921812][T28993] RBP: 00007fd135f77090 R08: 0000000000000000 R09: 0000000000000000 [ 490.921880][T28993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.921892][T28993] R13: 0000000000000000 R14: 00007fd137b35fa0 R15: 00007fff8d59b978 [ 490.921911][T28993] [ 491.388621][T29023] netlink: 'syz.5.9824': attribute type 8 has an invalid length. [ 491.445584][T29036] netlink: 'syz.5.9827': attribute type 13 has an invalid length. [ 491.472909][T29036] 8021q: adding VLAN 0 to HW filter on device team0 [ 491.495923][T29036] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 491.816219][T29086] ipvlan0: entered promiscuous mode [ 491.958821][T29099] FAULT_INJECTION: forcing a failure. [ 491.958821][T29099] name failslab, interval 1, probability 0, space 0, times 0 [ 491.971604][T29099] CPU: 1 UID: 0 PID: 29099 Comm: syz.3.9851 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 491.971630][T29099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 491.971641][T29099] Call Trace: [ 491.971647][T29099] [ 491.971655][T29099] __dump_stack+0x1d/0x30 [ 491.971675][T29099] dump_stack_lvl+0xe8/0x140 [ 491.971748][T29099] dump_stack+0x15/0x1b [ 491.971763][T29099] should_fail_ex+0x265/0x280 [ 491.971790][T29099] should_failslab+0x8c/0xb0 [ 491.971815][T29099] kmem_cache_alloc_noprof+0x50/0x310 [ 491.971988][T29099] ? audit_log_start+0x365/0x6c0 [ 491.972014][T29099] audit_log_start+0x365/0x6c0 [ 491.972047][T29099] audit_seccomp+0x48/0x100 [ 491.972190][T29099] ? __seccomp_filter+0x68c/0x10d0 [ 491.972214][T29099] __seccomp_filter+0x69d/0x10d0 [ 491.972237][T29099] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 491.972262][T29099] ? vfs_write+0x75e/0x8d0 [ 491.972283][T29099] ? __rcu_read_unlock+0x4f/0x70 [ 491.972302][T29099] ? __fget_files+0x184/0x1c0 [ 491.972329][T29099] ? 0xffffffff81000000 [ 491.972417][T29099] __secure_computing+0x82/0x150 [ 491.972435][T29099] syscall_trace_enter+0xcf/0x1e0 [ 491.972455][T29099] do_syscall_64+0xaa/0x1a0 [ 491.972539][T29099] ? clear_bhb_loop+0x25/0x80 [ 491.972559][T29099] ? clear_bhb_loop+0x25/0x80 [ 491.972577][T29099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 491.972598][T29099] RIP: 0033:0x7f0c283de969 [ 491.972633][T29099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.972651][T29099] RSP: 002b:00007f0c26a47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 491.972673][T29099] RAX: ffffffffffffffda RBX: 00007f0c28605fa0 RCX: 00007f0c283de969 [ 491.972688][T29099] RDX: 0000000000000000 RSI: 000000000000126c RDI: 0000000000000000 [ 491.972701][T29099] RBP: 00007f0c26a47090 R08: ffffffff81000000 R09: 0000000000000000 [ 491.972727][T29099] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 491.972738][T29099] R13: 0000000000000000 R14: 00007f0c28605fa0 R15: 00007ffe733616e8 [ 491.972752][T29099] ? 0xffffffff81000000 [ 491.972810][T29099] [ 492.204392][T29102] netlink: 'syz.0.9852': attribute type 1 has an invalid length. [ 492.220917][T29102] 8021q: adding VLAN 0 to HW filter on device bond2 [ 492.238463][T29102] 8021q: adding VLAN 0 to HW filter on device bond2 [ 492.246180][T29102] bond2: (slave vxcan3): The slave device specified does not support setting the MAC address [ 492.257790][T29102] bond2: (slave vxcan3): Error -95 calling set_mac_address [ 492.514619][T29191] netlink: 'syz.5.9869': attribute type 8 has an invalid length. [ 492.534600][T29194] SELinux: syz.3.9868 (29194) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 492.587464][T29206] FAULT_INJECTION: forcing a failure. [ 492.587464][T29206] name failslab, interval 1, probability 0, space 0, times 0 [ 492.600259][T29206] CPU: 0 UID: 0 PID: 29206 Comm: syz.5.9873 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 492.600288][T29206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 492.600308][T29206] Call Trace: [ 492.600315][T29206] [ 492.600323][T29206] __dump_stack+0x1d/0x30 [ 492.600347][T29206] dump_stack_lvl+0xe8/0x140 [ 492.600365][T29206] dump_stack+0x15/0x1b [ 492.600381][T29206] should_fail_ex+0x265/0x280 [ 492.600473][T29206] ? alloc_pipe_info+0xae/0x350 [ 492.600489][T29206] should_failslab+0x8c/0xb0 [ 492.600600][T29206] __kmalloc_cache_noprof+0x4c/0x320 [ 492.600615][T29206] alloc_pipe_info+0xae/0x350 [ 492.600631][T29206] splice_direct_to_actor+0x592/0x680 [ 492.600692][T29206] ? kstrtouint_from_user+0x9f/0xf0 [ 492.600709][T29206] ? __pfx_direct_splice_actor+0x10/0x10 [ 492.600722][T29206] ? __rcu_read_unlock+0x4f/0x70 [ 492.600789][T29206] ? get_pid_task+0x96/0xd0 [ 492.600877][T29206] ? avc_policy_seqno+0x15/0x30 [ 492.600896][T29206] do_splice_direct+0xda/0x150 [ 492.600909][T29206] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 492.600925][T29206] do_sendfile+0x380/0x640 [ 492.600995][T29206] __x64_sys_sendfile64+0xb8/0x150 [ 492.601013][T29206] x64_sys_call+0xb39/0x2fb0 [ 492.601026][T29206] do_syscall_64+0xd0/0x1a0 [ 492.601040][T29206] ? clear_bhb_loop+0x25/0x80 [ 492.601109][T29206] ? clear_bhb_loop+0x25/0x80 [ 492.601122][T29206] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.601135][T29206] RIP: 0033:0x7f56ae18e969 [ 492.601147][T29206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.601204][T29206] RSP: 002b:00007f56ac7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 492.601218][T29206] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18e969 [ 492.601227][T29206] RDX: 0000200000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 492.601235][T29206] RBP: 00007f56ac7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 492.601242][T29206] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 492.601250][T29206] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 492.601262][T29206] [ 492.997443][T29245] FAULT_INJECTION: forcing a failure. [ 492.997443][T29245] name failslab, interval 1, probability 0, space 0, times 0 [ 493.010139][T29245] CPU: 0 UID: 0 PID: 29245 Comm: syz.5.9889 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 493.010170][T29245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 493.010263][T29245] Call Trace: [ 493.010270][T29245] [ 493.010277][T29245] __dump_stack+0x1d/0x30 [ 493.010299][T29245] dump_stack_lvl+0xe8/0x140 [ 493.010320][T29245] dump_stack+0x15/0x1b [ 493.010338][T29245] should_fail_ex+0x265/0x280 [ 493.010370][T29245] should_failslab+0x8c/0xb0 [ 493.010465][T29245] kmem_cache_alloc_noprof+0x50/0x310 [ 493.010496][T29245] ? getname_flags+0x80/0x3b0 [ 493.010530][T29245] getname_flags+0x80/0x3b0 [ 493.010562][T29245] __x64_sys_lgetxattr+0xfd/0x140 [ 493.010604][T29245] x64_sys_call+0x1b0e/0x2fb0 [ 493.010650][T29245] do_syscall_64+0xd0/0x1a0 [ 493.010670][T29245] ? clear_bhb_loop+0x25/0x80 [ 493.010689][T29245] ? clear_bhb_loop+0x25/0x80 [ 493.010708][T29245] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 493.010810][T29245] RIP: 0033:0x7f56ae18e969 [ 493.010825][T29245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 493.010841][T29245] RSP: 002b:00007f56ac7f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 493.010870][T29245] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18e969 [ 493.010883][T29245] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000200000000000 [ 493.010932][T29245] RBP: 00007f56ac7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 493.010944][T29245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 493.010958][T29245] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 493.010974][T29245] [ 493.287586][T29270] __nla_validate_parse: 23 callbacks suppressed [ 493.287605][T29270] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9896'. [ 493.339310][T29274] netlink: 'syz.4.9897': attribute type 8 has an invalid length. [ 493.499305][T29318] netlink: 'syz.5.9908': attribute type 7 has an invalid length. [ 493.499722][T29324] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9910'. [ 493.507165][T29318] netlink: 'syz.5.9908': attribute type 8 has an invalid length. [ 493.535108][T29311] netlink: 24 bytes leftover after parsing attributes in process `syz.4.9905'. [ 493.602827][T29334] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9913'. [ 493.825215][T29357] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9922'. [ 493.844402][T29357] ipvlan0: entered promiscuous mode [ 493.929638][T29367] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9924'. [ 494.019709][T29372] FAULT_INJECTION: forcing a failure. [ 494.019709][T29372] name failslab, interval 1, probability 0, space 0, times 0 [ 494.032443][T29372] CPU: 0 UID: 0 PID: 29372 Comm: syz.5.9926 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 494.032474][T29372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 494.032487][T29372] Call Trace: [ 494.032495][T29372] [ 494.032504][T29372] __dump_stack+0x1d/0x30 [ 494.032529][T29372] dump_stack_lvl+0xe8/0x140 [ 494.032551][T29372] dump_stack+0x15/0x1b [ 494.032613][T29372] should_fail_ex+0x265/0x280 [ 494.032649][T29372] should_failslab+0x8c/0xb0 [ 494.032682][T29372] kmem_cache_alloc_node_noprof+0x57/0x320 [ 494.032715][T29372] ? __alloc_skb+0x101/0x320 [ 494.032811][T29372] __alloc_skb+0x101/0x320 [ 494.032841][T29372] ? audit_log_start+0x365/0x6c0 [ 494.032937][T29372] audit_log_start+0x380/0x6c0 [ 494.032967][T29372] audit_seccomp+0x48/0x100 [ 494.033006][T29372] ? __seccomp_filter+0x68c/0x10d0 [ 494.033030][T29372] __seccomp_filter+0x69d/0x10d0 [ 494.033055][T29372] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 494.033083][T29372] ? vfs_write+0x75e/0x8d0 [ 494.033161][T29372] ? __rcu_read_unlock+0x4f/0x70 [ 494.033185][T29372] ? __fget_files+0x184/0x1c0 [ 494.033215][T29372] ? 0xffffffff81000000 [ 494.033233][T29372] __secure_computing+0x82/0x150 [ 494.033317][T29372] syscall_trace_enter+0xcf/0x1e0 [ 494.033341][T29372] do_syscall_64+0xaa/0x1a0 [ 494.033366][T29372] ? clear_bhb_loop+0x25/0x80 [ 494.033443][T29372] ? clear_bhb_loop+0x25/0x80 [ 494.033467][T29372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.033487][T29372] RIP: 0033:0x7f56ae18e969 [ 494.033504][T29372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.033598][T29372] RSP: 002b:00007f56ac7f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 494.033616][T29372] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18e969 [ 494.033630][T29372] RDX: 0000000000000000 RSI: 0000000000000ea3 RDI: 0000000000000000 [ 494.033676][T29372] RBP: 00007f56ac7f7090 R08: ffffffff81000000 R09: 0000000000000000 [ 494.033690][T29372] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 494.033704][T29372] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 494.033721][T29372] ? 0xffffffff81000000 [ 494.033736][T29372] [ 494.423783][T29394] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9936'. [ 494.596726][T29410] SELinux: syz.4.9940 (29410) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 494.611041][T29409] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9938'. [ 495.157236][ T29] kauditd_printk_skb: 1570 callbacks suppressed [ 495.157255][ T29] audit: type=1326 audit(1747087606.529:119669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.189201][ T29] audit: type=1326 audit(1747087606.529:119670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.213684][ T29] audit: type=1326 audit(1747087606.529:119671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.237881][ T29] audit: type=1326 audit(1747087606.529:119672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.259881][T29424] netlink: 'syz.0.9947': attribute type 8 has an invalid length. [ 495.261905][ T29] audit: type=1326 audit(1747087606.529:119673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.293142][T29428] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9948'. [ 495.294501][ T29] audit: type=1400 audit(1747087606.529:119674): avc: denied { prog_load } for pid=29412 comm="syz.0.9943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 495.322755][ T29] audit: type=1326 audit(1747087606.529:119675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.346813][ T29] audit: type=1326 audit(1747087606.529:119676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=267 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.371021][ T29] audit: type=1326 audit(1747087606.529:119677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.394802][ T29] audit: type=1326 audit(1747087606.529:119678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29412 comm="syz.0.9943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fd13790e969 code=0x7ffc0000 [ 495.442415][T29436] FAULT_INJECTION: forcing a failure. [ 495.442415][T29436] name failslab, interval 1, probability 0, space 0, times 0 [ 495.455719][T29436] CPU: 0 UID: 0 PID: 29436 Comm: syz.4.9952 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 495.455745][T29436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 495.455756][T29436] Call Trace: [ 495.455762][T29436] [ 495.455770][T29436] __dump_stack+0x1d/0x30 [ 495.455864][T29436] dump_stack_lvl+0xe8/0x140 [ 495.455882][T29436] dump_stack+0x15/0x1b [ 495.455945][T29436] should_fail_ex+0x265/0x280 [ 495.456001][T29436] should_failslab+0x8c/0xb0 [ 495.456089][T29436] __kmalloc_noprof+0xa5/0x3e0 [ 495.456108][T29436] ? alloc_pipe_info+0x1c9/0x350 [ 495.456136][T29436] alloc_pipe_info+0x1c9/0x350 [ 495.456162][T29436] splice_direct_to_actor+0x592/0x680 [ 495.456257][T29436] ? kstrtouint_from_user+0x9f/0xf0 [ 495.456288][T29436] ? __pfx_direct_splice_actor+0x10/0x10 [ 495.456313][T29436] ? __rcu_read_unlock+0x4f/0x70 [ 495.456336][T29436] ? get_pid_task+0x96/0xd0 [ 495.456410][T29436] ? avc_policy_seqno+0x15/0x30 [ 495.456438][T29436] do_splice_direct+0xda/0x150 [ 495.456456][T29436] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 495.456482][T29436] do_sendfile+0x380/0x640 [ 495.456517][T29436] __x64_sys_sendfile64+0xb8/0x150 [ 495.456543][T29436] x64_sys_call+0xb39/0x2fb0 [ 495.456562][T29436] do_syscall_64+0xd0/0x1a0 [ 495.456583][T29436] ? clear_bhb_loop+0x25/0x80 [ 495.456670][T29436] ? clear_bhb_loop+0x25/0x80 [ 495.456694][T29436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.456716][T29436] RIP: 0033:0x7f13dfe1e969 [ 495.456732][T29436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.456751][T29436] RSP: 002b:00007f13de487038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 495.456772][T29436] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1e969 [ 495.456802][T29436] RDX: 0000200000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 495.456815][T29436] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 495.456827][T29436] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 495.456868][T29436] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 495.456887][T29436] [ 495.746332][T29460] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9960'. [ 495.818224][T29472] SELinux: syz.0.9963 (29472) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 495.857876][T29476] FAULT_INJECTION: forcing a failure. [ 495.857876][T29476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 495.871150][T29476] CPU: 1 UID: 0 PID: 29476 Comm: syz.3.9967 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 495.871179][T29476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 495.871195][T29476] Call Trace: [ 495.871202][T29476] [ 495.871211][T29476] __dump_stack+0x1d/0x30 [ 495.871343][T29476] dump_stack_lvl+0xe8/0x140 [ 495.871363][T29476] dump_stack+0x15/0x1b [ 495.871381][T29476] should_fail_ex+0x265/0x280 [ 495.871414][T29476] should_fail+0xb/0x20 [ 495.871443][T29476] should_fail_usercopy+0x1a/0x20 [ 495.871530][T29476] strncpy_from_user+0x25/0x230 [ 495.871589][T29476] ? kmem_cache_alloc_noprof+0x186/0x310 [ 495.871624][T29476] ? getname_flags+0x80/0x3b0 [ 495.871679][T29476] getname_flags+0xae/0x3b0 [ 495.871709][T29476] __x64_sys_lgetxattr+0xfd/0x140 [ 495.871749][T29476] x64_sys_call+0x1b0e/0x2fb0 [ 495.871875][T29476] do_syscall_64+0xd0/0x1a0 [ 495.871900][T29476] ? clear_bhb_loop+0x25/0x80 [ 495.871960][T29476] ? clear_bhb_loop+0x25/0x80 [ 495.871982][T29476] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.872063][T29476] RIP: 0033:0x7f0c283de969 [ 495.872079][T29476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.872098][T29476] RSP: 002b:00007f0c26a47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 495.872134][T29476] RAX: ffffffffffffffda RBX: 00007f0c28605fa0 RCX: 00007f0c283de969 [ 495.872148][T29476] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000200000000000 [ 495.872161][T29476] RBP: 00007f0c26a47090 R08: 0000000000000000 R09: 0000000000000000 [ 495.872175][T29476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 495.872187][T29476] R13: 0000000000000000 R14: 00007f0c28605fa0 R15: 00007ffe733616e8 [ 495.872206][T29476] [ 496.382212][T29488] netlink: 'syz.2.9972': attribute type 8 has an invalid length. [ 496.461390][T29478] netlink: 'syz.3.9969': attribute type 13 has an invalid length. [ 496.944878][T29560] SELinux: syz.3.9990 (29560) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 497.134266][T29584] bridge: RTM_NEWNEIGH with unconfigured vlan 4 on bridge0 [ 497.358811][T29617] ipvlan0: entered promiscuous mode [ 497.530589][T29638] binfmt_misc: register: failed to install interpreter file ./file0 [ 497.650427][T29667] x_tables: duplicate entry at hook 2 [ 497.663775][T29667] netlink: 'syz.0.10023': attribute type 21 has an invalid length. [ 497.800447][T29690] netlink: 'syz.4.10034': attribute type 13 has an invalid length. [ 497.812724][T29690] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 497.924875][T29715] FAULT_INJECTION: forcing a failure. [ 497.924875][T29715] name failslab, interval 1, probability 0, space 0, times 0 [ 497.937635][T29715] CPU: 1 UID: 0 PID: 29715 Comm: syz.4.10041 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 497.937702][T29715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 497.937712][T29715] Call Trace: [ 497.937719][T29715] [ 497.937726][T29715] __dump_stack+0x1d/0x30 [ 497.937750][T29715] dump_stack_lvl+0xe8/0x140 [ 497.937772][T29715] dump_stack+0x15/0x1b [ 497.937788][T29715] should_fail_ex+0x265/0x280 [ 497.937891][T29715] should_failslab+0x8c/0xb0 [ 497.937923][T29715] __kmalloc_noprof+0xa5/0x3e0 [ 497.938046][T29715] ? copy_splice_read+0xc2/0x5f0 [ 497.938065][T29715] copy_splice_read+0xc2/0x5f0 [ 497.938158][T29715] ? __pfx_copy_splice_read+0x10/0x10 [ 497.938176][T29715] splice_direct_to_actor+0x26c/0x680 [ 497.938195][T29715] ? __pfx_direct_splice_actor+0x10/0x10 [ 497.938220][T29715] do_splice_direct+0xda/0x150 [ 497.938243][T29715] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 497.938331][T29715] do_sendfile+0x380/0x640 [ 497.938427][T29715] __x64_sys_sendfile64+0xb8/0x150 [ 497.938453][T29715] x64_sys_call+0xb39/0x2fb0 [ 497.938474][T29715] do_syscall_64+0xd0/0x1a0 [ 497.938496][T29715] ? clear_bhb_loop+0x25/0x80 [ 497.938523][T29715] ? clear_bhb_loop+0x25/0x80 [ 497.938605][T29715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 497.938630][T29715] RIP: 0033:0x7f13dfe1e969 [ 497.938665][T29715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.938681][T29715] RSP: 002b:00007f13de487038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 497.938759][T29715] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1e969 [ 497.938843][T29715] RDX: 0000200000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 497.938855][T29715] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 497.938869][T29715] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 497.938883][T29715] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 497.938903][T29715] [ 498.159605][T29722] __nla_validate_parse: 16 callbacks suppressed [ 498.159622][T29722] netlink: 48 bytes leftover after parsing attributes in process `syz.5.10043'. [ 498.293386][T29749] FAULT_INJECTION: forcing a failure. [ 498.293386][T29749] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 498.307319][T29749] CPU: 0 UID: 0 PID: 29749 Comm: syz.4.10054 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 498.307391][T29749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 498.307404][T29749] Call Trace: [ 498.307411][T29749] [ 498.307419][T29749] __dump_stack+0x1d/0x30 [ 498.307442][T29749] dump_stack_lvl+0xe8/0x140 [ 498.307463][T29749] dump_stack+0x15/0x1b [ 498.307538][T29749] should_fail_ex+0x265/0x280 [ 498.307572][T29749] should_fail+0xb/0x20 [ 498.307601][T29749] should_fail_usercopy+0x1a/0x20 [ 498.307691][T29749] _copy_to_user+0x20/0xa0 [ 498.307710][T29749] simple_read_from_buffer+0xb5/0x130 [ 498.307746][T29749] proc_fail_nth_read+0x100/0x140 [ 498.307775][T29749] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 498.307853][T29749] vfs_read+0x19d/0x6f0 [ 498.307876][T29749] ? __rcu_read_unlock+0x4f/0x70 [ 498.307899][T29749] ? __fget_files+0x184/0x1c0 [ 498.307928][T29749] ksys_read+0xda/0x1a0 [ 498.307950][T29749] __x64_sys_read+0x40/0x50 [ 498.308009][T29749] x64_sys_call+0x2d77/0x2fb0 [ 498.308032][T29749] do_syscall_64+0xd0/0x1a0 [ 498.308057][T29749] ? clear_bhb_loop+0x25/0x80 [ 498.308163][T29749] ? clear_bhb_loop+0x25/0x80 [ 498.308185][T29749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 498.308208][T29749] RIP: 0033:0x7f13dfe1d37c [ 498.308303][T29749] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 498.308323][T29749] RSP: 002b:00007f13de487030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 498.308345][T29749] RAX: ffffffffffffffda RBX: 00007f13e0045fa0 RCX: 00007f13dfe1d37c [ 498.308359][T29749] RDX: 000000000000000f RSI: 00007f13de4870a0 RDI: 0000000000000003 [ 498.308431][T29749] RBP: 00007f13de487090 R08: 0000000000000000 R09: 0000000000000000 [ 498.308444][T29749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.308482][T29749] R13: 0000000000000000 R14: 00007f13e0045fa0 R15: 00007ffe83b99ed8 [ 498.308498][T29749] [ 498.331174][T29753] netlink: 48 bytes leftover after parsing attributes in process `syz.5.10056'. [ 498.652707][T29790] netlink: 'syz.5.10069': attribute type 8 has an invalid length. [ 498.731304][T29802] netlink: 48 bytes leftover after parsing attributes in process `syz.3.10074'. [ 498.754609][T29805] block device autoloading is deprecated and will be removed. [ 498.782223][T29809] pim6reg1: entered promiscuous mode [ 498.787660][T29809] pim6reg1: entered allmulticast mode [ 498.793489][T29805] syz.0.10071: attempt to access beyond end of device [ 498.793489][T29805] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 498.972472][T12696] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.991787][T29860] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10084'. [ 499.042894][T12696] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.090548][T12696] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.138251][T12696] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.197373][T12696] bridge0: port 1() entered disabled state [ 499.648464][T12696]  (unregistering): (slave dummy0): Releasing backup interface [ 499.656374][T12696] dummy0: left promiscuous mode [ 499.661371][T12696] dummy0: left allmulticast mode [ 499.666976][T12696]  (unregistering): Released all slaves [ 499.674859][T12696] bond0 (unregistering): left promiscuous mode [ 499.683275][T12696] bond0 (unregistering): Released all slaves [ 499.692044][T12696] bond1 (unregistering): Released all slaves [ 499.700009][T12696] bond2 (unregistering): Released all slaves [ 499.758121][T12696] hsr_slave_0: left promiscuous mode [ 499.764099][T12696] hsr_slave_1: left promiscuous mode [ 499.807924][T12664] smc: removing ib device syz! [ 499.893893][ T29] kauditd_printk_skb: 811 callbacks suppressed [ 499.893911][ T29] audit: type=1400 audit(1747087867.529:120488): avc: denied { prog_load } for pid=29888 comm="syz.3.10094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 499.919675][ T29] audit: type=1400 audit(1747087867.529:120489): avc: denied { execmem } for pid=29886 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 499.951299][ T29] audit: type=1400 audit(1747087867.592:120490): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=976 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 499.982501][ T29] audit: type=1400 audit(1747087867.624:120491): avc: denied { read write } for pid=9985 comm="syz-executor" name="loop5" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 500.072618][T12696] IPVS: stop unused estimator thread 0... [ 500.479662][ T29] audit: type=1326 audit(1747087868.153:120492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29925 comm="syz.2.10097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 500.504210][ T29] audit: type=1326 audit(1747087868.153:120493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29925 comm="syz.2.10097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc90a67e969 code=0x7ffc0000 [ 500.528641][ T29] audit: type=1400 audit(1747087868.153:120494): avc: denied { execmem } for pid=29924 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 500.548555][ T29] audit: type=1400 audit(1747087868.153:120495): avc: denied { prog_load } for pid=29931 comm="syz.5.10096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 500.568362][ T29] audit: type=1400 audit(1747087868.153:120496): avc: denied { prog_load } for pid=29926 comm="syz.3.10098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 500.587997][ T29] audit: type=1400 audit(1747087868.153:120497): avc: denied { prog_load } for pid=29928 comm="syz.0.10095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 501.165096][T29944] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10101'. [ 501.175315][T29944] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10101'. [ 501.184341][T29944] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10101'. [ 501.189121][T29942] FAULT_INJECTION: forcing a failure. [ 501.189121][T29942] name failslab, interval 1, probability 0, space 0, times 0 [ 501.195837][T29944] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.206064][T29942] CPU: 0 UID: 0 PID: 29942 Comm: syz.5.10100 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 501.206097][T29942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 501.206108][T29942] Call Trace: [ 501.206115][T29942] [ 501.206124][T29942] __dump_stack+0x1d/0x30 [ 501.206146][T29942] dump_stack_lvl+0xe8/0x140 [ 501.206235][T29942] dump_stack+0x15/0x1b [ 501.206252][T29942] should_fail_ex+0x265/0x280 [ 501.206287][T29942] should_failslab+0x8c/0xb0 [ 501.206315][T29942] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 501.206380][T29942] ? sidtab_sid2str_get+0xa0/0x130 [ 501.206409][T29942] kmemdup_noprof+0x2b/0x70 [ 501.206461][T29942] sidtab_sid2str_get+0xa0/0x130 [ 501.206495][T29942] security_sid_to_context_core+0x1eb/0x2e0 [ 501.206522][T29942] security_sid_to_context+0x27/0x40 [ 501.206603][T29942] selinux_lsmprop_to_secctx+0x67/0xf0 [ 501.206630][T29942] security_lsmprop_to_secctx+0x43/0x80 [ 501.206651][T29942] audit_log_task_context+0x77/0x190 [ 501.206694][T29942] audit_log_task+0xf4/0x250 [ 501.206719][T29942] audit_seccomp+0x61/0x100 [ 501.206818][T29942] ? __seccomp_filter+0x68c/0x10d0 [ 501.206839][T29942] __seccomp_filter+0x69d/0x10d0 [ 501.206922][T29942] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 501.206947][T29942] ? vfs_write+0x75e/0x8d0 [ 501.206971][T29942] ? 0xffffffff81000000 [ 501.206986][T29942] __secure_computing+0x82/0x150 [ 501.207043][T29942] syscall_trace_enter+0xcf/0x1e0 [ 501.207065][T29942] do_syscall_64+0xaa/0x1a0 [ 501.207087][T29942] ? clear_bhb_loop+0x25/0x80 [ 501.207107][T29942] ? clear_bhb_loop+0x25/0x80 [ 501.207204][T29942] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.207225][T29942] RIP: 0033:0x7f56ae18e969 [ 501.207240][T29942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.207258][T29942] RSP: 002b:00007f56ac7f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 501.207278][T29942] RAX: ffffffffffffffda RBX: 00007f56ae3b5fa0 RCX: 00007f56ae18e969 [ 501.207291][T29942] RDX: 0000000000000000 RSI: 0000000000000ee5 RDI: 0000000000000000 [ 501.207304][T29942] RBP: 00007f56ac7f7090 R08: ffffffff81000000 R09: 0000000000000000 [ 501.207339][T29942] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 501.207351][T29942] R13: 0000000000000000 R14: 00007f56ae3b5fa0 R15: 00007ffcbdd874f8 [ 501.207428][T29942] ? 0xffffffff81000000 [ 501.207442][T29942] [ 501.456178][T29944] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.464454][T29944] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.472679][T29944] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.480932][T29944] geneve2: entered promiscuous mode [ 501.486155][T29944] geneve2: entered allmulticast mode [ 501.932169][T29957] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10106'. [ 501.945847][T29957] ipvlan0: entered promiscuous mode [ 501.982737][T29963] netlink: 24 bytes leftover after parsing attributes in process `syz.0.10103'. [ 504.802733][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 504.802759][ T29] audit: type=1400 audit(1747087872.733:120589): avc: denied { execmem } for pid=29991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 504.832748][ T29] audit: type=1400 audit(1747087872.754:120590): avc: denied { create } for pid=29993 comm="syz.0.10115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 504.859761][T29995] gtp1: entered promiscuous mode [ 504.860552][ T29] audit: type=1400 audit(1747087872.754:120591): avc: denied { map_create } for pid=29992 comm="syz.5.10116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.884313][ T29] audit: type=1400 audit(1747087872.754:120592): avc: denied { prog_load } for pid=29992 comm="syz.5.10116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.903936][ T29] audit: type=1400 audit(1747087872.754:120593): avc: denied { prog_load } for pid=29992 comm="syz.5.10116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.906017][T30002] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10116'. [ 504.923512][ T29] audit: type=1400 audit(1747087872.785:120594): avc: denied { map_create } for pid=29993 comm="syz.0.10115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.923541][ T29] audit: type=1400 audit(1747087872.785:120595): avc: denied { prog_load } for pid=29993 comm="syz.0.10115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.971788][ T29] audit: type=1400 audit(1747087872.785:120596): avc: denied { execmem } for pid=29993 comm="syz.0.10115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 504.993334][ T29] audit: type=1400 audit(1747087872.785:120597): avc: denied { create } for pid=29993 comm="syz.0.10115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 505.013523][ T29] audit: type=1400 audit(1747087872.796:120598): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=976 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 506.008130][T30011] vcan1: entered promiscuous mode [ 507.231591][T30042] x_tables: duplicate entry at hook 2 [ 507.251361][T30042] netlink: 'syz.3.10126': attribute type 21 has an invalid length. [ 509.987271][ T29] kauditd_printk_skb: 206 callbacks suppressed [ 509.987289][ T29] audit: type=1400 audit(1747087878.208:120805): avc: denied { open } for pid=30059 comm="syz.0.10131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 510.020739][ T29] audit: type=1400 audit(1747087878.208:120806): avc: denied { execmem } for pid=30058 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 510.021097][T30065] netlink: 4 bytes leftover after parsing attributes in process `gtp'. [ 510.041031][ T29] audit: type=1400 audit(1747087878.219:120807): avc: denied { create } for pid=30062 comm="syz.2.10133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 510.070325][ T29] audit: type=1400 audit(1747087878.219:120808): avc: denied { map_create } for pid=30062 comm="syz.2.10133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 510.071969][T30067] netlink: 'syz.3.10134': attribute type 13 has an invalid length. [ 510.089925][ T29] audit: type=1400 audit(1747087878.219:120809): avc: denied { prog_load } for pid=30062 comm="syz.2.10133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 510.089956][ T29] audit: type=1400 audit(1747087878.219:120810): avc: denied { prog_load } for pid=30062 comm="syz.2.10133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 510.137339][ T29] audit: type=1400 audit(1747087878.219:120811): avc: denied { map_create } for pid=30060 comm="syz.5.10132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 510.157555][ T29] audit: type=1400 audit(1747087878.219:120812): avc: denied { prog_load } for pid=30060 comm="syz.5.10132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 510.177136][ T29] audit: type=1400 audit(1747087878.219:120813): avc: denied { allowed } for pid=30060 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 510.196720][ T29] audit: type=1400 audit(1747087878.219:120814): avc: denied { create } for pid=30060 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 514.875603][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 514.875621][ T29] audit: type=1400 audit(1747087883.364:120983): avc: denied { execmem } for pid=30095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 514.890421][T30102] x_tables: duplicate entry at hook 2 [ 514.915159][T30102] netlink: 'syz.2.10144': attribute type 21 has an invalid length. [ 514.930053][ T29] audit: type=1400 audit(1747087883.375:120984): avc: denied { map_create } for pid=30096 comm="syz.0.10142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.939400][T30106] netlink: 24 bytes leftover after parsing attributes in process `syz.0.10142'. [ 514.949772][ T29] audit: type=1400 audit(1747087883.385:120985): avc: denied { map_create } for pid=30101 comm="syz.2.10144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.978917][ T29] audit: type=1400 audit(1747087883.385:120986): avc: denied { prog_load } for pid=30101 comm="syz.2.10144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.998821][ T29] audit: type=1400 audit(1747087883.385:120987): avc: denied { prog_load } for pid=30101 comm="syz.2.10144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 515.018252][ T29] audit: type=1400 audit(1747087883.385:120988): avc: denied { map_create } for pid=30101 comm="syz.2.10144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 515.038317][ T29] audit: type=1400 audit(1747087883.385:120989): avc: denied { prog_load } for pid=30101 comm="syz.2.10144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 515.057698][ T29] audit: type=1400 audit(1747087883.385:120990): avc: denied { prog_load } for pid=30096 comm="syz.0.10142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 515.077630][ T29] audit: type=1400 audit(1747087883.385:120991): avc: denied { prog_load } for pid=30096 comm="syz.0.10142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 515.097053][ T29] audit: type=1400 audit(1747087883.385:120992): avc: denied { create } for pid=30101 comm="syz.2.10144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 516.715103][ T3303] ================================================================== [ 516.723252][ T3303] BUG: KCSAN: data-race in pipe_poll / pipe_release [ 516.729878][ T3303] [ 516.732214][ T3303] write to 0xffff88811a29f2a8 of 4 bytes by task 30107 on cpu 0: [ 516.739940][ T3303] pipe_release+0xb6/0x1d0 [ 516.744553][ T3303] __fput+0x298/0x650 [ 516.748607][ T3303] ____fput+0x1c/0x30 [ 516.752643][ T3303] task_work_run+0x12e/0x1a0 [ 516.757247][ T3303] do_exit+0x5dd/0x17c0 [ 516.761424][ T3303] do_group_exit+0x139/0x140 [ 516.766034][ T3303] __x64_sys_exit_group+0x1f/0x20 [ 516.771077][ T3303] x64_sys_call+0x2fa4/0x2fb0 [ 516.775765][ T3303] do_syscall_64+0xd0/0x1a0 [ 516.780286][ T3303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.786191][ T3303] [ 516.788519][ T3303] read to 0xffff88811a29f2a8 of 4 bytes by task 3303 on cpu 1: [ 516.796073][ T3303] pipe_poll+0x16d/0x250 [ 516.800355][ T3303] do_select+0x8ee/0xf40 [ 516.804641][ T3303] core_sys_select+0x3b2/0x600 [ 516.809434][ T3303] __se_sys_pselect6+0x216/0x280 [ 516.814382][ T3303] __x64_sys_pselect6+0x78/0x90 [ 516.819241][ T3303] x64_sys_call+0x1caa/0x2fb0 [ 516.823924][ T3303] do_syscall_64+0xd0/0x1a0 [ 516.828512][ T3303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.834443][ T3303] [ 516.836777][ T3303] value changed: 0x00000001 -> 0x00000000 [ 516.842512][ T3303] [ 516.844842][ T3303] Reported by Kernel Concurrency Sanitizer on: [ 516.851000][ T3303] CPU: 1 UID: 0 PID: 3303 Comm: syz-executor Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 516.861869][ T3303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 516.871950][ T3303] ================================================================== [ 516.912339][T30115] netlink: 20 bytes leftover after parsing attributes in process `syz.5.10147'. [ 519.002809][T12696] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 519.074126][T12696] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 519.149503][T12696] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 519.195962][T12696] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 519.641725][T12696] bond1 (unregistering): Released all slaves [ 519.649975][T12696] bond0 (unregistering): left promiscuous mode [ 519.658513][T12696] bond0 (unregistering): Released all slaves [ 519.666878][T12696] bond2 (unregistering): Released all slaves [ 519.674811][T12696] bond3 (unregistering): Released all slaves [ 519.682830][T12696] bond4 (unregistering): Released all slaves [ 519.709927][T12696] hsr_slave_0: left promiscuous mode [ 519.715631][T12696] hsr_slave_1: left promiscuous mode [ 520.065679][T12696] IPVS: stop unused estimator thread 0... [ 520.287534][T12696] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.323558][T12696] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.370564][T12696] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.417928][T12696] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.660628][T12696] bridge_slave_0: left allmulticast mode [ 520.666375][T12696] bridge_slave_0: left promiscuous mode [ 520.672014][T12696] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.681847][T12696] : left allmulticast mode [ 520.686595][T12696] : left promiscuous mode [ 520.691181][T12696] bridge0: port 1() entered disabled state [ 522.058101][T12696] bond0 (unregistering): Released all slaves [ 522.066365][T12696] bond1 (unregistering): Released all slaves [ 522.073967][T12696] bond2 (unregistering): Released all slaves [ 522.082776][T12696] bond0 (unregistering): Released all slaves [ 522.091047][T12696] bond1 (unregistering): Released all slaves [ 522.099258][T12696] bond2 (unregistering): Released all slaves [ 522.107135][T12696] bond3 (unregistering): Released all slaves [ 522.115457][T12696] bond4 (unregistering): Released all slaves [ 522.123709][T12696]  (unregistering): Released all slaves [ 522.131205][T12696] bond0 (unregistering): Released all slaves [ 522.139708][T12696] bond1 (unregistering): Released all slaves [ 522.165307][T12696] tipc: Left network mode [ 522.210192][T12696] hsr_slave_0: left promiscuous mode [ 522.215879][T12696] hsr_slave_0: left promiscuous mode