last executing test programs: 4m19.685829332s ago: executing program 3 (id=8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0xc8, 0x8, 0x0, 0x5803, 0x360, 0x2e8, 0x2e8, 0x360, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x198, 0x200, 0x0, {0x0, 0x2000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x10, 'fsm\x00', "cfcfcf0c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e67262c1fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x1a, 0x0, {0x80000}}}, @common=@frag={{0x30}, {[0x6, 0x3], 0x3, 0x2, 0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x17, 0x3, 0x6, 0xc0000000, 'pptp\x00', 'syz0\x00', {0xe6}}}}, {{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [0xff, 0xffffff00, 0xff000000, 0xff], [0xff, 0x0, 0xffffff00], 'wg0\x00', 'nicvf0\x00', {0xff}, {}, 0x0, 0xc0, 0x0, 0x14}, 0x0, 0xf8, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x4, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00', {0x4}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x400) stat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000900)=@broute={'broute\x00', 0x20, 0x6, 0x884, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000b00], 0x0, &(0x7f0000000800), &(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"]}, 0x9f7) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r3}, 0x32) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4400000010001f04000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x20004885}, 0x4054) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="5c000180082b9d9995f3ccb3d901e4000300030000000800030002000000140002007683d96d56657468305f766972745f77696669000800030002000000", @ANYRES16=r5, @ANYBLOB="000326bd7000fcdbdf25020000003c000180080003000100000014000200626174616476300000000000000000001400020069705f7674693000000000000000000008000100", @ANYRES32=r7, @ANYBLOB="ac000000", @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB, @ANYRES32, @ANYRES64=r9], 0xac}, 0x1, 0x0, 0x0, 0x4040000}, 0x4040084) r10 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r11 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r11, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000004c0)=@keyring={'key_or_keyring:', r10}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) r12 = creat(&(0x7f0000000000)='./file0\x00', 0x6a) write$binfmt_elf32(r12, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c460007ff84ff7f0000000000000300060003000000a400000038000000aa00000007000000a70b2000010026840400000000000000030000000700020000000000ff070000c300"], 0x58) close(r12) perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x9, 0x3, 0x1, 0x8, 0x0, 0xfffffffffffffff9, 0x30, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000640), 0xe}, 0x8, 0x1, 0xffffffff, 0x7, 0x100, 0x19b7, 0x2, 0x0, 0x6c, 0x0, 0x1}, r12, 0xc, r4, 0x7) close_range(r1, 0xffffffffffffffff, 0x0) 4m19.221408903s ago: executing program 3 (id=14): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xec, 0x7ffc0202}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x7, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 4m19.177749684s ago: executing program 3 (id=16): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x18) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) 4m19.04446432s ago: executing program 3 (id=17): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x4e22, @empty}, 0x10) listen(r2, 0x0) syz_emit_ethernet(0x36, &(0x7f00000010c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x5, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) 4m18.912228686s ago: executing program 3 (id=19): r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x2853}, &(0x7f00000000c0)=0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0xea) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) r4 = add_key$fscrypt_v1(&(0x7f0000002a00), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000007c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa00", 0x28}, 0x48, 0xffffffffffffffff) r5 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r6 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6075ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r6, r5, r5, 0x0) keyctl$KEYCTL_MOVE(0x4, r4, r4, 0x0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r7 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r7) 4m18.718372424s ago: executing program 3 (id=22): rt_sigpending(&(0x7f0000000080), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000200)) 4m17.86538127s ago: executing program 0 (id=35): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r1) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c0c5) setsockopt$sock_attach_bpf(r2, 0x1, 0x9, &(0x7f0000000040), 0x4) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) openat(0xffffffffffffff9c, 0x0, 0x42, 0x120) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}, {0x9, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4910, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x18) syz_emit_ethernet(0x46, &(0x7f00000002c0)={@multicast, @random="0000060000ff", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "011100", 0x10, 0x11, 0x0, @remote, @local, {[], {0x4e21, 0x4e21, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r8, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), r8) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x6, 0x9}, {0x1ff, 0x32e3}}, 0x0) alarm(0x38) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100001400a0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af9219a1e18c488e827c1bbec", 0x89}], 0x1}, 0x0) 4m17.797679044s ago: executing program 0 (id=37): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0xc8, 0x8, 0x0, 0x5803, 0x360, 0x2e8, 0x2e8, 0x360, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x198, 0x200, 0x0, {0x0, 0x2000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x10, 'fsm\x00', "cfcfcf0c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e67262c1fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x1a, 0x0, {0x80000}}}, @common=@frag={{0x30}, {[0x6, 0x3], 0x3, 0x2, 0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x17, 0x3, 0x6, 0xc0000000, 'pptp\x00', 'syz0\x00', {0xe6}}}}, {{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [0xff, 0xffffff00, 0xff000000, 0xff], [0xff, 0x0, 0xffffff00], 'wg0\x00', 'nicvf0\x00', {0xff}, {}, 0x0, 0xc0, 0x0, 0x14}, 0x0, 0xf8, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x4, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00', {0x4}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x400) stat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000900)=@broute={'broute\x00', 0x20, 0x6, 0x884, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000b00], 0x0, &(0x7f0000000800), &(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"]}, 0x9f6) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42202) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x32) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4400000010001f04000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r8, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x20004885}, 0x4054) r11 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) sync_file_range(r11, 0x2, 0x8, 0xb) r12 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r12, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r12, &(0x7f0000000180)="10030600e0ff020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r13}, 0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="5c000180082b9d9995f3ccb3d901e4000300030000000800030002000000140002007683d96d56657468305f766972745f77696669000800030002000000", @ANYRES16=r6, @ANYBLOB="000326bd7000fcdbdf25020000003c000180080003000100000014000200626174616476300000000000000000001400020069705f7674693000000000000000000008000100", @ANYRES32=r8, @ANYBLOB="ac000000", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB, @ANYRES32=r13, @ANYRES64=r10], 0xac}, 0x1, 0x0, 0x0, 0x4040000}, 0x4040084) r14 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r15 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r15, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000004c0)=@keyring={'key_or_keyring:', r14}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) r16 = creat(&(0x7f0000000000)='./file0\x00', 0x6a) write$binfmt_elf32(r16, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c460007ff84ff7f0000000000000300060003000000a400000038000000aa00000007000000a70b2000010026840400000000000000030000000700020000000000ff070000c300"], 0x58) close(r16) perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x9, 0x3, 0x1, 0x8, 0x0, 0xfffffffffffffff9, 0x30, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000640), 0xe}, 0x8, 0x1, 0xffffffff, 0x7, 0x100, 0x19b7, 0x2, 0x0, 0x6c, 0x0, 0x1}, r16, 0xc, r5, 0x7) close_range(r1, 0xffffffffffffffff, 0x0) 4m17.548715364s ago: executing program 0 (id=42): r0 = socket(0x10, 0x803, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x0, 0xffe1}, {0xffff, 0xffff}, {0xffe0, 0xfff3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x4, 0x9}}]}}]}, 0x48}}, 0x8000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x924}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x100) readv(r6, &(0x7f0000000300)=[{&(0x7f0000000000)=""/47, 0x2f}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x1cc0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3e, 0x0, 0x0, 0x0, 0xb}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x18) 4m16.694474631s ago: executing program 0 (id=51): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="16000542ffff0000000000599bf1b33fd2868f1476d9eed5dd0001"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r1, 0x0, 0x401}, 0x11) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0xa2) r4 = dup2(r3, r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9d}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x8, 0x3, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x2c0, 0xffffffff, 0xffffffff, 0x2c0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xc8, 0x60030000, {0x0, 0xff000000}}, @unspec=@TRACE={0x20}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0x0, 0x0, 0xffffffff, 0xff000000], 'team_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {0x101}, 0x11, 0x2, 0x5, 0x5}, 0x0, 0x1d0, 0x1f8, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x3, 0x2, 0x3, 0x1, 0x5}}, @common=@inet=@recent0={{0xf8}, {0x4, 0x6, 0x4, 0x0, 'syz0\x00', 0xfe}}]}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r3, 0x20, &(0x7f0000000200)={&(0x7f0000000b00)=""/250, 0xfa, 0x0, &(0x7f00000001c0)=""/61, 0x3d}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xa, 0xb, &(0x7f0000000040)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./control\x00', 0x480, &(0x7f0000000180), 0x2, 0x786, &(0x7f0000000f80)="$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") r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="187a0b0000000000000000000040000085000000f100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r9}, 0x18) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) close(r10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000005000000000002000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xeb48195b69e85694, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m16.530965158s ago: executing program 0 (id=52): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="020100000e000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000005000500000000000a00000000000000fe8092d59736ee0f2c880000000000bb0000000000ebff000200130003"], 0x70}}, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0xea) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x8, 0x0, 0x2f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) 4m15.531634681s ago: executing program 0 (id=68): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) gettid() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000020000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$loop(0xffffffffffffff9c, 0x0, 0x1000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x88) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) mknodat(0xffffffffffffff9c, 0x0, 0x81c0, 0x0) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x204080, &(0x7f00000004c0), 0xfd, 0x573, &(0x7f0000000cc0)="$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") io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="effd00000000", 0x6, 0x0, 0x0, 0x2}]) 4m3.501100117s ago: executing program 32 (id=22): rt_sigpending(&(0x7f0000000080), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000200)) 4m0.504990677s ago: executing program 33 (id=68): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) gettid() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000020000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$loop(0xffffffffffffff9c, 0x0, 0x1000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x88) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) mknodat(0xffffffffffffff9c, 0x0, 0x81c0, 0x0) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x204080, &(0x7f00000004c0), 0xfd, 0x573, &(0x7f0000000cc0)="$eJzs3V9rW+UfAPDvSZP9636/djCGeiGDXTgZS9fWPxOEzUvR4UDvZ2izMpouo0nHWgduF+7GGxmCiAPxBXjv5fAN+CoGOhgyil6IUDnpSZe1Sf8tNbH5fOBsz5Nzkud58pzvyfOck/QEMLBOpv/kIl6OiK+SiJGWdfnIVp5c3W756e2pdEliZeXj35O4sO61kuz/4SzzUkT8/EXEmdzGcmuLS7OlSqU8n+XH6nM3xmqLS2evzZVmyjPl6xOTk+ffnJx45+23utbW1y//+e1HD98//+Wp5W9+fHzsfhIX42i2Lm1XF4q405o5Wfo7SxXi4roNx7tQWD9Jel0BdmUoi/NCpMeAkRjKoh7Y/z6PiBVgQCXiHwZUcxzQnNt3aR78n/HkvdUJ0Mb251fPjcShxtzoyHLy3Mwone+OdqH8tIyffntwP11i8/MQh7fIA+zInbsRcS6f33j8S7Lj3+6da5w83tz6Mgbt8wd66WE6/knuRGyI/9za+CfajH+G28Tubmwd/7nHXSimo3T8927b8e/aoWt0KMv9rzHmKyRXr1XK5yLi/xFxOgoH0/xm13POLz9a6bSudfyXLmn5zbFgVo/H+YPPP2e6VC+9SJtbPbkb8Urb8W+y1v9Jm/5P34/L2yzjRPnBq53Wbd3+vbXyQ8Rrbfv/2RWtZPPrk2ON/WGsuVds9Me9E790Kr/X7U/7/8jm7R9NWq/X1nZexveH/ip3Wrfb/f9A8kkjfSB77FapXp8fjziQfJgfXv/4xLPnNvPN7dP2nz7VPv432//Tyden22z/veP3Om7aD/0/vaP+33ni0Qeffdep/O31/xuN1Onske0c/7ZbwRd57wAAAAAAAKDf5CLiaCS54lo6lysWV7/fcTyO5CrVWv3M1erC9elo/FZ2NAq55pXukZbvQ4xn34dt5ifW5Scj4lhEfD10uJEvTlUr071uPAAAAAAAAAAAAAAAAAAAAPSJ4Q6//0/9OtTr2gF7rnFjg4O9rgXQC1ve8r8bd3oC+tKW8Q/sWzuPf2cGYL/w+Q+DS/zD4BL/MLi2G/+FkT2uCPCv8/kPg0v8AwAAAAAAAAAAAAAAAAAAAAAAAAAAQFddvnQpXVaWn96eSvPTNxcXZqs3z06Xa7PFuYWp4lR1/kZxplqdqZSLU9W5rV6vUq3eGJ+IhVtj9XKtPlZbXLoyV124Xr9yba40U75SLvhjwwAAAAAAAAAAAAAAAAAAALBBbXFptlSplOclOiYuRF9UYy8buGpXT8/3Syskupro8YEJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFr8EwAA//8DDjNQ") io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="effd00000000", 0x6, 0x0, 0x0, 0x2}]) 3.03401205s ago: executing program 6 (id=4141): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0xab, @loopback, 0x10001}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x441, 0x104) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) wait4(0xffffffffffffffff, 0x0, 0x20000004, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x9, 0x5, 0x0, 0x7ffffdbe}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xf4ff, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r3 = syz_open_procfs$pagemap(0x0, &(0x7f0000001080)) ioctl$PAGEMAP_SCAN(r3, 0xc0606610, &(0x7f0000000140)={0x60, 0x0, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, &(0x7f0000000640)=[{0x800000000}, {0x0, 0x5, 0x4}], 0x2, 0x100000c01, 0x61, 0x0, 0x0, 0x6e}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @loopback, 0x23}, 0x1c) r4 = dup(r0) setsockopt(r4, 0xc8, 0x8f, &(0x7f0000000000)="86d78234b25bb5e3bbf97a7f5785f8ec4a9bf643eca9fa3614c54047262204c812041f38d527ac60710ee1e270c6ff1bf0a3fec06396820ab7f77982a6649b46fab0a0d2b3b5ecf5b0b5e8c401f6d656457032af2d6e2c", 0x57) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000000)=ANY=[], 0x78}, 0x1, 0x0, 0x0, 0x4080}, 0x8080) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0xffffffffffffffa0, 0xfa00, {0xffffffffffffffff, 0x10c}}, 0xfffffd88) 3.01520829s ago: executing program 6 (id=4142): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r0, 0x400, 0x0) mkdir(0x0, 0x0) pipe2$9p(0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) dup(0xffffffffffffffff) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r3}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) 2.981681312s ago: executing program 6 (id=4143): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0xfffffd0b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9ee6, 0x200000005}, 0x104022, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_io_uring_setup(0x1332, &(0x7f0000000540)={0x0, 0x6242, 0x210, 0x0, 0x34a}, &(0x7f0000000300)=0x0, &(0x7f0000000400)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f00000003c0)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095", @ANYRES32=r2], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.498857543s ago: executing program 4 (id=4152): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x200000, @empty, 0x1}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000008000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/14, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x4, 0x7ffc0002}]}) semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x1000, 0x1000}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180500000051d71e0ea800000000000000000000140c3cfb24a7cc24c09398cc68210c54fd358a5eb1345158c9e973b7f1a385638dca", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sched_switch\x00'}, 0x18) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x989680}}, 0x0) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x4}, @const={0x0, 0x0, 0x0, 0x2}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x1, [{0x2, 0x3, 0x6}]}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x60}, 0x28) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x77359400}, 0xfffffffffffffffe) listen(r1, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) accept(r1, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) 2.221239975s ago: executing program 4 (id=4155): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r0, 0x0, 0x401}, 0x11) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002e40)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="8b332ebd7000000000001500"], 0x38}}, 0x40000) (fail_nth: 4) 2.011262634s ago: executing program 6 (id=4157): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0xfffffd0b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9ee6, 0x200000005}, 0x104022, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_io_uring_setup(0x1332, &(0x7f0000000540)={0x0, 0x6242, 0x210, 0x0, 0x34a}, &(0x7f0000000300)=0x0, &(0x7f0000000400)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f00000003c0)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095", @ANYRES32=r2], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) 1.701031237s ago: executing program 4 (id=4159): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x21, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) getitimer(0x1, &(0x7f0000000080)) 1.700750537s ago: executing program 4 (id=4160): socket$packet(0x11, 0xa, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x1c0000000000000, 0x4, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socket$inet(0x2, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x20, 0xfc, 0x2, 0x0, @rand_addr=0x1c, @multicast1=0xe0000300}, @dest_unreach={0x3, 0x6, 0x0, 0x0, 0xfa, 0x9, {0x5, 0x4, 0x0, 0x1c, 0xfff6, 0x65, 0x5, 0x1, 0x4, 0x3, @private=0xa010102, @local}}}}}}, 0x0) 1.281421665s ago: executing program 5 (id=4164): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r0, 0x400, 0x0) mkdir(0x0, 0x0) pipe2$9p(0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) dup(0xffffffffffffffff) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r3}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) 1.263436226s ago: executing program 5 (id=4165): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sync() bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000d00)=""/110, 0x6e}}, 0x10) r3 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r4, {0x0, 0x4}, {}, {0xffff, 0xffff}}, [@filter_kind_options=@f_flow={{0x9}, {0xc, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x4001ec6e}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x54}, 0x4848) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRESDEC, @ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', r4, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) 1.035823765s ago: executing program 5 (id=4166): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) io_setup(0x7fffffff, &(0x7f0000000040)=0x0) io_getevents(r1, 0xc3, 0x1, &(0x7f0000000140)=[{}], &(0x7f0000000180)={0x0, 0x3938700}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x50, &(0x7f0000000000)={&(0x7f00000084c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020025642532000000000900010073797a30000000000800054000000002"], 0x40c4}}, 0x0) 1.018317046s ago: executing program 5 (id=4167): socket$inet_icmp_raw(0x2, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x3022440, &(0x7f00000008c0)={[{@bsdgroups}, {@usrjquota}, {@noblock_validity}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x18}}, {@grpjquota}, {@noquota}, {@auto_da_alloc}, {@dioread_lock}, {@journal_dev={'journal_dev', 0x3d, 0x56657b2b}}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") 970.061948ms ago: executing program 6 (id=4168): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x204000, &(0x7f0000000000), 0x106, 0x2}}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x9}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x13f, 0x8}}, 0x20) close(r0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x3022440, &(0x7f00000008c0)={[{@bsdgroups}, {@usrjquota}, {@noblock_validity}, {@mb_optimize_scan}, {@grpjquota}, {@noquota}, {@nolazytime}, {@dioread_lock}, {@journal_dev={'journal_dev', 0x3d, 0x80}}]}, 0x64, 0x511, &(0x7f0000000980)="$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") 902.101392ms ago: executing program 2 (id=4169): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000005c0), r2) sendmsg$FOU_CMD_ADD(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x18, r3, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4040000}, 0x8840) 854.023554ms ago: executing program 2 (id=4170): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0x3}, 0x18) memfd_create(0x0, 0x3) 842.271524ms ago: executing program 4 (id=4171): recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x734, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff01000085"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) sendfile(r1, r1, 0x0, 0x40000f63c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0xffffffffffff8001}, 0x18) 784.820927ms ago: executing program 2 (id=4172): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r0 = eventfd2(0x856a, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000780)='fsi_master_gpio_cmd_rel_addr\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000180)='./file1\x00', 0x804800, &(0x7f0000000000)=ANY=[@ANYRES8=0x0, @ANYBLOB="6092034e5823f645654f6e8edfc3b8e1a948efb0d4b9a9d4c30f5dacb3c1a7ea2587d59165777f070017c2921e793ec5a1384e143b57bb832f14bb43afdef6cb4ed4960b6c732be46a927cdd8c57f93ee6c15401df91ebcbe4f9989843313ea9f243d4dc3d276b966b898100a620b69b543033b9b7bcd9069b9248fbdff46c4a49f094a61938776ce1a1d0f0c84cb7a84bf0b1e2ce5f38f95e11d5b1977ead80625337f66dc391089ab8573d008a4bd03f6f9f01406db632558ed25be4beecd844ac00e52f95c5dc96a1e4a25c80d56aebf6cb33914d6bc72a40bf2fc94efed2f941cf3e"], 0xf9, 0x1213, &(0x7f0000000600)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) utimes(&(0x7f0000000380)='./file0\x00', 0x0) 688.166441ms ago: executing program 2 (id=4173): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/sync_on_suspend', 0x343282, 0x1e2dfe37373eafbd) unshare(0x20000400) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff27}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x20842, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x0], 0x0, 0x0, 0x1, 0x1, r1}}, 0x40) r5 = socket(0x10, 0x3, 0x0) dup3(r5, r4, 0x0) sendfile(r0, r0, 0x0, 0x5) r6 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x804}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) 677.310011ms ago: executing program 1 (id=4174): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) sendmmsg(r0, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x34000, 0x0) 618.763723ms ago: executing program 1 (id=4175): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r0, 0x400, 0x0) mkdir(0x0, 0x0) pipe2$9p(0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) dup(0xffffffffffffffff) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r3}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) 601.252914ms ago: executing program 1 (id=4176): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/sync_on_suspend', 0x343282, 0x1e2dfe37373eafbd) unshare(0x20000400) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)='+}[@\x00G5\v\x89n\xb2\x0e\xb7\xb4\x9a\xb3\xb9\xe1\xff@`\x87\xefy\xb7\xe0\xe6c\x91\x81ND\t3\xc4\xca\xf0\xd0Zp\xadbdY\xdcz\xc6lo\xd0\xc7\'CT') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x20842, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x0], 0x0, 0x0, 0x1, 0x1, r1}}, 0x40) r4 = socket(0x10, 0x3, 0x0) dup3(r4, r3, 0x0) sendfile(r0, r0, 0x0, 0x5) r5 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) sendmsg$nl_route_sched(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x804}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) 578.654815ms ago: executing program 2 (id=4177): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x1a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x2, 0x0, 0x4, 0x9, 0x7, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0xe7, 0x30, &(0x7f0000000100)=""/48, 0x40f00, 0x19, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x4, 0xbb, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[r2, r0], &(0x7f00000004c0)=[{0x2, 0x5, 0x6, 0x5}], 0x10, 0x3}, 0x94) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x315b, &(0x7f0000000200)={0x0, 0xcfca, 0x1040, 0xfffffffd, 0x1000001}, &(0x7f0000000100), &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000595000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f00000ce000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$binfmt_elf32(r2, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x28, 0x2, 0x5, 0x8, 0xff, 0x2, 0x3e, 0x3ff, 0x1b9, 0x38, 0x341, 0x0, 0xda6d, 0x20, 0x4, 0x8, 0x7, 0x6}, [{0x6474e551, 0x10001, 0x24, 0x4, 0xe, 0x6, 0x400, 0x3}, {0x6474e551, 0x7, 0x3, 0x7, 0x8, 0x1, 0x800, 0x5}, {0x2, 0x9, 0xe55, 0x0, 0xe7b, 0x7fffffff, 0x6, 0x9}, {0x3, 0x101, 0x2, 0x3, 0x6, 0x2, 0x3, 0x5}], "369e8158e235fd2f2d51eb2d0dd66cefe3350771c4aaf49202482c944587f7517d2ea84e8e7ac4a318b77ddd33c49c0202e22474dae7483402beb4df0a7cd0440a0f3c3e1288aa47ecdd51c3718abca86b675338f2014d6c1c7f1086d3945d79c8b2ea32c2e210c65c2ccde0d76153c519bffbccfd287be65fe2ad176da831381d8658230fbad91bae87bfa9a7b82d10462ac4650ea6cce79405d87946855ab5f199a48bc7d4919590b30c30a1b483eb", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x668) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r3, 0xc, 0x0, 0x0) prctl$PR_SCHED_CORE(0x4d, 0x8, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) setresuid(0xee00, 0xee00, 0x0) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000700000000000000000000009500000000200000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 477.7269ms ago: executing program 1 (id=4178): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r2}, 0x10) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000100001000000000000000000d100000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a320000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a31000000004c000000050a19020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d6163767461700000000800014000000005"], 0xe8}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r6, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000300)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r6, r6}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x10, &(0x7f0000000e00)=ANY=[@ANYBLOB="18000000bfffffff0000000000000000b7080000000000007b8af8ff00000000b7080000ffffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000100000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000c00000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0xccee5849be245758, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mq_timedsend(r5, &(0x7f0000000300)="84907713dea143e271918fb67e41d3e101ca74e3f6fe2504d729427aa0db682ba3fff98594268bc6e34338057d5d7a0dc83335a0a95f679fd75562c7bfa9566c3cf4fd203fd0b6a55a4d86daf50e78b449a28031118b7c799fa481efad4f10a43960fb0a023d6976ddc74b3a1130", 0x6e, 0x81, &(0x7f0000000380)={0x0, 0x989680}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000440), &(0x7f0000000480)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r8, 0x0, 0xf, 0x0, &(0x7f0000000180)="c1dfb080cd21d308098ee68886dd96", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 464.24491ms ago: executing program 2 (id=4179): arch_prctl$ARCH_GET_MAX_TAG_BITS(0x4003, &(0x7f0000000000)) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/14, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000001180)=[{{&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000440)=""/101, 0x65}, {&(0x7f0000000ac0)=""/10, 0xa}], 0x2, &(0x7f0000000980)=""/97, 0x61}, 0x4000d2}, {{&(0x7f0000000a00)=@phonet, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000c00)=""/203, 0xcb}, 0x9}, {{0xfffffffffffffffe, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000d00)=""/231, 0xe7}, {&(0x7f0000000b00)=""/164, 0xa4}, {&(0x7f0000001280)=""/134, 0x86}], 0x3, &(0x7f0000000e40)=""/159, 0x9f}, 0x4}, {{&(0x7f0000000f00)=@xdp, 0x80, &(0x7f0000001100)=[{&(0x7f0000000f80)=""/207, 0xcf}, {&(0x7f0000001080)=""/118, 0x76}], 0x2, &(0x7f0000001140)=""/48, 0x30}, 0x7}], 0x4, 0x43, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYRES8=0x0], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_async', 0x42, 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[0x0]) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000004c0)=@nat={'nat\x00', 0x670, 0x5, 0x458, 0xb, 0x0, 0xfeffffff, 0xf0, 0x218, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'veth1_to_team\x00', {}, {}, 0x6}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2, 0x4}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@set={{0x40}}, @common=@set={{0x40}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'pim6reg0\x00', 'wlan0\x00'}, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@private2, @ipv4=@dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) r6 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_regs={0x4, 0x0, 0x4, "f42a97b9"}}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRESDEC=0x0], 0x50) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000280)=0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00'}, 0x10) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r7, 0xf501, 0x0) 350.829925ms ago: executing program 1 (id=4180): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0xfffe, 0x8, 0x5, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_context(r4, &(0x7f0000000340)='system_u:object_r:hugetlbfs_t:s0\x00', 0xff7) r5 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r5, &(0x7f0000000840)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x1}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x200000, 0x3}, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f00000006c0)=[@mss={0x2, 0x7}], 0x1) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x2, 0x1}, 0x10) sendmsg$tipc(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000090}, 0x95) r8 = dup3(r5, r6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r8, 0x10f, 0x88) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000002180)=ANY=[@ANYBLOB="180200000000000000000000cfffffff850000001700000095"], &(0x7f0000000040)='syzkaller\x00', 0x8000}, 0x94) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'dummy0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r9, r11, 0x25, 0x0, @void}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x1c, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r8, @ANYBLOB="00dce80001000000b7577f0000f800e400020000000000000000020000030000001823000000000000000000", @ANYRES32=r8, @ANYBLOB="00000000090000001838000001000000000000000000000085200000010000009f030200040000008500000019000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x14, &(0x7f0000000380)=""/20, 0x40f00, 0x18, '\x00', r11, 0x0, r8, 0x8, &(0x7f00000003c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xe, 0x81, 0x2}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000440)=[{0x5, 0x5, 0xc, 0x7}, {0x1, 0x2, 0xb, 0x6}, {0x3, 0x1, 0x5}, {0x0, 0x1, 0xf}, {0x2, 0x2, 0xa, 0x3}, {0x0, 0x4, 0xa, 0x8}, {0x2, 0x5, 0x0, 0x9}, {0x3, 0x3, 0x4, 0x1}, {0x0, 0x1, 0x1, 0x3}]}, 0x94) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x40, 0xed1, 0x5, {{0x31, 0x4, 0x0, 0x0, 0xc4, 0x65, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@lsrr={0x83, 0xf, 0x68, [@loopback, @loopback, @local]}, @lsrr={0x83, 0x27, 0xc6, [@multicast2, @broadcast, @multicast2, @remote, @private=0xa010101, @private=0xa010100, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @rr={0x7, 0x17, 0xf2, [@remote, @broadcast, @local, @multicast2, @multicast2]}, @timestamp={0x44, 0x8, 0xeb, 0x0, 0x3, [0xa14]}, @end, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x1c, 0x74, 0x1, 0x5, [{@broadcast, 0x81}, {@dev={0xac, 0x14, 0x14, 0xb}, 0x4}, {@broadcast, 0x8}]}, @cipso={0x86, 0x37, 0x1, [{0x0, 0x3, "b5"}, {0x3, 0xe, "d72ed33477e907895a0930cf"}, {0x7, 0x11, "5a19088f72430dbc32a17804efb875"}, {0x1, 0xf, "63c3e56b89843a3d19304f5f0d"}]}]}}}}}) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x18) 269.297069ms ago: executing program 1 (id=4181): socket$packet(0x11, 0xa, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x1c0000000000000, 0x4, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socket$inet(0x2, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x20, 0xfc, 0x2, 0x0, @rand_addr=0x1c, @multicast1=0xe0000300}, @dest_unreach={0x3, 0x6, 0x0, 0x0, 0xfa, 0x9, {0x5, 0x4, 0x0, 0x1c, 0xfff6, 0x65, 0x5, 0x1, 0x4, 0x3, @private=0xa010102, @local}}}}}}, 0x0) 132.957825ms ago: executing program 5 (id=4182): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) sendmmsg(r0, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x34000, 0x0) 129.986095ms ago: executing program 6 (id=4183): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000001000c10701000000000000000a0000000900020054495043"], 0x7b}}, 0x20048482) write$binfmt_script(r1, &(0x7f0000000000), 0x208e24b) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_recvmsg\x00', r3}, 0x18) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa94f8d674031204efaa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) recvmsg$kcm(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8140) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) capget(&(0x7f0000000040)={0x20071026}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000240), 0x3af4701e) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f00000003c0)={0x9c9, 0x0, 0x0, 'queue0\x00', 0x200000}) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x120002) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r8, 0x54a2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r7, 0x40605346, &(0x7f0000000100)={0x0, 0x0, {0x3, 0x7, 0x6, 0x2}, 0x9}) r9 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r9, &(0x7f0000000080), 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000180)=ANY=[@ANYBLOB="12010000bdf7130870270c936a8d01020301090212"], 0x0) close(0x3) sendfile(r5, r0, 0x0, 0x10000a007) 12.59423ms ago: executing program 4 (id=4184): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x1a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x2, 0x0, 0x4, 0x9, 0x7, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0xe7, 0x30, &(0x7f0000000100)=""/48, 0x40f00, 0x19, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x4, 0xbb, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[r2, r0], &(0x7f00000004c0)=[{0x2, 0x5, 0x6, 0x5}], 0x10, 0x3}, 0x94) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x315b, &(0x7f0000000200)={0x0, 0xcfca, 0x1040, 0xfffffffd, 0x1000001}, &(0x7f0000000100), &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000595000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f00000ce000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$binfmt_elf32(r2, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x28, 0x2, 0x5, 0x8, 0xff, 0x2, 0x3e, 0x3ff, 0x1b9, 0x38, 0x341, 0x0, 0xda6d, 0x20, 0x4, 0x8, 0x7, 0x6}, [{0x6474e551, 0x10001, 0x24, 0x4, 0xe, 0x6, 0x400, 0x3}, {0x6474e551, 0x7, 0x3, 0x7, 0x8, 0x1, 0x800, 0x5}, {0x2, 0x9, 0xe55, 0x0, 0xe7b, 0x7fffffff, 0x6, 0x9}, {0x3, 0x101, 0x2, 0x3, 0x6, 0x2, 0x3, 0x5}], "369e8158e235fd2f2d51eb2d0dd66cefe3350771c4aaf49202482c944587f7517d2ea84e8e7ac4a318b77ddd33c49c0202e22474dae7483402beb4df0a7cd0440a0f3c3e1288aa47ecdd51c3718abca86b675338f2014d6c1c7f1086d3945d79c8b2ea32c2e210c65c2ccde0d76153c519bffbccfd287be65fe2ad176da831381d8658230fbad91bae87bfa9a7b82d10462ac4650ea6cce79405d87946855ab5f199a48bc7d4919590b30c30a1b483eb", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x668) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r3, 0xc, 0x0, 0x0) prctl$PR_SCHED_CORE(0x4d, 0x8, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) setresuid(0xee00, 0xee00, 0x0) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000700000000000000000000009500000000200000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 0s ago: executing program 5 (id=4185): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/sync_on_suspend', 0x343282, 0x1e2dfe37373eafbd) unshare(0x20000400) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)='+}[@\x00G5\v\x89n\xb2\x0e\xb7\xb4\x9a\xb3\xb9\xe1\xff@`\x87\xefy\xb7\xe0\xe6c\x91\x81ND\t3\xc4\xca\xf0\xd0Zp\xadbdY\xdcz\xc6lo\xd0\xc7\'CT') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff27}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x20842, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x0], 0x0, 0x0, 0x1, 0x1, r1}}, 0x40) r5 = socket(0x10, 0x3, 0x0) dup3(r5, r4, 0x0) sendfile(r0, r0, 0x0, 0x5) r6 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x804}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000540)='kfree\x00', r8}, 0x10) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000009006000000080000000000000a38000000090a000000000000000000000000000008000a40000000000900020073797a310000000008000540000000000800084000000001"], 0x60}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r9 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1200, 0x12011, r9, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000600)={0x28, 0x0, 0x0, @local}, 0x10) kernel console output (not intermixed with test programs): ummy0): Enslaving as an active interface with an up link [ 223.378297][ T29] audit: type=1326 audit(1763669742.254:31035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12415 comm="syz.4.3251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 223.406615][T12361] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.417633][ T29] audit: type=1326 audit(1763669742.254:31036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12415 comm="syz.4.3251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 223.441406][ T29] audit: type=1326 audit(1763669742.254:31037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12415 comm="syz.4.3251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 223.465262][ T29] audit: type=1326 audit(1763669742.254:31038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12415 comm="syz.4.3251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 223.526855][T12424] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 223.548924][T12361] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.568239][ T29] audit: type=1326 audit(1763669742.453:31039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12428 comm="syz.2.3257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe976ff749 code=0x7ffc0000 [ 223.592386][ T29] audit: type=1326 audit(1763669742.453:31040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12428 comm="syz.2.3257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe976ff749 code=0x7ffc0000 [ 223.616031][ T29] audit: type=1326 audit(1763669742.453:31041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12428 comm="syz.2.3257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe976ff749 code=0x7ffc0000 [ 223.651384][T12422] serio: Serial port ptm0 [ 223.658307][T12361] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.700558][T12441] FAULT_INJECTION: forcing a failure. [ 223.700558][T12441] name failslab, interval 1, probability 0, space 0, times 0 [ 223.713247][T12441] CPU: 0 UID: 0 PID: 12441 Comm: syz.2.3261 Not tainted syzkaller #0 PREEMPT(voluntary) [ 223.713269][T12441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 223.713278][T12441] Call Trace: [ 223.713284][T12441] [ 223.713290][T12441] __dump_stack+0x1d/0x30 [ 223.713377][T12441] dump_stack_lvl+0xe8/0x140 [ 223.713388][T12441] dump_stack+0x15/0x1b [ 223.713399][T12441] should_fail_ex+0x265/0x280 [ 223.713448][T12441] should_failslab+0x8c/0xb0 [ 223.713464][T12441] __kmalloc_noprof+0xa5/0x570 [ 223.713516][T12441] ? alloc_pipe_info+0x1c9/0x350 [ 223.713531][T12441] alloc_pipe_info+0x1c9/0x350 [ 223.713545][T12441] splice_direct_to_actor+0x592/0x680 [ 223.713558][T12441] ? kstrtouint_from_user+0x9f/0xf0 [ 223.713580][T12441] ? __pfx_direct_splice_actor+0x10/0x10 [ 223.713592][T12441] ? __rcu_read_unlock+0x4f/0x70 [ 223.713605][T12441] ? get_pid_task+0x96/0xd0 [ 223.713636][T12441] ? avc_policy_seqno+0x15/0x30 [ 223.713653][T12441] ? selinux_file_permission+0x1e4/0x320 [ 223.713809][T12441] do_splice_direct+0xda/0x150 [ 223.713821][T12441] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 223.713836][T12441] do_sendfile+0x380/0x650 [ 223.713854][T12441] __x64_sys_sendfile64+0xb8/0x150 [ 223.713931][T12441] x64_sys_call+0x2bb4/0x3000 [ 223.713942][T12441] do_syscall_64+0xd2/0x200 [ 223.713954][T12441] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 223.713968][T12441] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 223.714021][T12441] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 223.714033][T12441] RIP: 0033:0x7efe976ff749 [ 223.714042][T12441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.714052][T12441] RSP: 002b:00007efe9615f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 223.714063][T12441] RAX: ffffffffffffffda RBX: 00007efe97955fa0 RCX: 00007efe976ff749 [ 223.714070][T12441] RDX: 0000200000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 223.714088][T12441] RBP: 00007efe9615f090 R08: 0000000000000000 R09: 0000000000000000 [ 223.714094][T12441] R10: 00000002000007ff R11: 0000000000000246 R12: 0000000000000001 [ 223.714101][T12441] R13: 00007efe97956038 R14: 00007efe97955fa0 R15: 00007fff5408bbe8 [ 223.714113][T12441] [ 223.715383][T12441] netlink: 56 bytes leftover after parsing attributes in process `syz.2.3261'. [ 223.946622][T12361] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.070453][T12361] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 224.079628][T12361] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 224.088767][T12361] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 224.099893][T12361] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 224.156966][T12361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.169131][T12361] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.178512][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.185671][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.196209][ T1059] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.203268][ T1059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.254352][T12347] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.272527][T12361] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.357815][T12479] netlink: 'syz.1.3268': attribute type 10 has an invalid length. [ 224.370783][T12479] team0: Port device dummy0 added [ 224.377583][T12361] veth0_vlan: entered promiscuous mode [ 224.380159][T12479] netlink: 'syz.1.3268': attribute type 10 has an invalid length. [ 224.386243][T12361] veth1_vlan: entered promiscuous mode [ 224.399708][T12479] team0: Port device dummy0 removed [ 224.407201][T12479] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 224.428264][T12361] veth0_macvtap: entered promiscuous mode [ 224.436441][T12361] veth1_macvtap: entered promiscuous mode [ 224.448798][T12361] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 224.459503][T12361] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 224.470699][T11856] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.481729][T11856] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.490903][T11856] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.500250][T11856] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.712954][T12439] bond0: (slave syz_tun): Releasing backup interface [ 224.744334][T12504] 9pnet: Could not find request transport: f [ 224.754240][T12347] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.772720][T12501] netlink: 56 bytes leftover after parsing attributes in process `syz.5.3276'. [ 224.816425][T12347] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.832228][T12493] lo speed is unknown, defaulting to 1000 [ 224.835682][T12508] serio: Serial port ptm0 [ 224.876825][ T1059] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.892930][ T1059] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.937148][ T1059] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.953473][ T1059] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.964584][T12493] chnl_net:caif_netlink_parms(): no params data found [ 225.060935][T12540] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.071939][T12493] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.079099][T12493] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.086911][T12493] bridge_slave_0: entered allmulticast mode [ 225.093951][T12493] bridge_slave_0: entered promiscuous mode [ 225.101216][T12493] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.108466][T12493] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.121414][T12493] bridge_slave_1: entered allmulticast mode [ 225.128323][T12493] bridge_slave_1: entered promiscuous mode [ 225.135601][T12540] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.160059][T12550] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.185540][T12493] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.196372][T12493] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.217943][T12540] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.245667][T12493] team0: Port device team_slave_0 added [ 225.252694][T12493] team0: Port device team_slave_1 added [ 225.267643][T12493] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.274759][T12493] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 225.300813][T12493] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.313775][T12493] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.320784][T12493] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 225.346707][T12493] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.372266][T12550] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.393361][T12493] hsr_slave_0: entered promiscuous mode [ 225.399469][T12493] hsr_slave_1: entered promiscuous mode [ 225.405594][T12493] debugfs: 'hsr0' already exists in 'hsr' [ 225.411488][T12493] Cannot create hsr debugfs directory [ 225.417006][T12552] lo speed is unknown, defaulting to 1000 [ 225.435815][T12540] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.463177][T12550] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.530082][T12550] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.546640][T12493] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.557674][T11856] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.570530][T11856] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.580792][T11856] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.593417][T11856] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.612652][T12493] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.679563][T12493] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.756016][T12493] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.854657][T12493] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 225.867585][T12577] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.878782][T12493] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 225.887444][T12493] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 225.905735][T12493] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 225.928763][T12577] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.965814][T12589] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3305'. [ 225.998171][T12592] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 226.007389][T12592] team0: Device macvtap2 is already an upper device of the team interface [ 226.024120][T12577] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.054626][T12493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.073521][T12493] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.089961][ T58] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.097176][ T58] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.110551][T12577] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.124642][ T1059] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.131820][ T1059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.166793][T12493] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 226.229748][T12493] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.304473][T12493] veth0_vlan: entered promiscuous mode [ 226.312701][T12493] veth1_vlan: entered promiscuous mode [ 226.331080][T12493] veth0_macvtap: entered promiscuous mode [ 226.340033][T12493] veth1_macvtap: entered promiscuous mode [ 226.359712][T12493] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 226.373393][T12493] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 226.385315][ T58] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.401688][ T58] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.439800][ T58] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.458360][T12618] lo speed is unknown, defaulting to 1000 [ 226.548456][ T58] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.295761][T12643] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3321'. [ 227.304941][T12643] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3321'. [ 227.313993][T12643] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3321'. [ 227.323061][T12643] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3321'. [ 227.587492][ T58] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.602599][T11856] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.610956][T11856] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.623088][ T58] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.688206][T12664] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3328'. [ 227.697200][T12664] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3328'. [ 227.706260][T12664] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3328'. [ 227.715418][T12664] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3328'. [ 227.742190][T12667] team_slave_0: entered promiscuous mode [ 227.747918][T12667] team_slave_1: entered promiscuous mode [ 227.754645][T12667] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 227.763060][T12667] team0: Device macvtap1 is already an upper device of the team interface [ 227.772405][T12667] team_slave_0: left promiscuous mode [ 227.777859][T12667] team_slave_1: left promiscuous mode [ 227.783702][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 227.783724][ T29] audit: type=1326 audit(1763669746.884:31254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12659 comm="syz.2.3328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 227.813812][ T29] audit: type=1326 audit(1763669746.884:31255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12657 comm="syz.2.3328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f59814eb829 code=0x7ffc0000 [ 227.837642][ T29] audit: type=1326 audit(1763669746.884:31256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12657 comm="syz.2.3328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 227.861393][ T29] audit: type=1326 audit(1763669746.884:31257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12657 comm="syz.2.3328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 228.035610][ T29] audit: type=1326 audit(1763669747.147:31258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12679 comm="syz.4.3336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 228.065737][ T29] audit: type=1326 audit(1763669747.147:31259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12679 comm="syz.4.3336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 228.089593][ T29] audit: type=1326 audit(1763669747.147:31260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12679 comm="syz.4.3336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 228.113502][ T29] audit: type=1326 audit(1763669747.147:31261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12679 comm="syz.4.3336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 228.137226][ T29] audit: type=1326 audit(1763669747.147:31262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12679 comm="syz.4.3336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=151 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 228.160892][ T29] audit: type=1326 audit(1763669747.147:31263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12679 comm="syz.4.3336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 228.277019][T12685] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 228.384643][T12685] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 228.433095][T12685] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 228.499479][T12685] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 228.593515][T12694] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 228.622215][T12694] lo speed is unknown, defaulting to 1000 [ 228.728913][ T31] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.801898][ T31] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.908509][ T31] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.987123][ T31] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 229.079259][T12706] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3345'. [ 229.088443][T12706] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3345'. [ 229.286273][ T31] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 229.301998][T12711] lo speed is unknown, defaulting to 1000 [ 229.307970][ T58] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 229.355117][T12713] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 229.402335][T12722] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 229.459388][ T58] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 229.471224][ T58] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 229.607302][T12732] serio: Serial port ptm0 [ 229.636322][T12738] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 229.778557][T12752] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 229.851263][T12757] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 229.876679][T12757] lo speed is unknown, defaulting to 1000 [ 230.292096][T12752] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 230.354914][T12752] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 230.379294][T12768] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 230.443506][T12752] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 230.510760][T12777] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(7) [ 230.517407][T12777] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 230.525049][T12777] vhci_hcd vhci_hcd.0: Device attached [ 230.543589][ T58] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.563555][ T58] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.583458][T12780] vhci_hcd: connection closed [ 230.583929][ T1457] vhci_hcd: stop threads [ 230.584047][ T58] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.588619][ T1457] vhci_hcd: release socket [ 230.588637][ T1457] vhci_hcd: disconnect device [ 230.616052][ T58] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.652602][T12789] serio: Serial port ptm0 [ 230.689844][T12805] 9pnet: Could not find request transport: f [ 230.710303][T12794] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 230.899181][T12817] lo speed is unknown, defaulting to 1000 [ 230.945742][T12825] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 231.002733][T12825] lo speed is unknown, defaulting to 1000 [ 231.105919][T12833] team_slave_0: entered promiscuous mode [ 231.111667][T12833] team_slave_1: entered promiscuous mode [ 231.122574][T12833] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 231.144331][T12833] team0: Device macvtap1 is already an upper device of the team interface [ 231.174089][T12833] team_slave_0: left promiscuous mode [ 231.179512][T12833] team_slave_1: left promiscuous mode [ 231.352294][T12838] team_slave_0: entered promiscuous mode [ 231.358038][T12838] team_slave_1: entered promiscuous mode [ 231.395643][T12838] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 231.395925][T12843] FAULT_INJECTION: forcing a failure. [ 231.395925][T12843] name failslab, interval 1, probability 0, space 0, times 0 [ 231.415380][T12843] CPU: 0 UID: 0 PID: 12843 Comm: syz.5.3390 Not tainted syzkaller #0 PREEMPT(voluntary) [ 231.415426][T12843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 231.415472][T12843] Call Trace: [ 231.415477][T12843] [ 231.415484][T12843] __dump_stack+0x1d/0x30 [ 231.415504][T12843] dump_stack_lvl+0xe8/0x140 [ 231.415522][T12843] dump_stack+0x15/0x1b [ 231.415539][T12843] should_fail_ex+0x265/0x280 [ 231.415621][T12838] team0: Device macvtap1 is already an upper device of the team interface [ 231.415622][T12843] should_failslab+0x8c/0xb0 [ 231.415650][T12843] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 231.415742][T12843] ? __alloc_skb+0x101/0x320 [ 231.415772][T12843] __alloc_skb+0x101/0x320 [ 231.415862][T12843] netlink_alloc_large_skb+0xbf/0xf0 [ 231.415892][T12843] netlink_sendmsg+0x3cf/0x6b0 [ 231.415989][T12843] ? __pfx_netlink_sendmsg+0x10/0x10 [ 231.416081][T12843] __sock_sendmsg+0x145/0x180 [ 231.416105][T12843] ____sys_sendmsg+0x31e/0x4e0 [ 231.416135][T12843] ___sys_sendmsg+0x17b/0x1d0 [ 231.416205][T12843] __x64_sys_sendmsg+0xd4/0x160 [ 231.416229][T12843] x64_sys_call+0x191e/0x3000 [ 231.416250][T12843] do_syscall_64+0xd2/0x200 [ 231.416338][T12843] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 231.416430][T12843] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 231.416460][T12843] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 231.416561][T12843] RIP: 0033:0x7f8a4259f749 [ 231.416577][T12843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.416594][T12843] RSP: 002b:00007f8a41007038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 231.416675][T12843] RAX: ffffffffffffffda RBX: 00007f8a427f5fa0 RCX: 00007f8a4259f749 [ 231.416688][T12843] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000006 [ 231.416699][T12843] RBP: 00007f8a41007090 R08: 0000000000000000 R09: 0000000000000000 [ 231.416710][T12843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.416722][T12843] R13: 00007f8a427f6038 R14: 00007f8a427f5fa0 R15: 00007fffe13a6f78 [ 231.416828][T12843] [ 231.684314][T12838] team_slave_0: left promiscuous mode [ 231.689776][T12838] team_slave_1: left promiscuous mode [ 231.719697][T12850] team_slave_0: entered promiscuous mode [ 231.725399][T12850] team_slave_1: entered promiscuous mode [ 231.735677][T12847] serio: Serial port ptm0 [ 231.741823][T12850] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 231.770580][T12850] team0: Device macvtap1 is already an upper device of the team interface [ 231.782046][T12850] team_slave_0: left promiscuous mode [ 231.787482][T12850] team_slave_1: left promiscuous mode [ 231.946795][T12876] sch_fq: defrate 4294967295 ignored. [ 231.986656][T12881] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 232.208295][T12887] lo speed is unknown, defaulting to 1000 [ 232.261491][T12892] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.356086][T12892] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.356173][T12901] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 232.585548][T12892] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.613345][T12907] serio: Serial port ptm0 [ 232.661252][T12892] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.793636][T12913] team_slave_0: entered promiscuous mode [ 232.799505][T12913] team_slave_1: entered promiscuous mode [ 232.819802][T12913] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 232.840599][T12913] team0: Device macvtap1 is already an upper device of the team interface [ 232.858532][T12913] team_slave_0: left promiscuous mode [ 232.863986][T12913] team_slave_1: left promiscuous mode [ 232.946458][ T29] kauditd_printk_skb: 622 callbacks suppressed [ 232.946473][ T29] audit: type=1326 audit(1763669752.312:31886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 232.978166][ T29] audit: type=1326 audit(1763669752.312:31887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.001780][ T29] audit: type=1326 audit(1763669752.312:31888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.025434][ T29] audit: type=1326 audit(1763669752.312:31889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.049038][ T29] audit: type=1326 audit(1763669752.312:31890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.072662][ T29] audit: type=1326 audit(1763669752.312:31891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.096250][ T29] audit: type=1326 audit(1763669752.312:31892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.120518][ T29] audit: type=1326 audit(1763669752.365:31893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.144123][ T29] audit: type=1326 audit(1763669752.365:31894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.167959][ T29] audit: type=1326 audit(1763669752.365:31895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12916 comm="syz.5.3417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 233.286784][T12935] team_slave_0: entered promiscuous mode [ 233.292594][T12935] team_slave_1: entered promiscuous mode [ 233.299622][T12935] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 233.309007][T12935] team0: Device macvtap1 is already an upper device of the team interface [ 233.318134][T12935] team_slave_0: left promiscuous mode [ 233.323529][T12935] team_slave_1: left promiscuous mode [ 233.723214][T11856] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.744306][T11856] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.762892][T11856] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.781859][T11856] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.854130][T12960] FAULT_INJECTION: forcing a failure. [ 233.854130][T12960] name failslab, interval 1, probability 0, space 0, times 0 [ 233.866848][T12960] CPU: 0 UID: 0 PID: 12960 Comm: syz.4.3432 Not tainted syzkaller #0 PREEMPT(voluntary) [ 233.866878][T12960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 233.866890][T12960] Call Trace: [ 233.866898][T12960] [ 233.866906][T12960] __dump_stack+0x1d/0x30 [ 233.866983][T12960] dump_stack_lvl+0xe8/0x140 [ 233.867005][T12960] dump_stack+0x15/0x1b [ 233.867022][T12960] should_fail_ex+0x265/0x280 [ 233.867057][T12960] should_failslab+0x8c/0xb0 [ 233.867086][T12960] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 233.867166][T12960] ? __alloc_skb+0x101/0x320 [ 233.867197][T12960] __alloc_skb+0x101/0x320 [ 233.867228][T12960] netlink_alloc_large_skb+0xbf/0xf0 [ 233.867289][T12960] netlink_sendmsg+0x3cf/0x6b0 [ 233.867312][T12960] ? __pfx_netlink_sendmsg+0x10/0x10 [ 233.867333][T12960] __sock_sendmsg+0x145/0x180 [ 233.867371][T12960] ____sys_sendmsg+0x31e/0x4e0 [ 233.867393][T12960] ___sys_sendmsg+0x17b/0x1d0 [ 233.867424][T12960] __x64_sys_sendmsg+0xd4/0x160 [ 233.867444][T12960] x64_sys_call+0x191e/0x3000 [ 233.867464][T12960] do_syscall_64+0xd2/0x200 [ 233.867494][T12960] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 233.867523][T12960] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 233.867578][T12960] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.867597][T12960] RIP: 0033:0x7fafacc7f749 [ 233.867705][T12960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.867724][T12960] RSP: 002b:00007fafab6e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.867744][T12960] RAX: ffffffffffffffda RBX: 00007fafaced5fa0 RCX: 00007fafacc7f749 [ 233.867806][T12960] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000007 [ 233.867820][T12960] RBP: 00007fafab6e7090 R08: 0000000000000000 R09: 0000000000000000 [ 233.867833][T12960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.867846][T12960] R13: 00007fafaced6038 R14: 00007fafaced5fa0 R15: 00007ffef9e2a868 [ 233.867867][T12960] [ 234.346404][T12989] lo speed is unknown, defaulting to 1000 [ 234.573428][T13020] team_slave_0: entered promiscuous mode [ 234.579149][T13020] team_slave_1: entered promiscuous mode [ 234.618159][T13020] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 234.674868][T13020] team0: Device macvtap1 is already an upper device of the team interface [ 234.867647][T13059] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 234.906261][T13020] team_slave_0: left promiscuous mode [ 234.911750][T13020] team_slave_1: left promiscuous mode [ 234.954195][T13061] xt_TCPMSS: Only works on TCP SYN packets [ 234.999576][T13059] lo speed is unknown, defaulting to 1000 [ 235.087052][T13061] bridge0: port 3(gretap0) entered blocking state [ 235.087089][T13061] bridge0: port 3(gretap0) entered disabled state [ 235.087295][T13061] gretap0: entered allmulticast mode [ 235.088116][T13061] gretap0: entered promiscuous mode [ 235.088367][T13061] bridge0: port 3(gretap0) entered blocking state [ 235.088403][T13061] bridge0: port 3(gretap0) entered forwarding state [ 235.111321][T13060] 9pnet: Could not find request transport: f [ 235.465175][T13077] team_slave_0: entered promiscuous mode [ 235.470919][T13077] team_slave_1: entered promiscuous mode [ 235.477759][T13077] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 235.486590][T13077] team0: Device macvtap1 is already an upper device of the team interface [ 235.495761][T13077] team_slave_0: left promiscuous mode [ 235.501233][T13077] team_slave_1: left promiscuous mode [ 235.539352][T13082] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 235.699254][T13094] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 235.766680][T13092] serio: Serial port ptm0 [ 235.978062][T13108] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 236.006076][T13108] lo speed is unknown, defaulting to 1000 [ 236.492334][T13116] lo speed is unknown, defaulting to 1000 [ 236.605022][T13120] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 236.670842][T13122] team_slave_0: entered promiscuous mode [ 236.676540][T13122] team_slave_1: entered promiscuous mode [ 236.689527][T13122] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 236.701800][T13122] team0: Device macvtap1 is already an upper device of the team interface [ 236.745764][T13122] team_slave_0: left promiscuous mode [ 236.751187][T13122] team_slave_1: left promiscuous mode [ 237.213847][T13154] team_slave_0: entered promiscuous mode [ 237.219574][T13154] team_slave_1: entered promiscuous mode [ 237.226694][T13154] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 237.234825][T13154] team0: Device macvtap1 is already an upper device of the team interface [ 237.245661][T13154] team_slave_0: left promiscuous mode [ 237.251219][T13154] team_slave_1: left promiscuous mode [ 237.423546][T13169] FAULT_INJECTION: forcing a failure. [ 237.423546][T13169] name failslab, interval 1, probability 0, space 0, times 0 [ 237.436224][T13169] CPU: 1 UID: 0 PID: 13169 Comm: syz.6.3480 Not tainted syzkaller #0 PREEMPT(voluntary) [ 237.436331][T13169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 237.436342][T13169] Call Trace: [ 237.436349][T13169] [ 237.436357][T13169] __dump_stack+0x1d/0x30 [ 237.436378][T13169] dump_stack_lvl+0xe8/0x140 [ 237.436398][T13169] dump_stack+0x15/0x1b [ 237.436414][T13169] should_fail_ex+0x265/0x280 [ 237.436524][T13169] should_failslab+0x8c/0xb0 [ 237.436551][T13169] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 237.436579][T13169] ? __alloc_skb+0x101/0x320 [ 237.436642][T13169] __alloc_skb+0x101/0x320 [ 237.436668][T13169] ? audit_log_start+0x342/0x720 [ 237.436728][T13169] audit_log_start+0x3a0/0x720 [ 237.436785][T13169] ? kstrtouint+0x76/0xc0 [ 237.436815][T13169] audit_seccomp+0x48/0x100 [ 237.436912][T13169] ? __seccomp_filter+0x82d/0x1250 [ 237.436938][T13169] __seccomp_filter+0x83e/0x1250 [ 237.436965][T13169] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 237.437013][T13169] ? vfs_write+0x7e8/0x960 [ 237.437043][T13169] __secure_computing+0x82/0x150 [ 237.437070][T13169] syscall_trace_enter+0xcf/0x1e0 [ 237.437128][T13169] do_syscall_64+0xac/0x200 [ 237.437149][T13169] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 237.437175][T13169] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 237.437264][T13169] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.437282][T13169] RIP: 0033:0x7f20d287f749 [ 237.437297][T13169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.437312][T13169] RSP: 002b:00007f20d12e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000010b [ 237.437339][T13169] RAX: ffffffffffffffda RBX: 00007f20d2ad5fa0 RCX: 00007f20d287f749 [ 237.437349][T13169] RDX: 0000200000000780 RSI: 00002000000001c0 RDI: ffffffffffffffff [ 237.437360][T13169] RBP: 00007f20d12e7090 R08: 0000000000000000 R09: 0000000000000000 [ 237.437372][T13169] R10: 00000000000000c6 R11: 0000000000000246 R12: 0000000000000001 [ 237.437384][T13169] R13: 00007f20d2ad6038 R14: 00007f20d2ad5fa0 R15: 00007fff2cda9818 [ 237.437403][T13169] [ 237.718802][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 237.718817][ T29] audit: type=1400 audit(1763669757.320:32067): avc: denied { create } for pid=13183 comm="syz.6.3487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 238.665010][T13200] FAULT_INJECTION: forcing a failure. [ 238.665010][T13200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.678155][T13200] CPU: 1 UID: 0 PID: 13200 Comm: syz.2.3493 Not tainted syzkaller #0 PREEMPT(voluntary) [ 238.678179][T13200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 238.678191][T13200] Call Trace: [ 238.678198][T13200] [ 238.678205][T13200] __dump_stack+0x1d/0x30 [ 238.678284][T13200] dump_stack_lvl+0xe8/0x140 [ 238.678301][T13200] dump_stack+0x15/0x1b [ 238.678320][T13200] should_fail_ex+0x265/0x280 [ 238.678347][T13200] should_fail+0xb/0x20 [ 238.678360][T13200] should_fail_usercopy+0x1a/0x20 [ 238.678378][T13200] _copy_from_user+0x1c/0xb0 [ 238.678474][T13200] __copy_msghdr+0x244/0x300 [ 238.678501][T13200] ___sys_sendmsg+0x109/0x1d0 [ 238.678529][T13200] __x64_sys_sendmsg+0xd4/0x160 [ 238.678615][T13200] x64_sys_call+0x191e/0x3000 [ 238.678637][T13200] do_syscall_64+0xd2/0x200 [ 238.678657][T13200] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 238.678683][T13200] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 238.678781][T13200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 238.678801][T13200] RIP: 0033:0x7f598154f749 [ 238.678817][T13200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.678836][T13200] RSP: 002b:00007f597ffb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 238.678861][T13200] RAX: ffffffffffffffda RBX: 00007f59817a5fa0 RCX: 00007f598154f749 [ 238.678874][T13200] RDX: 000000000000c851 RSI: 0000200000000700 RDI: 0000000000000003 [ 238.678899][T13200] RBP: 00007f597ffb7090 R08: 0000000000000000 R09: 0000000000000000 [ 238.678912][T13200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.678925][T13200] R13: 00007f59817a6038 R14: 00007f59817a5fa0 R15: 00007ffc41f165c8 [ 238.678946][T13200] [ 238.925935][T13207] team_slave_0: entered promiscuous mode [ 238.931694][T13207] team_slave_1: entered promiscuous mode [ 238.938547][T13207] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 238.946671][T13207] team0: Device macvtap1 is already an upper device of the team interface [ 238.956677][T13207] team_slave_0: left promiscuous mode [ 238.962182][T13207] team_slave_1: left promiscuous mode [ 239.023214][T13211] serio: Serial port ptm0 [ 239.153373][T13234] 9pnet: Could not find request transport: f [ 239.211052][ T29] audit: type=1326 audit(1763669758.874:32068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.234933][ T29] audit: type=1326 audit(1763669758.874:32069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.261025][ T29] audit: type=1326 audit(1763669758.874:32070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.286183][ T29] audit: type=1326 audit(1763669758.874:32071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.309937][ T29] audit: type=1326 audit(1763669758.874:32072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.333837][ T29] audit: type=1326 audit(1763669758.874:32073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.357540][ T29] audit: type=1326 audit(1763669758.885:32074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.382091][ T29] audit: type=1326 audit(1763669758.885:32075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.406361][ T29] audit: type=1326 audit(1763669758.885:32076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13244 comm="syz.4.3510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 239.520288][T13251] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 239.701325][T13264] FAULT_INJECTION: forcing a failure. [ 239.701325][T13264] name failslab, interval 1, probability 0, space 0, times 0 [ 239.714080][T13264] CPU: 1 UID: 0 PID: 13264 Comm: syz.2.3514 Not tainted syzkaller #0 PREEMPT(voluntary) [ 239.714105][T13264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 239.714119][T13264] Call Trace: [ 239.714125][T13264] [ 239.714133][T13264] __dump_stack+0x1d/0x30 [ 239.714154][T13264] dump_stack_lvl+0xe8/0x140 [ 239.714173][T13264] dump_stack+0x15/0x1b [ 239.714189][T13264] should_fail_ex+0x265/0x280 [ 239.714297][T13264] should_failslab+0x8c/0xb0 [ 239.714312][T13264] __kmalloc_noprof+0xa5/0x570 [ 239.714390][T13264] ? alloc_pipe_info+0x1c9/0x350 [ 239.714405][T13264] alloc_pipe_info+0x1c9/0x350 [ 239.714419][T13264] splice_direct_to_actor+0x592/0x680 [ 239.714431][T13264] ? kstrtouint_from_user+0x9f/0xf0 [ 239.714442][T13264] ? __pfx_direct_splice_actor+0x10/0x10 [ 239.714515][T13264] ? __rcu_read_unlock+0x4f/0x70 [ 239.714528][T13264] ? get_pid_task+0x96/0xd0 [ 239.714544][T13264] ? avc_policy_seqno+0x15/0x30 [ 239.714597][T13264] ? selinux_file_permission+0x1e4/0x320 [ 239.714614][T13264] do_splice_direct+0xda/0x150 [ 239.714625][T13264] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 239.714640][T13264] do_sendfile+0x380/0x650 [ 239.714730][T13264] __x64_sys_sendfile64+0x105/0x150 [ 239.714747][T13264] x64_sys_call+0x2bb4/0x3000 [ 239.714796][T13264] do_syscall_64+0xd2/0x200 [ 239.714809][T13264] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 239.714835][T13264] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 239.714852][T13264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 239.714883][T13264] RIP: 0033:0x7f598154f749 [ 239.714892][T13264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.714904][T13264] RSP: 002b:00007f597ffb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 239.714916][T13264] RAX: ffffffffffffffda RBX: 00007f59817a5fa0 RCX: 00007f598154f749 [ 239.714923][T13264] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 239.714978][T13264] RBP: 00007f597ffb7090 R08: 0000000000000000 R09: 0000000000000000 [ 239.714985][T13264] R10: 000000007fffeff9 R11: 0000000000000246 R12: 0000000000000001 [ 239.714992][T13264] R13: 00007f59817a6038 R14: 00007f59817a5fa0 R15: 00007ffc41f165c8 [ 239.715017][T13264] [ 240.135661][T13277] serio: Serial port ptm0 [ 240.162515][T13293] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 240.239035][T13294] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 240.366479][T13294] __nla_validate_parse: 8 callbacks suppressed [ 240.366500][T13294] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 240.385407][T13318] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3531'. [ 240.394483][T13318] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3531'. [ 240.403631][T13318] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3531'. [ 240.487060][T13318] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3531'. [ 240.545233][T13331] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 240.589366][T13336] FAULT_INJECTION: forcing a failure. [ 240.589366][T13336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.602776][T13336] CPU: 0 UID: 0 PID: 13336 Comm: syz.1.3540 Not tainted syzkaller #0 PREEMPT(voluntary) [ 240.602802][T13336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 240.602821][T13336] Call Trace: [ 240.602827][T13336] [ 240.602835][T13336] __dump_stack+0x1d/0x30 [ 240.602859][T13336] dump_stack_lvl+0xe8/0x140 [ 240.602879][T13336] dump_stack+0x15/0x1b [ 240.602893][T13336] should_fail_ex+0x265/0x280 [ 240.602984][T13336] should_fail+0xb/0x20 [ 240.602997][T13336] should_fail_usercopy+0x1a/0x20 [ 240.603013][T13336] _copy_from_user+0x1c/0xb0 [ 240.603086][T13336] do_ipv6_setsockopt+0x124/0x2160 [ 240.603143][T13336] ? kstrtoull+0x111/0x140 [ 240.603240][T13336] ? __rcu_read_unlock+0x4f/0x70 [ 240.603263][T13336] ? avc_has_perm_noaudit+0x1b1/0x200 [ 240.603283][T13336] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 240.603311][T13336] ipv6_setsockopt+0x59/0x130 [ 240.603451][T13336] tcp_setsockopt+0x98/0xb0 [ 240.603481][T13336] sock_common_setsockopt+0x69/0x80 [ 240.603508][T13336] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 240.603534][T13336] __sys_setsockopt+0x184/0x200 [ 240.603638][T13336] __x64_sys_setsockopt+0x64/0x80 [ 240.603671][T13336] x64_sys_call+0x20ec/0x3000 [ 240.603693][T13336] do_syscall_64+0xd2/0x200 [ 240.603744][T13336] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 240.603801][T13336] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 240.603857][T13336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 240.603900][T13336] RIP: 0033:0x7f77adeaf749 [ 240.603917][T13336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.603935][T13336] RSP: 002b:00007f77ac917038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 240.603980][T13336] RAX: ffffffffffffffda RBX: 00007f77ae105fa0 RCX: 00007f77adeaf749 [ 240.603993][T13336] RDX: 0000000000000030 RSI: 0000000000000029 RDI: 0000000000000003 [ 240.604006][T13336] RBP: 00007f77ac917090 R08: 0000000000000110 R09: 0000000000000000 [ 240.604019][T13336] R10: 00002000000005c0 R11: 0000000000000246 R12: 0000000000000001 [ 240.604070][T13336] R13: 00007f77ae106038 R14: 00007f77ae105fa0 R15: 00007fff6e6f7928 [ 240.604087][T13336] [ 240.869324][T13338] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.173635][T13338] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.266315][T13338] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.393949][T13338] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.471032][ T31] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.483397][ T31] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.499275][ T31] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.525901][ T31] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.568372][T13386] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3554'. [ 241.577395][T13386] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3554'. [ 241.586404][T13386] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3554'. [ 241.600026][T13386] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3554'. [ 241.738365][T13396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13396 comm=syz.1.3561 [ 241.751506][T13396] netlink: 'syz.1.3561': attribute type 1 has an invalid length. [ 241.771603][T13396] bond1: (slave bridge5): making interface the new active one [ 241.779825][T13396] bond1: (slave bridge5): Enslaving as an active interface with an up link [ 242.016156][T13406] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 242.035188][T13413] team_slave_0: entered promiscuous mode [ 242.040888][T13413] team_slave_1: entered promiscuous mode [ 242.047889][T13413] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 242.058503][T13413] team0: Device macvtap1 is already an upper device of the team interface [ 242.077624][T13413] team_slave_0: left promiscuous mode [ 242.083077][T13413] team_slave_1: left promiscuous mode [ 242.449499][T13438] serio: Serial port ptm0 [ 242.488619][ T29] kauditd_printk_skb: 856 callbacks suppressed [ 242.488632][ T29] audit: type=1326 audit(1763669762.328:32933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.522338][ T29] audit: type=1326 audit(1763669762.360:32934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.546880][ T29] audit: type=1326 audit(1763669762.391:32935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.552007][T13456] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 242.571058][ T29] audit: type=1326 audit(1763669762.412:32936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.612436][ T29] audit: type=1326 audit(1763669762.454:32937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.636105][ T29] audit: type=1326 audit(1763669762.454:32938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.672382][ T29] audit: type=1326 audit(1763669762.507:32939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.696027][ T29] audit: type=1326 audit(1763669762.507:32940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.719761][ T29] audit: type=1326 audit(1763669762.507:32941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.743396][ T29] audit: type=1326 audit(1763669762.507:32942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13431 comm="syz.6.3574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d28b2005 code=0x7ffc0000 [ 242.881876][T13465] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3585'. [ 243.207886][T13481] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 243.390062][T13493] lo speed is unknown, defaulting to 1000 [ 243.496008][T13499] IPv6: NLM_F_CREATE should be specified when creating new route [ 243.649909][T13514] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 243.727207][T13519] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 243.757910][T13519] team0: Device macvtap2 is already an upper device of the team interface [ 243.847711][T13524] team_slave_0: entered promiscuous mode [ 243.853529][T13524] team_slave_1: entered promiscuous mode [ 243.862687][T13524] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 243.871664][T13524] team0: Device macvtap1 is already an upper device of the team interface [ 243.886190][T13524] team_slave_0: left promiscuous mode [ 243.891631][T13524] team_slave_1: left promiscuous mode [ 243.922514][T13526] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 243.958179][T13531] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 243.993338][T13529] lo speed is unknown, defaulting to 1000 [ 244.014245][T13538] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.085353][T13538] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.167237][T13538] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.419518][T13538] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.574456][ T1457] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.598045][ T1457] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.619498][T13578] team_slave_0: entered promiscuous mode [ 244.625220][T13578] team_slave_1: entered promiscuous mode [ 244.639755][T13578] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 244.648284][T13578] team0: Device macvtap1 is already an upper device of the team interface [ 244.722118][T13578] team_slave_0: left promiscuous mode [ 244.727573][T13578] team_slave_1: left promiscuous mode [ 244.777254][ T1457] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.786635][ T1457] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.806596][T13584] lo speed is unknown, defaulting to 1000 [ 244.854253][T13588] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 244.941087][T13577] lo speed is unknown, defaulting to 1000 [ 245.517622][T13606] __nla_validate_parse: 3 callbacks suppressed [ 245.517635][T13606] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3640'. [ 245.533701][T13606] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3640'. [ 245.548832][T13610] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 245.599274][T13610] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 245.668552][T13619] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 245.681160][T13610] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 245.748476][T13610] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 245.823737][ T1457] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.843618][ T1457] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.867208][ T1457] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.889600][ T1457] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.138087][T13636] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 246.194183][T13641] lo speed is unknown, defaulting to 1000 [ 246.243026][T13642] lo speed is unknown, defaulting to 1000 [ 246.511078][T13636] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 246.768684][T13660] lo speed is unknown, defaulting to 1000 [ 246.904055][T13665] team_slave_0: entered promiscuous mode [ 246.909765][T13665] team_slave_1: entered promiscuous mode [ 246.937476][T13665] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 246.945889][T13665] team0: Device macvtap1 is already an upper device of the team interface [ 246.967410][T13665] team_slave_0: left promiscuous mode [ 246.972833][T13665] team_slave_1: left promiscuous mode [ 247.015673][T13660] lo speed is unknown, defaulting to 1000 [ 247.111677][T13660] lo speed is unknown, defaulting to 1000 [ 247.178067][T13660] lo speed is unknown, defaulting to 1000 [ 247.260573][ T29] kauditd_printk_skb: 346 callbacks suppressed [ 247.260586][ T29] audit: type=1326 audit(1763669767.337:33289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.300268][T13660] lo speed is unknown, defaulting to 1000 [ 247.305614][ T29] audit: type=1326 audit(1763669767.368:33290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.329670][ T29] audit: type=1326 audit(1763669767.368:33291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13688 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a425d2005 code=0x7ffc0000 [ 247.353680][ T29] audit: type=1326 audit(1763669767.368:33292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.377639][ T29] audit: type=1326 audit(1763669767.368:33293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.413192][T13696] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3667'. [ 247.422199][T13696] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3667'. [ 247.431135][T13696] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3667'. [ 247.440391][ T29] audit: type=1326 audit(1763669767.515:33294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13688 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.440509][T13696] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3667'. [ 247.477462][T13686] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 247.478539][ T29] audit: type=1326 audit(1763669767.557:33295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8a4253b829 code=0x7ffc0000 [ 247.509693][ T29] audit: type=1326 audit(1763669767.578:33296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.533351][ T29] audit: type=1326 audit(1763669767.578:33297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13684 comm="syz.5.3667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 247.564569][T13695] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 247.589546][T13660] lo speed is unknown, defaulting to 1000 [ 247.720832][ T29] audit: type=1326 audit(1763669767.809:33298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13704 comm="syz.4.3673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 247.814595][T13717] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3673'. [ 247.823693][T13717] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3673'. [ 248.080129][T13732] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.133351][T13732] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.187028][T13732] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.244718][T13732] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.465155][T13735] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 248.497367][T13739] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 248.547872][T13746] team_slave_0: entered promiscuous mode [ 248.553608][T13746] team_slave_1: entered promiscuous mode [ 248.560268][T13746] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 248.568082][T13746] team0: Device macvtap1 is already an upper device of the team interface [ 248.576956][T13746] team_slave_0: left promiscuous mode [ 248.582401][T13746] team_slave_1: left promiscuous mode [ 248.934217][T13775] FAULT_INJECTION: forcing a failure. [ 248.934217][T13775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 248.947408][T13775] CPU: 0 UID: 0 PID: 13775 Comm: syz.6.3700 Not tainted syzkaller #0 PREEMPT(voluntary) [ 248.947484][T13775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 248.947496][T13775] Call Trace: [ 248.947503][T13775] [ 248.947511][T13775] __dump_stack+0x1d/0x30 [ 248.947533][T13775] dump_stack_lvl+0xe8/0x140 [ 248.947554][T13775] dump_stack+0x15/0x1b [ 248.947601][T13775] should_fail_ex+0x265/0x280 [ 248.947670][T13775] should_fail+0xb/0x20 [ 248.947686][T13775] should_fail_usercopy+0x1a/0x20 [ 248.947764][T13775] _copy_from_user+0x1c/0xb0 [ 248.947804][T13775] do_ipv6_setsockopt+0x124/0x2160 [ 248.947837][T13775] ? kstrtoull+0x111/0x140 [ 248.947867][T13775] ? __rcu_read_unlock+0x4f/0x70 [ 248.947913][T13775] ? avc_has_perm_noaudit+0x1b1/0x200 [ 248.947935][T13775] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 248.947979][T13775] ipv6_setsockopt+0x59/0x130 [ 248.948011][T13775] tcp_setsockopt+0x98/0xb0 [ 248.948032][T13775] sock_common_setsockopt+0x69/0x80 [ 248.948059][T13775] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 248.948086][T13775] __sys_setsockopt+0x184/0x200 [ 248.948194][T13775] __x64_sys_setsockopt+0x64/0x80 [ 248.948226][T13775] x64_sys_call+0x20ec/0x3000 [ 248.948309][T13775] do_syscall_64+0xd2/0x200 [ 248.948349][T13775] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 248.948376][T13775] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 248.948408][T13775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 248.948455][T13775] RIP: 0033:0x7f20d287f749 [ 248.948534][T13775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.948552][T13775] RSP: 002b:00007f20d12e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 248.948571][T13775] RAX: ffffffffffffffda RBX: 00007f20d2ad5fa0 RCX: 00007f20d287f749 [ 248.948638][T13775] RDX: 0000000000000039 RSI: 0000000000000029 RDI: 0000000000000003 [ 248.948650][T13775] RBP: 00007f20d12e7090 R08: 0000000000000008 R09: 0000000000000000 [ 248.948663][T13775] R10: 0000200000000a80 R11: 0000000000000246 R12: 0000000000000001 [ 248.948675][T13775] R13: 00007f20d2ad6038 R14: 00007f20d2ad5fa0 R15: 00007fff2cda9818 [ 248.948695][T13775] [ 249.793074][T13800] lo speed is unknown, defaulting to 1000 [ 250.190304][ T1059] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.282030][ T1059] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.290288][ T1059] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.298528][ T1059] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.513784][T13818] team_slave_0: entered promiscuous mode [ 250.519494][T13818] team_slave_1: entered promiscuous mode [ 250.525892][T13818] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 250.534174][T13818] team0: Device macvtap1 is already an upper device of the team interface [ 250.611168][T13818] team_slave_0: left promiscuous mode [ 250.616636][T13818] team_slave_1: left promiscuous mode [ 250.636962][T13816] lo speed is unknown, defaulting to 1000 [ 251.215103][T13847] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 251.237396][T13847] team0: Device macvtap2 is already an upper device of the team interface [ 251.440113][T13849] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 251.519934][T13851] team_slave_0: entered promiscuous mode [ 251.525619][T13851] team_slave_1: entered promiscuous mode [ 251.565571][T13851] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 251.593660][T13851] team0: Device macvtap1 is already an upper device of the team interface [ 251.632741][T13851] team_slave_0: left promiscuous mode [ 251.638159][T13851] team_slave_1: left promiscuous mode [ 251.798573][T13863] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 251.826672][T13863] team0: Device macvtap2 is already an upper device of the team interface [ 251.987721][T13871] wireguard0: entered promiscuous mode [ 251.993405][T13871] wireguard0: entered allmulticast mode [ 252.096928][T13878] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 252.877083][T13880] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 252.930886][T13878] lo speed is unknown, defaulting to 1000 [ 252.961517][T13879] lo speed is unknown, defaulting to 1000 [ 253.049985][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 253.050015][ T29] audit: type=1326 audit(1763669773.405:33490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.079981][ T29] audit: type=1326 audit(1763669773.447:33491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.109007][ T29] audit: type=1326 audit(1763669773.468:33492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.132653][ T29] audit: type=1326 audit(1763669773.468:33493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.156210][ T29] audit: type=1326 audit(1763669773.468:33494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.190443][T13890] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 253.192467][ T29] audit: type=1326 audit(1763669773.563:33495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.222372][ T29] audit: type=1326 audit(1763669773.563:33496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.253055][ T29] audit: type=1326 audit(1763669773.626:33497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13885 comm="syz.6.3739" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 253.350885][T13903] __nla_validate_parse: 6 callbacks suppressed [ 253.350921][T13903] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3739'. [ 253.366145][T13903] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3739'. [ 253.366252][T13899] serio: Serial port ptm0 [ 253.375101][T13903] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3739'. [ 253.389008][T13903] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3739'. [ 253.738597][T13919] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 253.766162][T13919] lo speed is unknown, defaulting to 1000 [ 254.277630][T13939] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.401813][ T29] audit: type=1326 audit(1763669774.833:33498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13940 comm="syz.4.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 254.425448][ T29] audit: type=1326 audit(1763669774.833:33499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13940 comm="syz.4.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 254.565325][T13939] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.638490][T13939] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.662222][T13950] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 254.735414][T13950] lo speed is unknown, defaulting to 1000 [ 254.942219][T13939] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.039876][ T1059] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.051537][ T1059] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.072860][ T1059] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.110425][ T1059] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.318601][T13969] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 255.334447][T13972] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3767'. [ 255.343621][T13972] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3767'. [ 255.352600][T13972] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3767'. [ 255.368872][T13972] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3767'. [ 255.402098][T13976] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.422461][T13980] team_slave_0: entered promiscuous mode [ 255.428276][T13980] team_slave_1: entered promiscuous mode [ 255.435088][T13980] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 255.443099][T13980] team0: Device macvtap1 is already an upper device of the team interface [ 255.452369][T13980] team_slave_0: left promiscuous mode [ 255.457766][T13980] team_slave_1: left promiscuous mode [ 255.466944][T13976] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.519980][T13976] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.547139][T13985] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.576750][T13976] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.634013][T13985] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.676872][ T1059] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.687967][ T1059] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.699169][ T1059] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.708470][T13985] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.722053][ T1059] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.749097][T13985] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.982119][T11856] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.001106][T11856] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.028771][T11856] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.051575][T11856] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.178312][T14002] team_slave_0: entered promiscuous mode [ 256.184007][T14002] team_slave_1: entered promiscuous mode [ 256.201929][T14002] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 256.213606][T14002] team0: Device macvtap1 is already an upper device of the team interface [ 256.223734][T14002] team_slave_0: left promiscuous mode [ 256.229197][T14002] team_slave_1: left promiscuous mode [ 256.249310][T13997] lo speed is unknown, defaulting to 1000 [ 256.260481][T14004] lo speed is unknown, defaulting to 1000 [ 256.338413][T14011] team_slave_0: entered promiscuous mode [ 256.344200][T14011] team_slave_1: entered promiscuous mode [ 256.359129][T14011] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 256.369725][T14011] team0: Device macvtap1 is already an upper device of the team interface [ 256.380000][T14011] team_slave_0: left promiscuous mode [ 256.385434][T14011] team_slave_1: left promiscuous mode [ 256.772102][T14035] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3791'. [ 256.781132][T14035] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3791'. [ 257.219888][T14045] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.262941][T14045] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.303465][T14045] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.348838][T14045] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.372549][T14047] team_slave_0: entered promiscuous mode [ 257.378260][T14047] team_slave_1: entered promiscuous mode [ 257.394864][T14047] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 257.408443][T14047] team0: Device macvtap1 is already an upper device of the team interface [ 257.424079][T14047] team_slave_0: left promiscuous mode [ 257.429505][T14047] team_slave_1: left promiscuous mode [ 257.457060][ T12] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.468522][ T12] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.488582][ T12] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.506880][ T12] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.648284][T14064] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.684912][T14066] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 257.749284][T14064] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.805233][T14071] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 257.831518][T14071] lo speed is unknown, defaulting to 1000 [ 258.206902][T14064] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.267197][T14074] lo speed is unknown, defaulting to 1000 [ 258.288004][T14064] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.367252][ T29] kauditd_printk_skb: 916 callbacks suppressed [ 258.367281][ T29] audit: type=1326 audit(1763669779.001:34416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.397473][ T29] audit: type=1326 audit(1763669779.001:34417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.421163][ T29] audit: type=1326 audit(1763669779.001:34418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.444953][ T29] audit: type=1326 audit(1763669779.001:34419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.468757][ T29] audit: type=1326 audit(1763669779.001:34420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.492524][ T29] audit: type=1326 audit(1763669779.001:34421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.516215][ T29] audit: type=1326 audit(1763669779.001:34422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.539833][ T29] audit: type=1326 audit(1763669779.001:34423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.563744][ T29] audit: type=1326 audit(1763669779.001:34424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.587329][ T29] audit: type=1326 audit(1763669779.001:34425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14078 comm="syz.5.3806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8a4259f749 code=0x7ffc0000 [ 258.705451][T14098] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 258.788257][T14101] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 258.810602][T14101] __nla_validate_parse: 3 callbacks suppressed [ 258.810617][T14101] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 258.828478][T14104] team_slave_0: entered promiscuous mode [ 258.834153][T14104] team_slave_1: entered promiscuous mode [ 258.841475][T14104] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 258.863440][T14104] team0: Device macvtap1 is already an upper device of the team interface [ 258.885692][T14104] team_slave_0: left promiscuous mode [ 258.891201][T14104] team_slave_1: left promiscuous mode [ 258.971901][T14112] team_slave_0: entered promiscuous mode [ 258.977603][T14112] team_slave_1: entered promiscuous mode [ 258.984679][T14112] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 258.992897][T14112] team0: Device macvtap1 is already an upper device of the team interface [ 259.002356][T14112] team_slave_0: left promiscuous mode [ 259.007755][T14112] team_slave_1: left promiscuous mode [ 259.336424][T14123] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 259.363321][T14123] lo speed is unknown, defaulting to 1000 [ 259.619599][T14125] xt_TCPMSS: Only works on TCP SYN packets [ 259.638273][T14125] bridge0: port 3(gretap0) entered blocking state [ 259.644861][T14125] bridge0: port 3(gretap0) entered disabled state [ 259.651558][T14125] gretap0: entered allmulticast mode [ 259.657649][T14125] gretap0: entered promiscuous mode [ 259.663052][T14125] bridge0: port 3(gretap0) entered blocking state [ 259.669489][T14125] bridge0: port 3(gretap0) entered forwarding state [ 259.797398][T14128] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 260.368843][T14148] lo speed is unknown, defaulting to 1000 [ 260.430793][T14152] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3827'. [ 260.439832][T14152] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3827'. [ 260.448876][T14152] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3827'. [ 260.520589][ T1059] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.549882][ T1059] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.579253][ T1059] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.601383][ T1059] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.656942][T14152] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3827'. [ 260.921154][T14158] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 260.986380][T14159] xt_TCPMSS: Only works on TCP SYN packets [ 261.339426][T14181] lo speed is unknown, defaulting to 1000 [ 261.497158][T14188] serio: Serial port ptm0 [ 262.050055][T14209] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3846'. [ 262.059185][T14209] netlink: 16 bytes leftover after parsing attributes in process `syz.6.3846'. [ 262.068176][T14209] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3846'. [ 262.086649][T14209] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3846'. [ 262.233202][T14215] xt_TCPMSS: Only works on TCP SYN packets [ 262.417773][T14224] lo speed is unknown, defaulting to 1000 [ 262.598582][T14228] lo speed is unknown, defaulting to 1000 [ 262.952332][T14231] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 262.983934][T14231] lo speed is unknown, defaulting to 1000 [ 263.540836][T14238] serio: Serial port ptm0 [ 263.573289][T14254] lo speed is unknown, defaulting to 1000 [ 263.596667][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 263.596681][ T29] audit: type=1326 audit(1763669784.492:34599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.633601][ T29] audit: type=1326 audit(1763669784.524:34600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.657310][ T29] audit: type=1326 audit(1763669784.524:34601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.680995][ T29] audit: type=1326 audit(1763669784.524:34602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.704692][ T29] audit: type=1326 audit(1763669784.524:34603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.716457][T14268] lo speed is unknown, defaulting to 1000 [ 263.728290][ T29] audit: type=1326 audit(1763669784.524:34604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.758325][ T29] audit: type=1326 audit(1763669784.524:34605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.781950][ T29] audit: type=1326 audit(1763669784.524:34606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.786295][T14271] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3864'. [ 263.805721][ T29] audit: type=1326 audit(1763669784.524:34607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.814650][T14271] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3864'. [ 263.838222][ T29] audit: type=1326 audit(1763669784.524:34608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14262 comm="syz.4.3864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 263.847134][T14271] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3864'. [ 263.863603][T14271] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3864'. [ 264.086023][T14277] xt_TCPMSS: Only works on TCP SYN packets [ 264.254031][T14280] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 264.274463][T14280] lo speed is unknown, defaulting to 1000 [ 264.814349][T14293] lo speed is unknown, defaulting to 1000 [ 264.853951][T14297] team_slave_0: entered promiscuous mode [ 264.859625][T14297] team_slave_1: entered promiscuous mode [ 264.925291][T14297] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 264.982970][T14297] team0: Device macvtap1 is already an upper device of the team interface [ 265.054473][T14297] team_slave_0: left promiscuous mode [ 265.060023][T14297] team_slave_1: left promiscuous mode [ 265.088169][T14303] serio: Serial port ptm0 [ 265.348794][T14320] lo speed is unknown, defaulting to 1000 [ 265.568004][T14335] xt_TCPMSS: Only works on TCP SYN packets [ 265.720689][T14340] lo speed is unknown, defaulting to 1000 [ 266.421989][T14343] lo speed is unknown, defaulting to 1000 [ 266.562591][T14349] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 266.632025][T14355] team_slave_0: entered promiscuous mode [ 266.637720][T14355] team_slave_1: entered promiscuous mode [ 266.651101][T14355] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 266.658540][T14361] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 266.671530][T14355] team0: Device macvtap1 is already an upper device of the team interface [ 266.684606][T14355] team_slave_0: left promiscuous mode [ 266.690001][T14355] team_slave_1: left promiscuous mode [ 266.750373][T14373] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 266.818841][T14359] team_slave_0: entered promiscuous mode [ 266.824566][T14359] team_slave_1: entered promiscuous mode [ 266.831281][T14359] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 266.839462][T14359] team0: Device macvtap1 is already an upper device of the team interface [ 266.848749][T14359] team_slave_0: left promiscuous mode [ 266.854226][T14359] team_slave_1: left promiscuous mode [ 266.915574][T14379] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 266.952966][T14363] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 267.092907][T14377] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 267.196334][T14379] lo speed is unknown, defaulting to 1000 [ 267.241894][T14378] lo speed is unknown, defaulting to 1000 [ 267.467495][T14389] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 267.839570][T14408] lo speed is unknown, defaulting to 1000 [ 268.415133][T14412] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 268.855482][T14426] lo speed is unknown, defaulting to 1000 [ 269.525415][T14429] xt_TCPMSS: Only works on TCP SYN packets [ 269.540623][ T29] kauditd_printk_skb: 142 callbacks suppressed [ 269.540636][ T29] audit: type=1326 audit(1763669790.729:34751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542073][ T29] audit: type=1326 audit(1763669790.729:34752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542099][ T29] audit: type=1326 audit(1763669790.729:34753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542124][ T29] audit: type=1326 audit(1763669790.729:34754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542171][ T29] audit: type=1326 audit(1763669790.729:34755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542191][ T29] audit: type=1326 audit(1763669790.729:34756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542273][ T29] audit: type=1326 audit(1763669790.729:34757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542466][ T29] audit: type=1326 audit(1763669790.729:34758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542538][ T29] audit: type=1326 audit(1763669790.729:34759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.542557][ T29] audit: type=1326 audit(1763669790.729:34760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.1.3917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f77adeaf749 code=0x7ffc0000 [ 269.851293][T14441] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 269.939149][T14457] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.045993][T14469] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 270.063731][T14457] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.112175][T14457] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.128759][T14474] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 270.138589][T14474] team0: Device macvtap2 is already an upper device of the team interface [ 270.172202][T14457] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.257539][ T1059] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.278554][ T1059] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.294319][ T1059] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.310010][ T1059] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.362231][T14486] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 270.427680][T14494] team_slave_0: entered promiscuous mode [ 270.433383][T14494] team_slave_1: entered promiscuous mode [ 270.441986][T14494] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 270.450311][T14494] team0: Device macvtap1 is already an upper device of the team interface [ 270.513807][T14494] team_slave_0: left promiscuous mode [ 270.519218][T14494] team_slave_1: left promiscuous mode [ 270.692235][T14503] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 270.749026][T14508] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.806648][T14508] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.854094][T14508] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.901963][T14508] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.949959][T14518] team_slave_0: entered promiscuous mode [ 270.955641][T14518] team_slave_1: entered promiscuous mode [ 270.964303][T14518] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 270.973518][T14518] team0: Device macvtap1 is already an upper device of the team interface [ 270.983804][T14518] team_slave_0: left promiscuous mode [ 270.989264][T14518] team_slave_1: left promiscuous mode [ 271.239603][T14525] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 271.647085][T14535] team_slave_0: entered promiscuous mode [ 271.652800][T14535] team_slave_1: entered promiscuous mode [ 271.677577][T14535] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 271.694090][T14535] team0: Device macvtap1 is already an upper device of the team interface [ 271.739124][T14535] team_slave_0: left promiscuous mode [ 271.744538][T14535] team_slave_1: left promiscuous mode [ 272.251270][T14554] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 272.292956][T14551] xt_TCPMSS: Only works on TCP SYN packets [ 272.977241][T14568] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 272.980120][T14566] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 272.985537][T14568] team0: Device macvtap2 is already an upper device of the team interface [ 273.814153][T14595] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 273.840057][T14595] lo speed is unknown, defaulting to 1000 [ 274.151419][T14605] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 274.156176][T14604] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 274.168269][T14604] team0: Device macvtap2 is already an upper device of the team interface [ 274.700247][T14615] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 274.801606][ T12] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.822474][ T12] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.840105][ T12] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.856741][ T12] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.070097][T14628] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 275.225498][ T29] kauditd_printk_skb: 2364 callbacks suppressed [ 275.225512][ T29] audit: type=1326 audit(1763669796.703:37125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.376694][T14634] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 275.439795][ T29] audit: type=1326 audit(1763669796.724:37126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.447134][T14634] team0: Device macvtap2 is already an upper device of the team interface [ 275.463596][ T29] audit: type=1326 audit(1763669796.724:37127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.495633][ T29] audit: type=1326 audit(1763669796.724:37128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.506435][T14641] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 275.519275][ T29] audit: type=1326 audit(1763669796.724:37129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.553253][ T29] audit: type=1326 audit(1763669796.724:37130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.576846][ T29] audit: type=1326 audit(1763669796.724:37131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.600416][ T29] audit: type=1326 audit(1763669796.724:37132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.624036][ T29] audit: type=1326 audit(1763669796.724:37133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.647741][ T29] audit: type=1326 audit(1763669796.724:37134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14635 comm="syz.2.3992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f598154f749 code=0x7ffc0000 [ 275.762594][T14645] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.782578][T14646] lo speed is unknown, defaulting to 1000 [ 275.856825][T14653] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 275.883691][T14653] lo speed is unknown, defaulting to 1000 [ 276.030995][T14645] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.150239][T14645] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.216520][T14645] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.327944][T14668] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 276.385574][ T31] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.498267][T14675] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 276.568429][T14675] lo speed is unknown, defaulting to 1000 [ 276.652620][ T31] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.676707][ T31] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.907313][ T1059] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.958931][T14685] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 276.982055][T14681] lo speed is unknown, defaulting to 1000 [ 277.092617][T14690] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 277.511001][T14709] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.531399][T14707] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 277.580840][T14709] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.776280][T14709] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.799529][T14723] bridge0: port 3(gretap0) entered blocking state [ 277.806185][T14723] bridge0: port 3(gretap0) entered disabled state [ 277.812894][T14723] gretap0: entered allmulticast mode [ 277.818816][T14723] gretap0: entered promiscuous mode [ 277.824182][T14723] bridge0: port 3(gretap0) entered blocking state [ 277.830637][T14723] bridge0: port 3(gretap0) entered forwarding state [ 277.856880][T14709] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.873297][T14725] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 277.899842][T14725] lo speed is unknown, defaulting to 1000 [ 278.103372][ T12] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.129049][ T12] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.190691][ T12] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.205377][ T12] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.219062][T14730] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4026'. [ 278.363548][T14745] netlink: 36 bytes leftover after parsing attributes in process `syz.1.4029'. [ 278.372598][T14745] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4029'. [ 278.381579][T14745] netlink: 36 bytes leftover after parsing attributes in process `syz.1.4029'. [ 278.390934][T14745] netlink: 36 bytes leftover after parsing attributes in process `syz.1.4029'. [ 278.416081][T14744] lo speed is unknown, defaulting to 1000 [ 278.600219][T14753] FAULT_INJECTION: forcing a failure. [ 278.600219][T14753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.613292][T14753] CPU: 1 UID: 0 PID: 14753 Comm: syz.2.4034 Not tainted syzkaller #0 PREEMPT(voluntary) [ 278.613316][T14753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 278.613326][T14753] Call Trace: [ 278.613394][T14753] [ 278.613400][T14753] __dump_stack+0x1d/0x30 [ 278.613414][T14753] dump_stack_lvl+0xe8/0x140 [ 278.613438][T14753] dump_stack+0x15/0x1b [ 278.613457][T14753] should_fail_ex+0x265/0x280 [ 278.613476][T14753] should_fail+0xb/0x20 [ 278.613541][T14753] should_fail_usercopy+0x1a/0x20 [ 278.613552][T14753] _copy_from_user+0x1c/0xb0 [ 278.613566][T14753] ___sys_sendmsg+0xc1/0x1d0 [ 278.613657][T14753] __x64_sys_sendmsg+0xd4/0x160 [ 278.613722][T14753] x64_sys_call+0x191e/0x3000 [ 278.613802][T14753] do_syscall_64+0xd2/0x200 [ 278.613830][T14753] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 278.613845][T14753] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 278.613978][T14753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.613999][T14753] RIP: 0033:0x7f598154f749 [ 278.614010][T14753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.614021][T14753] RSP: 002b:00007f597ffb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.614090][T14753] RAX: ffffffffffffffda RBX: 00007f59817a5fa0 RCX: 00007f598154f749 [ 278.614097][T14753] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000007 [ 278.614104][T14753] RBP: 00007f597ffb7090 R08: 0000000000000000 R09: 0000000000000000 [ 278.614112][T14753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.614119][T14753] R13: 00007f59817a6038 R14: 00007f59817a5fa0 R15: 00007ffc41f165c8 [ 278.614130][T14753] [ 278.877663][T14756] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 278.893674][T14758] lo speed is unknown, defaulting to 1000 [ 278.908100][T14756] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 278.961824][T14764] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.031253][T14764] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.170208][T14764] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.354898][T14777] lo speed is unknown, defaulting to 1000 [ 279.526711][T14782] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4041'. [ 279.541432][T14764] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.683297][T14784] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 279.703204][T14784] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 279.805202][T14791] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 279.839135][T14787] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 280.342408][T14819] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 280.505779][T14823] 8021q: adding VLAN 0 to HW filter on device macvtap2 [ 280.514415][T14823] team0: Device macvtap2 is already an upper device of the team interface [ 280.627170][T14834] FAULT_INJECTION: forcing a failure. [ 280.627170][T14834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.640286][T14834] CPU: 0 UID: 0 PID: 14834 Comm: syz.4.4061 Not tainted syzkaller #0 PREEMPT(voluntary) [ 280.640316][T14834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 280.640337][T14834] Call Trace: [ 280.640390][T14834] [ 280.640400][T14834] __dump_stack+0x1d/0x30 [ 280.640423][T14834] dump_stack_lvl+0xe8/0x140 [ 280.640444][T14834] dump_stack+0x15/0x1b [ 280.640491][T14834] should_fail_ex+0x265/0x280 [ 280.640525][T14834] should_fail+0xb/0x20 [ 280.640582][T14834] should_fail_usercopy+0x1a/0x20 [ 280.640601][T14834] _copy_from_iter+0xd2/0xe80 [ 280.640624][T14834] ? perf_cgroup_switch+0x10c/0x480 [ 280.640731][T14834] ? update_load_avg+0x1da/0x820 [ 280.640757][T14834] ? update_load_avg+0x1da/0x820 [ 280.640784][T14834] ? __list_add_valid_or_report+0x38/0xe0 [ 280.640881][T14834] tun_get_user+0x14d/0x26e0 [ 280.640910][T14834] ? __rcu_read_unlock+0x4f/0x70 [ 280.640938][T14834] ? ref_tracker_alloc+0x1f2/0x2f0 [ 280.641007][T14834] tun_chr_write_iter+0x15e/0x210 [ 280.641032][T14834] do_iter_readv_writev+0x4a1/0x540 [ 280.641061][T14834] vfs_writev+0x2df/0x8b0 [ 280.641103][T14834] do_writev+0xe7/0x210 [ 280.641181][T14834] __x64_sys_writev+0x45/0x50 [ 280.641208][T14834] x64_sys_call+0x1e9a/0x3000 [ 280.641227][T14834] do_syscall_64+0xd2/0x200 [ 280.641245][T14834] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 280.641298][T14834] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 280.641327][T14834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.641345][T14834] RIP: 0033:0x7fafacc7f749 [ 280.641358][T14834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.641376][T14834] RSP: 002b:00007fafab6e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 280.641438][T14834] RAX: ffffffffffffffda RBX: 00007fafaced5fa0 RCX: 00007fafacc7f749 [ 280.641450][T14834] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000006 [ 280.641460][T14834] RBP: 00007fafab6e7090 R08: 0000000000000000 R09: 0000000000000000 [ 280.641529][T14834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.641541][T14834] R13: 00007fafaced6038 R14: 00007fafaced5fa0 R15: 00007ffef9e2a868 [ 280.641562][T14834] [ 281.036746][T14838] xt_TCPMSS: Only works on TCP SYN packets [ 281.053671][T14844] team_slave_0: entered promiscuous mode [ 281.059431][T14844] team_slave_1: entered promiscuous mode [ 281.066108][T14844] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 281.075063][T14844] team0: Device macvtap1 is already an upper device of the team interface [ 281.084836][T14844] team_slave_0: left promiscuous mode [ 281.090257][T14844] team_slave_1: left promiscuous mode [ 281.290472][T13054] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 281.313128][T13054] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 281.321876][T14856] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 281.334536][T13054] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 281.352223][T13054] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.102097][ T29] kauditd_printk_skb: 386 callbacks suppressed [ 282.102110][ T29] audit: type=1326 audit(1763669803.916:37521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.197741][T14884] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 282.277753][T14887] audit: audit_backlog=65 > audit_backlog_limit=64 [ 282.284353][T14887] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 282.292097][T14887] audit: backlog limit exceeded [ 282.519370][ T29] audit: type=1326 audit(1763669803.958:37522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.543057][ T29] audit: type=1326 audit(1763669803.958:37523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.566700][ T29] audit: type=1326 audit(1763669803.958:37524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.590270][ T29] audit: type=1326 audit(1763669803.958:37525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.613816][ T29] audit: type=1326 audit(1763669803.958:37526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.637489][ T29] audit: type=1326 audit(1763669803.958:37527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14881 comm="syz.6.4079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f20d287f749 code=0x7ffc0000 [ 282.857940][T14892] xt_TCPMSS: Only works on TCP SYN packets [ 282.931176][T14900] serio: Serial port ptm0 [ 283.018353][T14909] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 283.047785][T14909] lo speed is unknown, defaulting to 1000 [ 283.229345][T14915] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.340212][T14915] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.407552][T14915] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.454945][T14915] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.558886][ T12] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.574619][ T12] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.589288][ T12] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.597567][ T12] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.813612][T14935] serio: Serial port ptm0 [ 284.105460][T14946] team_slave_0: entered promiscuous mode [ 284.111177][T14946] team_slave_1: entered promiscuous mode [ 284.118609][T14946] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 284.126977][T14946] team0: Device macvtap1 is already an upper device of the team interface [ 284.140653][T14946] team_slave_0: left promiscuous mode [ 284.146091][T14946] team_slave_1: left promiscuous mode [ 284.211107][T14951] netlink: 'syz.2.4098': attribute type 12 has an invalid length. [ 284.219049][T14951] netlink: 'syz.2.4098': attribute type 29 has an invalid length. [ 284.226895][T14951] netlink: 148 bytes leftover after parsing attributes in process `syz.2.4098'. [ 284.235953][T14951] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4098'. [ 284.373021][T14953] team_slave_0: entered promiscuous mode [ 284.378853][T14953] team_slave_1: entered promiscuous mode [ 284.385633][T14953] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 284.394107][T14953] team0: Device macvtap1 is already an upper device of the team interface [ 284.403767][T14953] team_slave_0: left promiscuous mode [ 284.409221][T14953] team_slave_1: left promiscuous mode [ 284.477656][T14956] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.608167][T14956] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.629870][T14962] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 284.655692][T14956] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.702998][T14956] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.844678][T14976] SELinux: Context system_u:object is not valid (left unmapped). [ 284.875745][T14989] 9pnet_fd: Insufficient options for proto=fd [ 284.940074][T14993] team_slave_0: entered promiscuous mode [ 284.945774][T14993] team_slave_1: entered promiscuous mode [ 284.952443][T14993] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 284.960735][T14993] team0: Device macvtap1 is already an upper device of the team interface [ 284.971039][T14993] team_slave_0: left promiscuous mode [ 284.976463][T14993] team_slave_1: left promiscuous mode [ 285.113806][T15001] netlink: 'syz.1.4116': attribute type 5 has an invalid length. [ 285.193324][T15006] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.212927][T15004] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 285.295139][T15010] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.420645][T15019] FAULT_INJECTION: forcing a failure. [ 285.420645][T15019] name failslab, interval 1, probability 0, space 0, times 0 [ 285.433345][T15019] CPU: 0 UID: 0 PID: 15019 Comm: syz.1.4122 Not tainted syzkaller #0 PREEMPT(voluntary) [ 285.433372][T15019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 285.433384][T15019] Call Trace: [ 285.433391][T15019] [ 285.433398][T15019] __dump_stack+0x1d/0x30 [ 285.433417][T15019] dump_stack_lvl+0xe8/0x140 [ 285.433518][T15019] dump_stack+0x15/0x1b [ 285.433545][T15019] should_fail_ex+0x265/0x280 [ 285.433573][T15019] should_failslab+0x8c/0xb0 [ 285.433602][T15019] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 285.433668][T15019] ? __alloc_skb+0x101/0x320 [ 285.433707][T15019] __alloc_skb+0x101/0x320 [ 285.433772][T15019] ? audit_log_start+0x342/0x720 [ 285.433785][T15019] audit_log_start+0x3a0/0x720 [ 285.433796][T15019] ? kstrtouint+0x76/0xc0 [ 285.433813][T15019] audit_seccomp+0x48/0x100 [ 285.433831][T15019] ? __seccomp_filter+0x82d/0x1250 [ 285.433877][T15019] __seccomp_filter+0x83e/0x1250 [ 285.433892][T15019] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 285.433908][T15019] ? vfs_write+0x7e8/0x960 [ 285.433921][T15019] ? __rcu_read_unlock+0x4f/0x70 [ 285.433965][T15019] ? __fget_files+0x184/0x1c0 [ 285.433981][T15019] __secure_computing+0x82/0x150 [ 285.433995][T15019] syscall_trace_enter+0xcf/0x1e0 [ 285.434010][T15019] do_syscall_64+0xac/0x200 [ 285.434098][T15019] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 285.434138][T15019] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 285.434155][T15019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.434167][T15019] RIP: 0033:0x7f77adeaf749 [ 285.434176][T15019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.434194][T15019] RSP: 002b:00007f77ac917038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 285.434205][T15019] RAX: ffffffffffffffda RBX: 00007f77ae105fa0 RCX: 00007f77adeaf749 [ 285.434212][T15019] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000002 [ 285.434241][T15019] RBP: 00007f77ac917090 R08: 0000000000000000 R09: 0000000000000000 [ 285.434248][T15019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.434255][T15019] R13: 00007f77ae106038 R14: 00007f77ae105fa0 R15: 00007fff6e6f7928 [ 285.434267][T15019] [ 285.753721][T15028] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 285.770291][T15022] serio: Serial port ptm0 [ 285.864849][T15039] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4128'. [ 285.977900][T15049] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 286.003728][T15049] lo speed is unknown, defaulting to 1000 [ 286.183868][T15055] lo speed is unknown, defaulting to 1000 [ 286.656362][T15068] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 286.741894][T15073] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 286.905740][T15085] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 286.924138][T15085] lo speed is unknown, defaulting to 1000 [ 287.075401][ T29] kauditd_printk_skb: 866 callbacks suppressed [ 287.075413][ T29] audit: type=1400 audit(1763669809.134:38392): avc: denied { map } for pid=15094 comm="syz.4.4148" path="socket:[67838]" dev="sockfs" ino=67838 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 287.105321][ T29] audit: type=1400 audit(1763669809.134:38393): avc: denied { read accept } for pid=15094 comm="syz.4.4148" path="socket:[67838]" dev="sockfs" ino=67838 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 287.237707][T15097] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 287.261695][ T29] audit: type=1326 audit(1763669809.323:38394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.285360][ T29] audit: type=1326 audit(1763669809.323:38395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.358897][T15112] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 287.383549][T15112] lo speed is unknown, defaulting to 1000 [ 287.491102][T15115] SELinux: Context system_u:object_r:udev_var_run_t:s0 is not valid (left unmapped). [ 287.550155][ T29] audit: type=1326 audit(1763669809.333:38396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.573914][ T29] audit: type=1326 audit(1763669809.333:38397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.597502][ T29] audit: type=1326 audit(1763669809.333:38398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.621205][ T29] audit: type=1326 audit(1763669809.333:38399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.644894][ T29] audit: type=1326 audit(1763669809.333:38400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.668522][ T29] audit: type=1326 audit(1763669809.333:38401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15105 comm="syz.4.4152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fafacc7f749 code=0x7ffc0000 [ 287.721348][T15117] FAULT_INJECTION: forcing a failure. [ 287.721348][T15117] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.734474][T15117] CPU: 0 UID: 0 PID: 15117 Comm: syz.4.4155 Not tainted syzkaller #0 PREEMPT(voluntary) [ 287.734501][T15117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 287.734511][T15117] Call Trace: [ 287.734518][T15117] [ 287.734581][T15117] __dump_stack+0x1d/0x30 [ 287.734604][T15117] dump_stack_lvl+0xe8/0x140 [ 287.734626][T15117] dump_stack+0x15/0x1b [ 287.734699][T15117] should_fail_ex+0x265/0x280 [ 287.734733][T15117] should_fail+0xb/0x20 [ 287.734802][T15117] should_fail_usercopy+0x1a/0x20 [ 287.734873][T15117] _copy_from_iter+0xd2/0xe80 [ 287.734896][T15117] ? __build_skb_around+0x1ab/0x200 [ 287.735005][T15117] ? __alloc_skb+0x223/0x320 [ 287.735037][T15117] netlink_sendmsg+0x471/0x6b0 [ 287.735061][T15117] ? __pfx_netlink_sendmsg+0x10/0x10 [ 287.735108][T15117] __sock_sendmsg+0x145/0x180 [ 287.735141][T15117] ____sys_sendmsg+0x31e/0x4e0 [ 287.735165][T15117] ___sys_sendmsg+0x17b/0x1d0 [ 287.735273][T15117] __x64_sys_sendmsg+0xd4/0x160 [ 287.735296][T15117] x64_sys_call+0x191e/0x3000 [ 287.735314][T15117] do_syscall_64+0xd2/0x200 [ 287.735370][T15117] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 287.735461][T15117] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 287.735544][T15117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.735566][T15117] RIP: 0033:0x7fafacc7f749 [ 287.735582][T15117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.735599][T15117] RSP: 002b:00007fafab6e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.735619][T15117] RAX: ffffffffffffffda RBX: 00007fafaced5fa0 RCX: 00007fafacc7f749 [ 287.735633][T15117] RDX: 0000000000040000 RSI: 0000200000000340 RDI: 0000000000000005 [ 287.735646][T15117] RBP: 00007fafab6e7090 R08: 0000000000000000 R09: 0000000000000000 [ 287.735673][T15117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.735683][T15117] R13: 00007fafaced6038 R14: 00007fafaced5fa0 R15: 00007ffef9e2a868 [ 287.735714][T15117] [ 288.134675][T15132] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 288.361927][T11856] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.373937][T11856] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.389055][T11856] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.406742][T11856] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.556603][T15143] serio: Serial port ptm0 [ 289.233150][T15174] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 289.430420][T15184] xt_TCPMSS: Only works on TCP SYN packets [ 289.731535][T15193] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 289.744443][T15193] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 289.806613][ T1053] ================================================================== [ 289.814701][ T1053] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 289.821813][ T1053] [ 289.824113][ T1053] read-write to 0xffff888237c29de4 of 4 bytes by task 10 on cpu 0: [ 289.831972][ T1053] wq_worker_running+0x95/0x120 [ 289.836798][ T1053] schedule_timeout+0xb7/0x170 [ 289.841538][ T1053] msleep+0x50/0x90 [ 289.845323][ T1053] nsim_fib_event_work+0x42e6/0x4790 [ 289.850600][ T1053] process_scheduled_works+0x4ce/0x9d0 [ 289.856037][ T1053] worker_thread+0x582/0x770 [ 289.860614][ T1053] kthread+0x489/0x510 [ 289.864667][ T1053] ret_from_fork+0x122/0x1b0 [ 289.869316][ T1053] ret_from_fork_asm+0x1a/0x30 [ 289.874053][ T1053] [ 289.876353][ T1053] read to 0xffff888237c29de4 of 4 bytes by task 1053 on cpu 1: [ 289.883867][ T1053] kick_pool+0x49/0x2d0 [ 289.887995][ T1053] __queue_work+0x8cb/0xb50 [ 289.892649][ T1053] queue_work_on+0xd1/0x160 [ 289.897126][ T1053] process_srcu+0x999/0xbc0 [ 289.901609][ T1053] process_scheduled_works+0x4ce/0x9d0 [ 289.907049][ T1053] worker_thread+0x582/0x770 [ 289.911613][ T1053] kthread+0x489/0x510 [ 289.915700][ T1053] ret_from_fork+0x122/0x1b0 [ 289.920273][ T1053] ret_from_fork_asm+0x1a/0x30 [ 289.925010][ T1053] [ 289.927308][ T1053] value changed: 0x00000000 -> 0x00000001 [ 289.933010][ T1053] [ 289.935307][ T1053] Reported by Kernel Concurrency Sanitizer on: [ 289.941431][ T1053] CPU: 1 UID: 0 PID: 1053 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 289.951207][ T1053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 289.961236][ T1053] Workqueue: rcu_gp process_srcu [ 289.966155][ T1053] ================================================================== [ 290.001519][T15200] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.