last executing test programs: 2.823345652s ago: executing program 3 (id=1036): r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, r1) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) read(r0, &(0x7f0000000380)=""/14, 0xe) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) unshare(0x62040200) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 2.725324813s ago: executing program 0 (id=1038): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) sendmsg$NFC_CMD_FW_DOWNLOAD(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r3, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) read(r0, &(0x7f0000000380)=""/14, 0xe) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) (fail_nth: 1) 2.386002255s ago: executing program 0 (id=1041): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ff9}]}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000000bf00)={0x0, 0x0, &(0x7f000000bec0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000001600010000000000000000000a000000", @ANYRES32, @ANYBLOB="14000200fe8000"/19], 0x40}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000280)='./file1\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x1219, &(0x7f0000001100)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x275a, 0x0) ftruncate(r2, 0x2000009) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(0xffffffffffffffff, 0x400455c8, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0x3) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000140)=0x3) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000400)=0x7) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000200)=0xa) pwritev2(r3, &(0x7f00000001c0)=[{&(0x7f0000000400)="ba", 0xfdef}], 0x1, 0xe7b, 0x0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000050000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000006696f9eeeeaac72dc3fd37aff0a59c4607d7a92ada8ef0fe5ff20f2ffbc8ff7135d15eb6408a9959f5f485fa601354acb25d8333c973f9e44af618b3"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x4, 0x7f, 0x5, 0x50, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7801, 0x8000, 0x4}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) 2.339782125s ago: executing program 1 (id=1043): socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x81010200, 0x0, 0xffffffffffffff92, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x800400, &(0x7f00000009c0)={[{@quota}]}, 0x1, 0x4f3, &(0x7f0000000a00)="$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") listxattr(&(0x7f0000000100)='./file1\x00', 0x0, 0x100000) 2.281673326s ago: executing program 1 (id=1045): r0 = socket(0x2, 0x80805, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x741000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)='l', 0x1}], 0x1}, 0x400c941) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={r2, @in={{0x2, 0x0, @empty}}, 0x4, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x80, 0x7800, 0xb, 0xb8c, {{0x13, 0x4, 0x0, 0x2d, 0x4c, 0x68, 0x0, 0x2, 0x2f, 0x0, @empty, @local, {[@noop, @lsrr={0x83, 0x17, 0xaf, [@loopback, @multicast2, @private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp_addr={0x44, 0x14, 0xcd, 0x1, 0x5, [{@multicast1, 0x1}, {@local}]}, @generic={0x82, 0xb, "367a1645539c148508"}]}}}}}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000440)={r3, r4, 0x25, 0x1, @val=@netfilter={0x5, 0x0, 0x5, 0x1}}, 0x20) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xc4}}, 0x14) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020300090f0000000000000000000000010018009f03000005000600000000000a0000eb000000000000000000000000000000000000000000000000000000000200010000000000000009000000000005000500000000000a"], 0x78}, 0x1, 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="f9555d1994d0babad4"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r9 = openat$cgroup_int(r6, &(0x7f0000000240)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x4, 0x12) 2.057894487s ago: executing program 4 (id=1047): ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r4, 0x0, 0xf, 0x8) r5 = socket(0x1e, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) sendmsg$tipc(r5, 0x0, 0x4000001) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r3, r7, 0x53, 0x0) write$binfmt_script(r7, &(0x7f0000000b40)={'#! ', './file0'}, 0xb) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) tee(r6, r4, 0x9, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRESOCT], &(0x7f0000000040)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = dup(r10) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a32000000000500010007000000140007800800134000000000080012"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x3, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r12}, 0x18) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 1.991186987s ago: executing program 1 (id=1048): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x800, 0x10000, 0xfffffffe, 0x5, 0x8, 0x60005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r2, 0x0, 0x7fffffffffffffff}, 0x18) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0xfe, &(0x7f00000001c0)=[{&(0x7f00000007c0)="d8000000180081054e81f782db4cb90402200800fe00fe05e8fe55a10a0015000600142603600e1208000f007f370301a8001600a40002400f000100035c0461c1d67f6f94007134cf6edb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090014d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00350db798262f3d40fad95667e006dcdf63951f215c3f8b6ad2cba0e2375ee535e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x20000800) r4 = socket(0x200000000000011, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000850000000800000095"], 0x0, 0x5, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x27, &(0x7f0000000000)=""/114}, 0xa8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4e93, 0x18445, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xc0000000000000, 0xfffe}, 0x8080, 0xa9, 0x80000000, 0x5, 0x400000a5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r9}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000490000000000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000008c0)="89", 0x0, 0x1000000}, 0x32) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r6], 0x48}}, 0x0) 1.981212747s ago: executing program 4 (id=1049): r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="580000000206030000000000000000000100000012000300686173683a6e65742c706f72740000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007"], 0x58}, 0x1, 0x0, 0x0, 0x4000090}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000700000008500000050000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = syz_open_procfs$pagemap(0x0, &(0x7f0000001080)) ioctl$PAGEMAP_SCAN(r5, 0xc0606610, &(0x7f0000000140)={0x60, 0x0, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0, 0x0, 0x100000c01, 0x61, 0x0, 0x0, 0x6e}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kmem_cache_free\x00', r3}, 0x18) recvmsg(r2, &(0x7f0000000900)={0x0, 0x2f, &(0x7f0000000400)=[{&(0x7f0000000800)=""/208, 0xd0}], 0x1, 0x0, 0xfffffffffffffe8f, 0x500}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000018c0)=@newtfilter={0x4ac, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xf}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x480, 0x2, [@TCA_U32_POLICE={0x408, 0x6, [@TCA_POLICE_RATE={0x404, 0x2, [0x2dbc04b6, 0x1, 0x10, 0xa, 0x4, 0x0, 0x3, 0x10, 0x7, 0x9, 0x0, 0xd, 0x8, 0x5, 0x7f, 0x9, 0x9, 0x4, 0x81, 0x5, 0x537d, 0x0, 0xfffffffa, 0x12000000, 0x6, 0x3, 0x4, 0x0, 0xffffffff, 0x8, 0x0, 0x1, 0x7, 0x7fff, 0x0, 0xffffffff, 0x10, 0x258, 0x5, 0x8, 0x4, 0x1d, 0x5, 0x1, 0xfffff173, 0x1, 0x401, 0x7, 0x8000, 0x10000, 0xe, 0x3, 0x1, 0xd, 0x8, 0x0, 0x0, 0x4, 0xa79, 0x5, 0xc, 0x2, 0x0, 0x30000, 0xd, 0x6, 0xfff, 0x40, 0xfffeffff, 0x7fff, 0x6b81102, 0x7f, 0xfffffffe, 0x800000, 0x6, 0x8, 0x0, 0xe, 0x20000, 0xffff, 0x80000001, 0x1, 0x9a0, 0x4, 0x8, 0x6, 0x7, 0xfffffffb, 0x1ff, 0x3ff, 0x0, 0x40, 0xfc5, 0x800000, 0xb422, 0x7, 0x1, 0x8, 0x1, 0xa0bd, 0x200, 0x400, 0x1, 0xc, 0xff, 0x3, 0x2, 0xffffffc0, 0x8, 0x8001, 0x3f3, 0x8, 0x9, 0xf, 0x4, 0x3, 0x0, 0x6, 0xd, 0x8, 0x9, 0x800, 0x0, 0x9, 0x3, 0x3, 0x2, 0xf4, 0x81, 0x0, 0x6, 0x200, 0xad07, 0x8001, 0x8, 0x9, 0x100, 0x1, 0xb10, 0x8, 0x7, 0xfff, 0xa, 0x4e, 0x80, 0xfec300, 0xe815, 0x1, 0xfffffff9, 0xfffff801, 0x9, 0x1, 0xff, 0x7, 0x7, 0x7, 0x8001, 0x7, 0x1ff, 0x401, 0x5, 0x2, 0x1ff, 0x4, 0x2, 0x5f, 0x2, 0x1, 0x1, 0xb, 0x7, 0xb, 0x7, 0x9, 0x9, 0x68, 0x2, 0x6, 0x4, 0x9ca, 0x100, 0x9, 0xfff, 0xfffffffd, 0x1, 0xf, 0x2, 0xfffffff8, 0x80000001, 0x4, 0x3, 0x8, 0x8, 0x9, 0x3, 0x1, 0x7, 0x8, 0x5, 0x4, 0xc, 0x0, 0xf, 0x80000000, 0x5, 0x5, 0xfffffff7, 0xd6f, 0x4, 0x38, 0x1, 0x6, 0x9bb, 0xd31d, 0xfff, 0xfff, 0x40, 0x5, 0x3, 0x4, 0x0, 0x1ff, 0x6, 0x0, 0x9, 0x1, 0x4, 0x0, 0x1000, 0x5, 0x1c000000, 0x1, 0x6, 0x9, 0x80006, 0x3, 0x1, 0x0, 0x10000, 0x2, 0x7, 0x7, 0x6, 0xfffffff0, 0x2, 0x3, 0x8090, 0x7, 0x6d8, 0xfffffffb, 0x6, 0x400, 0x800, 0x8, 0x6, 0x76]}]}, @TCA_U32_SEL={0x74, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0xdeb2, 0x3, 0x6, 0x3}, {0x1, 0xfffffffb, 0x100, 0x3ff}, {0x200, 0x3ff, 0x3, 0x4}, {0x9, 0x7, 0x40, 0x80}, {0x3ff, 0x177, 0x3, 0xa6d}]}}]}}]}, 0x4ac}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) 1.955870807s ago: executing program 4 (id=1050): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='timer_start\x00', r2}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='timer_start\x00', r2}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r6 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000080)={0x8000200a}) r7 = syz_io_uring_setup(0x8d2, &(0x7f00000000c0)={0x0, 0x0, 0x3010, 0x0, 0x290}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r7, 0x47ba, 0x3e80, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r10}, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) (async) r11 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x2c020400) socket$inet_tcp(0x2, 0x1, 0x0) (async) r12 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r14, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4004000) (async) sendmsg$inet(r14, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4004000) recvmsg$unix(r13, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) close_range(r12, 0xffffffffffffffff, 0x2) setsockopt$IPT_SO_SET_REPLACE(r11, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x408, 0x2a8, 0x98, 0x2a8, 0x130, 0x1f0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11, 0x0, 0x69}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}, {0x2, 0xa}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'dvmrp1\x00', {}, {}, 0x6}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x3, {0x5}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) 1.932646148s ago: executing program 0 (id=1051): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'macvlan1\x00', 0x0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000001, 0x8c4b815a5465c2b1, r2, 0xfc37a000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) vmsplice(r4, &(0x7f00000003c0)=[{&(0x7f0000001800)='\x00', 0x1}], 0x1, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(r3, &(0x7f0000002bc0)=[{&(0x7f0000000680)="b0e53f84", 0x4}], 0x1, 0x4) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x50) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r9, 0x0, 0x3}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r11 = openat$cgroup_devices(r10, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r11, &(0x7f0000000000)={'c', ' *:* ', 'w\x00'}, 0x8) r12 = getpid() syz_pidfd_open(r12, 0x0) ptrace$poke(0x1, r12, &(0x7f0000000240), 0x8) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x2}, 0x94) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r8, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r14, 0x0, 0x14, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c000", 0x0, 0x86, 0x0, 0x31, 0x0, &(0x7f0000000000)="daf9e846ab156efc71b59652333536dbfd26a6d0546366e36eb77dd0aaa2dbe567d168904cf0d5bce1771889c98ffc0abf", 0x0}, 0x50) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRESDEC=r14, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r7], 0x40}, 0x1, 0x0, 0x0, 0x20044004}, 0x4008054) 1.800144989s ago: executing program 4 (id=1053): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009112cd000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/244, 0xf4}], 0x1) kexec_load(0x9, 0x8, &(0x7f0000000900)=[{&(0x7f0000000080)="ffe729fd987505c81de8e0538fac91c29262f076cd87a4b49ea00171aa518997cacd7824ab052125a453ea2fcc3fed0920de14a7675e9c34d86c1c669e9f005aa540483a08e368676a87f0b01e9a3c41c4d293caa418a6a5b7cbfae4a4e2c676c59c95a1009aa0cc63211626bc4ec40204cdea80f67706e55664c83b81ded720c2f5ce8aee403675439ad907e57d9b73b9ee98126269d9ec019d15e7405b9ba3bd5d33eb788ea8bf06c3940178f963ba53a0ef8bd08dc0a8990ee504e22530a8f0e4314e73b734c0298b5090d3d9b8b09e37f815df6cab22e6dbc07c", 0xdc, 0x1, 0x8}, {&(0x7f00000001c0)="b436206e009cf6b70e9296db5a429009b4a592efd97c9a7a630073c245ac0cacde7040366c3a695978d7a45356b91cf59f2fb4b5fe56110253adbe2b01aded64b939ac5ecf6dcc940b78672c101efb12241dc28e50995a83b9e6ffbeacd9c490dde0e6ba4564954d35f29f0d6185d3d36d96fd793d02d06e4376094f0b764cde778b5be5d88c6dd9744c515926bb21d9605024fa843cd684ff49cab9c419325a3df8aa8bc939371dfdf47c7d52a3f85e150343c443099ea3b521642e764a2d569f11f1e96086879e083717a45cbb1abbd6d2608005707528bf281748cab0e070b3366d755b7e", 0xe6, 0x0, 0x9}, {&(0x7f00000002c0)="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", 0xff, 0xfffffffffffff800, 0x401}, {&(0x7f0000000540)="729aa9029b2bd6c0b42913aaaea84923d2c2c906acbd0e93290f339ac24dd26b465b5caa0c78e7bd35994d789736cbe72f9cfa63e720421b0a879df4ff90b6b9f6556989165a190c09ad98db87ae587932884792cf29ee31dfa31dfd3872ccfa9d401c5e84865682bd675fa47f6f9fa33ed8e200b9f5c546463bb098c4de781ce7f3a47d474068c649f1707255c2cc2acba50b74a71aece640bed1672c0af6d43929775c3a5dbe217d0b6ed694ff3e006440428ced2247e3c7a49c094ae5b3934819", 0xc2, 0x1, 0x1}, {&(0x7f00000003c0)="590a79f6c61630f6b34d895671d7bfa51f6d685e6950e462fc1cc14ab4fdf374c5cfbc3743f26dc313d834c1f747d8b1719cf5be70a3c8e22e585368", 0x3c, 0x2, 0xfffffffffffffff7}, {&(0x7f0000000640)="8ce119578af4dcffe834c3ac298c335c17cb41b48f55dc08a83ea7dc611b82a0a7e54ce1172977a67e1d9c1255e13b0dc23fbfb745c24cc0b689f10b18c463555488a1f9d74abd7f7d2d50f4a905c095a0318eeddc28e4b264c147d49ae287684fe0ab2e08afbd042db89ddddd132b0e68b2edc6891abeab4136e03625dfa3acde670f98b21fac0e79b0e11c95575642de012134ca4c72711682981106fcae8890a5c7474c6c849883f38c7c9dd6d06810d11abc6ed5885c670159263a68c331038ca0fff275c6f5fbcf6c181f1a", 0xce, 0x80000001, 0x3ff}, {&(0x7f0000000740)="0e7901c0030f2a021f510c4d707397b932edf47d131f6868fb66d8cf9fd381cc321bc11c91a5e2797cf0770fb6b8aa42cb511a361496482a19e6af0d53409a3a6cd931bfbb98fa5986b0c328a0272e19b550facd35f9e41f59e13d6d961b46099037afbd3832ffd42dc60e335032f3a7439b230a7d9c4ba88093e0523ff756a0661454bfaf6429b029fa50f9c01ef1e112ca449ee82e23c53f7ba533cab200c4fe564718f050e1c61ad078a297a06a4d7ff9b0b68cffea206178264102f773ecbe458722811e1e6c3c196c0f569ff7958c533146f7046cc7bb0b28d65bd58d3593", 0xe1, 0x1000, 0x6}, {&(0x7f0000000840), 0x0, 0x2, 0x5}], 0x160000) 1.66626073s ago: executing program 3 (id=1056): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYRES32=r0, @ANYRES16=r0], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1}, 0x10) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="300000001900040029bd7000fddbdf250a2000f50004c8d30801000014001680100008800cf6008006000100000b0000"], 0x30}, 0x1, 0x0, 0x0, 0x2004d808}, 0x20030004) socket(0x10, 0x803, 0x0) r3 = syz_clone(0x200000, &(0x7f0000000000)="56207964b88c7d0f512931d852dfd696f60ee5f18a2593963ec642fa44026fed46b9c9a714f80838fee171bc08ee075910064c2ebceb66bbeac65246743b4d54833cedcd7c3f0ff97c47becef9b7c13c6b6cd4834dab903bc6f6d2c8d1bd92225262", 0x62, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000240)={&(0x7f0000000140)=""/145, 0x91}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f895e385b08a1f9ef19b5b9bd291a496bf809072e110ffffffb703000000000000b7040000000000008500"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYRES8=r5], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000b80)=ANY=[@ANYBLOB="48000000100020002cbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="63100400000000002800736974120000028008000300e00000010600080005000000080002007f000000dcfd7f893767decf1c3efe17c8ff2e828755def723c102a5595655a1396c62367c79f1857aa96d781bfde8b8eabf06"], 0x48}, 0x1, 0x0, 0x0, 0x9000}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r10 = signalfd4(r9, &(0x7f0000000400)={[0xffffffffffffffff]}, 0x8, 0x0) write$tun(r10, &(0x7f0000000b00)=ANY=[@ANYBLOB="008002007000c76d1d12ffffffffffffffffffffffff8100480008003eaa3236006500000400000000000000e000000244085310000008a389c7be608fcd555117bfffffffffe00000017f000001e0000001ac14143c001100907800000007"], 0x58) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x46, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000910095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r12 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r7, r11, 0x12, 0x0, @void}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r12, r11, 0x4, r11}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r14}, 0x18) setreuid(0xffffffffffffffff, 0xee01) 1.64128941s ago: executing program 1 (id=1057): openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x3000046, &(0x7f00000004c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@usrquota}, {@data_err_ignore}, {@nobarrier}, {@oldalloc}, {@grpquota}, {@noload}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x4, 0x553, &(0x7f0000001080)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xd}, {0xb, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x10}, 0x18) write(r4, &(0x7f00000001c0)="f1", 0x1) sendfile(r4, r3, 0x0, 0x40001) creat(&(0x7f00000000c0)='./bus\x00', 0x182) 1.64034583s ago: executing program 2 (id=1058): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) sendmsg$NFC_CMD_FW_DOWNLOAD(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r3, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) read(r0, &(0x7f0000000380)=""/14, 0xe) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000340)="577a29be4c834fe105e3399e08de3d945090b935490a65b37419c3391c7a68c302f06f897abc03", 0x27}], 0x1, 0x48, 0x3) 1.59310814s ago: executing program 3 (id=1059): ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r4, 0x0, 0xf, 0x8) r5 = socket(0x1e, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) sendmsg$tipc(r5, 0x0, 0x4000001) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r3, r7, 0x53, 0x0) write$binfmt_script(r7, &(0x7f0000000b40)={'#! ', './file0'}, 0xb) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) tee(r6, r4, 0x9, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRESOCT], &(0x7f0000000040)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = dup(r10) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a32000000000500010007000000140007800800134000000000080012"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x3, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r12}, 0x18) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 1.59225019s ago: executing program 2 (id=1060): r0 = fsopen(&(0x7f0000000080)='dax\x00', 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) (async) creat(&(0x7f0000000000)='./file0\x00', 0x6a) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000200)={[{@barrier}, {@nodioread_nolock}, {@lazytime}, {@barrier}, {@auto_da_alloc}, {@nodioread_nolock}]}, 0x1, 0x599, &(0x7f0000001280)="$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") (async, rerun: 64) socket$inet6_sctp(0xa, 0x5, 0x84) (rerun: 64) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) (async) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000800)=ANY=[@ANYRES32=r3, @ANYBLOB="04000100f8"], 0x9) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) (rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800003044070000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) (async, rerun: 32) r6 = creat(0x0, 0x8) (async, rerun: 32) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03"], 0x34}}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) (async, rerun: 64) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0e000000040000000800000001"], 0x50) (async, rerun: 64) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) ioctl$sock_inet_SIOCGIFBRDADDR(r7, 0x8919, &(0x7f0000000340)={'wg0\x00', {0x2, 0x0, @multicast2}}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xa, 0x8, &(0x7f0000000480)=ANY=[@ANYRES16=0x0, @ANYRES64=r2, @ANYBLOB="f1c782a6b5f7095aef6f64ead3c89b18b6d71156777db61f21fd4430232ecd91d3f31fd03e53e36c8574c4c213ec63f07143ee188549661bf232d405a1d35890634efc53fb808eebb0364a9fad58daf6782d137b571d9d99642fd5bfa98307c33e9e51a7940b7a57a9394727ffbf4a893d56213e73c470347f3dfc760005c085a99011504733e24afa02524e395b12a6c1acf223548f7f70ccee9ef8ad38643f729c6519de697daa223e0ed58d87b73c10702a940ec84f80aaf576c750f4d5945bd4210915ae"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xd7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r9}, &(0x7f0000000280), &(0x7f00000002c0)=r10}, 0x20) (async) r11 = syz_io_uring_setup(0x231, &(0x7f0000000140)={0x0, 0x0, 0x10100, 0x200}, &(0x7f0000000200), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_NAPI(r11, 0x1b, &(0x7f0000000400)={0x4, 0x2}, 0x1) (async, rerun: 64) syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') (async, rerun: 64) sendmsg$IPVS_CMD_ZERO(r6, &(0x7f0000000700)={&(0x7f00000003c0), 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f4000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf25100000000800060010000000840003801400020076657468315f746f5f6272696467650006000400ffff000006000400060000001400020076657468305f766c616e000000000000080005007f0000011400020070696d7265670000000000000000000008000100000000001400020077673100000000000000000000000000080001000100000008000500e00000022400028008000400070000000800060000000000080003000400000006000f000100000008000500000000000800060004000000080004004a0e0000180001800800060077da50d2c9e55c0a585bb36c63000c00"], 0xf4}, 0x1, 0x0, 0x0, 0x20008844}, 0x1) (async, rerun: 64) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831373f00000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) (rerun: 64) 1.356871442s ago: executing program 0 (id=1061): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ff9}]}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000000bf00)={0x0, 0x0, &(0x7f000000bec0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000001600010000000000000000000a000000", @ANYRES32, @ANYBLOB="14000200fe8000"/19], 0x40}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x40) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000280)='./file1\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x1219, &(0x7f0000001100)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x275a, 0x0) ftruncate(r2, 0x2000009) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(0xffffffffffffffff, 0x400455c8, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0x3) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000140)=0x3) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000400)=0x7) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000200)=0xa) pwritev2(r3, &(0x7f00000001c0)=[{&(0x7f0000000400)="ba", 0xfdef}], 0x1, 0xe7b, 0x0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000050000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000006696f9eeeeaac72dc3fd37aff0a59c4607d7a92ada8ef0fe5ff20f2ffbc8ff7135d15eb6408a9959f5f485fa601354acb25d8333c973f9e44af618b3"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x4, 0x7f, 0x5, 0x50, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7801, 0x8000, 0x4}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) 1.108567263s ago: executing program 3 (id=1062): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) sendmsg$NFC_CMD_FW_DOWNLOAD(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r3, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) read(r0, &(0x7f0000000380)=""/14, 0xe) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000340)="577a29be4c834fe105e3399e08de3d945090b935490a65b37419c3391c7a68c302f06f897abc03", 0x27}], 0x1, 0x48, 0x3) (fail_nth: 1) 742.340945ms ago: executing program 2 (id=1063): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x89901) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0xa6c3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x200000, &(0x7f00000008c0)={[{@noblock_validity}, {}, {@acl}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@data_journal}, {@inlinecrypt}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x57a, &(0x7f0000001780)="$eJzs3d9rU+cbAPDnpK3WH9+vFUS2XQzBizmcqW33w8FAdzk2mbDdu9DGIk2NNKnYTlAv5s1uhgzGmDD2B+zeS9k/sL9CmIIMKdvFbjpOeo7GpmnaGE1dPh+Ivm9O2ue8ec/z9jk5CQlgYB1J/ylEvB4R3yURB5q2DUe2MbPy+Np0ektidfWLP5NIsvvy7Un2/76s81pE/PZNxPFCa9za0vJcqVIpL2T98fr85fHa0vKJi/Ol2fJs+dLk1NSp96YmP/zg/Z6N9e1zf//4+b1PTn17dOWHXx8evJ3EmdjfNLYehLjR3DkSR7LnZCTOrHvgRA+C7SRJv3eArgxleT4S6RpwIIayrAf++65HxCowoBL5DwMqrwPyc/senQe/Mh59vHYC1Dr+4bXXRmK0cW60dyV55swoPd8d60H8NMbdB0ncfXDndnR4HeJ6D+IB5G7cjIiTw8Ot61+SrX/dO9n84nEb62MM2t8f6Kd7af3zzkb1T+FJ/RMb1D/7NsjdbnTO/8LDHoRpK63/Ptqw/n2ydI0NZb3/NWq+keTCxUr5ZET8PyKOxcjutL/Z9ZxTK/dX221bq//u3M5vafy8Fsz24+Hw7md/ZqZULz3PmJs9uhnxxtP6N4mW9X+0Ueuun//0+Ti3xRiHy3febDR2tW7rPP5mva+AV3+JeGvD+X96RSvZ/PrkeON4GM+PilZ/3Tr8e7v42xt/76Xzv3fz8Y8lzddra9uP8fPoP+V227o9/nclXzba+SF1tVSvL0xE7Eo+a71/8unP5v388en4jx1dP/7my7gbH/97IuKrLY7/1qFbbR+6E+Z/Zlvzv/3G/U+//qld/K3N/7uN1rHsnq2sf3nw0Q47+DzPHQAAAAAAAOw0hYjYH0mh+KRdKBSLa+/vOBR7C5VqrX78QnXx0kw0Pis7FiOF/Er3gab3Q0xk74fN+5Pr+lMRcTAivh/a0+gXp6uVmX4PHgAAAAAAAAAAAAAAAAAAAHaIfW0+/5/6Y6jfewe8cL7yGwZXx/zvxTc9ATuSv/8wuOQ/DC75D4NL/sPgkv8wuOQ/DC75D4NL/gMAAAAAAAAAAAAAAAAAAAAAAAAAAEBPnTt7Nr2trjy+Np32Z64sLc5Vr5yYKdfmivOL08Xp6sLl4my1OlspF6er851+X6VavTwxGYtXx+vlWn28trR8fr66eKl+/uJ8abZ8vjzyUkYFAAAAAAAAAAAAAAAAAAAAr5ba0vJcqVIpL7zMRqEfQbtvnI4dsRtdN5JOs3w6Oxi6CjHc/wFqvIBGnxcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGjybwAAAP//mPwx6Q==") fcntl$setlease(r1, 0x400, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x53, &(0x7f0000000380)={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@mpls_uc={0x8847, {[{0x3}, {0x8, 0x0, 0x1}], @llc={@snap={0xab, 0x0, "995e", "57ee3d", 0x9, "5d79dc2051597427013362e32fffcf48c37a1fc455a615ad524942504172d92a26c1a65048ecd7fb03e2329dea029001d53f9577"}}}}}}, &(0x7f0000000200)={0x0, 0x3, [0xb51, 0x1db, 0x3ac, 0x80b]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x100) unshare(0x24060400) move_mount(r0, 0x0, r4, 0x0, 0x46) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0x52, "aee366f3f9d54f945848d711fe5351fabef759389edd50b4688d66e84f1d4e2e96c6f89bf684bfc086c57ed6de5ddf7fef03f2b01bb058f7c176eb362f3ddfc58d64f1dc2635f8c9df98cca2f118693ee7db"}, &(0x7f0000000080)=0x5a) 741.369195ms ago: executing program 4 (id=1064): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x89901) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0xa6c3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x200000, &(0x7f00000008c0)={[{@noblock_validity}, {}, {@acl}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@data_journal}, {@inlinecrypt}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x57a, &(0x7f0000001780)="$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") fcntl$setlease(r1, 0x400, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x53, &(0x7f0000000380)={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@mpls_uc={0x8847, {[{0x3}, {0x8, 0x0, 0x1}], @llc={@snap={0xab, 0x0, "995e", "57ee3d", 0x9, "5d79dc2051597427013362e32fffcf48c37a1fc455a615ad524942504172d92a26c1a65048ecd7fb03e2329dea029001d53f9577"}}}}}}, &(0x7f0000000200)={0x0, 0x3, [0xb51, 0x1db, 0x3ac, 0x80b]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x100) unshare(0x24060400) move_mount(r0, 0x0, r4, 0x0, 0x46) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0x52, "aee366f3f9d54f945848d711fe5351fabef759389edd50b4688d66e84f1d4e2e96c6f89bf684bfc086c57ed6de5ddf7fef03f2b01bb058f7c176eb362f3ddfc58d64f1dc2635f8c9df98cca2f118693ee7db"}, &(0x7f0000000080)=0x5a) 676.443836ms ago: executing program 2 (id=1065): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) (async) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x9c, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r4, {}, {0xffff, 0xffff}, {0x2, 0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x6c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x4000000}]}]}, @TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8]}}]}}]}, 0x9c}}, 0x0) (async) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x2}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000008c0)='kfree\x00'}, 0x18) (async) r7 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') close_range(r7, 0xffffffffffffffff, 0x200000000000000) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000580)={'gretap0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x10, 0x7800, 0x7, 0x10001, {{0x20, 0x4, 0x1, 0x0, 0x80, 0x66, 0x0, 0x50, 0x29, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x18}, {[@timestamp_addr={0x44, 0x3c, 0xf2, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xdbf1}, {@multicast2, 0x4}, {@multicast2, 0xe}, {@local, 0x7}, {@remote, 0x4}, {@empty, 0xa6a}, {@multicast1, 0x9}]}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x24, 0xb0, 0x1, 0x5, [{@local, 0x7}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x1}, {@loopback, 0x2}, {@loopback, 0x4}]}, @noop, @rr={0x7, 0x7, 0xb4, [@loopback]}]}}}}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000600)=0xc) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r5, &(0x7f00000007c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f0000000740)={0x50, r6, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0xe}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x80}, @ETHTOOL_A_CHANNELS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x200}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x92f5e}, 0x6d) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r12 = syz_io_uring_setup(0x3380, &(0x7f0000000180)={0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, r8}, &(0x7f0000000380)=0x0, &(0x7f00000000c0)=0x0) (async) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r15, &(0x7f0000000040)=ANY=[@ANYBLOB='5'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r15, 0x0) (async) syz_io_uring_submit(r13, r14, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r12, 0x2d3e, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x20000000ec072, 0xffffffffffffffff, 0x0) 643.367696ms ago: executing program 0 (id=1066): r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, r1) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) read(r0, &(0x7f0000000380)=""/14, 0xe) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) unshare(0x62040200) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 639.136736ms ago: executing program 1 (id=1067): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='irq_handler_exit\x00', r1, 0x0, 0xfffffffffffffffc}, 0x4d) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002d0001002dbd7000ffdbdf2508000d00", @ANYRES32], 0x38}], 0x1, 0x0, 0x0, 0x20004880}, 0xc000) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[@ANYBLOB="240000003f000500000000000000df25047c0000040000000c0001"], 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r3, &(0x7f0000000780)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000003b40)={0x1704, r4, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x12, 0x2e}}}}, [@NL80211_ATTR_IE={0x56, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x84, 0xd}}, @mic={0x8c, 0x10, {0x4d, "59b707496574", @short="a999f95737a43cd0"}}, @dsss={0x3, 0x1, 0xa5}, @sec_chan_ofs={0x3e, 0x1, 0x2}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x2, 0xa9, 0x6}}, @ssid={0x0, 0x6, @default_ibss_ssid}, @prep={0x83, 0x25, {{0x0, 0x1}, 0x8, 0x1, @device_a, 0x56, @value, 0x85cc, 0x3, @device_a, 0x6}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x32, 0xfc, "6f70d4bd13a190cdb333a01b5d0b25435c5e2a9d7151efd6d706f98b892da736a133fcbaf4add66d14cfd83862a1"}, @NL80211_ATTR_FILS_ERP_REALM={0x4d, 0xfa, "a3290e8ae3a6b6380d6a5a0153ca8fcf59f4cefce4d891c8351ee7335a87f77acb434934b6be36a6beac88cb51d4d8faddb3dc454f7cec945bf8f4a7ecc8adb991a7156330432d5092"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0xc}], @NL80211_ATTR_IE={0x236, 0x2a, [@ibss={0x6, 0x2, 0xfe6a}, @challenge={0x10, 0x1, 0x4f}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x6, 0xac, 0x7}}, @mic={0x8c, 0x18, {0xc20, "f81dfd833b87", @long="8c59dce860d95738ab89119015474505"}}, @tim={0x5, 0xc9, {0xff, 0x3a, 0x81, "4500bd34642b5524474cca1f2d3a1bba6a8f3d6779659f185cdffbe33d4b993182e27188c51bb065d31b921f56c0628c833756ace85a3238bfe5ea37d3d1f7b1d468b729b0c98faeef23f818d52e3e5884c2c7abcf03156bea6d6e10d9c0e7c02eaca45105b0684e5e550f48a20ab8030973762496044d4a73922c19a5f1ae8c21ad2ddbdd940479f6ac090db0cde22766a4c6b19a02d6e9576f7b725db866fd0149dbeb2c6e534e49bcc6082ffc81f2e98e91215c2501bfa81544a8744c78af8cfdd1dee71d"}}, @measure_req={0x26, 0xa5, {0x5, 0x1, 0x54, "f87a33558b54ed17105a4fa425d4c9284f0097f44073596598dbee0c0530703c2ee159ba1a506916239db4baad10c00e3dfc627a4daa4b725c819fb6cc312228e182d124242dac094037729af2b1d4202b4239bb5ef805cef6b5209cf7a3e6369c9f24039d6a581bb8a73e8eda2f353d6ff448c31aea4287b1c8fda434ea91d2d3e2fffd1c506d0c565debda3e74e929fd0efedd8cf388dc8bb8c995620f93ebd0a7"}}, @prep={0x83, 0x25, {{0x0, 0x1}, 0x1, 0x81, @broadcast, 0x7, @value=@device_b, 0xae49, 0x1, @device_a, 0xdb}}, @preq={0x82, 0x6d, {{0x1, 0x1, 0x1, 0x0, 0x1}, 0x2, 0x4, 0x80000001, @device_a, 0x7, @value=@device_b, 0x5, 0x4, 0x7, [{{0x1}, @device_a, 0x8}, {{}, @device_a, 0x6}, {{0x1}, @device_b, 0x1ff}, {{0x1, 0x0, 0x1}, @broadcast, 0x7}, {{}, @device_b, 0x8}, {{0x1}, @broadcast, 0x7}, {{0x1}, @device_a, 0x8}]}}, @challenge={0x10, 0x1, 0xdf}]}, @NL80211_ATTR_IE={0xf6, 0x2a, [@perr={0x84, 0x62, {0x3, 0x6, [{{}, @device_a, 0x40, @void, 0x3d}, {{0x0, 0x1}, @device_a, 0x3, @value=@device_b, 0x6}, {{0x0, 0x1}, @device_a, 0x561a182a, @value=@broadcast, 0x40}, {{}, @device_a, 0xe5e, @void, 0x1a}, {{0x0, 0x1}, @broadcast, 0xa, @value, 0x8}, {{}, @broadcast, 0x8, @void, 0xf}]}}, @ht={0x2d, 0x1a, {0x2000, 0x3, 0x1, 0x0, {0x400, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, 0x8, 0x5, 0x40}}, @perr={0x84, 0x5c, {0x1, 0x6, [{{0x0, 0x1}, @device_b, 0x281, @value, 0x3d}, {{}, @device_a, 0x3}, {{}, @device_b, 0x5, @void, 0x3b}, {{}, @device_b, 0x2, @void, 0x11}, {{0x0, 0x1}, @broadcast, 0x5, @value, 0x3f}, {{}, @device_a, 0x8, @void, 0x15}]}}, @link_id={0x65, 0x12, {@initial, @device_a, @broadcast}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xc7, 0xfa, "1305430fc0798e539273e1f074ddbc18f9dae6c14da171d14a00565973a6f1e1c76e51bf7ae372da940807d7516d5e243cc769357f8cc4e39cf95b1c8214606e163468c6e0fb35bc58c9024d77fc0c5e9ca9427c8c6c206eb075892bfe7f4da2f39b29db214d9124ce63a8c2ae672438632dbec1f346b77a5233c8096e3443bbb0c79643f94eb913f91d98b283b4e0249fc9fcdee04b5c341dcf831bc12447d87c1c2ba77857cb2e260a5785fed6abe82629d323176f6084abc0ccc80f77fdd7e2397b"}, @NL80211_ATTR_FILS_ERP_REALM={0xaf, 0xfa, "dd78d8aae29ae1dc22e7850a8ee0da14f7175d81321dc77b87d767b51c19ec7fcadf032211d353d36bb6dfb74c039900da3a71db873d3e637db878092d19309eacff0c8fa35678eb5a5b714bc9bd4011fb4843e1ab50dd4623653502be6131faf3e34b47b0d894e38c4661c11803a90bbca602b8a6333d70e2f98d3fb5142d12a0ff377d12d2db5c38ddd1fae4ea83ca7e16900af800a6d003914c136faa1b9499ac013c868ca2a349ffe9"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x4}, @NL80211_ATTR_FILS_ERP_REALM={0xfb, 0xfa, "4d3aef04372ce4a34c8cfbe70b2653f5ca9e5141430c90647374697ba8942c6e1688724a2e60da19639766c93f154597fe22c1915e9754a7b27b4fb5ee75bdbda4956812941c5f62225c2e29ca2aa81eb8267490a488406473382fabd0a3d7ea3325a62a74164d4e9ccd6bfe5a8fbfe170719b92c4e8ea0bbac34e6f09b1416570bda1f1280fd7f48b2717a39bd2e346ff9aadca2a2608db119e3043271036ce799eb3e962be2e6124b3666099eaf1faf53fda13d5507e17245b6e5579957f825d00aa6f95930bfd0be1f04bbc51bd673a92e053c6b7b7535712a70d58d5e6e1a0479d4a88377df6ac6e8a6ec711f981b6c4deee8541f5"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x14, 0xf9, "5410f4087acc2322bbf524bdf8468195"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x101}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_RRK={0x30, 0xfc, "48357fcb32a5700da1b2d982ce025a7f05070c4cfab61a7d04d2543225662b3c41b6e2e98b047ab618e8a57c"}]]}, 0x1704}, 0x1, 0x0, 0x0, 0x4020000}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="d8000000180081054e81f782db44b904021d005c06007c09e8fe55a10a0015400100142603600e1208000f0000000401a800160008001e4009001120036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360d070100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1000000000000064}, 0x8000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r7 = creat(&(0x7f0000000080)='./file0/file1\x00', 0x90) write$cgroup_type(r7, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000100)='./file0/file1\x00') (fail_nth: 1) 626.718226ms ago: executing program 4 (id=1068): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='irq_handler_exit\x00', r1, 0x0, 0xfffffffffffffffc}, 0x4d) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002d0001002dbd7000ffdbdf2508000d00", @ANYRES32], 0x38}], 0x1, 0x0, 0x0, 0x20004880}, 0xc000) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[@ANYBLOB="240000003f000500000000000000df25047c0000040000000c0001"], 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r3, &(0x7f0000000780)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000003b40)={0x1704, r4, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x12, 0x2e}}}}, [@NL80211_ATTR_IE={0x56, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x84, 0xd}}, @mic={0x8c, 0x10, {0x4d, "59b707496574", @short="a999f95737a43cd0"}}, @dsss={0x3, 0x1, 0xa5}, @sec_chan_ofs={0x3e, 0x1, 0x2}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x2, 0xa9, 0x6}}, @ssid={0x0, 0x6, @default_ibss_ssid}, @prep={0x83, 0x25, {{0x0, 0x1}, 0x8, 0x1, @device_a, 0x56, @value, 0x85cc, 0x3, @device_a, 0x6}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x32, 0xfc, "6f70d4bd13a190cdb333a01b5d0b25435c5e2a9d7151efd6d706f98b892da736a133fcbaf4add66d14cfd83862a1"}, @NL80211_ATTR_FILS_ERP_REALM={0x4d, 0xfa, "a3290e8ae3a6b6380d6a5a0153ca8fcf59f4cefce4d891c8351ee7335a87f77acb434934b6be36a6beac88cb51d4d8faddb3dc454f7cec945bf8f4a7ecc8adb991a7156330432d5092"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0xc}], @NL80211_ATTR_IE={0x236, 0x2a, [@ibss={0x6, 0x2, 0xfe6a}, @challenge={0x10, 0x1, 0x4f}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x6, 0xac, 0x7}}, @mic={0x8c, 0x18, {0xc20, "f81dfd833b87", @long="8c59dce860d95738ab89119015474505"}}, @tim={0x5, 0xc9, {0xff, 0x3a, 0x81, "4500bd34642b5524474cca1f2d3a1bba6a8f3d6779659f185cdffbe33d4b993182e27188c51bb065d31b921f56c0628c833756ace85a3238bfe5ea37d3d1f7b1d468b729b0c98faeef23f818d52e3e5884c2c7abcf03156bea6d6e10d9c0e7c02eaca45105b0684e5e550f48a20ab8030973762496044d4a73922c19a5f1ae8c21ad2ddbdd940479f6ac090db0cde22766a4c6b19a02d6e9576f7b725db866fd0149dbeb2c6e534e49bcc6082ffc81f2e98e91215c2501bfa81544a8744c78af8cfdd1dee71d"}}, @measure_req={0x26, 0xa5, {0x5, 0x1, 0x54, "f87a33558b54ed17105a4fa425d4c9284f0097f44073596598dbee0c0530703c2ee159ba1a506916239db4baad10c00e3dfc627a4daa4b725c819fb6cc312228e182d124242dac094037729af2b1d4202b4239bb5ef805cef6b5209cf7a3e6369c9f24039d6a581bb8a73e8eda2f353d6ff448c31aea4287b1c8fda434ea91d2d3e2fffd1c506d0c565debda3e74e929fd0efedd8cf388dc8bb8c995620f93ebd0a7"}}, @prep={0x83, 0x25, {{0x0, 0x1}, 0x1, 0x81, @broadcast, 0x7, @value=@device_b, 0xae49, 0x1, @device_a, 0xdb}}, @preq={0x82, 0x6d, {{0x1, 0x1, 0x1, 0x0, 0x1}, 0x2, 0x4, 0x80000001, @device_a, 0x7, @value=@device_b, 0x5, 0x4, 0x7, [{{0x1}, @device_a, 0x8}, {{}, @device_a, 0x6}, {{0x1}, @device_b, 0x1ff}, {{0x1, 0x0, 0x1}, @broadcast, 0x7}, {{}, @device_b, 0x8}, {{0x1}, @broadcast, 0x7}, {{0x1}, @device_a, 0x8}]}}, @challenge={0x10, 0x1, 0xdf}]}, @NL80211_ATTR_IE={0xf6, 0x2a, [@perr={0x84, 0x62, {0x3, 0x6, [{{}, @device_a, 0x40, @void, 0x3d}, {{0x0, 0x1}, @device_a, 0x3, @value=@device_b, 0x6}, {{0x0, 0x1}, @device_a, 0x561a182a, @value=@broadcast, 0x40}, {{}, @device_a, 0xe5e, @void, 0x1a}, {{0x0, 0x1}, @broadcast, 0xa, @value, 0x8}, {{}, @broadcast, 0x8, @void, 0xf}]}}, @ht={0x2d, 0x1a, {0x2000, 0x3, 0x1, 0x0, {0x400, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, 0x8, 0x5, 0x40}}, @perr={0x84, 0x5c, {0x1, 0x6, [{{0x0, 0x1}, @device_b, 0x281, @value, 0x3d}, {{}, @device_a, 0x3}, {{}, @device_b, 0x5, @void, 0x3b}, {{}, @device_b, 0x2, @void, 0x11}, {{0x0, 0x1}, @broadcast, 0x5, @value, 0x3f}, {{}, @device_a, 0x8, @void, 0x15}]}}, @link_id={0x65, 0x12, {@initial, @device_a, @broadcast}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xc7, 0xfa, "1305430fc0798e539273e1f074ddbc18f9dae6c14da171d14a00565973a6f1e1c76e51bf7ae372da940807d7516d5e243cc769357f8cc4e39cf95b1c8214606e163468c6e0fb35bc58c9024d77fc0c5e9ca9427c8c6c206eb075892bfe7f4da2f39b29db214d9124ce63a8c2ae672438632dbec1f346b77a5233c8096e3443bbb0c79643f94eb913f91d98b283b4e0249fc9fcdee04b5c341dcf831bc12447d87c1c2ba77857cb2e260a5785fed6abe82629d323176f6084abc0ccc80f77fdd7e2397b"}, @NL80211_ATTR_FILS_ERP_REALM={0xaf, 0xfa, "dd78d8aae29ae1dc22e7850a8ee0da14f7175d81321dc77b87d767b51c19ec7fcadf032211d353d36bb6dfb74c039900da3a71db873d3e637db878092d19309eacff0c8fa35678eb5a5b714bc9bd4011fb4843e1ab50dd4623653502be6131faf3e34b47b0d894e38c4661c11803a90bbca602b8a6333d70e2f98d3fb5142d12a0ff377d12d2db5c38ddd1fae4ea83ca7e16900af800a6d003914c136faa1b9499ac013c868ca2a349ffe9"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x4}, @NL80211_ATTR_FILS_ERP_REALM={0xfb, 0xfa, "4d3aef04372ce4a34c8cfbe70b2653f5ca9e5141430c90647374697ba8942c6e1688724a2e60da19639766c93f154597fe22c1915e9754a7b27b4fb5ee75bdbda4956812941c5f62225c2e29ca2aa81eb8267490a488406473382fabd0a3d7ea3325a62a74164d4e9ccd6bfe5a8fbfe170719b92c4e8ea0bbac34e6f09b1416570bda1f1280fd7f48b2717a39bd2e346ff9aadca2a2608db119e3043271036ce799eb3e962be2e6124b3666099eaf1faf53fda13d5507e17245b6e5579957f825d00aa6f95930bfd0be1f04bbc51bd673a92e053c6b7b7535712a70d58d5e6e1a0479d4a88377df6ac6e8a6ec711f981b6c4deee8541f5"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x14, 0xf9, "5410f4087acc2322bbf524bdf8468195"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x101}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_RRK={0x30, 0xfc, "48357fcb32a5700da1b2d982ce025a7f05070c4cfab61a7d04d2543225662b3c41b6e2e98b047ab618e8a57c"}]]}, 0x1704}, 0x1, 0x0, 0x0, 0x4020000}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="d8000000180081054e81f782db44b904021d005c06007c09e8fe55a10a0015400100142603600e1208000f0000000401a800160008001e4009001120036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360d070100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1000000000000064}, 0x8000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r7 = creat(&(0x7f0000000080)='./file0/file1\x00', 0x90) write$cgroup_type(r7, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000100)='./file0/file1\x00') 579.404987ms ago: executing program 3 (id=1069): socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x81010200, 0x0, 0xffffffffffffff92, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x800400, &(0x7f00000009c0)={[{@quota}]}, 0x1, 0x4f3, &(0x7f0000000a00)="$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") listxattr(&(0x7f0000000100)='./file1\x00', 0x0, 0x100000) 577.384767ms ago: executing program 2 (id=1070): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x1ff003, 0x81, 0xffff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x50) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getchain={0x3c, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [{0x8, 0xb, 0x9}, {0x8, 0xb, 0x2}, {0x8}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r2, @ANYRESHEX=r3], 0x28}, 0x1, 0x0, 0x0, 0x4000008}, 0x0) 497.403327ms ago: executing program 2 (id=1071): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)="d80000001000810468f70082db44b904021d080b01000000e8fe55a11800150006001400000000120800040043000000a80016000300014006000d00036010fab94dcf5c0461c1d67f6f94000534cf6ee08000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88ac417898516277ce06bbace80177ccbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d0080000000000000b57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5588a63644caf1ce1bd6c769ad809d52a9ecbee", 0xd8}], 0x1}, 0x20000004) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x18, 0x7ffc1fff}]}) rt_sigaction(0x1b, 0x0, 0x0, 0x8, &(0x7f00000001c0)) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r6}, 0x10) setreuid(0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@local, @in=@dev={0xac, 0x14, 0x14, 0x29}, 0x4e22, 0x401, 0x4e22, 0x8000, 0x2, 0xa0, 0x80, 0x4}, {0x4, 0x354824a5, 0x7, 0x5, 0x7, 0x2, 0xe987, 0xe}, {0x6, 0x2, 0x64f4, 0xa}, 0xf, 0x6e6bb8, 0x2, 0x0, 0x2, 0x2}, {{@in6=@empty, 0x4d4, 0x3c}, 0x2, @in=@local, 0x3504, 0x3, 0x2, 0x7f, 0x5, 0xb, 0xc837}}, 0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x4008032, 0xffffffffffffffff, 0xd06d000) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) r7 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) ioctl$PAGEMAP_SCAN(r7, 0xc0606610, &(0x7f0000000280)={0x60, 0x0, &(0x7f00000b6000/0x3000)=nil, &(0x7f0000f3f000/0x8000)=nil, 0x4, 0x0, 0x0, 0x8, 0x31, 0x4, 0x12, 0x20}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000251000/0x2000)=nil, 0x2000, &(0x7f00000001c0)='\x00') setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000100)={0x3, [0x400, 0x3], 0x4}, 0x10) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f0000000580)={0x2, 0xb57, 0x0, 'queue0\x00', 0x401}) r9 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r0, &(0x7f0000000300)="7392ddf3a0bbc89c6cecbc28b6b96b374547568e177cbe7621b6e8eff78d27dab5d2ce452da8f2d283e6cbb999207a73c1c72b46d6d0fa9256ff7f7508d436ee14a2acf863511d8f680f90789037aeb0fba1f13b0aa1a8d53c83a848dd200f660bd48fb1c77dfbbad1c745279cab841242149b7f8c9fc16ca65c85bbe87e9204f108115dce841bf89484796510e0e29991ff929c6336b2a33fb002d42851f93e533c52e7709cee20f5450eacf825063873411189a0dee82d219b623844c4a7aabc3e173545d057d07a7b5d16bb8d7d26ff535b5098c06cdfed16b9cc03f5dde265f47480e51dab618be1c826635cdfee218ab146e0", &(0x7f0000000200)=@udp=r9, 0x1}, 0x20) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r5, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/86, 0x56, 0x8, 0x37}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 52.00151ms ago: executing program 0 (id=1072): r0 = socket$kcm(0x10, 0x400000002, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, 0x0) r3 = syz_io_uring_setup(0x136f, &(0x7f00000001c0)={0x0, 0x49fa, 0x10, 0x0, 0x4e}, &(0x7f0000000100)=0x0, &(0x7f0000000280)=0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000300)=[0xffffffffffffffff], 0x1) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff], 0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4f, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x4}}) io_uring_enter(r3, 0x47f6, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x80, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0xf) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$TCFLSH(r6, 0x400455c8, 0x0) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000040)=0x5) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000180)=0x3) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000140)=0x3) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000400)=0x7) getrandom(&(0x7f0000000000), 0x0, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001d00)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, 0x0, 0xfffffffe, 0xb84, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, 0x0, 0xc74, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x100, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffff002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, 0x200, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0xfffffffc, 0x6, 0x0, 0x0, 0xffffffff, 0xf, 0x7f, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x5, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe4, 0x0, 0xfffffffe, 0x0, 0x0, 0x100000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xdc, 0x10000000, 0x7fffffff, 0x6, 0xfffffffd, {0x6, 0x2, 0x1, 0x401, 0x1, 0xc}, {0x9a, 0x0, 0x40, 0x5, 0x400}, 0x5, 0x2, 0x81}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x488}}, 0xc0) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000200)=0xa) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000840)=""/4085, 0xff5}, {&(0x7f0000003700)=""/4074, 0xfea}, {&(0x7f0000002500)=""/4121, 0x1019}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x4}, 0x0) 2.71205ms ago: executing program 1 (id=1073): syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3}}) (async) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) (async, rerun: 32) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) (rerun: 32) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = syz_io_uring_setup(0x5c6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4, 0x28a}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) (async) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x4}) (async) r4 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x10000000}, 0xc) close(r4) io_uring_enter(r1, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = syz_clone(0x81248080, 0x0, 0x4c, 0x0, 0x0, 0x0) (async, rerun: 32) r8 = syz_open_dev$char_usb(0xc, 0xb4, 0x6c) (async, rerun: 32) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x2, 0x44, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10, 0x0, 0x7fff}, 0x18) (async) r11 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r11, 0x114, 0x8, &(0x7f00000008c0), 0x4) (async, rerun: 32) bind$inet6(r11, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback, 0xa77}, 0x1c) (async, rerun: 32) fsetxattr$trusted_overlay_upper(r8, &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x59, 0x4, 0x2, "5ad51e38e3406b0f956717fe1687f1f1", "e4ae612c3a826b5b873f1ac60e0925bee797de9619466534eaeb8d592c54ab58e9e51d1e452c5b4733a98b6e11566159e1c159da5c64d4fd7f7c4ee3ce58d71231ffb39a"}, 0x59, 0x1) ptrace(0x10, r7) (async, rerun: 32) ptrace(0x8, r7) (async, rerun: 32) wait4(r7, 0x0, 0x8, 0x0) setpriority(0x1, r7, 0xc3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) 0s ago: executing program 3 (id=1074): socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$key(0xf, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='kfree\x00', r2, 0x0, 0x10000001}, 0x18) fsmount(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f00000004c0)='id_legacy\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='cgroup2\x00', 0x0) (fail_nth: 1) kernel console output (not intermixed with test programs): 00 R09: 0000000000000000 [ 49.317735][ T3967] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 49.317778][ T3967] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 49.317801][ T3967] [ 49.674826][ T2968] IPVS: starting estimator thread 0... [ 49.768036][ T3991] IPVS: using max 2352 ests per chain, 117600 per kthread [ 49.795125][ T3996] ip6gre1: entered allmulticast mode [ 49.876521][ T4001] netem: incorrect gi model size [ 49.881788][ T4001] netem: change failed [ 50.112321][ T4012] FAULT_INJECTION: forcing a failure. [ 50.112321][ T4012] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 50.125544][ T4012] CPU: 0 UID: 0 PID: 4012 Comm: syz.3.204 Not tainted syzkaller #0 PREEMPT(voluntary) [ 50.125580][ T4012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 50.125596][ T4012] Call Trace: [ 50.125604][ T4012] [ 50.125614][ T4012] __dump_stack+0x1d/0x30 [ 50.125642][ T4012] dump_stack_lvl+0xe8/0x140 [ 50.125739][ T4012] dump_stack+0x15/0x1b [ 50.125839][ T4012] should_fail_ex+0x265/0x280 [ 50.125865][ T4012] should_fail+0xb/0x20 [ 50.125937][ T4012] should_fail_usercopy+0x1a/0x20 [ 50.125988][ T4012] _copy_to_user+0x20/0xa0 [ 50.126015][ T4012] simple_read_from_buffer+0xb5/0x130 [ 50.126120][ T4012] proc_fail_nth_read+0x10e/0x150 [ 50.126222][ T4012] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 50.126254][ T4012] vfs_read+0x1a8/0x770 [ 50.126279][ T4012] ? __rcu_read_unlock+0x4f/0x70 [ 50.126364][ T4012] ? __fget_files+0x184/0x1c0 [ 50.126391][ T4012] ? __sys_bind+0xc3/0x2a0 [ 50.126422][ T4012] ksys_read+0xda/0x1a0 [ 50.126496][ T4012] __x64_sys_read+0x40/0x50 [ 50.126522][ T4012] x64_sys_call+0x27c0/0x3000 [ 50.126546][ T4012] do_syscall_64+0xd2/0x200 [ 50.126566][ T4012] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 50.126649][ T4012] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 50.126683][ T4012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 50.126705][ T4012] RIP: 0033:0x7fbc22b5e0dc [ 50.126780][ T4012] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 50.126799][ T4012] RSP: 002b:00007fbc215c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 50.126819][ T4012] RAX: ffffffffffffffda RBX: 00007fbc22db5fa0 RCX: 00007fbc22b5e0dc [ 50.126831][ T4012] RDX: 000000000000000f RSI: 00007fbc215c70a0 RDI: 0000000000000003 [ 50.126844][ T4012] RBP: 00007fbc215c7090 R08: 0000000000000000 R09: 0000000000000000 [ 50.126856][ T4012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.126870][ T4012] R13: 00007fbc22db6038 R14: 00007fbc22db5fa0 R15: 00007ffd95cab718 [ 50.126888][ T4012] [ 50.644876][ T4034] netem: incorrect gi model size [ 50.650338][ T4034] netem: change failed [ 50.833347][ T4046] sctp: [Deprecated]: syz.3.218 (pid 4046) Use of int in max_burst socket option deprecated. [ 50.833347][ T4046] Use struct sctp_assoc_value instead [ 50.841342][ T4048] 8021q: adding VLAN 0 to HW filter on device bond1 [ 51.059761][ T4066] ip6gre1: entered allmulticast mode [ 51.077953][ T4063] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 51.245727][ T4077] FAULT_INJECTION: forcing a failure. [ 51.245727][ T4077] name failslab, interval 1, probability 0, space 0, times 0 [ 51.258473][ T4077] CPU: 1 UID: 0 PID: 4077 Comm: syz.1.229 Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.258508][ T4077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 51.258548][ T4077] Call Trace: [ 51.258557][ T4077] [ 51.258567][ T4077] __dump_stack+0x1d/0x30 [ 51.258630][ T4077] dump_stack_lvl+0xe8/0x140 [ 51.258655][ T4077] dump_stack+0x15/0x1b [ 51.258721][ T4077] should_fail_ex+0x265/0x280 [ 51.258746][ T4077] should_failslab+0x8c/0xb0 [ 51.258819][ T4077] kmem_cache_alloc_noprof+0x50/0x480 [ 51.258866][ T4077] ? audit_log_start+0x342/0x720 [ 51.258892][ T4077] audit_log_start+0x342/0x720 [ 51.258930][ T4077] ? kstrtouint+0x76/0xc0 [ 51.258973][ T4077] audit_seccomp+0x48/0x100 [ 51.259015][ T4077] ? __seccomp_filter+0x82d/0x1250 [ 51.259055][ T4077] __seccomp_filter+0x83e/0x1250 [ 51.259100][ T4077] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 51.259134][ T4077] ? vfs_write+0x7e8/0x960 [ 51.259160][ T4077] ? __rcu_read_unlock+0x4f/0x70 [ 51.259257][ T4077] ? __fget_files+0x184/0x1c0 [ 51.259290][ T4077] __secure_computing+0x82/0x150 [ 51.259326][ T4077] syscall_trace_enter+0xcf/0x1e0 [ 51.259371][ T4077] do_syscall_64+0xac/0x200 [ 51.259436][ T4077] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 51.259463][ T4077] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 51.259532][ T4077] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.259561][ T4077] RIP: 0033:0x7fdc4a19f6c9 [ 51.259579][ T4077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.259619][ T4077] RSP: 002b:00007fdc48bde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.259644][ T4077] RAX: ffffffffffffffda RBX: 00007fdc4a3f6090 RCX: 00007fdc4a19f6c9 [ 51.259659][ T4077] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000006 [ 51.259674][ T4077] RBP: 00007fdc48bde090 R08: 0000000000000000 R09: 0000000000000000 [ 51.259690][ T4077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.259705][ T4077] R13: 00007fdc4a3f6128 R14: 00007fdc4a3f6090 R15: 00007ffe10a4c638 [ 51.259723][ T4077] [ 51.313217][ T4077] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 51.493180][ T4086] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 51.675854][ T4096] ip6gre3: entered allmulticast mode [ 51.754666][ T407] Bluetooth: hci0: Frame reassembly failed (-84) [ 51.777159][ T4087] Bluetooth: hci0: Frame reassembly failed (-90) [ 51.788727][ T4101] FAULT_INJECTION: forcing a failure. [ 51.788727][ T4101] name failslab, interval 1, probability 0, space 0, times 0 [ 51.801423][ T4101] CPU: 1 UID: 0 PID: 4101 Comm: syz.2.240 Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.801496][ T4101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 51.801513][ T4101] Call Trace: [ 51.801522][ T4101] [ 51.801532][ T4101] __dump_stack+0x1d/0x30 [ 51.801563][ T4101] dump_stack_lvl+0xe8/0x140 [ 51.801591][ T4101] dump_stack+0x15/0x1b [ 51.801616][ T4101] should_fail_ex+0x265/0x280 [ 51.801755][ T4101] ? __se_sys_memfd_create+0x1cc/0x590 [ 51.801788][ T4101] should_failslab+0x8c/0xb0 [ 51.801818][ T4101] __kmalloc_cache_noprof+0x4c/0x4a0 [ 51.801882][ T4101] ? fput+0x8f/0xc0 [ 51.801920][ T4101] __se_sys_memfd_create+0x1cc/0x590 [ 51.801956][ T4101] __x64_sys_memfd_create+0x31/0x40 [ 51.801990][ T4101] x64_sys_call+0x2ac2/0x3000 [ 51.802064][ T4101] do_syscall_64+0xd2/0x200 [ 51.802099][ T4101] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 51.802139][ T4101] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 51.802183][ T4101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.802234][ T4101] RIP: 0033:0x7fa4e244f6c9 [ 51.802251][ T4101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.802269][ T4101] RSP: 002b:00007fa4e0eb6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 51.802291][ T4101] RAX: ffffffffffffffda RBX: 000000000000050a RCX: 00007fa4e244f6c9 [ 51.802309][ T4101] RDX: 00007fa4e0eb6ef0 RSI: 0000000000000000 RDI: 00007fa4e24d2960 [ 51.802326][ T4101] RBP: 0000200000000940 R08: 00007fa4e0eb6bb7 R09: 00007fa4e0eb6e40 [ 51.802366][ T4101] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 51.802384][ T4101] R13: 00007fa4e0eb6ef0 R14: 00007fa4e0eb6eb0 R15: 00002000000002c0 [ 51.802407][ T4101] [ 52.030402][ T4107] validate_nla: 12 callbacks suppressed [ 52.030421][ T4107] netlink: 'syz.1.243': attribute type 39 has an invalid length. [ 52.032149][ T4105] netlink: 'syz.2.242': attribute type 1 has an invalid length. [ 52.068092][ T4103] netlink: 'syz.0.241': attribute type 2 has an invalid length. [ 52.135095][ T4105] 8021q: adding VLAN 0 to HW filter on device bond1 [ 52.183308][ T4117] __nla_validate_parse: 1 callbacks suppressed [ 52.183327][ T4117] netlink: 20 bytes leftover after parsing attributes in process `syz.4.245'. [ 52.209308][ T4120] xt_CT: You must specify a L4 protocol and not use inversions on it [ 52.304095][ T4125] geneve2: entered promiscuous mode [ 52.643395][ T4137] netlink: 'syz.4.254': attribute type 39 has an invalid length. [ 52.792303][ T4139] FAULT_INJECTION: forcing a failure. [ 52.792303][ T4139] name failslab, interval 1, probability 0, space 0, times 0 [ 52.805258][ T4139] CPU: 0 UID: 0 PID: 4139 Comm: syz.1.253 Not tainted syzkaller #0 PREEMPT(voluntary) [ 52.805310][ T4139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 52.805323][ T4139] Call Trace: [ 52.805330][ T4139] [ 52.805340][ T4139] __dump_stack+0x1d/0x30 [ 52.805369][ T4139] dump_stack_lvl+0xe8/0x140 [ 52.805400][ T4139] dump_stack+0x15/0x1b [ 52.805425][ T4139] should_fail_ex+0x265/0x280 [ 52.805445][ T4139] ? alloc_pipe_info+0xae/0x350 [ 52.805509][ T4139] should_failslab+0x8c/0xb0 [ 52.805547][ T4139] __kmalloc_cache_noprof+0x4c/0x4a0 [ 52.805589][ T4139] alloc_pipe_info+0xae/0x350 [ 52.805625][ T4139] splice_direct_to_actor+0x592/0x680 [ 52.805731][ T4139] ? kstrtouint_from_user+0x9f/0xf0 [ 52.805757][ T4139] ? __pfx_direct_splice_actor+0x10/0x10 [ 52.805815][ T4139] ? __rcu_read_unlock+0x4f/0x70 [ 52.805841][ T4139] ? get_pid_task+0x96/0xd0 [ 52.805863][ T4139] ? avc_policy_seqno+0x15/0x30 [ 52.805888][ T4139] ? selinux_file_permission+0x1e4/0x320 [ 52.806003][ T4139] do_splice_direct+0xda/0x150 [ 52.806041][ T4139] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 52.806075][ T4139] do_sendfile+0x380/0x650 [ 52.806134][ T4139] __x64_sys_sendfile64+0x105/0x150 [ 52.806178][ T4139] x64_sys_call+0x2bb4/0x3000 [ 52.806209][ T4139] do_syscall_64+0xd2/0x200 [ 52.806235][ T4139] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 52.806269][ T4139] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 52.806349][ T4139] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.806379][ T4139] RIP: 0033:0x7fdc4a19f6c9 [ 52.806398][ T4139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.806421][ T4139] RSP: 002b:00007fdc48bde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 52.806475][ T4139] RAX: ffffffffffffffda RBX: 00007fdc4a3f6090 RCX: 00007fdc4a19f6c9 [ 52.806489][ T4139] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 52.806505][ T4139] RBP: 00007fdc48bde090 R08: 0000000000000000 R09: 0000000000000000 [ 52.806522][ T4139] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 52.806571][ T4139] R13: 00007fdc4a3f6128 R14: 00007fdc4a3f6090 R15: 00007ffe10a4c638 [ 52.806592][ T4139] [ 53.108703][ T4147] netlink: 'syz.4.258': attribute type 1 has an invalid length. [ 53.123206][ T4147] 8021q: adding VLAN 0 to HW filter on device bond1 [ 53.174444][ T4149] netem: incorrect gi model size [ 53.179478][ T4149] netem: change failed [ 53.195143][ T4151] xt_CT: You must specify a L4 protocol and not use inversions on it [ 53.326497][ T4154] netlink: 'syz.4.261': attribute type 5 has an invalid length. [ 53.338430][ T4154] batman_adv: batadv0: Adding interface: vxlan0 [ 53.344803][ T4154] batman_adv: batadv0: The MTU of interface vxlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 53.387804][ T4159] netlink: 'syz.2.263': attribute type 5 has an invalid length. [ 53.406762][ T4154] batman_adv: batadv0: Interface activated: vxlan0 [ 53.427733][ T389] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 53.483966][ T389] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 53.509675][ T389] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 53.525892][ T4167] netlink: 'syz.0.265': attribute type 39 has an invalid length. [ 53.532932][ T389] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 53.534460][ T4168] netlink: 20 bytes leftover after parsing attributes in process `syz.1.266'. [ 53.808040][ T4178] netlink: 'syz.2.269': attribute type 1 has an invalid length. [ 53.835978][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 53.842100][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 53.867240][ T4178] 8021q: adding VLAN 0 to HW filter on device bond2 [ 53.938303][ T4185] xt_CT: You must specify a L4 protocol and not use inversions on it [ 53.962964][ T29] kauditd_printk_skb: 34977 callbacks suppressed [ 53.962981][ T29] audit: type=1400 audit(1762208902.807:39988): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.016676][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 54.023267][ T3044] audit: audit_lost=8297 audit_rate_limit=0 audit_backlog_limit=64 [ 54.031214][ T3044] audit: backlog limit exceeded [ 54.052910][ T29] audit: type=1400 audit(1762208902.847:39989): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.074341][ T29] audit: type=1400 audit(1762208902.847:39990): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.095599][ T29] audit: type=1400 audit(1762208902.847:39991): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.116882][ T29] audit: type=1400 audit(1762208902.847:39992): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.138153][ T29] audit: type=1400 audit(1762208902.847:39993): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.160108][ T29] audit: type=1400 audit(1762208902.847:39994): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 54.231848][ T4190] FAULT_INJECTION: forcing a failure. [ 54.231848][ T4190] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.245164][ T4190] CPU: 1 UID: 0 PID: 4190 Comm: syz.2.274 Not tainted syzkaller #0 PREEMPT(voluntary) [ 54.245197][ T4190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 54.245258][ T4190] Call Trace: [ 54.245266][ T4190] [ 54.245273][ T4190] __dump_stack+0x1d/0x30 [ 54.245296][ T4190] dump_stack_lvl+0xe8/0x140 [ 54.245316][ T4190] dump_stack+0x15/0x1b [ 54.245367][ T4190] should_fail_ex+0x265/0x280 [ 54.245394][ T4190] should_fail+0xb/0x20 [ 54.245417][ T4190] should_fail_usercopy+0x1a/0x20 [ 54.245438][ T4190] _copy_to_user+0x20/0xa0 [ 54.245529][ T4190] simple_read_from_buffer+0xb5/0x130 [ 54.245587][ T4190] proc_fail_nth_read+0x10e/0x150 [ 54.245631][ T4190] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 54.245670][ T4190] vfs_read+0x1a8/0x770 [ 54.245719][ T4190] ? __rcu_read_unlock+0x4f/0x70 [ 54.245745][ T4190] ? __fget_files+0x184/0x1c0 [ 54.245847][ T4190] ksys_read+0xda/0x1a0 [ 54.245881][ T4190] __x64_sys_read+0x40/0x50 [ 54.245915][ T4190] x64_sys_call+0x27c0/0x3000 [ 54.245947][ T4190] do_syscall_64+0xd2/0x200 [ 54.245974][ T4190] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 54.246075][ T4190] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 54.246117][ T4190] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.246295][ T4190] RIP: 0033:0x7fa4e244e0dc [ 54.246311][ T4190] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 54.246329][ T4190] RSP: 002b:00007fa4e0eb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 54.246353][ T4190] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244e0dc [ 54.246392][ T4190] RDX: 000000000000000f RSI: 00007fa4e0eb70a0 RDI: 0000000000000003 [ 54.246404][ T4190] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 54.246416][ T4190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.246428][ T4190] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 54.246451][ T4190] [ 54.527734][ T4192] netlink: 'syz.3.275': attribute type 5 has an invalid length. [ 54.695645][ T4203] 8021q: adding VLAN 0 to HW filter on device bond3 [ 54.734905][ T4209] ip6gre4: entered allmulticast mode [ 54.831301][ T4215] netlink: 40 bytes leftover after parsing attributes in process `syz.4.285'. [ 54.870180][ T4219] xt_CT: You must specify a L4 protocol and not use inversions on it [ 55.245674][ T407] Bluetooth: hci0: Frame reassembly failed (-84) [ 55.254464][ T4215] Bluetooth: hci0: Frame reassembly failed (-90) [ 55.255692][ T4240] ip6gre2: entered allmulticast mode [ 55.343622][ T4243] netem: incorrect gi model size [ 55.348606][ T4243] netem: change failed [ 55.463128][ T4250] serio: Serial port ptm1 [ 55.503909][ T4253] FAULT_INJECTION: forcing a failure. [ 55.503909][ T4253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 55.517045][ T4253] CPU: 0 UID: 0 PID: 4253 Comm: syz.2.299 Not tainted syzkaller #0 PREEMPT(voluntary) [ 55.517077][ T4253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 55.517093][ T4253] Call Trace: [ 55.517101][ T4253] [ 55.517111][ T4253] __dump_stack+0x1d/0x30 [ 55.517178][ T4253] dump_stack_lvl+0xe8/0x140 [ 55.517272][ T4253] dump_stack+0x15/0x1b [ 55.517295][ T4253] should_fail_ex+0x265/0x280 [ 55.517321][ T4253] should_fail+0xb/0x20 [ 55.517337][ T4253] should_fail_usercopy+0x1a/0x20 [ 55.517362][ T4253] _copy_to_user+0x20/0xa0 [ 55.517395][ T4253] simple_read_from_buffer+0xb5/0x130 [ 55.517427][ T4253] proc_fail_nth_read+0x10e/0x150 [ 55.517525][ T4253] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 55.517589][ T4253] vfs_read+0x1a8/0x770 [ 55.517619][ T4253] ? __fget_files+0x184/0x1c0 [ 55.517653][ T4253] ? __rcu_read_unlock+0x4f/0x70 [ 55.517688][ T4253] ? __fget_files+0x184/0x1c0 [ 55.517787][ T4253] ksys_read+0xda/0x1a0 [ 55.517820][ T4253] __x64_sys_read+0x40/0x50 [ 55.517853][ T4253] x64_sys_call+0x27c0/0x3000 [ 55.517883][ T4253] do_syscall_64+0xd2/0x200 [ 55.517948][ T4253] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 55.517986][ T4253] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 55.518117][ T4253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.518139][ T4253] RIP: 0033:0x7fa4e244e0dc [ 55.518153][ T4253] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 55.518193][ T4253] RSP: 002b:00007fa4e0eb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 55.518220][ T4253] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244e0dc [ 55.518300][ T4253] RDX: 000000000000000f RSI: 00007fa4e0eb70a0 RDI: 0000000000000003 [ 55.518312][ T4253] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 55.518327][ T4253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.518343][ T4253] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 55.518362][ T4253] [ 55.784919][ T4258] netlink: 20 bytes leftover after parsing attributes in process `syz.1.300'. [ 56.085777][ T4273] netlink: 20 bytes leftover after parsing attributes in process `syz.0.306'. [ 56.505203][ T4287] ip6gre3: entered allmulticast mode [ 56.763073][ T4305] netlink: 20 bytes leftover after parsing attributes in process `syz.1.318'. [ 56.807190][ T4307] FAULT_INJECTION: forcing a failure. [ 56.807190][ T4307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.820435][ T4307] CPU: 0 UID: 0 PID: 4307 Comm: syz.3.319 Not tainted syzkaller #0 PREEMPT(voluntary) [ 56.820465][ T4307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 56.820480][ T4307] Call Trace: [ 56.820500][ T4307] [ 56.820510][ T4307] __dump_stack+0x1d/0x30 [ 56.820535][ T4307] dump_stack_lvl+0xe8/0x140 [ 56.820554][ T4307] dump_stack+0x15/0x1b [ 56.820576][ T4307] should_fail_ex+0x265/0x280 [ 56.820603][ T4307] should_fail+0xb/0x20 [ 56.820683][ T4307] should_fail_usercopy+0x1a/0x20 [ 56.820711][ T4307] _copy_to_user+0x20/0xa0 [ 56.820740][ T4307] simple_read_from_buffer+0xb5/0x130 [ 56.820775][ T4307] proc_fail_nth_read+0x10e/0x150 [ 56.820837][ T4307] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 56.820875][ T4307] vfs_read+0x1a8/0x770 [ 56.820907][ T4307] ? __set_next_task_fair+0x5b/0x150 [ 56.820941][ T4307] ? __rcu_read_unlock+0x4f/0x70 [ 56.820994][ T4307] ? __fget_files+0x184/0x1c0 [ 56.821020][ T4307] ? finish_task_switch+0xad/0x2b0 [ 56.821046][ T4307] ksys_read+0xda/0x1a0 [ 56.821081][ T4307] __x64_sys_read+0x40/0x50 [ 56.821115][ T4307] x64_sys_call+0x27c0/0x3000 [ 56.821184][ T4307] do_syscall_64+0xd2/0x200 [ 56.821203][ T4307] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 56.821254][ T4307] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 56.821361][ T4307] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.821390][ T4307] RIP: 0033:0x7fbc22b5e0dc [ 56.821409][ T4307] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 56.821427][ T4307] RSP: 002b:00007fbc215c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 56.821446][ T4307] RAX: ffffffffffffffda RBX: 00007fbc22db5fa0 RCX: 00007fbc22b5e0dc [ 56.821471][ T4307] RDX: 000000000000000f RSI: 00007fbc215c70a0 RDI: 0000000000000003 [ 56.821488][ T4307] RBP: 00007fbc215c7090 R08: 0000000000000000 R09: 0000000000000000 [ 56.821503][ T4307] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.821519][ T4307] R13: 00007fbc22db6038 R14: 00007fbc22db5fa0 R15: 00007ffd95cab718 [ 56.821540][ T4307] [ 57.178295][ T4314] xt_CT: You must specify a L4 protocol and not use inversions on it [ 57.212466][ T4317] validate_nla: 9 callbacks suppressed [ 57.212485][ T4317] netlink: 'syz.1.323': attribute type 39 has an invalid length. [ 57.274123][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 57.285808][ T4320] ip6gre1: entered allmulticast mode [ 57.465444][ T4324] netlink: 'syz.1.326': attribute type 2 has an invalid length. [ 57.548858][ T4326] netlink: 20 bytes leftover after parsing attributes in process `syz.0.327'. [ 57.577447][ T4328] serio: Serial port ptm0 [ 57.828311][ T4339] netlink: 20 bytes leftover after parsing attributes in process `syz.4.332'. [ 57.889643][ T4341] netlink: 'syz.3.333': attribute type 1 has an invalid length. [ 57.960277][ T4341] 8021q: adding VLAN 0 to HW filter on device bond2 [ 58.022331][ T4346] netlink: 'syz.4.336': attribute type 39 has an invalid length. [ 58.138235][ T4354] netlink: 'syz.3.335': attribute type 5 has an invalid length. [ 58.148554][ T4353] netlink: 'syz.4.339': attribute type 2 has an invalid length. [ 58.353808][ T4366] netlink: 40 bytes leftover after parsing attributes in process `syz.4.343'. [ 58.622381][ T4372] netlink: 24 bytes leftover after parsing attributes in process `syz.0.346'. [ 58.755623][ T4374] FAULT_INJECTION: forcing a failure. [ 58.755623][ T4374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 58.768869][ T4374] CPU: 0 UID: 0 PID: 4374 Comm: syz.2.348 Not tainted syzkaller #0 PREEMPT(voluntary) [ 58.768900][ T4374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 58.768917][ T4374] Call Trace: [ 58.768926][ T4374] [ 58.768935][ T4374] __dump_stack+0x1d/0x30 [ 58.768964][ T4374] dump_stack_lvl+0xe8/0x140 [ 58.769036][ T4374] dump_stack+0x15/0x1b [ 58.769053][ T4374] should_fail_ex+0x265/0x280 [ 58.769078][ T4374] should_fail+0xb/0x20 [ 58.769100][ T4374] should_fail_usercopy+0x1a/0x20 [ 58.769121][ T4374] _copy_to_user+0x20/0xa0 [ 58.769273][ T4374] simple_read_from_buffer+0xb5/0x130 [ 58.769301][ T4374] proc_fail_nth_read+0x10e/0x150 [ 58.769380][ T4374] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 58.769420][ T4374] vfs_read+0x1a8/0x770 [ 58.769451][ T4374] ? __set_next_task_fair+0x5b/0x150 [ 58.769493][ T4374] ? __rcu_read_unlock+0x4f/0x70 [ 58.769599][ T4374] ? __fget_files+0x184/0x1c0 [ 58.769634][ T4374] ? finish_task_switch+0xad/0x2b0 [ 58.769719][ T4374] ksys_read+0xda/0x1a0 [ 58.769787][ T4374] __x64_sys_read+0x40/0x50 [ 58.769818][ T4374] x64_sys_call+0x27c0/0x3000 [ 58.769849][ T4374] do_syscall_64+0xd2/0x200 [ 58.769936][ T4374] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 58.769966][ T4374] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 58.770071][ T4374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 58.770096][ T4374] RIP: 0033:0x7fa4e244e0dc [ 58.770157][ T4374] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 58.770179][ T4374] RSP: 002b:00007fa4e0eb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 58.770204][ T4374] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244e0dc [ 58.770221][ T4374] RDX: 000000000000000f RSI: 00007fa4e0eb70a0 RDI: 0000000000000003 [ 58.770238][ T4374] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 58.770264][ T4374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.770275][ T4374] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 58.770303][ T4374] [ 58.981247][ T29] kauditd_printk_skb: 19090 callbacks suppressed [ 58.981265][ T29] audit: type=1400 audit(1762208907.627:58614): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.992839][ T4378] netlink: 'syz.0.349': attribute type 39 has an invalid length. [ 59.008917][ T29] audit: type=1400 audit(1762208907.627:58615): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.034329][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 59.037810][ T29] audit: type=1400 audit(1762208907.627:58616): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.044310][ T3044] audit: audit_lost=8455 audit_rate_limit=0 audit_backlog_limit=64 [ 59.065483][ T29] audit: type=1400 audit(1762208907.627:58617): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.065508][ T29] audit: type=1400 audit(1762208907.627:58618): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.065536][ T29] audit: type=1400 audit(1762208907.627:58619): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.073448][ T3044] audit: backlog limit exceeded [ 59.094551][ T29] audit: type=1400 audit(1762208907.627:58620): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.132143][ T4376] xt_CT: You must specify a L4 protocol and not use inversions on it [ 59.204944][ T389] Bluetooth: hci0: Frame reassembly failed (-84) [ 59.246194][ T4366] Bluetooth: hci0: Frame reassembly failed (-90) [ 59.276152][ T4383] netlink: 'syz.0.352': attribute type 5 has an invalid length. [ 59.347023][ T4397] netlink: 20 bytes leftover after parsing attributes in process `syz.2.356'. [ 59.357729][ T4395] netlink: 'syz.0.353': attribute type 39 has an invalid length. [ 59.376100][ T4394] ip6gre2: entered allmulticast mode [ 59.448824][ T4401] netlink: 'syz.0.357': attribute type 2 has an invalid length. [ 60.827415][ T4446] netem: incorrect gi model size [ 60.832434][ T4446] netem: change failed [ 61.085618][ T4460] xt_CT: You must specify a L4 protocol and not use inversions on it [ 61.251403][ T4469] 8021q: adding VLAN 0 to HW filter on device bond4 [ 61.273449][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 61.526041][ T4488] xt_CT: You must specify a L4 protocol and not use inversions on it [ 61.551137][ T4491] netem: incorrect gi model size [ 61.556176][ T4491] netem: change failed [ 61.726474][ T4501] 8021q: adding VLAN 0 to HW filter on device bond1 [ 61.813938][ T4507] netlink: 40 bytes leftover after parsing attributes in process `syz.0.399'. [ 61.865005][ T4513] netlink: 20 bytes leftover after parsing attributes in process `syz.1.402'. [ 61.936196][ T4519] xt_CT: You must specify a L4 protocol and not use inversions on it [ 62.033542][ T4526] netem: incorrect gi model size [ 62.038569][ T4526] netem: change failed [ 62.211014][ T4507] Bluetooth: hci0: Frame reassembly failed (-90) [ 62.575214][ T4542] validate_nla: 13 callbacks suppressed [ 62.575234][ T4542] netlink: 'syz.3.413': attribute type 1 has an invalid length. [ 62.626641][ T4542] 8021q: adding VLAN 0 to HW filter on device bond3 [ 62.797200][ T4549] netlink: 'syz.3.414': attribute type 5 has an invalid length. [ 62.870652][ T4554] xt_CT: You must specify a L4 protocol and not use inversions on it [ 63.225583][ T4569] serio: Serial port ptm1 [ 63.417911][ T4572] netlink: 'syz.1.423': attribute type 2 has an invalid length. [ 63.429093][ T4575] netlink: 'syz.4.424': attribute type 1 has an invalid length. [ 63.459059][ T4575] 8021q: adding VLAN 0 to HW filter on device bond2 [ 63.565964][ T4581] netlink: 20 bytes leftover after parsing attributes in process `syz.3.426'. [ 63.700971][ T4591] serio: Serial port ptm2 [ 63.724725][ T4593] ip6gre3: entered allmulticast mode [ 63.758705][ T4596] xt_CT: You must specify a L4 protocol and not use inversions on it [ 63.982985][ T29] kauditd_printk_skb: 26965 callbacks suppressed [ 63.983003][ T29] audit: type=1400 audit(1762208912.837:83495): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 63.991376][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 64.017103][ T3044] audit: audit_lost=9153 audit_rate_limit=0 audit_backlog_limit=64 [ 64.025053][ T3044] audit: backlog limit exceeded [ 64.030200][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 64.036775][ T3044] audit: audit_lost=9154 audit_rate_limit=0 audit_backlog_limit=64 [ 64.044708][ T3044] audit: backlog limit exceeded [ 64.049882][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 64.056057][ T29] audit: type=1400 audit(1762208912.837:83496): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 64.056427][ T3044] audit: audit_lost=9155 audit_rate_limit=0 audit_backlog_limit=64 [ 64.129576][ T4604] netlink: 'syz.1.436': attribute type 1 has an invalid length. [ 64.144852][ T4604] 8021q: adding VLAN 0 to HW filter on device bond2 [ 64.190964][ T4601] netlink: 8 bytes leftover after parsing attributes in process `syz.2.435'. [ 64.232982][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 64.234316][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 64.360438][ T4616] netlink: 'syz.2.439': attribute type 2 has an invalid length. [ 64.561457][ T4628] serio: Serial port ptm0 [ 64.587102][ T4630] ip6gre4: entered allmulticast mode [ 64.792435][ T4635] bridge: RTM_NEWNEIGH with invalid state 0x10 [ 64.801442][ T4636] bridge: RTM_NEWNEIGH with invalid state 0x10 [ 64.829238][ T4638] netlink: 'syz.2.448': attribute type 39 has an invalid length. [ 64.999647][ T4653] serio: Serial port ptm1 [ 65.052815][ T4663] netlink: 40 bytes leftover after parsing attributes in process `syz.3.458'. [ 65.174829][ T4673] netlink: 'syz.1.462': attribute type 39 has an invalid length. [ 65.391895][ T37] Bluetooth: hci0: Frame reassembly failed (-84) [ 65.403904][ T4663] Bluetooth: hci0: Frame reassembly failed (-90) [ 65.632208][ T4697] netlink: 'syz.1.475': attribute type 39 has an invalid length. [ 65.784622][ T4705] serio: Serial port ptm0 [ 65.862384][ T4711] netlink: 4 bytes leftover after parsing attributes in process `syz.2.481'. [ 65.881313][ T4711] netlink: 4 bytes leftover after parsing attributes in process `syz.2.481'. [ 66.033858][ T4720] netlink: 'syz.2.485': attribute type 1 has an invalid length. [ 66.078950][ T4720] 8021q: adding VLAN 0 to HW filter on device bond5 [ 66.086313][ T4727] capability: warning: `syz.0.488' uses deprecated v2 capabilities in a way that may be insecure [ 66.218012][ T4735] netlink: 4 bytes leftover after parsing attributes in process `syz.0.491'. [ 66.309200][ T4738] serio: Serial port ptm1 [ 66.420840][ T4749] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=8 sclass=netlink_audit_socket pid=4749 comm=syz.0.497 [ 66.516467][ T4755] 8021q: adding VLAN 0 to HW filter on device bond2 [ 66.636681][ T4762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4762 comm=syz.4.504 [ 66.666249][ T4762] xt_hashlimit: overflow, try lower: 18446744073709551615/11 [ 66.765520][ T4768] netlink: 20 bytes leftover after parsing attributes in process `syz.4.506'. [ 67.007941][ T4781] 8021q: adding VLAN 0 to HW filter on device bond6 [ 67.082272][ T4788] netlink: 20 bytes leftover after parsing attributes in process `syz.0.515'. [ 67.129218][ T4794] FAULT_INJECTION: forcing a failure. [ 67.129218][ T4794] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 67.143796][ T4794] CPU: 0 UID: 0 PID: 4794 Comm: syz.4.517 Not tainted syzkaller #0 PREEMPT(voluntary) [ 67.143836][ T4794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 67.143854][ T4794] Call Trace: [ 67.143862][ T4794] [ 67.143872][ T4794] __dump_stack+0x1d/0x30 [ 67.143978][ T4794] dump_stack_lvl+0xe8/0x140 [ 67.144001][ T4794] dump_stack+0x15/0x1b [ 67.144024][ T4794] should_fail_ex+0x265/0x280 [ 67.144109][ T4794] should_fail_alloc_page+0xf2/0x100 [ 67.144145][ T4794] __alloc_frozen_pages_noprof+0xff/0x360 [ 67.144177][ T4794] alloc_pages_mpol+0xb3/0x260 [ 67.144265][ T4794] vma_alloc_folio_noprof+0x1aa/0x300 [ 67.144298][ T4794] handle_mm_fault+0xec2/0x2be0 [ 67.144332][ T4794] ? vma_start_read+0x141/0x1f0 [ 67.144398][ T4794] do_user_addr_fault+0x630/0x1080 [ 67.144422][ T4794] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 67.144449][ T4794] exc_page_fault+0x62/0xa0 [ 67.144503][ T4794] asm_exc_page_fault+0x26/0x30 [ 67.144531][ T4794] RIP: 0033:0x7f02fab2cbab [ 67.144550][ T4794] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 67.144570][ T4794] RSP: 002b:00007f02f95dce10 EFLAGS: 00010246 [ 67.144587][ T4794] RAX: 00007f02f95def30 RBX: 00007f02fada7640 RCX: 0000000000000000 [ 67.144605][ T4794] RDX: 00007f02f95def78 RSI: 00007f02fabdedf8 RDI: 00007f02f95dce30 [ 67.144621][ T4794] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 67.144686][ T4794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.144703][ T4794] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 67.144726][ T4794] [ 67.144752][ T4794] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 67.385581][ T4800] netlink: 20 bytes leftover after parsing attributes in process `syz.1.519'. [ 67.433009][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 67.436281][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 67.456968][ T4803] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.520'. [ 67.564862][ T4812] 8021q: adding VLAN 0 to HW filter on device bond3 [ 67.693139][ T4821] xt_CT: You must specify a L4 protocol and not use inversions on it [ 67.906410][ T4832] validate_nla: 6 callbacks suppressed [ 67.906424][ T4832] netlink: 'syz.4.533': attribute type 39 has an invalid length. [ 68.005929][ T4842] netlink: 'syz.3.537': attribute type 39 has an invalid length. [ 68.050467][ T4846] ip6gre4: entered allmulticast mode [ 68.129559][ T4856] FAULT_INJECTION: forcing a failure. [ 68.129559][ T4856] name failslab, interval 1, probability 0, space 0, times 0 [ 68.142347][ T4856] CPU: 1 UID: 0 PID: 4856 Comm: syz.1.545 Not tainted syzkaller #0 PREEMPT(voluntary) [ 68.142388][ T4856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 68.142432][ T4856] Call Trace: [ 68.142439][ T4856] [ 68.142448][ T4856] __dump_stack+0x1d/0x30 [ 68.142474][ T4856] dump_stack_lvl+0xe8/0x140 [ 68.142499][ T4856] dump_stack+0x15/0x1b [ 68.142588][ T4856] should_fail_ex+0x265/0x280 [ 68.142653][ T4856] should_failslab+0x8c/0xb0 [ 68.142689][ T4856] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 68.142845][ T4856] ? __d_alloc+0x3d/0x340 [ 68.142886][ T4856] ? trace_reschedule_exit+0xd/0xc0 [ 68.142957][ T4856] __d_alloc+0x3d/0x340 [ 68.142998][ T4856] d_alloc_pseudo+0x1e/0x80 [ 68.143104][ T4856] alloc_file_pseudo+0x71/0x160 [ 68.143129][ T4856] ? __se_sys_memfd_create+0x1cc/0x590 [ 68.143164][ T4856] __shmem_file_setup+0x1de/0x210 [ 68.143190][ T4856] shmem_file_setup+0x3b/0x50 [ 68.143254][ T4856] __se_sys_memfd_create+0x2c3/0x590 [ 68.143279][ T4856] __x64_sys_memfd_create+0x31/0x40 [ 68.143312][ T4856] x64_sys_call+0x2ac2/0x3000 [ 68.143366][ T4856] do_syscall_64+0xd2/0x200 [ 68.143389][ T4856] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 68.143429][ T4856] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 68.143493][ T4856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.143521][ T4856] RIP: 0033:0x7fdc4a19f6c9 [ 68.143581][ T4856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.143606][ T4856] RSP: 002b:00007fdc48bfee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 68.143631][ T4856] RAX: ffffffffffffffda RBX: 000000000000060a RCX: 00007fdc4a19f6c9 [ 68.143644][ T4856] RDX: 00007fdc48bfeef0 RSI: 0000000000000000 RDI: 00007fdc4a222960 [ 68.143656][ T4856] RBP: 0000200000000600 R08: 00007fdc48bfebb7 R09: 00007fdc48bfee40 [ 68.143668][ T4856] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000005c0 [ 68.143714][ T4856] R13: 00007fdc48bfeef0 R14: 00007fdc48bfeeb0 R15: 0000200000001340 [ 68.143732][ T4856] [ 68.365087][ T4858] netlink: 'syz.2.546': attribute type 4 has an invalid length. [ 68.449170][ T4858] netlink: 'syz.2.546': attribute type 4 has an invalid length. [ 68.465212][ T4870] capability: warning: `syz.1.552' uses 32-bit capabilities (legacy support in use) [ 68.600464][ T4878] netlink: 'syz.1.555': attribute type 39 has an invalid length. [ 68.662188][ T4882] netlink: 'syz.2.556': attribute type 39 has an invalid length. [ 68.842262][ T389] Bluetooth: hci0: Frame reassembly failed (-84) [ 68.860765][ T4862] Bluetooth: hci0: Frame reassembly failed (-90) [ 68.890418][ T4891] xt_CT: You must specify a L4 protocol and not use inversions on it [ 68.992935][ T29] kauditd_printk_skb: 33921 callbacks suppressed [ 68.993003][ T29] audit: type=1400 audit(1762208917.847:111214): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 69.030615][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.038271][ T3044] audit: audit_lost=11224 audit_rate_limit=0 audit_backlog_limit=64 [ 69.046454][ T3044] audit: backlog limit exceeded [ 69.051900][ T29] audit: type=1400 audit(1762208917.877:111215): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 69.074296][ T29] audit: type=1400 audit(1762208917.877:111216): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 69.093584][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.096753][ T29] audit: type=1400 audit(1762208917.877:111217): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 69.102174][ T3044] audit: audit_lost=11225 audit_rate_limit=0 audit_backlog_limit=64 [ 69.124655][ T29] audit: type=1400 audit(1762208917.877:111218): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 69.191781][ T4908] netlink: 'syz.2.567': attribute type 39 has an invalid length. [ 69.240039][ T4913] netlink: 'syz.2.568': attribute type 39 has an invalid length. [ 69.303092][ T4919] xt_CT: You must specify a L4 protocol and not use inversions on it [ 69.432486][ T4931] netlink: 'syz.3.575': attribute type 1 has an invalid length. [ 69.485884][ T4931] 8021q: adding VLAN 0 to HW filter on device bond4 [ 69.667889][ T4942] ip6gre5: entered allmulticast mode [ 69.957983][ T4956] xt_CT: You must specify a L4 protocol and not use inversions on it [ 70.481596][ T4977] netlink: 'syz.2.593': attribute type 39 has an invalid length. [ 70.650785][ T4985] xt_CT: You must specify a L4 protocol and not use inversions on it [ 70.873036][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 70.874326][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 70.974920][ T5000] serio: Serial port ptm0 [ 71.184582][ T5010] netem: incorrect gi model size [ 71.189624][ T5010] netem: change failed [ 71.320216][ T5013] 8021q: adding VLAN 0 to HW filter on device bond4 [ 71.490870][ T5023] ip6gre1: entered allmulticast mode [ 71.559272][ T5030] __nla_validate_parse: 3 callbacks suppressed [ 71.559290][ T5030] netlink: 4 bytes leftover after parsing attributes in process `syz.1.614'. [ 71.738150][ T5044] netem: incorrect gi model size [ 71.744220][ T5044] netem: change failed [ 71.877628][ T5048] 8021q: adding VLAN 0 to HW filter on device bond3 [ 71.919727][ T5053] netlink: 40 bytes leftover after parsing attributes in process `syz.3.621'. [ 72.109206][ T5066] ip6gre2: entered allmulticast mode [ 72.235784][ T5073] serio: Serial port ptm0 [ 72.392962][ T5053] Bluetooth: hci0: Frame reassembly failed (-90) [ 72.629263][ T5081] FAULT_INJECTION: forcing a failure. [ 72.629263][ T5081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 72.642488][ T5081] CPU: 1 UID: 0 PID: 5081 Comm: syz.1.634 Not tainted syzkaller #0 PREEMPT(voluntary) [ 72.642524][ T5081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 72.642541][ T5081] Call Trace: [ 72.642550][ T5081] [ 72.642584][ T5081] __dump_stack+0x1d/0x30 [ 72.642621][ T5081] dump_stack_lvl+0xe8/0x140 [ 72.642645][ T5081] dump_stack+0x15/0x1b [ 72.642670][ T5081] should_fail_ex+0x265/0x280 [ 72.642690][ T5081] should_fail+0xb/0x20 [ 72.642762][ T5081] should_fail_usercopy+0x1a/0x20 [ 72.642791][ T5081] _copy_from_user+0x1c/0xb0 [ 72.642827][ T5081] ___sys_recvmsg+0xaa/0x370 [ 72.642858][ T5081] ? 0xffffffff81000000 [ 72.642875][ T5081] ? __rcu_read_unlock+0x4f/0x70 [ 72.642950][ T5081] __x64_sys_recvmsg+0xd1/0x160 [ 72.642980][ T5081] x64_sys_call+0x2b46/0x3000 [ 72.643009][ T5081] do_syscall_64+0xd2/0x200 [ 72.643097][ T5081] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 72.643133][ T5081] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 72.643174][ T5081] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 72.643264][ T5081] RIP: 0033:0x7fdc4a19f6c9 [ 72.643277][ T5081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.643299][ T5081] RSP: 002b:00007fdc48bff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 72.643333][ T5081] RAX: ffffffffffffffda RBX: 00007fdc4a3f5fa0 RCX: 00007fdc4a19f6c9 [ 72.643348][ T5081] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000004 [ 72.643364][ T5081] RBP: 00007fdc48bff090 R08: 0000000000000000 R09: 0000000000000000 [ 72.643380][ T5081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.643396][ T5081] R13: 00007fdc4a3f6038 R14: 00007fdc4a3f5fa0 R15: 00007ffe10a4c638 [ 72.643426][ T5081] [ 73.081619][ T5092] validate_nla: 5 callbacks suppressed [ 73.081687][ T5092] netlink: 'syz.2.638': attribute type 39 has an invalid length. [ 73.134519][ T5096] xt_CT: You must specify a L4 protocol and not use inversions on it [ 73.170011][ T5100] netlink: 20 bytes leftover after parsing attributes in process `syz.2.642'. [ 73.217256][ T5101] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.641'. [ 73.272408][ T5103] netlink: 24 bytes leftover after parsing attributes in process `syz.4.643'. [ 73.311935][ T5108] ip6gre6: entered allmulticast mode [ 73.421855][ T5121] netlink: 'syz.2.650': attribute type 39 has an invalid length. [ 73.455554][ T5123] serio: Serial port ptm0 [ 73.478340][ T5126] xt_CT: You must specify a L4 protocol and not use inversions on it [ 73.608756][ T5133] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 73.653325][ T5138] netlink: 20 bytes leftover after parsing attributes in process `syz.1.656'. [ 73.737081][ T5143] FAULT_INJECTION: forcing a failure. [ 73.737081][ T5143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.751306][ T5143] CPU: 0 UID: 0 PID: 5143 Comm: syz.2.658 Not tainted syzkaller #0 PREEMPT(voluntary) [ 73.751341][ T5143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 73.751365][ T5143] Call Trace: [ 73.751374][ T5143] [ 73.751384][ T5143] __dump_stack+0x1d/0x30 [ 73.751409][ T5143] dump_stack_lvl+0xe8/0x140 [ 73.751428][ T5143] dump_stack+0x15/0x1b [ 73.751485][ T5143] should_fail_ex+0x265/0x280 [ 73.751511][ T5143] should_fail+0xb/0x20 [ 73.751533][ T5143] should_fail_usercopy+0x1a/0x20 [ 73.751590][ T5143] _copy_to_user+0x20/0xa0 [ 73.751624][ T5143] simple_read_from_buffer+0xb5/0x130 [ 73.751657][ T5143] proc_fail_nth_read+0x10e/0x150 [ 73.751736][ T5143] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 73.751769][ T5143] vfs_read+0x1a8/0x770 [ 73.751870][ T5143] ? __rcu_read_unlock+0x4f/0x70 [ 73.751905][ T5143] ? __fget_files+0x184/0x1c0 [ 73.751959][ T5143] ksys_read+0xda/0x1a0 [ 73.751993][ T5143] __x64_sys_read+0x40/0x50 [ 73.752029][ T5143] x64_sys_call+0x27c0/0x3000 [ 73.752052][ T5143] do_syscall_64+0xd2/0x200 [ 73.752152][ T5143] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 73.752187][ T5143] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 73.752225][ T5143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.752303][ T5143] RIP: 0033:0x7fa4e244e0dc [ 73.752365][ T5143] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 73.752387][ T5143] RSP: 002b:00007fa4e0eb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 73.752409][ T5143] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244e0dc [ 73.752424][ T5143] RDX: 000000000000000f RSI: 00007fa4e0eb70a0 RDI: 0000000000000003 [ 73.752469][ T5143] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 73.752485][ T5143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.752500][ T5143] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 73.752521][ T5143] [ 74.004000][ T29] kauditd_printk_skb: 32620 callbacks suppressed [ 74.004018][ T29] audit: type=1400 audit(1762208922.857:133797): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.012363][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.033038][ T29] audit: type=1400 audit(1762208922.857:133798): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.038442][ T3044] audit: audit_lost=14573 audit_rate_limit=0 audit_backlog_limit=64 [ 74.061313][ T29] audit: type=1400 audit(1762208922.857:133799): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.068437][ T3044] audit: backlog limit exceeded [ 74.091753][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.091769][ T3044] audit: audit_lost=14574 audit_rate_limit=0 audit_backlog_limit=64 [ 74.091787][ T3044] audit: backlog limit exceeded [ 74.091924][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.139307][ T5154] netlink: 'syz.2.662': attribute type 39 has an invalid length. [ 74.176683][ T5158] xt_CT: You must specify a L4 protocol and not use inversions on it [ 74.266573][ T5168] netlink: 20 bytes leftover after parsing attributes in process `syz.0.669'. [ 74.328376][ T5172] netlink: 4 bytes leftover after parsing attributes in process `syz.4.670'. [ 74.377408][ T5179] netlink: 'syz.2.673': attribute type 39 has an invalid length. [ 74.393002][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 74.534303][ T5185] xt_CT: You must specify a L4 protocol and not use inversions on it [ 74.697081][ T5199] serio: Serial port ptm0 [ 74.745511][ T5204] netlink: 'syz.4.684': attribute type 39 has an invalid length. [ 74.772802][ T5206] ip6gre7: entered allmulticast mode [ 74.786372][ T5209] netlink: 20 bytes leftover after parsing attributes in process `syz.4.686'. [ 74.881139][ T5212] xt_CT: You must specify a L4 protocol and not use inversions on it [ 75.096177][ T5225] netlink: 4 bytes leftover after parsing attributes in process `syz.1.693'. [ 75.191742][ T5234] FAULT_INJECTION: forcing a failure. [ 75.191742][ T5234] name failslab, interval 1, probability 0, space 0, times 0 [ 75.204520][ T5234] CPU: 1 UID: 0 PID: 5234 Comm: syz.1.693 Not tainted syzkaller #0 PREEMPT(voluntary) [ 75.204556][ T5234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.204571][ T5234] Call Trace: [ 75.204578][ T5234] [ 75.204586][ T5234] __dump_stack+0x1d/0x30 [ 75.204609][ T5234] dump_stack_lvl+0xe8/0x140 [ 75.204629][ T5234] dump_stack+0x15/0x1b [ 75.204683][ T5234] should_fail_ex+0x265/0x280 [ 75.204711][ T5234] should_failslab+0x8c/0xb0 [ 75.204777][ T5234] kmem_cache_alloc_noprof+0x50/0x480 [ 75.204857][ T5234] ? __anon_vma_prepare+0x70/0x2f0 [ 75.204883][ T5234] __anon_vma_prepare+0x70/0x2f0 [ 75.204908][ T5234] do_wp_page+0x18ee/0x2510 [ 75.204937][ T5234] ? __rcu_read_lock+0x37/0x50 [ 75.204977][ T5234] ? css_rstat_updated+0xb7/0x240 [ 75.205001][ T5234] ? __rcu_read_lock+0x37/0x50 [ 75.205035][ T5234] handle_mm_fault+0x77d/0x2be0 [ 75.205105][ T5234] ? vma_start_read+0x141/0x1f0 [ 75.205148][ T5234] do_user_addr_fault+0x630/0x1080 [ 75.205249][ T5234] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 75.205292][ T5234] exc_page_fault+0x62/0xa0 [ 75.205392][ T5234] asm_exc_page_fault+0x26/0x30 [ 75.205418][ T5234] RIP: 0033:0x7fdc4a060933 [ 75.205436][ T5234] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 75.205501][ T5234] RSP: 002b:00007fdc48bdd4a0 EFLAGS: 00010202 [ 75.205595][ T5234] RAX: 0000000000000400 RBX: 00007fdc48bdd540 RCX: 00007fdc407be000 [ 75.205612][ T5234] RDX: 00007fdc48bdd6e0 RSI: 0000000000000029 RDI: 00007fdc48bdd5e0 [ 75.205627][ T5234] RBP: 00000000000000f9 R08: 0000000000000008 R09: 00000000000000a3 [ 75.205715][ T5234] R10: 00000000000000be R11: 00007fdc48bdd540 R12: 0000000000000001 [ 75.205731][ T5234] R13: 00007fdc4a23dc40 R14: 0000000000000020 R15: 00007fdc48bdd5e0 [ 75.205755][ T5234] [ 75.205767][ T5234] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 75.366443][ T5235] netlink: 'syz.4.697': attribute type 39 has an invalid length. [ 75.469312][ T5237] ip6gre5: entered allmulticast mode [ 75.563497][ T5247] FAULT_INJECTION: forcing a failure. [ 75.563497][ T5247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.576684][ T5247] CPU: 1 UID: 0 PID: 5247 Comm: syz.4.703 Not tainted syzkaller #0 PREEMPT(voluntary) [ 75.576729][ T5247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.576741][ T5247] Call Trace: [ 75.576748][ T5247] [ 75.576755][ T5247] __dump_stack+0x1d/0x30 [ 75.576778][ T5247] dump_stack_lvl+0xe8/0x140 [ 75.576798][ T5247] dump_stack+0x15/0x1b [ 75.576820][ T5247] should_fail_ex+0x265/0x280 [ 75.576877][ T5247] should_fail+0xb/0x20 [ 75.576893][ T5247] should_fail_usercopy+0x1a/0x20 [ 75.576959][ T5247] _copy_to_user+0x20/0xa0 [ 75.576991][ T5247] rng_dev_read+0x3ef/0x740 [ 75.577026][ T5247] ? __pfx_rng_dev_read+0x10/0x10 [ 75.577058][ T5247] vfs_readv+0x3fb/0x690 [ 75.577124][ T5247] __x64_sys_preadv+0xfd/0x1c0 [ 75.577160][ T5247] x64_sys_call+0x282e/0x3000 [ 75.577260][ T5247] do_syscall_64+0xd2/0x200 [ 75.577286][ T5247] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 75.577324][ T5247] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 75.577443][ T5247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.577466][ T5247] RIP: 0033:0x7f02fab7f6c9 [ 75.577485][ T5247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.577502][ T5247] RSP: 002b:00007f02f95df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 75.577588][ T5247] RAX: ffffffffffffffda RBX: 00007f02fadd5fa0 RCX: 00007f02fab7f6c9 [ 75.577605][ T5247] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 75.577621][ T5247] RBP: 00007f02f95df090 R08: 0000000000000000 R09: 0000000000000000 [ 75.577636][ T5247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.577648][ T5247] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 75.577722][ T5247] [ 75.819614][ T5252] FAULT_INJECTION: forcing a failure. [ 75.819614][ T5252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.833041][ T5252] CPU: 0 UID: 0 PID: 5252 Comm: syz.0.705 Not tainted syzkaller #0 PREEMPT(voluntary) [ 75.833086][ T5252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.833098][ T5252] Call Trace: [ 75.833108][ T5252] [ 75.833117][ T5252] __dump_stack+0x1d/0x30 [ 75.833152][ T5252] dump_stack_lvl+0xe8/0x140 [ 75.833178][ T5252] dump_stack+0x15/0x1b [ 75.833199][ T5252] should_fail_ex+0x265/0x280 [ 75.833227][ T5252] should_fail+0xb/0x20 [ 75.833266][ T5252] should_fail_usercopy+0x1a/0x20 [ 75.833298][ T5252] _copy_from_user+0x1c/0xb0 [ 75.833442][ T5252] get_timespec64+0x4c/0x100 [ 75.833479][ T5252] __se_sys_ppoll+0x75/0x200 [ 75.833516][ T5252] ? fput+0x8f/0xc0 [ 75.833542][ T5252] __x64_sys_ppoll+0x67/0x80 [ 75.833607][ T5252] x64_sys_call+0x1d52/0x3000 [ 75.833639][ T5252] do_syscall_64+0xd2/0x200 [ 75.833666][ T5252] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 75.833708][ T5252] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 75.833809][ T5252] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.833840][ T5252] RIP: 0033:0x7fb09d84f6c9 [ 75.833861][ T5252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.833887][ T5252] RSP: 002b:00007fb09c2af038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 75.833984][ T5252] RAX: ffffffffffffffda RBX: 00007fb09daa5fa0 RCX: 00007fb09d84f6c9 [ 75.834002][ T5252] RDX: 0000200000000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 75.834020][ T5252] RBP: 00007fb09c2af090 R08: 0000000000000000 R09: 0000000000000000 [ 75.834037][ T5252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.834106][ T5252] R13: 00007fb09daa6038 R14: 00007fb09daa5fa0 R15: 00007fffb6d94db8 [ 75.834137][ T5252] [ 76.071716][ T5267] netlink: 'syz.2.710': attribute type 39 has an invalid length. [ 76.179121][ T5272] ip6gre8: entered allmulticast mode [ 76.388834][ T5290] netlink: 'syz.3.722': attribute type 39 has an invalid length. [ 76.684934][ T5301] binfmt_misc: register: failed to install interpreter file ./file0 [ 76.745608][ T5304] ip6gre2: entered allmulticast mode [ 76.878699][ T5316] netlink: 'syz.1.734': attribute type 39 has an invalid length. [ 77.105919][ T5330] __nla_validate_parse: 2 callbacks suppressed [ 77.106003][ T5330] netlink: 20 bytes leftover after parsing attributes in process `syz.2.739'. [ 77.107630][ T5331] netlink: 20 bytes leftover after parsing attributes in process `syz.0.738'. [ 77.250286][ T5340] ip6gre3: entered allmulticast mode [ 77.308256][ T5342] netlink: 'syz.1.745': attribute type 39 has an invalid length. [ 77.577534][ T5330] Bluetooth: hci0: Frame reassembly failed (-90) [ 77.584306][ T407] Bluetooth: hci0: Frame reassembly failed (-84) [ 77.947977][ T5372] ip6gre4: entered allmulticast mode [ 78.199859][ T5389] FAULT_INJECTION: forcing a failure. [ 78.199859][ T5389] name failslab, interval 1, probability 0, space 0, times 0 [ 78.213657][ T5389] CPU: 0 UID: 0 PID: 5389 Comm: syz.4.764 Not tainted syzkaller #0 PREEMPT(voluntary) [ 78.213720][ T5389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 78.213735][ T5389] Call Trace: [ 78.213742][ T5389] [ 78.213749][ T5389] __dump_stack+0x1d/0x30 [ 78.213773][ T5389] dump_stack_lvl+0xe8/0x140 [ 78.213793][ T5389] dump_stack+0x15/0x1b [ 78.213820][ T5389] should_fail_ex+0x265/0x280 [ 78.213845][ T5389] ? __se_sys_mount+0xef/0x2e0 [ 78.213873][ T5389] should_failslab+0x8c/0xb0 [ 78.213903][ T5389] __kmalloc_cache_noprof+0x4c/0x4a0 [ 78.214025][ T5389] ? memdup_user+0x99/0xd0 [ 78.214057][ T5389] __se_sys_mount+0xef/0x2e0 [ 78.214084][ T5389] ? fput+0x8f/0xc0 [ 78.214107][ T5389] ? ksys_write+0x192/0x1a0 [ 78.214141][ T5389] __x64_sys_mount+0x67/0x80 [ 78.214233][ T5389] x64_sys_call+0x2b51/0x3000 [ 78.214258][ T5389] do_syscall_64+0xd2/0x200 [ 78.214281][ T5389] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 78.214316][ T5389] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 78.214359][ T5389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.214380][ T5389] RIP: 0033:0x7f02fab7f6c9 [ 78.214394][ T5389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.214438][ T5389] RSP: 002b:00007f02f95df038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.214462][ T5389] RAX: ffffffffffffffda RBX: 00007f02fadd5fa0 RCX: 00007f02fab7f6c9 [ 78.214478][ T5389] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 78.214495][ T5389] RBP: 00007f02f95df090 R08: 0000200000000300 R09: 0000000000000000 [ 78.214511][ T5389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.214527][ T5389] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 78.214545][ T5389] [ 78.768640][ T5401] validate_nla: 1 callbacks suppressed [ 78.768666][ T5401] netlink: 'syz.1.769': attribute type 39 has an invalid length. [ 78.798272][ T5403] netlink: 4 bytes leftover after parsing attributes in process `syz.3.770'. [ 78.822169][ T5405] ip6gre5: entered allmulticast mode [ 78.843215][ T5403] FAULT_INJECTION: forcing a failure. [ 78.843215][ T5403] name failslab, interval 1, probability 0, space 0, times 0 [ 78.856039][ T5403] CPU: 1 UID: 0 PID: 5403 Comm: syz.3.770 Not tainted syzkaller #0 PREEMPT(voluntary) [ 78.856067][ T5403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 78.856109][ T5403] Call Trace: [ 78.856116][ T5403] [ 78.856124][ T5403] __dump_stack+0x1d/0x30 [ 78.856152][ T5403] dump_stack_lvl+0xe8/0x140 [ 78.856179][ T5403] dump_stack+0x15/0x1b [ 78.856201][ T5403] should_fail_ex+0x265/0x280 [ 78.856240][ T5403] should_failslab+0x8c/0xb0 [ 78.856278][ T5403] kmem_cache_alloc_noprof+0x50/0x480 [ 78.856359][ T5403] ? alloc_empty_file+0x76/0x200 [ 78.856426][ T5403] alloc_empty_file+0x76/0x200 [ 78.856504][ T5403] alloc_file_pseudo+0xc6/0x160 [ 78.856531][ T5403] __shmem_file_setup+0x1de/0x210 [ 78.856555][ T5403] shmem_file_setup+0x3b/0x50 [ 78.856578][ T5403] __se_sys_memfd_create+0x2c3/0x590 [ 78.856603][ T5403] __x64_sys_memfd_create+0x31/0x40 [ 78.856687][ T5403] x64_sys_call+0x2ac2/0x3000 [ 78.856784][ T5403] do_syscall_64+0xd2/0x200 [ 78.856809][ T5403] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 78.856853][ T5403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.856944][ T5403] RIP: 0033:0x7fbc22b5f6c9 [ 78.857034][ T5403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.857095][ T5403] RSP: 002b:00007fbc215c6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 78.857121][ T5403] RAX: ffffffffffffffda RBX: 000000000000060a RCX: 00007fbc22b5f6c9 [ 78.857137][ T5403] RDX: 00007fbc215c6ef0 RSI: 0000000000000000 RDI: 00007fbc22be2960 [ 78.857160][ T5403] RBP: 0000200000000600 R08: 00007fbc215c6bb7 R09: 00007fbc215c6e40 [ 78.857176][ T5403] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000005c0 [ 78.857193][ T5403] R13: 00007fbc215c6ef0 R14: 00007fbc215c6eb0 R15: 0000200000001340 [ 78.857216][ T5403] [ 79.014233][ T29] kauditd_printk_skb: 25313 callbacks suppressed [ 79.014253][ T29] audit: type=1326 audit(1762208927.867:154059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=294 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014289][ T29] audit: type=1326 audit(1762208927.867:154060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014323][ T29] audit: type=1326 audit(1762208927.867:154061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=254 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014373][ T29] audit: type=1326 audit(1762208927.867:154062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014435][ T29] audit: type=1326 audit(1762208927.867:154063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014495][ T29] audit: type=1326 audit(1762208927.867:154064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014529][ T29] audit: type=1326 audit(1762208927.867:154065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014589][ T29] audit: type=1326 audit(1762208927.867:154066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014622][ T29] audit: type=1326 audit(1762208927.867:154067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.014656][ T29] audit: type=1326 audit(1762208927.867:154068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5421 comm="syz.4.777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f02fab7f6c9 code=0x7ffc0000 [ 79.045984][ T5420] netlink: 'syz.3.775': attribute type 5 has an invalid length. [ 79.127312][ T5430] netlink: 'syz.1.781': attribute type 39 has an invalid length. [ 79.443197][ T52] Bluetooth: hci1: Frame reassembly failed (-84) [ 79.481682][ T5442] ip6gre6: entered allmulticast mode [ 79.592948][ T3555] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 79.594156][ T5437] Bluetooth: hci0: command 0x1003 tx timeout [ 79.734393][ T5457] netlink: 'syz.3.792': attribute type 39 has an invalid length. [ 79.879725][ T5465] netlink: 'syz.4.795': attribute type 5 has an invalid length. [ 79.963398][ T5473] ip6gre5: entered allmulticast mode [ 80.387699][ T5493] netlink: 'syz.0.807': attribute type 5 has an invalid length. [ 80.461974][ T5496] netlink: 'syz.0.808': attribute type 39 has an invalid length. [ 80.687513][ T5502] ip6gre7: entered allmulticast mode [ 80.795842][ T5506] netlink: 16 bytes leftover after parsing attributes in process `syz.0.813'. [ 80.807832][ T5510] netlink: 20 bytes leftover after parsing attributes in process `syz.3.815'. [ 80.948674][ T5519] netlink: 'syz.4.819': attribute type 39 has an invalid length. [ 80.963749][ T5514] netlink: 'syz.2.818': attribute type 5 has an invalid length. [ 81.036899][ T5529] ip6gre9: entered allmulticast mode [ 81.436857][ T5535] FAULT_INJECTION: forcing a failure. [ 81.436857][ T5535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.450091][ T5535] CPU: 1 UID: 0 PID: 5535 Comm: syz.2.826 Not tainted syzkaller #0 PREEMPT(voluntary) [ 81.450126][ T5535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 81.450218][ T5535] Call Trace: [ 81.450228][ T5535] [ 81.450236][ T5535] __dump_stack+0x1d/0x30 [ 81.450283][ T5535] dump_stack_lvl+0xe8/0x140 [ 81.450340][ T5535] dump_stack+0x15/0x1b [ 81.450366][ T5535] should_fail_ex+0x265/0x280 [ 81.450386][ T5535] should_fail+0xb/0x20 [ 81.450405][ T5535] should_fail_usercopy+0x1a/0x20 [ 81.450433][ T5535] _copy_from_user+0x1c/0xb0 [ 81.450467][ T5535] get_timespec64+0x4c/0x100 [ 81.450501][ T5535] __se_sys_ppoll+0x75/0x200 [ 81.450592][ T5535] ? fput+0x8f/0xc0 [ 81.450616][ T5535] __x64_sys_ppoll+0x67/0x80 [ 81.450650][ T5535] x64_sys_call+0x1d52/0x3000 [ 81.450681][ T5535] do_syscall_64+0xd2/0x200 [ 81.450737][ T5535] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 81.450765][ T5535] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 81.450861][ T5535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.451001][ T5535] RIP: 0033:0x7fa4e244f6c9 [ 81.451020][ T5535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.451038][ T5535] RSP: 002b:00007fa4e0eb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 81.451056][ T5535] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244f6c9 [ 81.451070][ T5535] RDX: 0000200000000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 81.451108][ T5535] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 81.451124][ T5535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.451140][ T5535] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 81.451158][ T5535] [ 81.524142][ T3555] Bluetooth: hci1: command 0x1003 tx timeout [ 81.529155][ T44] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 81.741433][ T5551] netlink: 20 bytes leftover after parsing attributes in process `syz.0.831'. [ 81.880383][ T5553] netlink: 'syz.3.832': attribute type 5 has an invalid length. [ 82.011269][ T5567] ip6gre8: entered allmulticast mode [ 82.077449][ T5571] FAULT_INJECTION: forcing a failure. [ 82.077449][ T5571] name failslab, interval 1, probability 0, space 0, times 0 [ 82.090375][ T5571] CPU: 1 UID: 0 PID: 5571 Comm: syz.0.840 Not tainted syzkaller #0 PREEMPT(voluntary) [ 82.090488][ T5571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 82.090505][ T5571] Call Trace: [ 82.090512][ T5571] [ 82.090522][ T5571] __dump_stack+0x1d/0x30 [ 82.090551][ T5571] dump_stack_lvl+0xe8/0x140 [ 82.090629][ T5571] dump_stack+0x15/0x1b [ 82.090651][ T5571] should_fail_ex+0x265/0x280 [ 82.090672][ T5571] should_failslab+0x8c/0xb0 [ 82.090705][ T5571] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 82.090747][ T5571] ? __alloc_skb+0x101/0x320 [ 82.090850][ T5571] ? __rtnl_unlock+0x95/0xb0 [ 82.090881][ T5571] __alloc_skb+0x101/0x320 [ 82.091039][ T5571] netlink_ack+0xfd/0x500 [ 82.091085][ T5571] netlink_rcv_skb+0x192/0x220 [ 82.091131][ T5571] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 82.091191][ T5571] rtnetlink_rcv+0x1c/0x30 [ 82.091220][ T5571] netlink_unicast+0x5c0/0x690 [ 82.091260][ T5571] netlink_sendmsg+0x58b/0x6b0 [ 82.091287][ T5571] ? __pfx_netlink_sendmsg+0x10/0x10 [ 82.091386][ T5571] __sock_sendmsg+0x145/0x180 [ 82.091463][ T5571] ____sys_sendmsg+0x31e/0x4e0 [ 82.091499][ T5571] ___sys_sendmsg+0x17b/0x1d0 [ 82.091537][ T5571] __x64_sys_sendmsg+0xd4/0x160 [ 82.091602][ T5571] x64_sys_call+0x191e/0x3000 [ 82.091657][ T5571] do_syscall_64+0xd2/0x200 [ 82.091681][ T5571] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 82.091718][ T5571] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 82.091763][ T5571] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.091790][ T5571] RIP: 0033:0x7fb09d84f6c9 [ 82.091805][ T5571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.091822][ T5571] RSP: 002b:00007fb09c2af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 82.091907][ T5571] RAX: ffffffffffffffda RBX: 00007fb09daa5fa0 RCX: 00007fb09d84f6c9 [ 82.091920][ T5571] RDX: 00000000000000c0 RSI: 00002000000007c0 RDI: 0000000000000003 [ 82.091936][ T5571] RBP: 00007fb09c2af090 R08: 0000000000000000 R09: 0000000000000000 [ 82.091953][ T5571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.091969][ T5571] R13: 00007fb09daa6038 R14: 00007fb09daa5fa0 R15: 00007fffb6d94db8 [ 82.091992][ T5571] [ 82.398652][ T5581] netlink: 20 bytes leftover after parsing attributes in process `syz.2.846'. [ 82.501954][ T5592] FAULT_INJECTION: forcing a failure. [ 82.501954][ T5592] name failslab, interval 1, probability 0, space 0, times 0 [ 82.514763][ T5592] CPU: 1 UID: 0 PID: 5592 Comm: syz.4.849 Not tainted syzkaller #0 PREEMPT(voluntary) [ 82.514846][ T5592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 82.514858][ T5592] Call Trace: [ 82.514863][ T5592] [ 82.514869][ T5592] __dump_stack+0x1d/0x30 [ 82.514895][ T5592] dump_stack_lvl+0xe8/0x140 [ 82.514980][ T5592] dump_stack+0x15/0x1b [ 82.514997][ T5592] should_fail_ex+0x265/0x280 [ 82.515034][ T5592] should_failslab+0x8c/0xb0 [ 82.515070][ T5592] kmem_cache_alloc_noprof+0x50/0x480 [ 82.515156][ T5592] ? __anon_vma_prepare+0x70/0x2f0 [ 82.515219][ T5592] __anon_vma_prepare+0x70/0x2f0 [ 82.515244][ T5592] handle_mm_fault+0x1d1b/0x2be0 [ 82.515339][ T5592] ? vma_start_read+0x141/0x1f0 [ 82.515373][ T5592] do_user_addr_fault+0x630/0x1080 [ 82.515397][ T5592] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 82.515432][ T5592] exc_page_fault+0x62/0xa0 [ 82.515551][ T5592] asm_exc_page_fault+0x26/0x30 [ 82.515570][ T5592] RIP: 0033:0x7f02faa40933 [ 82.515585][ T5592] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 82.515607][ T5592] RSP: 002b:00007f02f95de4a0 EFLAGS: 00010206 [ 82.515627][ T5592] RAX: 0000000000000000 RBX: 00007f02f95de540 RCX: 00007f02f11bf000 [ 82.515688][ T5592] RDX: 00007f02f95de6e0 RSI: 000000000000000b RDI: 00007f02f95de5e0 [ 82.515732][ T5592] RBP: 000000000000013c R08: 000000000000000a R09: 0000000000000395 [ 82.515747][ T5592] R10: 00000000000003be R11: 00007f02f95de540 R12: 00007f02f95de540 [ 82.515762][ T5592] R13: 00007f02fac1dc40 R14: 0000000000000060 R15: 00007f02f95de5e0 [ 82.515783][ T5592] [ 82.515792][ T5592] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 82.612111][ T5596] serio: Serial port ptm0 [ 82.791147][ T5602] ip6gre3: entered allmulticast mode [ 82.846561][ T5609] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=5609 comm=syz.2.856 [ 83.078067][ T5624] FAULT_INJECTION: forcing a failure. [ 83.078067][ T5624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.091298][ T5624] CPU: 1 UID: 0 PID: 5624 Comm: syz.4.859 Not tainted syzkaller #0 PREEMPT(voluntary) [ 83.091325][ T5624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 83.091337][ T5624] Call Trace: [ 83.091344][ T5624] [ 83.091350][ T5624] __dump_stack+0x1d/0x30 [ 83.091372][ T5624] dump_stack_lvl+0xe8/0x140 [ 83.091502][ T5624] dump_stack+0x15/0x1b [ 83.091520][ T5624] should_fail_ex+0x265/0x280 [ 83.091545][ T5624] should_fail+0xb/0x20 [ 83.091566][ T5624] should_fail_usercopy+0x1a/0x20 [ 83.091633][ T5624] _copy_from_iter+0xd2/0xe80 [ 83.091738][ T5624] ? __alloc_frozen_pages_noprof+0x188/0x360 [ 83.091763][ T5624] copy_page_from_iter+0x178/0x2a0 [ 83.091793][ T5624] ? anon_pipe_write+0x71/0xb30 [ 83.091899][ T5624] anon_pipe_write+0x541/0xb30 [ 83.091935][ T5624] ? anon_pipe_write+0x71/0xb30 [ 83.091978][ T5624] ? __pfx_anon_pipe_write+0x10/0x10 [ 83.092031][ T5624] vfs_write+0x52a/0x960 [ 83.092059][ T5624] ksys_write+0xda/0x1a0 [ 83.092100][ T5624] __x64_sys_write+0x40/0x50 [ 83.092129][ T5624] x64_sys_call+0x2802/0x3000 [ 83.092151][ T5624] do_syscall_64+0xd2/0x200 [ 83.092168][ T5624] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 83.092203][ T5624] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 83.092244][ T5624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.092272][ T5624] RIP: 0033:0x7f02fab7f6c9 [ 83.092288][ T5624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.092336][ T5624] RSP: 002b:00007f02f95be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 83.092360][ T5624] RAX: ffffffffffffffda RBX: 00007f02fadd6090 RCX: 00007f02fab7f6c9 [ 83.092376][ T5624] RDX: 0000000000011000 RSI: 0000200000000040 RDI: 0000000000000007 [ 83.092392][ T5624] RBP: 00007f02f95be090 R08: 0000000000000000 R09: 0000000000000000 [ 83.092461][ T5624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.092473][ T5624] R13: 00007f02fadd6128 R14: 00007f02fadd6090 R15: 00007fff65530208 [ 83.092490][ T5624] [ 83.349828][ T5630] Cannot find add_set index 0 as target [ 83.447456][ T5630] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.454706][ T5630] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.512467][ T5630] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.525895][ T5630] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.529437][ T5637] netlink: 20 bytes leftover after parsing attributes in process `syz.0.865'. [ 83.617913][ T5630] batman_adv: batadv0: Interface deactivated: vxlan0 [ 83.661064][ T5639] ip6gre6: entered allmulticast mode [ 83.670935][ T37] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 83.681117][ T37] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.692422][ T37] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 83.702586][ T37] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.731582][ T37] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 83.741899][ T37] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.752689][ T37] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 83.762949][ T37] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.896930][ T5651] validate_nla: 5 callbacks suppressed [ 83.896943][ T5651] netlink: 'syz.0.871': attribute type 5 has an invalid length. [ 84.009938][ T5662] serio: Serial port ptm0 [ 84.023009][ T29] kauditd_printk_skb: 27309 callbacks suppressed [ 84.023033][ T29] audit: type=1400 audit(1762208932.867:174100): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.028279][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.029455][ T29] audit: type=1400 audit(1762208932.867:174101): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.050613][ T3044] audit: audit_lost=18686 audit_rate_limit=0 audit_backlog_limit=64 [ 84.050632][ T3044] audit: backlog limit exceeded [ 84.050881][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.057266][ T29] audit: type=1400 audit(1762208932.867:174102): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.057367][ T29] audit: type=1400 audit(1762208932.867:174103): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.057397][ T29] audit: type=1400 audit(1762208932.867:174104): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.057429][ T29] audit: type=1400 audit(1762208932.867:174105): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.248766][ T5670] netlink: 20 bytes leftover after parsing attributes in process `syz.2.878'. [ 84.283112][ T5672] netlink: 'syz.3.879': attribute type 21 has an invalid length. [ 84.425066][ T5668] FAULT_INJECTION: forcing a failure. [ 84.425066][ T5668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.438243][ T5668] CPU: 1 UID: 0 PID: 5668 Comm: syz.0.876 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.438310][ T5668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 84.438376][ T5668] Call Trace: [ 84.438384][ T5668] [ 84.438394][ T5668] __dump_stack+0x1d/0x30 [ 84.438424][ T5668] dump_stack_lvl+0xe8/0x140 [ 84.438451][ T5668] dump_stack+0x15/0x1b [ 84.438473][ T5668] should_fail_ex+0x265/0x280 [ 84.438499][ T5668] should_fail+0xb/0x20 [ 84.438579][ T5668] should_fail_usercopy+0x1a/0x20 [ 84.438606][ T5668] _copy_to_user+0x20/0xa0 [ 84.438685][ T5668] simple_read_from_buffer+0xb5/0x130 [ 84.438719][ T5668] proc_fail_nth_read+0x10e/0x150 [ 84.438877][ T5668] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 84.438918][ T5668] vfs_read+0x1a8/0x770 [ 84.438972][ T5668] ? __rcu_read_unlock+0x4f/0x70 [ 84.438998][ T5668] ? __fget_files+0x184/0x1c0 [ 84.439027][ T5668] ksys_read+0xda/0x1a0 [ 84.439083][ T5668] __x64_sys_read+0x40/0x50 [ 84.439115][ T5668] x64_sys_call+0x27c0/0x3000 [ 84.439281][ T5668] do_syscall_64+0xd2/0x200 [ 84.439306][ T5668] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 84.439360][ T5668] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 84.439476][ T5668] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.439507][ T5668] RIP: 0033:0x7fb09d84e0dc [ 84.439523][ T5668] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 84.439606][ T5668] RSP: 002b:00007fb09c2af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 84.439629][ T5668] RAX: ffffffffffffffda RBX: 00007fb09daa5fa0 RCX: 00007fb09d84e0dc [ 84.439646][ T5668] RDX: 000000000000000f RSI: 00007fb09c2af0a0 RDI: 0000000000000003 [ 84.439659][ T5668] RBP: 00007fb09c2af090 R08: 0000000000000000 R09: 0000000000000000 [ 84.439670][ T5668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 84.439682][ T5668] R13: 00007fb09daa6038 R14: 00007fb09daa5fa0 R15: 00007fffb6d94db8 [ 84.439701][ T5668] [ 84.729973][ T5682] FAULT_INJECTION: forcing a failure. [ 84.729973][ T5682] name failslab, interval 1, probability 0, space 0, times 0 [ 84.743776][ T5682] CPU: 0 UID: 0 PID: 5682 Comm: syz.3.882 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.743818][ T5682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 84.743831][ T5682] Call Trace: [ 84.743837][ T5682] [ 84.743844][ T5682] __dump_stack+0x1d/0x30 [ 84.743872][ T5682] dump_stack_lvl+0xe8/0x140 [ 84.743895][ T5682] dump_stack+0x15/0x1b [ 84.743914][ T5682] should_fail_ex+0x265/0x280 [ 84.743933][ T5682] ? rtnl_newlink+0x5c/0x12d0 [ 84.743955][ T5682] should_failslab+0x8c/0xb0 [ 84.743993][ T5682] __kmalloc_cache_noprof+0x4c/0x4a0 [ 84.744081][ T5682] rtnl_newlink+0x5c/0x12d0 [ 84.744115][ T5682] ? xas_load+0x413/0x430 [ 84.744157][ T5682] ? xas_load+0x413/0x430 [ 84.744272][ T5682] ? __rcu_read_unlock+0x4f/0x70 [ 84.744299][ T5682] ? __rcu_read_unlock+0x4f/0x70 [ 84.744330][ T5682] ? avc_has_perm_noaudit+0x1b1/0x200 [ 84.744358][ T5682] ? cred_has_capability+0x210/0x280 [ 84.744475][ T5682] ? selinux_capable+0x31/0x40 [ 84.744502][ T5682] ? security_capable+0x83/0x90 [ 84.744539][ T5682] ? ns_capable+0x7d/0xb0 [ 84.744570][ T5682] ? __pfx_rtnl_newlink+0x10/0x10 [ 84.744609][ T5682] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 84.744644][ T5682] netlink_rcv_skb+0x123/0x220 [ 84.744697][ T5682] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 84.744735][ T5682] rtnetlink_rcv+0x1c/0x30 [ 84.744833][ T5682] netlink_unicast+0x5c0/0x690 [ 84.744940][ T5682] netlink_sendmsg+0x58b/0x6b0 [ 84.744961][ T5682] ? __pfx_netlink_sendmsg+0x10/0x10 [ 84.745092][ T5682] __sock_sendmsg+0x145/0x180 [ 84.745125][ T5682] ____sys_sendmsg+0x31e/0x4e0 [ 84.745214][ T5682] ___sys_sendmsg+0x17b/0x1d0 [ 84.745252][ T5682] __x64_sys_sendmsg+0xd4/0x160 [ 84.745298][ T5682] x64_sys_call+0x191e/0x3000 [ 84.745320][ T5682] do_syscall_64+0xd2/0x200 [ 84.745343][ T5682] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 84.745381][ T5682] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 84.745464][ T5682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.745487][ T5682] RIP: 0033:0x7fbc22b5f6c9 [ 84.745505][ T5682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.745589][ T5682] RSP: 002b:00007fbc215c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 84.745609][ T5682] RAX: ffffffffffffffda RBX: 00007fbc22db5fa0 RCX: 00007fbc22b5f6c9 [ 84.745624][ T5682] RDX: 0000000000008000 RSI: 00002000000006c0 RDI: 0000000000000003 [ 84.745660][ T5682] RBP: 00007fbc215c7090 R08: 0000000000000000 R09: 0000000000000000 [ 84.745676][ T5682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.745692][ T5682] R13: 00007fbc22db6038 R14: 00007fbc22db5fa0 R15: 00007ffd95cab718 [ 84.745771][ T5682] [ 85.137217][ T5692] netlink: 'syz.3.885': attribute type 5 has an invalid length. [ 85.154314][ T3555] Bluetooth: hci0: sending frame failed (-49) [ 85.160578][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 85.247836][ T5711] ip6gre10: entered allmulticast mode [ 85.331439][ T5718] serio: Serial port ptm0 [ 85.365258][ T5721] netlink: 4 bytes leftover after parsing attributes in process `syz.0.898'. [ 85.388191][ T5723] netlink: 4 bytes leftover after parsing attributes in process `syz.4.899'. [ 85.397779][ T5723] FAULT_INJECTION: forcing a failure. [ 85.397779][ T5723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.410916][ T5723] CPU: 1 UID: 0 PID: 5723 Comm: syz.4.899 Not tainted syzkaller #0 PREEMPT(voluntary) [ 85.410948][ T5723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 85.410986][ T5723] Call Trace: [ 85.410993][ T5723] [ 85.411021][ T5723] __dump_stack+0x1d/0x30 [ 85.411045][ T5723] dump_stack_lvl+0xe8/0x140 [ 85.411064][ T5723] dump_stack+0x15/0x1b [ 85.411138][ T5723] should_fail_ex+0x265/0x280 [ 85.411158][ T5723] should_fail+0xb/0x20 [ 85.411174][ T5723] should_fail_usercopy+0x1a/0x20 [ 85.411280][ T5723] _copy_from_user+0x1c/0xb0 [ 85.411315][ T5723] ___sys_sendmsg+0xc1/0x1d0 [ 85.411354][ T5723] __x64_sys_sendmsg+0xd4/0x160 [ 85.411384][ T5723] x64_sys_call+0x191e/0x3000 [ 85.411416][ T5723] do_syscall_64+0xd2/0x200 [ 85.411520][ T5723] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 85.411550][ T5723] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 85.411666][ T5723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.411697][ T5723] RIP: 0033:0x7f02fab7f6c9 [ 85.411713][ T5723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.411731][ T5723] RSP: 002b:00007f02f95df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 85.411754][ T5723] RAX: ffffffffffffffda RBX: 00007f02fadd5fa0 RCX: 00007f02fab7f6c9 [ 85.411798][ T5723] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 85.411816][ T5723] RBP: 00007f02f95df090 R08: 0000000000000000 R09: 0000000000000000 [ 85.411832][ T5723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.411846][ T5723] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 85.411879][ T5723] [ 85.450384][ T5728] netlink: 45 bytes leftover after parsing attributes in process `syz.3.896'. [ 85.679425][ T5730] netlink: 'syz.4.901': attribute type 5 has an invalid length. [ 85.808147][ T5741] netlink: 'syz.4.904': attribute type 21 has an invalid length. [ 85.818876][ T5741] netlink: 156 bytes leftover after parsing attributes in process `syz.4.904'. [ 85.919010][ T5746] ip6gre9: entered allmulticast mode [ 85.966827][ T5751] netlink: 4 bytes leftover after parsing attributes in process `syz.3.909'. [ 86.250338][ T5766] netlink: 'syz.2.915': attribute type 5 has an invalid length. [ 86.320546][ T5776] FAULT_INJECTION: forcing a failure. [ 86.320546][ T5776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.334770][ T5776] CPU: 0 UID: 0 PID: 5776 Comm: syz.2.920 Not tainted syzkaller #0 PREEMPT(voluntary) [ 86.334801][ T5776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 86.334814][ T5776] Call Trace: [ 86.334823][ T5776] [ 86.334832][ T5776] __dump_stack+0x1d/0x30 [ 86.334867][ T5776] dump_stack_lvl+0xe8/0x140 [ 86.334961][ T5776] dump_stack+0x15/0x1b [ 86.334979][ T5776] should_fail_ex+0x265/0x280 [ 86.334999][ T5776] should_fail+0xb/0x20 [ 86.335022][ T5776] should_fail_usercopy+0x1a/0x20 [ 86.335050][ T5776] _copy_to_user+0x20/0xa0 [ 86.335099][ T5776] rng_dev_read+0x3ef/0x740 [ 86.335184][ T5776] ? __pfx_rng_dev_read+0x10/0x10 [ 86.335254][ T5776] vfs_readv+0x3fb/0x690 [ 86.335298][ T5776] __x64_sys_preadv+0xfd/0x1c0 [ 86.335332][ T5776] x64_sys_call+0x282e/0x3000 [ 86.335414][ T5776] do_syscall_64+0xd2/0x200 [ 86.335544][ T5776] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 86.335583][ T5776] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 86.335615][ T5776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.335697][ T5776] RIP: 0033:0x7fa4e244f6c9 [ 86.335716][ T5776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.335734][ T5776] RSP: 002b:00007fa4e0eb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 86.335755][ T5776] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244f6c9 [ 86.335772][ T5776] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 86.335785][ T5776] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 86.335849][ T5776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 86.335865][ T5776] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 86.335888][ T5776] [ 86.584588][ T5783] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 86.591163][ T5783] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 86.598729][ T5783] vhci_hcd vhci_hcd.0: Device attached [ 86.658135][ T5778] ip6gre10: entered allmulticast mode [ 86.685641][ T5784] vhci_hcd: connection closed [ 86.685855][ T140] vhci_hcd: stop threads [ 86.695245][ T140] vhci_hcd: release socket [ 86.699672][ T140] vhci_hcd: disconnect device [ 86.724220][ T5794] serio: Serial port ptm0 [ 87.064254][ T9] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 87.328102][ T37] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 87.394135][ T9] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 87.467619][ T5820] ip6gre7: entered allmulticast mode [ 87.763377][ T5834] FAULT_INJECTION: forcing a failure. [ 87.763377][ T5834] name failslab, interval 1, probability 0, space 0, times 0 [ 87.777320][ T5834] CPU: 0 UID: 0 PID: 5834 Comm: syz.2.941 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.777360][ T5834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 87.777406][ T5834] Call Trace: [ 87.777415][ T5834] [ 87.777425][ T5834] __dump_stack+0x1d/0x30 [ 87.777454][ T5834] dump_stack_lvl+0xe8/0x140 [ 87.777481][ T5834] dump_stack+0x15/0x1b [ 87.777505][ T5834] should_fail_ex+0x265/0x280 [ 87.777583][ T5834] should_failslab+0x8c/0xb0 [ 87.777671][ T5834] kmem_cache_alloc_noprof+0x50/0x480 [ 87.777712][ T5834] ? audit_log_start+0x342/0x720 [ 87.777742][ T5834] audit_log_start+0x342/0x720 [ 87.777819][ T5834] ? kstrtouint+0x76/0xc0 [ 87.777860][ T5834] audit_seccomp+0x48/0x100 [ 87.777892][ T5834] ? __seccomp_filter+0x82d/0x1250 [ 87.778027][ T5834] __seccomp_filter+0x83e/0x1250 [ 87.778111][ T5834] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 87.778226][ T5834] ? vfs_write+0x7e8/0x960 [ 87.778257][ T5834] ? __rcu_read_unlock+0x4f/0x70 [ 87.778292][ T5834] ? __fget_files+0x184/0x1c0 [ 87.778333][ T5834] __secure_computing+0x82/0x150 [ 87.778429][ T5834] syscall_trace_enter+0xcf/0x1e0 [ 87.778458][ T5834] do_syscall_64+0xac/0x200 [ 87.778552][ T5834] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 87.778591][ T5834] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 87.778659][ T5834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.778682][ T5834] RIP: 0033:0x7fa4e244f6c9 [ 87.778701][ T5834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.778725][ T5834] RSP: 002b:00007fa4e0eb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000072 [ 87.778750][ T5834] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244f6c9 [ 87.778836][ T5834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 87.778853][ T5834] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 87.778869][ T5834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.778885][ T5834] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 87.778902][ T5834] [ 87.782403][ T5837] FAULT_INJECTION: forcing a failure. [ 87.782403][ T5837] name failslab, interval 1, probability 0, space 0, times 0 [ 88.026385][ T5837] CPU: 0 UID: 0 PID: 5837 Comm: syz.4.939 Not tainted syzkaller #0 PREEMPT(voluntary) [ 88.026432][ T5837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 88.026526][ T5837] Call Trace: [ 88.026534][ T5837] [ 88.026543][ T5837] __dump_stack+0x1d/0x30 [ 88.026589][ T5837] dump_stack_lvl+0xe8/0x140 [ 88.026615][ T5837] dump_stack+0x15/0x1b [ 88.026635][ T5837] should_fail_ex+0x265/0x280 [ 88.026654][ T5837] should_failslab+0x8c/0xb0 [ 88.026727][ T5837] kmem_cache_alloc_noprof+0x50/0x480 [ 88.026759][ T5837] ? security_inode_alloc+0x37/0x100 [ 88.026781][ T5837] security_inode_alloc+0x37/0x100 [ 88.026801][ T5837] inode_init_always_gfp+0x4b7/0x500 [ 88.026895][ T5837] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 88.026928][ T5837] alloc_inode+0x58/0x170 [ 88.026954][ T5837] new_inode+0x1d/0xe0 [ 88.026979][ T5837] __debugfs_create_file+0x109/0x330 [ 88.026998][ T5837] debugfs_create_file_full+0x3f/0x60 [ 88.027021][ T5837] ? __pfx_sl_setup+0x10/0x10 [ 88.027129][ T5837] ref_tracker_dir_debugfs+0x100/0x1e0 [ 88.027299][ T5837] alloc_netdev_mqs+0x1a7/0xa50 [ 88.027320][ T5837] slip_open+0x2d1/0x920 [ 88.027346][ T5837] ? should_failslab+0x19/0xb0 [ 88.027376][ T5837] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 88.027432][ T5837] tty_ldisc_reinit+0x208/0x310 [ 88.027463][ T5837] tty_reopen+0x187/0x1c0 [ 88.027545][ T5837] tty_open+0x8e6/0xaf0 [ 88.027573][ T5837] chrdev_open+0x2eb/0x3a0 [ 88.027609][ T5837] do_dentry_open+0x649/0xa20 [ 88.027632][ T5837] ? __pfx_chrdev_open+0x10/0x10 [ 88.027806][ T5837] vfs_open+0x37/0x1e0 [ 88.027828][ T5837] path_openat+0x1c5e/0x2170 [ 88.027861][ T5837] do_filp_open+0x109/0x230 [ 88.027888][ T5837] do_sys_openat2+0xa6/0x110 [ 88.027910][ T5837] __x64_sys_openat+0xf2/0x120 [ 88.027957][ T5837] x64_sys_call+0x2eab/0x3000 [ 88.027988][ T5837] do_syscall_64+0xd2/0x200 [ 88.028014][ T5837] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 88.028050][ T5837] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 88.028132][ T5837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.028153][ T5837] RIP: 0033:0x7f02fab7f6c9 [ 88.028167][ T5837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.028195][ T5837] RSP: 002b:00007f02f95be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 88.028216][ T5837] RAX: ffffffffffffffda RBX: 00007f02fadd6090 RCX: 00007f02fab7f6c9 [ 88.028228][ T5837] RDX: 0000000000000100 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 88.028259][ T5837] RBP: 00007f02f95be090 R08: 0000000000000000 R09: 0000000000000000 [ 88.028276][ T5837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.028290][ T5837] R13: 00007f02fadd6128 R14: 00007f02fadd6090 R15: 00007fff65530208 [ 88.028306][ T5837] [ 88.028315][ T5837] debugfs: out of free dentries, can not create file 'netdev@ffff888109d30558' [ 88.369376][ T5848] serio: Serial port ptm0 [ 88.394319][ T37] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 88.402233][ T37] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 88.410390][ T5850] netlink: 'syz.0.947': attribute type 3 has an invalid length. [ 88.447898][ T5857] netlink: 8 bytes leftover after parsing attributes in process `syz.0.950'. [ 88.462702][ T5857] netlink: 8 bytes leftover after parsing attributes in process `syz.0.950'. [ 88.488954][ T5852] netlink: 'syz.2.948': attribute type 5 has an invalid length. [ 88.518508][ T5866] FAULT_INJECTION: forcing a failure. [ 88.518508][ T5866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.531785][ T5866] CPU: 1 UID: 0 PID: 5866 Comm: syz.2.954 Not tainted syzkaller #0 PREEMPT(voluntary) [ 88.531822][ T5866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 88.531838][ T5866] Call Trace: [ 88.531920][ T5866] [ 88.531930][ T5866] __dump_stack+0x1d/0x30 [ 88.531958][ T5866] dump_stack_lvl+0xe8/0x140 [ 88.531984][ T5866] dump_stack+0x15/0x1b [ 88.532007][ T5866] should_fail_ex+0x265/0x280 [ 88.532033][ T5866] should_fail+0xb/0x20 [ 88.532055][ T5866] should_fail_usercopy+0x1a/0x20 [ 88.532090][ T5866] _copy_from_user+0x1c/0xb0 [ 88.532124][ T5866] ___sys_sendmsg+0xc1/0x1d0 [ 88.532162][ T5866] __x64_sys_sendmsg+0xd4/0x160 [ 88.532268][ T5866] x64_sys_call+0x191e/0x3000 [ 88.532298][ T5866] do_syscall_64+0xd2/0x200 [ 88.532322][ T5866] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 88.532358][ T5866] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 88.532452][ T5866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.532480][ T5866] RIP: 0033:0x7fa4e244f6c9 [ 88.532500][ T5866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.532522][ T5866] RSP: 002b:00007fa4e0eb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 88.532622][ T5866] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244f6c9 [ 88.532636][ T5866] RDX: 0000000004008054 RSI: 0000200000000280 RDI: 0000000000000003 [ 88.532648][ T5866] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 88.532660][ T5866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.532672][ T5866] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 88.532688][ T5866] [ 88.710251][ T5869] netlink: 'syz.0.955': attribute type 3 has an invalid length. [ 88.749239][ T5872] netlink: 8 bytes leftover after parsing attributes in process `syz.2.956'. [ 88.758182][ T5872] netlink: 24 bytes leftover after parsing attributes in process `syz.2.956'. [ 88.930551][ T5891] netlink: 'syz.0.965': attribute type 3 has an invalid length. [ 89.015697][ T5900] veth4: entered promiscuous mode [ 89.020806][ T5900] veth4: entered allmulticast mode [ 89.034641][ T29] kauditd_printk_skb: 17679 callbacks suppressed [ 89.034656][ T29] audit: type=1400 audit(1762208937.887:189193): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.076870][ T5898] veth6: entered promiscuous mode [ 89.082036][ T5898] veth6: entered allmulticast mode [ 89.088178][ T29] audit: type=1400 audit(1762208937.887:189194): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.109511][ T29] audit: type=1400 audit(1762208937.887:189195): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.130875][ T29] audit: type=1400 audit(1762208937.887:189196): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.152236][ T29] audit: type=1400 audit(1762208937.887:189197): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.156760][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.173605][ T29] audit: type=1400 audit(1762208937.887:189198): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.173651][ T29] audit: type=1400 audit(1762208937.887:189199): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.173677][ T29] audit: type=1400 audit(1762208937.887:189200): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.173708][ T29] audit: type=1400 audit(1762208937.887:189201): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.173976][ T36] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 89.321292][ T5912] FAULT_INJECTION: forcing a failure. [ 89.321292][ T5912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.335664][ T5912] CPU: 0 UID: 0 PID: 5912 Comm: syz.4.970 Not tainted syzkaller #0 PREEMPT(voluntary) [ 89.335699][ T5912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 89.335723][ T5912] Call Trace: [ 89.335731][ T5912] [ 89.335740][ T5912] __dump_stack+0x1d/0x30 [ 89.335767][ T5912] dump_stack_lvl+0xe8/0x140 [ 89.335864][ T5912] dump_stack+0x15/0x1b [ 89.335887][ T5912] should_fail_ex+0x265/0x280 [ 89.335911][ T5912] should_fail+0xb/0x20 [ 89.335931][ T5912] should_fail_usercopy+0x1a/0x20 [ 89.335994][ T5912] _copy_from_user+0x1c/0xb0 [ 89.336029][ T5912] kstrtouint_from_user+0x69/0xf0 [ 89.336054][ T5912] ? 0xffffffff81000000 [ 89.336069][ T5912] ? selinux_file_permission+0x1e4/0x320 [ 89.336149][ T5912] proc_fail_nth_write+0x50/0x160 [ 89.336189][ T5912] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 89.336307][ T5912] vfs_write+0x269/0x960 [ 89.336363][ T5912] ? vfs_read+0x4e6/0x770 [ 89.336386][ T5912] ? __rcu_read_unlock+0x4f/0x70 [ 89.336411][ T5912] ? __fget_files+0x184/0x1c0 [ 89.336447][ T5912] ksys_write+0xda/0x1a0 [ 89.336554][ T5912] __x64_sys_write+0x40/0x50 [ 89.336587][ T5912] x64_sys_call+0x2802/0x3000 [ 89.336624][ T5912] do_syscall_64+0xd2/0x200 [ 89.336648][ T5912] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 89.336684][ T5912] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 89.336725][ T5912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.336806][ T5912] RIP: 0033:0x7f02fab7e17f [ 89.336823][ T5912] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 89.336866][ T5912] RSP: 002b:00007f02f95df030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 89.336891][ T5912] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f02fab7e17f [ 89.336908][ T5912] RDX: 0000000000000001 RSI: 00007f02f95df0a0 RDI: 0000000000000004 [ 89.336966][ T5912] RBP: 00007f02f95df090 R08: 0000000000000000 R09: 0000000000000000 [ 89.336997][ T5912] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 89.337013][ T5912] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 89.337034][ T5912] [ 89.637167][ T5923] serio: Serial port ptm0 [ 89.757804][ T5929] netlink: 8 bytes leftover after parsing attributes in process `syz.0.971'. [ 89.962420][ T5941] FAULT_INJECTION: forcing a failure. [ 89.962420][ T5941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.976691][ T5941] CPU: 0 UID: 0 PID: 5941 Comm: syz.2.983 Not tainted syzkaller #0 PREEMPT(voluntary) [ 89.976772][ T5941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 89.976789][ T5941] Call Trace: [ 89.976798][ T5941] [ 89.976807][ T5941] __dump_stack+0x1d/0x30 [ 89.976832][ T5941] dump_stack_lvl+0xe8/0x140 [ 89.976893][ T5941] dump_stack+0x15/0x1b [ 89.976918][ T5941] should_fail_ex+0x265/0x280 [ 89.976944][ T5941] should_fail+0xb/0x20 [ 89.976964][ T5941] should_fail_usercopy+0x1a/0x20 [ 89.976985][ T5941] _copy_from_user+0x1c/0xb0 [ 89.977073][ T5941] __se_sys_move_pages+0xd4a/0x1360 [ 89.977108][ T5941] ? get_pid_task+0x96/0xd0 [ 89.977142][ T5941] ? fput+0x8f/0xc0 [ 89.977165][ T5941] ? ksys_write+0x192/0x1a0 [ 89.977257][ T5941] __x64_sys_move_pages+0x78/0x90 [ 89.977306][ T5941] x64_sys_call+0x2f87/0x3000 [ 89.977338][ T5941] do_syscall_64+0xd2/0x200 [ 89.977359][ T5941] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 89.977396][ T5941] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 89.977507][ T5941] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.977570][ T5941] RIP: 0033:0x7fa4e244f6c9 [ 89.977589][ T5941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.977633][ T5941] RSP: 002b:00007fa4e0eb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000117 [ 89.977684][ T5941] RAX: ffffffffffffffda RBX: 00007fa4e26a5fa0 RCX: 00007fa4e244f6c9 [ 89.977700][ T5941] RDX: 0000000000000000 RSI: 00000000fffffdc2 RDI: 0000000000000000 [ 89.977717][ T5941] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 89.977733][ T5941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.977749][ T5941] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 89.977772][ T5941] [ 90.004575][ T5943] macvlan1: entered promiscuous mode [ 90.130448][ T5947] FAULT_INJECTION: forcing a failure. [ 90.130448][ T5947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.193501][ T5947] CPU: 0 UID: 0 PID: 5947 Comm: syz.2.986 Not tainted syzkaller #0 PREEMPT(voluntary) [ 90.193559][ T5947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 90.193575][ T5947] Call Trace: [ 90.193582][ T5947] [ 90.193591][ T5947] __dump_stack+0x1d/0x30 [ 90.193666][ T5947] dump_stack_lvl+0xe8/0x140 [ 90.193724][ T5947] dump_stack+0x15/0x1b [ 90.193747][ T5947] should_fail_ex+0x265/0x280 [ 90.193772][ T5947] should_fail+0xb/0x20 [ 90.193815][ T5947] should_fail_usercopy+0x1a/0x20 [ 90.193839][ T5947] _copy_from_user+0x1c/0xb0 [ 90.193883][ T5947] ___sys_recvmsg+0xaa/0x370 [ 90.193909][ T5947] ? 0xffffffff81000000 [ 90.193925][ T5947] ? __rcu_read_unlock+0x4f/0x70 [ 90.194022][ T5947] __x64_sys_recvmsg+0xd1/0x160 [ 90.194044][ T5947] x64_sys_call+0x2b46/0x3000 [ 90.194068][ T5947] do_syscall_64+0xd2/0x200 [ 90.194092][ T5947] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 90.194122][ T5947] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 90.194245][ T5947] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.194279][ T5947] RIP: 0033:0x7fa4e244f6c9 [ 90.194298][ T5947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.194320][ T5947] RSP: 002b:00007fa4e0e96038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 90.194397][ T5947] RAX: ffffffffffffffda RBX: 00007fa4e26a6090 RCX: 00007fa4e244f6c9 [ 90.194413][ T5947] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 90.194471][ T5947] RBP: 00007fa4e0e96090 R08: 0000000000000000 R09: 0000000000000000 [ 90.194483][ T5947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.194494][ T5947] R13: 00007fa4e26a6128 R14: 00007fa4e26a6090 R15: 00007ffe8e064d98 [ 90.194513][ T5947] [ 90.256996][ T5943] ipvlan0: entered promiscuous mode [ 90.389557][ T5943] ipvlan0: left promiscuous mode [ 90.395382][ T5943] macvlan1: left promiscuous mode [ 90.464858][ T5955] netlink: 8 bytes leftover after parsing attributes in process `syz.2.990'. [ 90.503979][ T5955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.572359][ T5963] ip6gre11: entered allmulticast mode [ 90.646813][ T5977] serio: Serial port ptm0 [ 90.721956][ T5987] serio: Serial port ptm1 [ 90.728779][ T5989] FAULT_INJECTION: forcing a failure. [ 90.728779][ T5989] name failslab, interval 1, probability 0, space 0, times 0 [ 90.742522][ T5989] CPU: 0 UID: 0 PID: 5989 Comm: syz.4.1004 Not tainted syzkaller #0 PREEMPT(voluntary) [ 90.742552][ T5989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 90.742569][ T5989] Call Trace: [ 90.742576][ T5989] [ 90.742584][ T5989] __dump_stack+0x1d/0x30 [ 90.742683][ T5989] dump_stack_lvl+0xe8/0x140 [ 90.742708][ T5989] dump_stack+0x15/0x1b [ 90.742731][ T5989] should_fail_ex+0x265/0x280 [ 90.742755][ T5989] ? do_epoll_create+0x57/0x260 [ 90.742844][ T5989] should_failslab+0x8c/0xb0 [ 90.742888][ T5989] __kmalloc_cache_noprof+0x4c/0x4a0 [ 90.742931][ T5989] do_epoll_create+0x57/0x260 [ 90.742956][ T5989] __x64_sys_epoll_create+0x35/0x60 [ 90.743008][ T5989] x64_sys_call+0x2d98/0x3000 [ 90.743034][ T5989] do_syscall_64+0xd2/0x200 [ 90.743053][ T5989] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 90.743133][ T5989] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 90.743165][ T5989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.743189][ T5989] RIP: 0033:0x7f02fab7f6c9 [ 90.743207][ T5989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.743271][ T5989] RSP: 002b:00007f02f95df038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 90.743296][ T5989] RAX: ffffffffffffffda RBX: 00007f02fadd5fa0 RCX: 00007f02fab7f6c9 [ 90.743312][ T5989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 90.743326][ T5989] RBP: 00007f02f95df090 R08: 0000000000000000 R09: 0000000000000000 [ 90.743338][ T5989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.743411][ T5989] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 90.743435][ T5989] [ 91.015236][ T6002] ip6gre11: entered allmulticast mode [ 91.732085][ T6038] ip6gre12: entered allmulticast mode [ 91.935505][ T6050] serio: Serial port ptm0 [ 92.102975][ T6053] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1028'. [ 92.119196][ T6055] serio: Serial port ptm1 [ 92.232937][ C1] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 92.326117][ T6068] FAULT_INJECTION: forcing a failure. [ 92.326117][ T6068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.339322][ T6068] CPU: 1 UID: 0 PID: 6068 Comm: syz.2.1033 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.339370][ T6068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 92.339387][ T6068] Call Trace: [ 92.339397][ T6068] [ 92.339406][ T6068] __dump_stack+0x1d/0x30 [ 92.339448][ T6068] dump_stack_lvl+0xe8/0x140 [ 92.339535][ T6068] dump_stack+0x15/0x1b [ 92.339554][ T6068] should_fail_ex+0x265/0x280 [ 92.339617][ T6068] should_fail+0xb/0x20 [ 92.339641][ T6068] should_fail_usercopy+0x1a/0x20 [ 92.339672][ T6068] _copy_from_user+0x1c/0xb0 [ 92.339757][ T6068] get_timespec64+0x4c/0x100 [ 92.339836][ T6068] __se_sys_clock_nanosleep+0x10b/0x250 [ 92.339867][ T6068] __x64_sys_clock_nanosleep+0x55/0x70 [ 92.339913][ T6068] x64_sys_call+0x2731/0x3000 [ 92.339999][ T6068] do_syscall_64+0xd2/0x200 [ 92.340100][ T6068] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.340145][ T6068] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.340178][ T6068] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.340275][ T6068] RIP: 0033:0x7fa4e2481f85 [ 92.340296][ T6068] Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 f6 54 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 4f 55 ff ff 48 8b 04 24 48 83 c4 28 f7 d8 [ 92.340316][ T6068] RSP: 002b:00007fa4e0eb6fa0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 92.340340][ T6068] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fa4e2481f85 [ 92.340358][ T6068] RDX: 00007fa4e0eb6fe0 RSI: 0000000000000000 RDI: 0000000000000000 [ 92.340375][ T6068] RBP: 00007fa4e0eb7090 R08: 0000000000000000 R09: 0000000000000000 [ 92.340446][ T6068] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 92.340464][ T6068] R13: 00007fa4e26a6038 R14: 00007fa4e26a5fa0 R15: 00007ffe8e064d98 [ 92.340488][ T6068] [ 92.887450][ T6085] FAULT_INJECTION: forcing a failure. [ 92.887450][ T6085] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.900582][ T6085] CPU: 1 UID: 0 PID: 6085 Comm: syz.0.1038 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.900616][ T6085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 92.900632][ T6085] Call Trace: [ 92.900640][ T6085] [ 92.900649][ T6085] __dump_stack+0x1d/0x30 [ 92.900741][ T6085] dump_stack_lvl+0xe8/0x140 [ 92.900842][ T6085] dump_stack+0x15/0x1b [ 92.900865][ T6085] should_fail_ex+0x265/0x280 [ 92.900964][ T6085] should_fail+0xb/0x20 [ 92.900981][ T6085] should_fail_usercopy+0x1a/0x20 [ 92.901008][ T6085] _copy_to_user+0x20/0xa0 [ 92.901099][ T6085] simple_read_from_buffer+0xb5/0x130 [ 92.901133][ T6085] proc_fail_nth_read+0x10e/0x150 [ 92.901175][ T6085] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 92.901219][ T6085] vfs_read+0x1a8/0x770 [ 92.901249][ T6085] ? __fget_files+0x184/0x1c0 [ 92.901312][ T6085] ? __rcu_read_unlock+0x4f/0x70 [ 92.901338][ T6085] ? __fget_files+0x184/0x1c0 [ 92.901424][ T6085] ksys_read+0xda/0x1a0 [ 92.901456][ T6085] __x64_sys_read+0x40/0x50 [ 92.901479][ T6085] x64_sys_call+0x27c0/0x3000 [ 92.901572][ T6085] do_syscall_64+0xd2/0x200 [ 92.901596][ T6085] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.901703][ T6085] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.901744][ T6085] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.901772][ T6085] RIP: 0033:0x7fb09d84e0dc [ 92.901791][ T6085] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 92.901809][ T6085] RSP: 002b:00007fb09c28e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.901857][ T6085] RAX: ffffffffffffffda RBX: 00007fb09daa6090 RCX: 00007fb09d84e0dc [ 92.901873][ T6085] RDX: 000000000000000f RSI: 00007fb09c28e0a0 RDI: 0000000000000005 [ 92.901889][ T6085] RBP: 00007fb09c28e090 R08: 0000000000000000 R09: 0000000000000000 [ 92.901904][ T6085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.901919][ T6085] R13: 00007fb09daa6128 R14: 00007fb09daa6090 R15: 00007fffb6d94db8 [ 92.901941][ T6085] [ 93.174995][ T6090] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1041'. [ 93.187662][ T6091] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 93.267692][ T6095] FAULT_INJECTION: forcing a failure. [ 93.267692][ T6095] name failslab, interval 1, probability 0, space 0, times 0 [ 93.281510][ T6095] CPU: 0 UID: 0 PID: 6095 Comm: syz.4.1044 Not tainted syzkaller #0 PREEMPT(voluntary) [ 93.281540][ T6095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 93.281569][ T6095] Call Trace: [ 93.281578][ T6095] [ 93.281588][ T6095] __dump_stack+0x1d/0x30 [ 93.281611][ T6095] dump_stack_lvl+0xe8/0x140 [ 93.281630][ T6095] dump_stack+0x15/0x1b [ 93.281693][ T6095] should_fail_ex+0x265/0x280 [ 93.281717][ T6095] should_failslab+0x8c/0xb0 [ 93.281750][ T6095] __kmalloc_noprof+0xa5/0x570 [ 93.281808][ T6095] ? kernfs_fop_write_iter+0xe2/0x300 [ 93.281835][ T6095] ? selinux_file_permission+0x1e4/0x320 [ 93.281886][ T6095] kernfs_fop_write_iter+0xe2/0x300 [ 93.281977][ T6095] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 93.282001][ T6095] vfs_write+0x52a/0x960 [ 93.282059][ T6095] ksys_write+0xda/0x1a0 [ 93.282085][ T6095] __x64_sys_write+0x40/0x50 [ 93.282117][ T6095] x64_sys_call+0x2802/0x3000 [ 93.282197][ T6095] do_syscall_64+0xd2/0x200 [ 93.282220][ T6095] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 93.282249][ T6095] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 93.282398][ T6095] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.282425][ T6095] RIP: 0033:0x7f02fab7f6c9 [ 93.282440][ T6095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.282503][ T6095] RSP: 002b:00007f02f95df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 93.282535][ T6095] RAX: ffffffffffffffda RBX: 00007f02fadd5fa0 RCX: 00007f02fab7f6c9 [ 93.282547][ T6095] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000004 [ 93.282559][ T6095] RBP: 00007f02f95df090 R08: 0000000000000000 R09: 0000000000000000 [ 93.282570][ T6095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.282583][ T6095] R13: 00007f02fadd6038 R14: 00007f02fadd5fa0 R15: 00007fff65530208 [ 93.282606][ T6095] [ 93.515721][ T6103] netlink: 'syz.1.1048': attribute type 21 has an invalid length. [ 93.523931][ T6103] netlink: 'syz.1.1048': attribute type 1 has an invalid length. [ 93.531796][ T6103] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1048'. [ 93.628648][ T6109] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 93.641820][ T6113] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1048'. [ 93.668957][ T6109] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 93.760217][ T6120] serio: Serial port ptm0 [ 94.022769][ T6137] syz.2.1060 (6137): attempted to duplicate a private mapping with mremap. This is not supported. [ 94.042937][ T29] kauditd_printk_skb: 17841 callbacks suppressed [ 94.042956][ T29] audit: type=1400 audit(1762208942.887:204417): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.054288][ T6135] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.070747][ T29] audit: type=1400 audit(1762208942.887:204418): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.070785][ T29] audit: type=1400 audit(1762208942.887:204419): avc: denied { read write } for pid=6134 comm="syz.2.1060" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.070881][ T29] audit: type=1400 audit(1762208942.887:204420): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.070912][ T29] audit: type=1400 audit(1762208942.887:204421): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.070990][ T29] audit: type=1400 audit(1762208942.887:204422): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.071021][ T29] audit: type=1400 audit(1762208942.887:204423): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.071050][ T29] audit: type=1400 audit(1762208942.887:204424): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.071152][ T29] audit: type=1400 audit(1762208942.887:204425): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.121606][ T6143] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1061'. [ 94.565552][ T6146] FAULT_INJECTION: forcing a failure. [ 94.565552][ T6146] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 94.578807][ T6146] CPU: 1 UID: 0 PID: 6146 Comm: syz.3.1062 Not tainted syzkaller #0 PREEMPT(voluntary) [ 94.578840][ T6146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 94.578854][ T6146] Call Trace: [ 94.578937][ T6146] [ 94.578947][ T6146] __dump_stack+0x1d/0x30 [ 94.578977][ T6146] dump_stack_lvl+0xe8/0x140 [ 94.579052][ T6146] dump_stack+0x15/0x1b [ 94.579076][ T6146] should_fail_ex+0x265/0x280 [ 94.579101][ T6146] should_fail+0xb/0x20 [ 94.579123][ T6146] should_fail_usercopy+0x1a/0x20 [ 94.579219][ T6146] _copy_to_user+0x20/0xa0 [ 94.579254][ T6146] simple_read_from_buffer+0xb5/0x130 [ 94.579280][ T6146] proc_fail_nth_read+0x10e/0x150 [ 94.579318][ T6146] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 94.579404][ T6146] vfs_read+0x1a8/0x770 [ 94.579453][ T6146] ? __rcu_read_unlock+0x4f/0x70 [ 94.579488][ T6146] ? __fget_files+0x184/0x1c0 [ 94.579578][ T6146] ? __rcu_read_unlock+0x4f/0x70 [ 94.579607][ T6146] ksys_read+0xda/0x1a0 [ 94.579633][ T6146] __x64_sys_read+0x40/0x50 [ 94.579666][ T6146] x64_sys_call+0x27c0/0x3000 [ 94.579743][ T6146] do_syscall_64+0xd2/0x200 [ 94.579768][ T6146] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 94.579799][ T6146] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 94.579912][ T6146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.579940][ T6146] RIP: 0033:0x7fbc22b5e0dc [ 94.579972][ T6146] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 94.579990][ T6146] RSP: 002b:00007fbc215c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 94.580020][ T6146] RAX: ffffffffffffffda RBX: 00007fbc22db5fa0 RCX: 00007fbc22b5e0dc [ 94.580037][ T6146] RDX: 000000000000000f RSI: 00007fbc215c70a0 RDI: 0000000000000003 [ 94.580053][ T6146] RBP: 00007fbc215c7090 R08: 0000000000000000 R09: 0000000000000000 [ 94.580066][ T6146] R10: 0000000000000048 R11: 0000000000000246 R12: 0000000000000001 [ 94.580077][ T6146] R13: 00007fbc22db6038 R14: 00007fbc22db5fa0 R15: 00007ffd95cab718 [ 94.580099][ T6146] [ 94.882031][ T6153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6153 comm=syz.2.1065 [ 94.941072][ T6160] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1068'. [ 94.944572][ T6161] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1067'. [ 94.988845][ T6165] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1070'. [ 95.055748][ T6169] FAULT_INJECTION: forcing a failure. [ 95.055748][ T6169] name failslab, interval 1, probability 0, space 0, times 0 [ 95.069540][ T6169] CPU: 0 UID: 0 PID: 6169 Comm: syz.1.1067 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.069635][ T6169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 95.069651][ T6169] Call Trace: [ 95.069659][ T6169] [ 95.069668][ T6169] __dump_stack+0x1d/0x30 [ 95.069695][ T6169] dump_stack_lvl+0xe8/0x140 [ 95.069720][ T6169] dump_stack+0x15/0x1b [ 95.069782][ T6169] should_fail_ex+0x265/0x280 [ 95.069801][ T6169] should_failslab+0x8c/0xb0 [ 95.069836][ T6169] kmem_cache_alloc_noprof+0x50/0x480 [ 95.069873][ T6169] ? getname_flags+0x80/0x3b0 [ 95.069979][ T6169] getname_flags+0x80/0x3b0 [ 95.070087][ T6169] __x64_sys_unlink+0x21/0x40 [ 95.070117][ T6169] x64_sys_call+0x2dcf/0x3000 [ 95.070146][ T6169] do_syscall_64+0xd2/0x200 [ 95.070209][ T6169] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.070327][ T6169] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 95.070428][ T6169] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.070466][ T6169] RIP: 0033:0x7fdc4a19f6c9 [ 95.070481][ T6169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.070500][ T6169] RSP: 002b:00007fdc48bde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 95.070518][ T6169] RAX: ffffffffffffffda RBX: 00007fdc4a3f6090 RCX: 00007fdc4a19f6c9 [ 95.070593][ T6169] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000100 [ 95.070609][ T6169] RBP: 00007fdc48bde090 R08: 0000000000000000 R09: 0000000000000000 [ 95.070631][ T6169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.070647][ T6169] R13: 00007fdc4a3f6128 R14: 00007fdc4a3f6090 R15: 00007ffe10a4c638 [ 95.070669][ T6169] [ 95.532303][ T6174] Bluetooth: hci0: Frame reassembly failed (-90) [ 95.563639][ T389] Bluetooth: hci0: Frame reassembly failed (-84) [ 95.666132][ T6178] ================================================================== [ 95.674270][ T6178] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 95.677295][ T6176] FAULT_INJECTION: forcing a failure. [ 95.677295][ T6176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.681603][ T6178] [ 95.681612][ T6178] write to 0xffff888104765300 of 8 bytes by task 6177 on cpu 0: [ 95.681633][ T6178] mas_wmb_replace+0xcf4/0xfa0 [ 95.695024][ T6176] CPU: 0 UID: 0 PID: 6176 Comm: syz.3.1074 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.695123][ T6176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 95.695142][ T6176] Call Trace: [ 95.695152][ T6176] [ 95.695162][ T6176] __dump_stack+0x1d/0x30 [ 95.695192][ T6176] dump_stack_lvl+0xe8/0x140 [ 95.695220][ T6176] dump_stack+0x15/0x1b [ 95.695246][ T6176] should_fail_ex+0x265/0x280 [ 95.695289][ T6176] should_fail+0xb/0x20 [ 95.695311][ T6176] should_fail_usercopy+0x1a/0x20 [ 95.695355][ T6176] strncpy_from_user+0x25/0x230 [ 95.695394][ T6176] ? __fget_files+0x184/0x1c0 [ 95.695436][ T6176] __se_sys_request_key+0x57/0x290 [ 95.695538][ T6176] ? fput+0x8f/0xc0 [ 95.695566][ T6176] __x64_sys_request_key+0x55/0x70 [ 95.695610][ T6176] x64_sys_call+0x1d98/0x3000 [ 95.695643][ T6176] do_syscall_64+0xd2/0x200 [ 95.695709][ T6176] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.695751][ T6176] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 95.695851][ T6176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.695949][ T6176] RIP: 0033:0x7fbc22b5f6c9 [ 95.695970][ T6176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.695996][ T6176] RSP: 002b:00007fbc215c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 95.696024][ T6176] RAX: ffffffffffffffda RBX: 00007fbc22db5fa0 RCX: 00007fbc22b5f6c9 [ 95.696041][ T6176] RDX: 0000200000000540 RSI: 0000200000000500 RDI: 00002000000004c0 [ 95.696059][ T6176] RBP: 00007fbc215c7090 R08: 0000000000000000 R09: 0000000000000000 [ 95.696107][ T6176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.696125][ T6176] R13: 00007fbc22db6038 R14: 00007fbc22db5fa0 R15: 00007ffd95cab718 [ 95.696150][ T6176] [ 95.892305][ T6178] mas_wr_store_entry+0x136b/0x26e0 [ 95.897529][ T6178] mas_store_prealloc+0x74d/0xa80 [ 95.902578][ T6178] vma_iter_store_new+0x1c5/0x200 [ 95.907617][ T6178] vma_complete+0x125/0x580 [ 95.912127][ T6178] __split_vma+0x5d9/0x650 [ 95.916564][ T6178] vma_modify+0x3f2/0xc80 [ 95.920903][ T6178] vma_modify_flags+0x101/0x130 [ 95.925765][ T6178] mprotect_fixup+0x2cc/0x570 [ 95.930465][ T6178] do_mprotect_pkey+0x6d6/0x980 [ 95.935327][ T6178] __x64_sys_mprotect+0x48/0x60 [ 95.940189][ T6178] x64_sys_call+0x2752/0x3000 [ 95.944877][ T6178] do_syscall_64+0xd2/0x200 [ 95.949388][ T6178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.955288][ T6178] [ 95.957619][ T6178] read to 0xffff888104765300 of 8 bytes by task 6178 on cpu 1: [ 95.965169][ T6178] mas_state_walk+0x485/0x650 [ 95.969874][ T6178] mas_walk+0x60/0x150 [ 95.973973][ T6178] lock_vma_under_rcu+0x95/0x170 [ 95.978940][ T6178] do_user_addr_fault+0x233/0x1080 [ 95.984066][ T6178] exc_page_fault+0x62/0xa0 [ 95.988601][ T6178] asm_exc_page_fault+0x26/0x30 [ 95.993472][ T6178] [ 95.995829][ T6178] value changed: 0xffff888104765806 -> 0xffff888104765300 [ 96.002963][ T6178] [ 96.005288][ T6178] Reported by Kernel Concurrency Sanitizer on: [ 96.011481][ T6178] CPU: 1 UID: 0 PID: 6178 Comm: syz.1.1073 Not tainted syzkaller #0 PREEMPT(voluntary) [ 96.021223][ T6178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 96.031295][ T6178] ================================================================== [ 97.592926][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 97.595373][ T3555] Bluetooth: hci0: command 0x1003 tx timeout [ 99.053860][ T29] kauditd_printk_skb: 29946 callbacks suppressed [ 99.053878][ T29] audit: type=1400 audit(1762208947.897:232183): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.068742][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.081765][ T29] audit: type=1400 audit(1762208947.907:232184): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.081866][ T29] audit: type=1400 audit(1762208947.907:232185): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.081895][ T29] audit: type=1400 audit(1762208947.907:232186): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.081923][ T29] audit: type=1400 audit(1762208947.907:232187): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.081951][ T29] audit: type=1400 audit(1762208947.907:232188): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.082008][ T29] audit: type=1400 audit(1762208947.907:232189): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.082035][ T29] audit: type=1400 audit(1762208947.907:232190): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.082064][ T29] audit: type=1400 audit(1762208947.907:232191): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.232928][ C1] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 104.063914][ T29] kauditd_printk_skb: 43540 callbacks suppressed [ 104.063935][ T29] audit: type=1400 audit(1762208952.917:275730): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.072025][ T3044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.092262][ T29] audit: type=1400 audit(1762208952.917:275731): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092299][ T29] audit: type=1400 audit(1762208952.917:275732): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092331][ T29] audit: type=1400 audit(1762208952.917:275733): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092421][ T29] audit: type=1400 audit(1762208952.917:275734): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092449][ T29] audit: type=1400 audit(1762208952.917:275735): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092480][ T29] audit: type=1400 audit(1762208952.917:275736): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092513][ T29] audit: type=1400 audit(1762208952.917:275737): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.092554][ T29] audit: type=1400 audit(1762208952.917:275738): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0