last executing test programs: 3.977929737s ago: executing program 1 (id=1853): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000008000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = epoll_create(0x3ff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = socket(0x2c, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r2, &(0x7f0000000140), &(0x7f0000000080)=@udp=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f0000000540)}, 0x20) r5 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000240)={0xa0000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r5, &(0x7f0000000280)={0x2000000}) 3.921949018s ago: executing program 1 (id=1854): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)={0x28, 0x10, 0x9, 0x0, 0x900, {0x3}, [@nested={0x14, 0x1, 0x0, 0x1, [@nested={0x10, 0x65, 0x0, 0x1, [@generic="ac977321a421b82ddbb34a3e"]}]}]}, 0x28}}, 0x48800) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x6}, 0x18) sendmsg$NFT_BATCH(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x880) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, 0x0, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r7 = socket(0x10, 0x3, 0x0) sendto$inet6(r7, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300040018000000fac8388827a685a168d9a44604094565360c648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902fc3a10004a320c0400160012000a00000000000000000000080756ede4ccbe5880", 0xec1, 0x0, 0x0, 0x9e5e111c47e3504f) 3.919504348s ago: executing program 1 (id=1855): r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3) r3 = getpid() sched_setscheduler(r3, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x3, 0x10010) r4 = fsopen(&(0x7f0000000140)='nfs4\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x5) fchdir(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x31) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000), 0x0, 0xffffffffffbffff8) dup2(r1, r2) r7 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0xa5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), &(0x7f0000000180)=r8}, 0x20) bind$llc(r7, &(0x7f0000000000)={0x1a, 0x0, 0x1, 0x0, 0x3, 0x4a}, 0x10) close(r7) fcntl$setown(r1, 0x8, r0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000), 0x2, 0x0) quotactl_fd$Q_GETNEXTQUOTA(r1, 0xffffffff80000901, 0x0, &(0x7f0000000080)) tkill(r0, 0x13) 2.900169347s ago: executing program 0 (id=1865): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000000, 0x2010, 0xffffffffffffffff, 0x1000) r0 = syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2ee, &(0x7f00000006c0)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040), 0x208e24b) readahead(0xffffffffffffffff, 0x6, 0x8f) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="9feb010018000000000000006000000069000000020000000000000000000004000000000d00000000000010100000000d0000000000000905000000000000000000000b040000000100000000000007000000000500000000000008000000000700000ddb000007000000000d00000000000012020000000000806716dceb3cd594cdef16feaf8cc7f6221613a34debde4d75a3728f93d8abb12f7ae0feb678529e22f0e96f202982e6a3ed25b37a881d9cf73c6c3341802d462557c336745d378133047295446ac3aa2e21befdef84e7edd6fc0d190adf551449df7bbf1ced80e71db5a9452f08693fb42c4450bb61aebf14ce002855d34118b6cefc32aeaff886b37fdac05142273f4c7f293090857317e390290151dbdca8838fb3d9c9f87798c89d0e110018c601337d60b0120602f70ed5d4fe82bafd050ea044b9e0523a11af39f756ee82f7ebde12cc66445c1d8c9b4e8a3f6fb68726bd755c31b8b2507826f63011bc217bed695c960af4848f22ed26fae48fc0beb4e8a970c2e842fd81b3170343446b7765394e0ecef0d43a1b5234723bb8d27262e045e045830be7"], 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000e0095000000f1ffffff"], &(0x7f00000004c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200)={0x1, 0xffffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000500)='fscache_access_volume\x00', r5}, 0x18) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32=r4], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x8, 0x0, 0x0, 0xa1880, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r9 = gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x3ff]}, 0x0, 0x0, 0x8) tkill(r9, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) read$watch_queue(r6, &(0x7f0000000340)=""/139, 0x8b) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000e80), 0xffffffffffffffff) r11 = add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r12 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r11) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r11, &(0x7f0000000380)='blacklist\x00', &(0x7f0000000440)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r12, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000340)=@keyring={'key_or_keyring:', r11}) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r13, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000009c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="0100000000000000000009000000440003800800010002000000140002007663616e300000000000000000000000080003000000000014000600ff"], 0x58}}, 0x0) 2.351040171s ago: executing program 4 (id=1873): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0x2000007d, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000e6a611f500ea205548215fb0fcc8017a55483893f776cc91658e03d09c4785e89d5842fea2f8f95983fe68a66d1150e05a744d0b12684e393537f46a6cff0494d5a31e4163b4c1dc48a214cdcd0795cb805d165e9e08a2fe77cf39204a78131952065d870ac0dd8da3c90a594f8edc8df3272436c1", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r4}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f00000006c0)=@v3={0x3000000, [{0xffffffff, 0x2}, {0x8009, 0x56}], 0xee01}, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x93254, 0x11b22}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8, 0x2, 0x2}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 2.028445204s ago: executing program 0 (id=1874): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x57, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1}, '\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x8f, 0x5, 0x8d, 0x8, @private1, @local, 0x8000, 0x1, 0xd33, 0x8000}}) ioctl$TIOCVHANGUP(r3, 0x5437, 0x8000000) 1.654400126s ago: executing program 3 (id=1876): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x72, &(0x7f00000009c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000210", 0x3c, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "e68634", 0x0, 0x2f, 0x0, @private1, @local, [@routing={0x3a, 0x0, 0x0, 0x40}], "ad589e64"}}}}}}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r5, 0x0, 0x8000000000000}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) prlimit64(0x0, 0x7, &(0x7f0000000300), 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r6, r7, 0x4, 0x0, @void}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) 1.531106078s ago: executing program 3 (id=1877): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300040018000000fac8388827a685a168d9a44604094565360c648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902fc3a10004a320c0400160012000a00000000000000000000080756ede4ccbe5880", 0xec1, 0x0, 0x0, 0x9e5e111c47e3504f) (fail_nth: 3) 1.530184107s ago: executing program 4 (id=1878): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000180)=0x4, 0x4) (async) memfd_create(&(0x7f0000000000)='\xf3e\t\x9f\x918\xc0y\x01c\x1fnux\x00sV\ad\xb0l \xfd\xd7\x8e\x7f\x89\xb8\xc5;~\x04\x03~K\xfbP\x84=\xfa\x81\f\x1et\x10\x0e\xcf^9\xbe\\', 0x0) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x4e24, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x4004) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000cbffffff00000000000000008500000041000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) (async) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}}}, 0xb8}}, 0x0) (async) syz_emit_ethernet(0x46, &(0x7f0000000000)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffff, @loopback, @loopback}, "00186371ae9b1c03"}}}}}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r3, &(0x7f0000000a00)="3052f48e780a5602ed24c89efbe0a8f54fb2ecf63afb96c01562f019ba82d7e8610c80a93f3c14499863ad23951d5f437402dee0f3a46a4ff40a7a38f91848fafaf8448c63a2f7a76c337d59f251d168104f0b24f6ab969f737fca7805770a9e440299ce5a383e15cc30789e8c5edfb921a13b0e98d246754c8ed097af8f6a5a3ae2ee0040c010f07b2cecead9f4f96431e70bf2519d56f10cfd4afbee4e9d971ab0d805e6d5de70805ddaf1e0485937db31d9617787c276ffc1fd4333b49f9f9b909e727e2ed1a85671449438b3d1ba439e2c68f5d704d60af20fbb66609b50460b5704efc677912261b680c297ad429375859c7ea22863b1f029c022a226c3e8331fa6bc854777ae69cd378d8a7880623817b8b93bafee74ef7e88b654d519813e533c85a5d27dd9c7aeeb52f4d1cf8fe5c8064c66668a6dcd8d052a19ec72d8cab63c95608cfc5c9596c76be9c73b45ab4a1be80d01868ec40f34aedb54052bc0a0c912a4d0ee45f140b2d207d5652a7191d4779aaa6a1250270098147151d264b57ba6ae01876db7b4ad56013586744060ad551a826d8b001a26927dbbfefcfe7ed058680a6d9b5f7e05d8ee02b5fda7e9955a63eb0ef03d7a5dad9335b35cb7c991d5ba112bc938685c0150fc6d3b6b0e21d6e638a5912b00a513c6a3d91ca9a0de2aaba3453a7fd33c773f947cf415f8f37356790009c70e3a486db4425860b5d1af9f76471f895af166b9a7dd64659b1fb16a8f06e5d011d197143a8951b18d8ead3b942cf584aa6ef03b9f581ad8eeb2808ab2a3e1a144e959499ef7f18dacbf57fc70abfbb46702a1eb86aba15da4799a8b6de183f16abd8abb34f88e3939c3253e10efab57620b1556d1a4b718b6dac4a964e550350bfb34a9ef3671ab1bd0118be342cdbf74bd1ef857e654b044a91f10fef591e8f0aec69ffb307eb8cdc44f4cc1efa1085a0c7864e6cb4e0822757bee087eec66d7837ce38c46b8977544ce9979b73f68dc06bb8c4d565497c662641b305eba99d018eb6bab36502a6b4ee1e7d7b3d17d16da9a0c2bd5c0279cf17b819db042847bc28a14d6af2dcd1bdec952c6f95de4b9ef83a2a5907331c12d58721676081ccd8da60559436d03d71a4e8312e6772965498569ce7d277e1a8266b2119e1e054011ce8c8be56371ddde78f71bd50597210781078b326c76292b618060229b257489a4c8af6edfc00361ffe2021b4a5028f748033b9630a5f1f3ffd52d85df2adf1960ea7052e20b543c8096263eadff215def06797f1b3ab16737771650105ac49ed70b6b30b00aedd909ac0c5b8b27af5c978ddb41dbc9d4b5d251d350b3b03d08e8cc6a128ceed1351a4bdc4d6f2d18aa8a5248b6b8496cecde79038b086769751a2dde20ba0a126c1165a39d166f46271921f21f77b1d7c168645462b4eca4a957550b28d33ff7f55a86ee390fc18a53b08dcad45616627641b460b737d8426683b95502473dc397e86a9edfaf7179cedea27394ae7c24ae008728a31278cf78102842ea27c85d442e09f74b1df242b851620880fb5b655134f2f8259c13d26a743649e3922247d9cad8c77fabf616db434ca513d37ae0b5cc8fe9e7ec5c21c00b828c8d48bd349f2f9301230a8998cf54ff428a2bd1bdd5c6323908dff1e97aa68dfd6b0dc8f90964a8231105785c668a5db60d8d55848865778e904cf5e53a17cc86697a158cfaf4e3407fa716bb525fb970212a42c995de7e312d837b284c547a88ba62d31a7d77c2bcd04b7c24876d721433d1ffb3327c0f5b3485071d0dc6155171d84475260e2a53f56b0ef81d0d3d215930f6b473e36304db9fe74407373cd4836ccb5b310fba6ca02013dffef3d010aa9a0ea027b318c958787f89653a89d9c3be1aca0695d73afa21285269853cfd0312c4bad8c5cbb93ad098b4cdcd2812354d163a2ea3fbeb560a5603550c1ac6bd155450a04be14fd09c7883bde09c8f1317ab942f38de75601151a6a729da00b40b62409a5140311f284a9a675cdfe4a5fc08af36cde2073e9f01f86b8132c06ae136f35a89c4cabf367a02012e39cb95cd90b7846b6893d9e075ec2d3e5263b60f6c088bcf21691fa9862f1c3ccf0c532d7f7f492b05bddf2da4d81753cefaa4f4143a51f58d13cc2a101afc93d9a3c53ebfd9bddf896ae65c3563b59ba2572d3aacfa4878e27a07a6a816e0e97750ad48022bcebfc0b07408b791cf597ff38ccdd8b83aaa124674078988f92bd2f1cbb5ad7bb18d56b6e0c7bfa6a3862ca8507496db336be93aeee6c6d1aabf9064d1420ab9155fb404c9fb5aec645a97fc684cb08d7ce303b2222e4cbd860f621d0efbd8ec380be9c1fe421647616054313d8f3c5995b6608288d8e0cab7cf6cc5287c69a76fa3488c4f116b02ecca645fdf01615ae428c507a452716b6da1cb15528d290fbe33514476b54d55454dd44d9f10ae468313544f7f350235f8b0cadfab73430b371fd14473a94156831b7f593725ea54467c650d9cd0161f7fa55139076ced1d9efa199f19448776a5594ae6301bc2473f356d19b6dc41707a81210bd142c7a6ee2cb861211e62fa769a5a997af011980a4df0ee33ef3004e549e13a5560e8562ffc66e291f02c11f66c4005c2ca69e0f7c1e98b3be7e4cd6db9d89d8094eabce95dbfdfa5fddfe3dfe8e0ea95c7f77d9d78638fa4b03f6123a02f1b6834a7e19c3650a4d2360d4ab0571f0cb71c9cff9f50d541397dcc7b81ea3917f0575a43ee6cf15ba3b02b4a4ff3cd6fd7ec36426d3b5d825de7c638cf14dc99adf63b90fddf141c11fb55c7788868892ba7ddca5ba08222e1ee390a36e2dce7644aa5de7e6289b560d1dba95fd2b17eeb0eb4dd5c7850f06dbe44a8b26300255540d520212884a3ac9dc981a1b165bb1a3d5f48a663c4d9d5934688a5de25e0b4c1d246b2a7c846fa2cc86faecde4d71b3d4b53760f95d80aa84d7e3745a6aec6f9705bc4100bcf1bd8c74857b343852f699a3a4cbd10330da10b28a5cf0f054381a426bf812bd0e7714a99680f1005d82d8e3335cbd8c6864e14c0cd56388e3398f3c63c5e28d8985b410ebaa393bbe941ece18bae7dc4ab5cbe07768348eac164974e8cf606b509f9247002ad93898c86328daed8a7e0426a82d509e0589eb2e1a64ba1213f267eb7d42a93671044e65d83b7740191374a5eb8dbd6daa57685039316d544618164f7369b6a8a141977a1a43a95dfe4118d419c9278cb97d9fb54b62381a5059f02d8c1307217c2e027b79ab949e73029f51e0937236cc7b848444d1e7cf7a73a8e22e88cd6792bc4f06307565a07f6487bfc62c01f79ac904b5f498272475408814cffd199b79fded4b14eb6d8291da7a032f746eda8ec4bf21d863934655c2a789418b082efb6402105c9e35b2c9be2ac29e1c51a891be248a0d47d5fed2dfae5e8488a5a27f0b27f4530fe142d4c5cc7c95f26589cdde91bd1971cdef2910eb4d86eb574b6880bb52b448f0f7581429dedc6922adb4b141d76431cea6db84cdd214d61bde9cbee66aa5f43c405b1e4d6bd19f7cbc28379798d3e20eec4a5646d58a86932f5e65c9321033366ab869aff3173b785a3a10470d1e492a7863a88c2b88beb86463b6fc63296235edf286287c81190444fb16fd6624798985d0342244ae581bf8bf6f260260ea8beff1a8829c82c1e6fb261900f954186b8e3bc571a57a5c192d1f7989f003da6fbc238c1c6c5f5b2349adcf41fa9d170de5cccca456ab398f75364078851652d9cf83e32bdbf1dbd8ea7cf6a02f44c7c8a2472950e74989092ff61362093f34a8cf4c637a3326780cf01d6b7acefa0f40e1ffd68348f11b7da9c220c52b60be3daef269fb0c000138484bccb8d5a5103113a4669b4e8872ea13be02441aca978e8c3343e9bf1e11ab8f578fe865a709ca1ecdd4a3f18ccd49b5f7e6cba656fcacf6b8851c12c5f1fec7be0a8c02b6f8f2a6d618f9423a27565192d2d8aa35e926b4e677df2458e94ccdee4ee516c7e38449e06a61a5bf3a4f8559497cd5a1abc992a954ea0dc26bb5b64017bf5f43ce4ec1f807e7f5f6397a883ccd831b3d0d6659df54a99b6ea1e8d2aaaf3ed5524be4b00623b9a87f668c9f77a03acba621b580e85c2e84fa1d705bf0cad4bd570e2254333cd54a54cf337ba6cc0cd094aa783816cee927035b8093f90ad956a166592e1fd4884a20301376edfaa68fba5781d2cc79e9a2bd5ff60c6e71429d9ef404936199e33c87082033bc4ddd1563dad30ad1df29296ada2b8bd1d29c4162a086615bd1927e37c3c42a9a8f743b65885caee48a5139f3f24707848993e52824ebd607a3d292fe1d3d5748695d305ba7e05acb0fe7c5ab6cc50b12d4ba4cdc04900239b449e40a74b7e97cc4b98b0b0423df682dd643353be677ccf0d250b7a09803e8f02a6494558b142c1959cf827a38f73ba7fb0f317e93b4a873daa1546775da026b80224a17064c99a70258478829e7463e904ac183ab77a675066f352fb795c50aa0dced06062fbb16cd3597e2ee13fcc5d9681c4bba5994b7c550f8f038b40d986453732c88901d82fadd2101128caa3c40e7955389b1463ff533a6c84d5eaf60c084dc4cd52c4cd6f668f078c398869d75d5185ff2ad2a5c6d21ed3c8d1a3422b662b2640a11af43ebcb860b6fd2c4d604c8f644c3d196055e6e3ab67a4c7567d34245619c092859b504a365c3ee3002afd2a436657924014ef2509ccb94b1564e70489570731d56ff84d46a90c35623636805b5f41f79553a6084d522e1b40c2f53008ee1ee5e8897295d64a74088f502f056831d491eb82c00c885210f0024ea352687c02687812e008a8b1c6c41d19fd90b96d4e49b7ebdda3bcbd21a41a7d45f751118f4b1134ab80afeb260eaaf18633892cc56477a7600f3d6a4d61be4cbcf9196d3e72717c2f26e6f5a1808a733c2f56c0f234f4c585d1915c128b053e4c04e11e2f15170fb9b655c4935baddf5ba925ca8c5f721945d6722cd06c56bd7caa44bdba969273d01dc5574a3d91d59c9be3308032c78aa8d21df298fb75d10250909bbb1dc4c8518c5cc9936b66f0a90a23b7e0a7a6af75408a7f93578133f26eac46a11c70116b2dd23979d73da8fb94a64114255a9a852256acbfc94f891ab3bc9e09eaeed809fe8d174077c0536235557867667f27dcf4e393abee46b88010d93ea55a27bf877b8b8efec1ee7fa9591fb92d30b31ce0a152a9d56209bc59a4dc38051b954f9c8de5fab4a4827fb198b6b88d5e58374026893029b511503acc8c3a6f86f914a088b2ccdd08e06e3fd4e254b7c6af1c92769e4396c7398d98dea0bb898ca51a4afd5430d075740aea653e999997667e030cb2ce20e405baad2c0a87c53ecb4572c304536c9cc9ec3f4165ea560512e8836021509724c4d70dce646d325861755db8e446bd3bc0834a58882cb01f1c1802bd1032b489786e3e6dd7767cae170c3f7cccc308fc2edf84786dd71947e342303ef6a4dcbc02a4d421d5475c09641752e6d854d90c2a9b197efff9b7693fd5bcb56532de97f4f478b84e160bec02cf7112512176ab1943e2c37631d0e56f17e5904745da1426d58332b026eb03a0ab69264a5fde3798403cb5041e2f9a6e3b58e9e01416f56678b0b986d49d76e8cbcc1670fe39b9064056a3fd60cc5b08b92029dbc3bde05684c1a850e5bd2fd890243b276508b4e1371e514cee04407882bd07bb76d5ebf3b9023b76cee4abcb12ffb3f7d8ddcad58cee3759cfec3de52c55"}, 0x20) 1.291208229s ago: executing program 3 (id=1879): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) (fail_nth: 5) 1.290514189s ago: executing program 4 (id=1880): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESOCT=r1], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='kmem_cache_free\x00', r3}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000530464"], 0x14}, 0x1, 0x0, 0x0, 0x24000841}, 0x4008840) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000f9ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r5}, 0x10) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file0\x00', 0xc80, &(0x7f0000020100)=ANY=[@ANYBLOB="00631dda01aef2456795dd9b26209f1c0f624854ea3dd5a00bd6df44035f5c3ae796fec6d633a0ffad0569794acfef7da01767fd4175f2cd82df769aa2ee7bfe3640554507d2e660c9f9e222a72e1e3e71145c480657d2864e5e276f028d64701ae31cde0ceaf408fdb05c0f4142da00e900000100000149e6d308cbe315789f4baffe39bbced9b1d421d2e290e9fc563b62225f002ee310e1fa7321000000000000d6231001a4b2d467825f3abb0c167e129cf1fa0e7854103f4bf2d3a0194983bc86cbd3d75ccef3c8ac4516dac102"], 0x1, 0x27c, &(0x7f0000000600)="$eJzs281qE1EYxvGnH9ov20Sr1VbEF93oZmjjFYTSghhQaiN+gDC1Ew2ZJiUTKhGx3bn1LoTi0p0g3kA3XoELd9247EIc6UxskzaiFXRs8/9tzhvOPOGcnDPhLGY2775aKhUCp+DW1N1l6pX6tSWl1a0exboabXdUH1ezNV0dzX26cPve/RvZXG5mzmw2O38tY2YjF98/ff7m0ofa0J23I+/6tJF+uPkl83ljbGN889v8k2JgxcDKlZq5tlCp1NwF37PFYlByzG75nht4ViwHXrWlv+BXlpfr5pYXhweXq14QmFuuW8mrW61itWrd3MdusWyO49jwoPAr+fW5OTeb9Cjwd1WrWXda0sS+nvx6IgMCAACJanP+X+P83yk4/3eC7fP/g8b924rzPwAAAAAAAAAAAAAAAAAAAAAAh8FWGKbCMEz9aI9J0Rs+YePzgKRBSUOSTkgaljQiKSUpLemkpFOSRiWdlnRG0piks5LOSRpv+q6k54r9kln/gSSnjCbc/52N9e9sTS/u9ktLL1fyK/m4jfuzBRXly9OkUvoarWVDXM9ez81MWiSt80urjfzqSr6nNT+l1PaGaZefivPWmu+L9t1OPqPU9gZrl8+0zffryuWmvKOUPj5SRb4Woz25m38xZTZ9M7cnPxFdd9Q5tqPt+jnOz/rj/AH2x57ft1cTvcnOHVJQf1Zyfd+rUlAcheK1/othHP4i6X8m/Au7i570SAAAAAAAAAAAAAAAAAAAB/GnTwiGq3H+dy5Oeo4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOz1PQAA//+5gF2o") creat(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x160) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) ioctl$AUTOFS_IOC_FAIL(r7, 0x4c80, 0x7000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r3, 0x0, 0xf}, 0x18) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r8, 0x0) ftruncate(r8, 0xc17a) io_setup(0x200, &(0x7f0000000140)) 1.084986241s ago: executing program 0 (id=1881): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x0, 0x700, &(0x7f0000000a40)="$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") bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000001680)={@fallback, 0xffffffffffffffff, 0x2f, 0x0, 0x0, @void, @value}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x2f, 0x2020, 0x4, @void, @void, @value}, 0x20) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x301081, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x23}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x40040) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x100}, 0x18) process_madvise(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x14, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) futimesat(r0, &(0x7f0000000240)='./file1\x00', 0x0) 1.063159531s ago: executing program 0 (id=1882): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018008, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRES16=0x0, @ANYRES32, @ANYRESDEC], 0x1, 0x2f5, &(0x7f00000004c0)="$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") mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./control\x00', 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000070000000100", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000ff0000000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x8510, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, @perf_bp={0x0, 0xa}, 0x1020, 0x5dd8, 0x0, 0x5, 0x3, 0x8, 0xfffb, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd4}, 0x24008000) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000540), 0xfffffdd8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000a80)='kfree\x00', r2, 0x0, 0x1d}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f00005ab000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) 1.012747102s ago: executing program 4 (id=1884): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='tlb_flush\x00', r1, 0x0, 0x3}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='ext4\x00') syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000025940000000c0a01030000000000000000070000080900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b802c0001800a0001006c696d69740000001c0002800c00014000000000000000030c0002400000000000000010140001800c000100636f756e746572"], 0x118}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0)="45fb00568cf8c46fa7dd4fb85ae111084689ede7819c124023975d773e132362400789b1d1825fd521358d1406fa3680d5b59d92e07012dd02826c205e8be759f60a37f6ee8a0e1d3205dd6b6730d8aa22535b655a8f0cc7fe5fc1acca211492d16ab4782cf700eef67f974390c53735eec87ddca5aa66e58344bc3aeebdb2a5825a66a84cb6def2a6891e135d765a96dfc489f0feeb", 0x96, r0}, 0x68) 952.759692ms ago: executing program 3 (id=1885): r0 = socket(0x10, 0x3, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="2400000007060101000000000000000007000005050001000700000008000640000064ac3c541fd8018d"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001540)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) socket$packet(0x11, 0x2, 0x300) syz_open_procfs$namespace(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x4f, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x7, 0x2, 0x8}}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) socket$key(0xf, 0x3, 0x2) r5 = fsopen(&(0x7f0000000180)='proc\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) fsmount(r5, 0x0, 0x1) inotify_init() socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = socket(0x840000000002, 0x3, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) r7 = socket(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="db06d8a8724b575c102d12f239f40419868bfd6101ea2289331f20701eb024e533debc91e50d38ed", @ANYRES8=r7, @ANYRESOCT=r5, @ANYRESOCT=r6], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 917.882002ms ago: executing program 3 (id=1886): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000010205000000000000000003000004000280"], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x4070bd2d, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xffe0}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) socket(0x3, 0x3, 0x8001) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000001080021850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000b40)={'\x00', 0x7ff, 0x5, 0xc, 0xfffffffffffffffd, 0x59c, 0xffffffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = socket(0x10, 0x2, 0x0) write(r7, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) recvmmsg(r7, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 915.463682ms ago: executing program 4 (id=1887): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001900)=@newtaction={0x160, 0x30, 0x1, 0x0, 0x0, {}, [{0x14c, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x0, 0xfffffffe}, 0x4}}]}, {0x4}, {0xc}, {0xc}}}, @m_simple={0xfc, 0x1a, 0x0, 0x0, {{0xb}, {0x80, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x7, 0x9, 0x3, 0x7f, 0x4}}, @TCA_DEF_DATA={0x8, 0x3, 'GPL\x00'}, @TCA_DEF_DATA={0x6, 0x3, '*\x00'}, @TCA_DEF_DATA={0xa, 0x3, 'pedit\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x4a, 0x10000000, 0x400, 0x7}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x7, 0x7, 0x6, 0x388}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x1, 0x10000000, 0xa8000000, 0xffff7fff}}]}, {0x52, 0x6, "58f532bcbc510c48eac376db6e0a913409f74dfe54bc8dec16ca7a65f99df045fb179b8a7bc33c27f203dc0c734c4fc547a4074584c525c1e1f245c416df11bc3393cf877592af8be79e47774273"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}]}, 0x160}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) socket(0x2, 0x80805, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) ioprio_get$pid(0x3, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r5, r7, 0xfffffffffffffc01, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000200)='kfree\x00', r9}, 0x18) r10 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r11, {0x0, 0x2}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 863.363232ms ago: executing program 1 (id=1888): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d40)=ANY=[@ANYBLOB="12000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3, 0xffffffffffffffff}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r4, 0x0, &(0x7f00000000c0)=""/22, 0x200000000000000}, 0x20) 862.724843ms ago: executing program 1 (id=1889): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0x2000007d, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000e6a611f500ea205548215fb0fcc8017a55483893f776cc91658e03d09c4785e89d5842fea2f8f95983fe68a66d1150e05a744d0b12684e393537f46a6cff0494d5a31e4163b4c1dc48a214cdcd0795cb805d165e9e08a2fe77cf39204a78131952065d870ac0dd8da3c90a594f8edc8df3272436c1", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r4}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f00000006c0)=@v3={0x3000000, [{0xffffffff, 0x2}, {0x8009, 0x56}], 0xee01}, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x93254, 0x11b22}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8, 0x2, 0x2}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 697.447644ms ago: executing program 1 (id=1891): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x57, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1}, '\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x8f, 0x5, 0x8d, 0x8, @private1, @local, 0x8000, 0x1, 0xd33, 0x8000}}) ioctl$TIOCVHANGUP(r3, 0x5437, 0x8000000) 501.582466ms ago: executing program 2 (id=1896): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a000000020000000900000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x1, 0xccb8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="120000000c00000004000000b47c000000000000", @ANYRESOCT=r0, @ANYRESOCT], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x18) r3 = syz_open_dev$loop(&(0x7f0000002f40), 0xac, 0x800) ioctl$BLKFRASET(r3, 0x1264, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) socket$rxrpc(0x21, 0x2, 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0xfffffffffffffffc, 0xc, 0xfffff7fffffffffd, 0x0, 0x572, 0x0, 0x8000000000000001}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x100, 0x9, 0x2, 0x0, 0x7fffffff}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='rpc_xdr_overflow\x00', r1, 0x0, 0x7}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000009791000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x50) (async) write$P9_RLOPEN(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0xa14846, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x0, 0x70a, &(0x7f0000001400)="$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") (async) r4 = openat$dir(0xffffffffffffff9c, 0x0, 0x800, 0x0) getdents(r4, &(0x7f0000000400)=""/4096, 0x1000) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) syz_mount_image$ext4(&(0x7f0000000600)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x4042, &(0x7f00000000c0), 0x7, 0x4c6, &(0x7f0000000b00)="$eJzs3E1sVNUeAPD/nc70Ax6PPh6PJ4hJEY2NxhYKCgs3GE1caGLEhS6bthCkUENrIoRISQwuDYl749ItC7fqzrgycYsLFyaGhBgSA7gac2funU7no5/TjjC/XzKdc+49955z7rnn3jP3zDSAnjWS/kki/hURtyNidzW6PMFI9e3BvatTD+9dnYrFcvn0H0kl3f00nilk7zuzfY4WIgqfJg07rJq/fOX85OzszKUsPr5w4cPx+ctXXjx3YfLszNmZixMnTx4/dvTEyxMvrb9SLfJL63X/wCdzB/e/8f7Nt6aK+fLB7L2+Hp0yEiP1RblVX6xnO51Zl+2qCyfFLhaEdUnbLW2uUqX/746+0HjQK8rlcnmg/erFcqPrTUuAR1YSbVYMZpcH4DGV3+jTz7/5q3b3H9ry4UfX3T1V/QCU1vtB9qquKdaeZ5QaPt920khEvLf415fpK1Z6DvHrFhUAAOg5353KR4KN479C7KtL9+9sDmU4Iv4TEXsi4r8RsTci/hdRSfv/iHiiMYMkorxC/nsb4s3jn8KdzdRvNen475Vsbmv5+C8f/cVwXxbblX4eri6bOZIdk9EoDZw5NztzdIU8vn/t58/brasf/6WvNP98LJiV406x4QHd9OTC5IYr3ODu9YgDxcb6J8W04fKZgCQi9kfEgXXsd7gufO75rw/WIqXl6Vavf0W5xZRedGKqovxVxHPV9l+MZe2/lGOy8vzk+GDMzhwZT8+CIy3z+PGnG2+3y3/V+n/zW+Mmr5/49vRmq12Ttv+OuvM/8vnbpfoPJxFJbb52fv153Pjls8p+Rw43r9vo+d+fvFsJ92fLPp5cWLh0NKI/ebN5+cTStnk8T5/Wf/Rw6/6/J9smPRJPRkR6Ej9VdwKnZT8UEU9HRIuq1fzw6jMftFu3xvN/y6T1n25x/bu2vP2X5us3EOg7f+j2wzYXj7W1//FKaDRb0vr6lyy7RKy1gB05iAAAAPAPV4jKd/8LY7VwoTA2Vn0GtDd2FGbn5hdeODP30cXp6m8EhqNUyJ90VZ8Hl5L8+edwXXyiIX4se278Rd9QJT42NTc73e3KQ4/bWenzSVP/T/3e1+3SAVvOT36gd63W//fd3KaCANvO/R96V13/X2yTZNE3ZeDx5P4PvatV/7+2gW2AR0tZX4aepv9D7yrGO7VwoaslAbab+z/0pM38rn/1QHmgYclANTAYzYljcGuKMdQirxaBg1t2EPJAOrJa51Z/9kdsPvehjWyV/zeFtmmisL4dDkTzqr7o9HEuxRqO2Nl9HT/5y9l35Tt92tzaln7aKtCVyxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDH/R0AAP//b9HZQw==") 478.489866ms ago: executing program 2 (id=1897): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, r2) (fail_nth: 2) 415.272557ms ago: executing program 2 (id=1898): r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3) r3 = getpid() sched_setscheduler(r3, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x3, 0x10010) r4 = fsopen(&(0x7f0000000140)='nfs4\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x5) fchdir(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x31) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x2c, 0xffffffffffbffff8) dup2(r1, r2) r7 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0xa5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), &(0x7f0000000180)=r8}, 0x20) bind$llc(r7, &(0x7f0000000000)={0x1a, 0x0, 0x1, 0x0, 0x3, 0x4a}, 0x10) close(r7) fcntl$setown(r1, 0x8, r0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000), 0x2, 0x0) quotactl_fd$Q_GETNEXTQUOTA(r1, 0xffffffff80000901, 0x0, &(0x7f0000000080)) tkill(r0, 0x13) 384.275477ms ago: executing program 2 (id=1899): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x18020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000180)={[{@nolazytime}, {@abort}, {@lazytime}, {@mblk_io_submit}, {@noauto_da_alloc}]}, 0xde, 0x53b, &(0x7f0000000e00)="$eJzs3c1vI2cZAPBnJnbIdlOSAodSqR+ii3YrWHvT0Dbi0BaBuFUClfsSJd4oWme9ip12E1WQFX8AEkJQiRMnLkjcuCCh/RMQUiX2jgCBEGzhwAEYNOPxNmvG2cD6Y5X8ftJrv/OOPc/zOvb4nY94AjizXoiINyNiLiJeioilsj0tSxz2S/64D++9t5GXvPntvySRlG0RRfW+8+XTFvp3lbr7B9fX2+3Wbjnd7O3cbHb3Dy5v76xvtbZaN1ZXV15de23tlbUrY+ln3q/Xv/KHH3z3J199/Zeff/e3V/906Vt50l8u5w/6NT7Fqxd3i9t6/lrcV4uI3fEGm5m5sj/1WScCAMCJ5KPUT0TEZ4rx/1LMFaO5wvCQbmH62QEAAADjkL2xGP9MIjIAAADg1HojIhYjSRvluQCLkaaNRv8c3k/FE2m70+197lpn78ZmPi9iOerpte1260p5Tu1y1JN8eqWofzT98tD0akQ8FRHfXzpXTDc2Ou3NWe/8AAAAgDPi/ND2/9+X+tv/AAAAwCmzPOsEAAAAgIkbtf2fTDkPAAAAYHIc/wcAAIBT7WtvvZWXbHD968139veud965vNnqXm/s7G00Njq7Nxtbnc5W8Zt9O8ctqx4R7U7n5hci9m41e61ur9ndP7i609m70bu67fqBAAAAMCtPPX/nbhIRh188V5TcfH4zN+IJzhWAUyMd0V75Mf/9ZHMBpmvU1/wJzI8zD2D6arNOAJidw1knAMzaAz/1UTEoOHryzgP7DH41uZwAAIDxuvjpO3e/XXH8v1aezw+cXqOO/wOn3yMc/89l48oDmD7H/+HsqsdctnTiR9+eaC7AbDzsUh8jf7yj6vh/5ZnBWfbQZQEAABO1WJTn00Z5LHAx0rTRiHiy+B/genJtu926EhEfj4jfLNU/lk+vFM9MXB4QAAAAAAAAAAAAAAAAAAAAAAAAAE4oy5LIAAAAgFMtIv1jUl7/6+LShcXh/QPzyT+KywPOR8S7P3r7h7fWe73dlbz9r/fbe++X7S/PYg8GAAAAnEW1Y+cOttMH2/EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAME4f3ntvY1CmGffPX4qI5ar4tVgo7heiHhFP/C2J2pHnJRExN4b4h7cj4umq+EmeViyXWQzHTyPi3HTiP5tlWWX882OID2fZnXz982bV5y+NF4r76s9/rSyP6oH13/zPj8xJ76//5kas/548YYxnPvhZc2T82xHP1KrXP4P4yYj4L1YtsOJF+eY3Dg7+q7G/8Mh+HHGx8vsneSBWs7dzs9ndP7i8vbO+1dpq3VhdXXl17bW1V9auNK9tt1vlbVWI+N6zv/j3UPR/ZX1F/6MfP6rWv8f1/0JeqR9pzIbDlME+uHXvk/1qfWgRRfxLL1a//54+Jn7+nvhs+T2Qz784qB/260c999NfP1eZWBl/c8Tr/7C//6VRCx3y0te/87sTPhQAmILBKGu3u39wfb3dbk2s8n6WZRMO8X9UIj3pg4vhYkTMPufJVGqTficsPC49nXLlwuORxv9SGceeLQAA4HHz0aB/1pkAAAAAAAAAAAAAAAAAAADA2dXdj3TSPyc2HPNwNl0FAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADjWfwIAAP//nJjX8w==") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x641, 0x1c3) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x18) fallocate(r2, 0x10, 0x2, 0x807c27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) (fail_nth: 5) 128.563379ms ago: executing program 2 (id=1900): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x2804, 0x0, 0x0, 0x0, 0x400, 0x10001, 0x1, 0x0, 0x0, 0x0, 0x1c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = socket$inet(0x2, 0x4000000000000001, 0x100) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x20, &(0x7f0000000180)=0x5, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f0000001480)={'fscrypt:', @desc4}, &(0x7f00000014c0)={0x0, "8062999da2dba5b7afa3320e8abebbad17b644c56790c945bc49ca7bddac8b2a8467d50153af3abb56f7d1266c0c3b194ee46aac438ff115770cb610d421110a", 0x38}, 0x48, 0xfffffffffffffffd) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x20000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x20, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0xc, 0x2, 0x0, 0x0, @str='nl80211\x00'}]}, 0x20}}, 0x0) recvmmsg(r4, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/189, 0xbd}, {&(0x7f00000003c0)=""/152, 0x98}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x3}}], 0x7, 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r5, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000000)='0', 0x1}], 0x2) 104.351129ms ago: executing program 0 (id=1901): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000054850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0xf6c447fee59251f4}) close(r2) 31.21932ms ago: executing program 2 (id=1902): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0x2000007d, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000e6a611f500ea205548215fb0fcc8017a55483893f776cc91658e03d09c4785e89d5842fea2f8f95983fe68a66d1150e05a744d0b12684e393537f46a6cff0494d5a31e4163b4c1dc48a214cdcd0795cb805d165e9e08a2fe77cf39204a78131952065d870ac0dd8da3c90a594f8edc8df3272436c1", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r4}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f00000006c0)=@v3={0x3000000, [{0xffffffff, 0x2}, {0x8009, 0x56}], 0xee01}, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x93254, 0x11b22}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8, 0x2, 0x2}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 30.573229ms ago: executing program 4 (id=1903): r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449", 0x80) 14.1143ms ago: executing program 0 (id=1904): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x0, 0x700, &(0x7f0000000a40)="$eJzs3V2P21gZB/D/STJJJoWqAlStqm7ndMpKUzGkTmabKipIGOckY0jiyPbAjIS0KnRmNWqmQFskmpt2bniRli/A3d5wwYdYiQuu9lvAFUgrEBJiBUJGPrbzMnEykzadbtn/b7Qbx358zuNjr896xj4GERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERERQVgNw6gItO3uzq6czWq4Tif5ksXU8qi0FdyMJm7Oq3MlrBcQ4T8oFvFWNPutr4xCLof/WsfV6NtVFMOPIgYXLl+6++VcJll/TsIvAosW+Pjp4MG9fn//0Rlis1i4+NcJmTMEtVTX9hy7Y7aUtD1H1ms149Z205NNu628Pc9XHWm5KuM7rtywbspKvb4lVXnP2em2GmZbJTPvfL1qGDX5nUK0owGUPWvbbrftbkvHhIvDmDvygx9EAcrsSHlw2N/fGsvnWVobh0GVlOQz48FhUPW0za0a1WqlUq1Warfrt+8YRm5qhhESxhCmIpZ+0NIbZrkncKKXkLEa/zH+JIA2iuhiB7uQqT8WGnDhoDNjeSzp/9+5pebWO97/J738ymjxFej+/1r07dqs/n9GLhJSr5C2RMyYv9jPis5I4jGeYoAHuIc++tjHoyWULSHXXrqEvBG35FLymfnTgkIXNjw4sNGBiRa+CBnPkaijhhoMvIdtNOFBogkbbSh42IMHHyo8ovJhpgomfDhwIbEBCzchUUEddWxBQqGMPTjYQRctNGDiX0EQHOBQt/tWnM/zlK1GElSZsREF5JLjbh/VOVs7q///4bNo7bj/N9j/f15Fx0Eh+vh4XgzRZ0AQX/8vaO3VZENEREREREREr4LQv30X+q/ybwMI0LTbypiIKby27IiIiIiIiIhoGQSCAq5CRHfl422I6et/IiIiIiIiInqzCf2MnQBQ0jf1i9HjUmf5JUD2HFIkIiIiIiIiopekn/y/lgcCfZf/GsRC1/9ERERERERE9Ab41dgY+7lsPMZukPxZPwNg7c8F8dHfCnBXxHFv96viyAyXmEdxzNQdAH7zirgYD9SrP/IA9DdLXRVxbRL4Z/Lbh9AnB+lj/T8PIkII90QC+ex4ATMSEGHNtVz8DR/gerTK9Xic+fuDDPSSaEThUtNuq7LltO9WYJoXM77a9X/28PDngDvczoPD/n75Rz/u39e5HIezjo/CQp9NpJNJb4xRLk/0eAv6mYu00Y1X0Uyq/HW3UxK6XiPZ/izMo8x4RfN2QG0ViLbyF1iP9tl6EMWWBsMR9wWwpgd/qJT1LpvYendFjLKonNzytB0xY8uLOosbUcyNjRvRR9ImYTkZUfxaFqiWp/fBRBbV8SxObwvx9xPtPz8LiGLYFlthFn8ICzqRxfc/ilbe6u0mw2OcJYupo4CI6HU5GPVCehDzqTH2k+4hOamdvd9BDojPcjN691EtQdx/JL37k98GUQ+VBXLx3ybSa0n6FYRn9A2hy8lHA7rnrqSc0Y3yp0EQmBeLGD+j/zcIkg0yFujdjoMgOHlG//3oHUhx2lNZ/DsIgrsV3ZP85kSv+mG4wocz6/Xa1SyKKODJ0U/0APih9/ff339YrW7VjHcN43YVK/p/FeKPLNj3EBHRlNPfsaMjMnMixLu4HpVx/f5f34mmJnq8L8W3FGi3gD7uYzN5hcBaeqklHOCb/4huQ9iMrlqB9VL0WRrIy5fuhle1w9hDkdNveNmceVWn+9IoVt/eUB3GJu8dOnkFOIrdesV7gYiI6Hytz+iHgYn+H5P9f3Gi/9/ERhSxcSX1urs0dkvhZnJ1PLykH1w4To2tnJ78t5bcGERERJ8Tyv1ElPxfCte1e+9V6vWK6W8r6TrWd6VrN1pK2l1fuda22W0p2XMd37Gctuy5KNirypPeTq/nuL5sOq7sOZ69q9/8LuNXv3uqY3Z92/J6bWV6SlpO1zctXzZsz5K9nW+3bW9buXplr6csu2lbpm87Xek5O66lylJ6So0F2g3V9e2mHU52Zc+1O6a7J7/ntHc6SjaUZ7l2z3eiApO67G7TcTu62DKChV90SERE9P/o8dPBg3v9/v6jkxOr4aV5NOcYM2KmJ/IpBXKMICIios+YUXe9wErFV5gQERERERERERERERERERERERERERERERFNOf2RvgUnVtIeFgSGc356MZ6D5xg9YjhVjsDL5vOp+0c9sN+LrJ5ZtNLkkYjBg4/nBK8O5yTNPx5zvEiluAS8cPv85QvABT0H0ZzcEg+A6edHl36MpU184yBq0VkxemHqosJwX+SW/59DOPHwd9OLRNjyQRAE81cvTLZh/uzHcw7Ao/ycXbB6yvFz3mciIjpv/wsAAP//eO06pA==") bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000001680)={@fallback, 0xffffffffffffffff, 0x2f, 0x0, 0x0, @void, @value}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x2f, 0x2020, 0x4, @void, @void, @value}, 0x20) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x301081, 0x100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x23}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x40040) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x100}, 0x18) process_madvise(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x14, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) futimesat(r0, &(0x7f0000000240)='./file1\x00', 0x0) 0s ago: executing program 3 (id=1905): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f00000000c0)={[{@nobh}, {@auto_da_alloc}, {@errors_remount}]}, 0x3, 0x4cd, &(0x7f0000000100)="$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") kernel console output (not intermixed with test programs): [ 38.726503][ T3322] veth0_macvtap: entered promiscuous mode [ 38.734463][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.745195][ T3322] veth1_macvtap: entered promiscuous mode [ 38.756010][ T3317] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.764912][ T3317] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.773846][ T3317] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.782586][ T3317] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.802791][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.820440][ T3323] veth0_macvtap: entered promiscuous mode [ 38.831447][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.842798][ T3323] veth1_macvtap: entered promiscuous mode [ 38.853107][ T3322] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.861890][ T3322] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.870831][ T3322] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.879663][ T3322] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.897325][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.909198][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 38.909214][ T29] audit: type=1400 audit(1748140287.567:84): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.N3wzzY/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.943129][ T29] audit: type=1400 audit(1748140287.567:85): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.944830][ T3316] veth0_macvtap: entered promiscuous mode [ 38.965226][ T29] audit: type=1400 audit(1748140287.577:86): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.N3wzzY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.983908][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.995953][ T29] audit: type=1400 audit(1748140287.577:87): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.025105][ T29] audit: type=1400 audit(1748140287.577:88): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.N3wzzY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.051696][ T29] audit: type=1400 audit(1748140287.577:89): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.N3wzzY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.079050][ T29] audit: type=1400 audit(1748140287.577:90): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.100067][ T29] audit: type=1400 audit(1748140287.757:91): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.122970][ T29] audit: type=1400 audit(1748140287.767:92): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=4246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.153651][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.159510][ T3316] veth1_macvtap: entered promiscuous mode [ 39.185135][ T3323] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.193959][ T3323] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.201808][ T29] audit: type=1400 audit(1748140287.857:93): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.202815][ T3323] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.236916][ T3323] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.269390][ T3318] veth0_vlan: entered promiscuous mode [ 39.277824][ T3318] veth1_vlan: entered promiscuous mode [ 39.292944][ T3458] loop0: detected capacity change from 0 to 164 [ 39.307790][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.318517][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.336846][ T3458] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 39.348073][ T3318] veth0_macvtap: entered promiscuous mode [ 39.366098][ T3458] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 39.374929][ T3458] Symlink component flag not implemented [ 39.380706][ T3458] Symlink component flag not implemented [ 39.387708][ T3316] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.396583][ T3316] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.405518][ T3316] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.414385][ T3316] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.424350][ T3458] Symlink component flag not implemented (7) [ 39.427279][ T3318] veth1_macvtap: entered promiscuous mode [ 39.430415][ T3458] Symlink component flag not implemented (116) [ 39.442737][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.454129][ T3463] tipc: Started in network mode [ 39.459050][ T3463] tipc: Node identity ac1414aa, cluster identity 4711 [ 39.467127][ T3463] tipc: Enabled bearer , priority 10 [ 39.491441][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.508841][ T3318] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.517704][ T3318] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.526606][ T3318] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.535351][ T3318] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.559837][ T3465] tipc: Disabling bearer [ 39.561223][ T3472] sd 0:0:1:0: device reset [ 39.664118][ T3479] loop1: detected capacity change from 0 to 164 [ 39.676194][ T3479] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 39.694030][ T3479] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 39.702989][ T3479] Symlink component flag not implemented [ 39.708658][ T3479] Symlink component flag not implemented [ 39.715223][ T3479] Symlink component flag not implemented (7) [ 39.721330][ T3479] Symlink component flag not implemented (116) [ 39.752491][ T3484] loop1: detected capacity change from 0 to 128 [ 39.818308][ T3486] tmpfs: Bad value for 'mpol' [ 40.428242][ T3501] netlink: 12 bytes leftover after parsing attributes in process `syz.3.17'. [ 40.559359][ T3513] netlink: 20 bytes leftover after parsing attributes in process `syz.0.18'. [ 40.572877][ T3513] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.581691][ T3513] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.590498][ T3513] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.599340][ T3513] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.612569][ T3513] netdevsim netdevsim0 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 40.621628][ T3513] netdevsim netdevsim0 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 40.630593][ T3513] netdevsim netdevsim0 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 40.639562][ T3513] netdevsim netdevsim0 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 40.684681][ T3518] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 40.696344][ T3513] Zero length message leads to an empty skb [ 41.303394][ T3513] syz.0.18 (3513) used greatest stack depth: 10472 bytes left [ 41.370780][ T3534] FAULT_INJECTION: forcing a failure. [ 41.370780][ T3534] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 41.370824][ T3534] CPU: 0 UID: 0 PID: 3534 Comm: syz.0.29 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 41.370859][ T3534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 41.370875][ T3534] Call Trace: [ 41.370882][ T3534] [ 41.370889][ T3534] __dump_stack+0x1d/0x30 [ 41.370913][ T3534] dump_stack_lvl+0xe8/0x140 [ 41.370978][ T3534] dump_stack+0x15/0x1b [ 41.370999][ T3534] should_fail_ex+0x265/0x280 [ 41.371042][ T3534] should_fail_alloc_page+0xf2/0x100 [ 41.371111][ T3534] __alloc_frozen_pages_noprof+0xff/0x360 [ 41.371144][ T3534] alloc_pages_mpol+0xb3/0x250 [ 41.371169][ T3534] folio_alloc_mpol_noprof+0x39/0x80 [ 41.371235][ T3534] shmem_get_folio_gfp+0x3cf/0xd40 [ 41.371274][ T3534] shmem_write_begin+0xa8/0x190 [ 41.371303][ T3534] generic_perform_write+0x181/0x490 [ 41.371397][ T3534] shmem_file_write_iter+0xc5/0xf0 [ 41.371435][ T3534] do_iter_readv_writev+0x421/0x4c0 [ 41.371471][ T3534] vfs_writev+0x2c9/0x870 [ 41.371503][ T3534] __se_sys_pwritev2+0xfc/0x1c0 [ 41.371614][ T3534] __x64_sys_pwritev2+0x67/0x80 [ 41.371700][ T3534] x64_sys_call+0x1cea/0x2fb0 [ 41.371737][ T3534] do_syscall_64+0xd0/0x1a0 [ 41.371780][ T3534] ? clear_bhb_loop+0x40/0x90 [ 41.371801][ T3534] ? clear_bhb_loop+0x40/0x90 [ 41.371822][ T3534] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.371915][ T3534] RIP: 0033:0x7f10c823e969 [ 41.371935][ T3534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.371979][ T3534] RSP: 002b:00007f10c68a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 41.372003][ T3534] RAX: ffffffffffffffda RBX: 00007f10c8465fa0 RCX: 00007f10c823e969 [ 41.372020][ T3534] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000004 [ 41.372036][ T3534] RBP: 00007f10c68a7090 R08: 0000000000000000 R09: 0000000000000003 [ 41.372081][ T3534] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 41.372093][ T3534] R13: 0000000000000000 R14: 00007f10c8465fa0 R15: 00007fffa39c2128 [ 41.372110][ T3534] [ 41.706181][ T3556] netlink: 4 bytes leftover after parsing attributes in process `syz.4.37'. [ 41.716301][ T3556] netlink: 2 bytes leftover after parsing attributes in process `syz.4.37'. [ 42.190539][ T3592] FAULT_INJECTION: forcing a failure. [ 42.190539][ T3592] name failslab, interval 1, probability 0, space 0, times 1 [ 42.203391][ T3592] CPU: 0 UID: 0 PID: 3592 Comm: syz.4.53 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 42.203426][ T3592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 42.203446][ T3592] Call Trace: [ 42.203453][ T3592] [ 42.203463][ T3592] __dump_stack+0x1d/0x30 [ 42.203489][ T3592] dump_stack_lvl+0xe8/0x140 [ 42.203514][ T3592] dump_stack+0x15/0x1b [ 42.203536][ T3592] should_fail_ex+0x265/0x280 [ 42.203589][ T3592] should_failslab+0x8c/0xb0 [ 42.203660][ T3592] kmem_cache_alloc_noprof+0x50/0x310 [ 42.203686][ T3592] ? getname_flags+0x80/0x3b0 [ 42.203728][ T3592] getname_flags+0x80/0x3b0 [ 42.203800][ T3592] __x64_sys_symlink+0x33/0x60 [ 42.203840][ T3592] x64_sys_call+0x2d8d/0x2fb0 [ 42.203861][ T3592] do_syscall_64+0xd0/0x1a0 [ 42.203887][ T3592] ? clear_bhb_loop+0x40/0x90 [ 42.203926][ T3592] ? clear_bhb_loop+0x40/0x90 [ 42.203954][ T3592] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.203981][ T3592] RIP: 0033:0x7f9cea0fe969 [ 42.203995][ T3592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.204013][ T3592] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 42.204109][ T3592] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 42.204144][ T3592] RDX: 0000000000000000 RSI: 00002000000017c0 RDI: 0000000000000000 [ 42.204156][ T3592] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 42.204167][ T3592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.204220][ T3592] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 42.204238][ T3592] [ 42.398583][ T3596] syz.4.55 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 42.410112][ T3596] FAULT_INJECTION: forcing a failure. [ 42.410112][ T3596] name failslab, interval 1, probability 0, space 0, times 0 [ 42.422782][ T3596] CPU: 1 UID: 0 PID: 3596 Comm: syz.4.55 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 42.422810][ T3596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 42.422838][ T3596] Call Trace: [ 42.422846][ T3596] [ 42.422856][ T3596] __dump_stack+0x1d/0x30 [ 42.422883][ T3596] dump_stack_lvl+0xe8/0x140 [ 42.422915][ T3596] dump_stack+0x15/0x1b [ 42.422938][ T3596] should_fail_ex+0x265/0x280 [ 42.423036][ T3596] should_failslab+0x8c/0xb0 [ 42.423076][ T3596] kmem_cache_alloc_noprof+0x50/0x310 [ 42.423098][ T3596] ? audit_log_start+0x365/0x6c0 [ 42.423197][ T3596] audit_log_start+0x365/0x6c0 [ 42.423294][ T3596] ? should_fail_ex+0xdb/0x280 [ 42.423341][ T3596] audit_seccomp+0x48/0x100 [ 42.423375][ T3596] ? __seccomp_filter+0x68c/0x10d0 [ 42.423405][ T3596] __seccomp_filter+0x69d/0x10d0 [ 42.423506][ T3596] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 42.423561][ T3596] ? vfs_read+0x47f/0x6f0 [ 42.423589][ T3596] ? __rcu_read_unlock+0x4f/0x70 [ 42.423618][ T3596] ? __fget_files+0x184/0x1c0 [ 42.423661][ T3596] __secure_computing+0x82/0x150 [ 42.423771][ T3596] syscall_trace_enter+0xcf/0x1e0 [ 42.423804][ T3596] do_syscall_64+0xaa/0x1a0 [ 42.423850][ T3596] ? clear_bhb_loop+0x40/0x90 [ 42.423879][ T3596] ? clear_bhb_loop+0x40/0x90 [ 42.423939][ T3596] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.424027][ T3596] RIP: 0033:0x7f9cea0fd41f [ 42.424045][ T3596] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 42.424066][ T3596] RSP: 002b:00007f9ce8767030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 42.424091][ T3596] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9cea0fd41f [ 42.424132][ T3596] RDX: 0000000000000001 RSI: 00007f9ce87670a0 RDI: 0000000000000003 [ 42.424149][ T3596] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 42.424165][ T3596] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 42.424181][ T3596] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 42.424226][ T3596] [ 42.818155][ T3637] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3637 comm=syz.2.73 [ 42.838504][ T3642] FAULT_INJECTION: forcing a failure. [ 42.838504][ T3642] name failslab, interval 1, probability 0, space 0, times 0 [ 42.851327][ T3642] CPU: 1 UID: 0 PID: 3642 Comm: syz.3.74 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 42.851362][ T3642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 42.851378][ T3642] Call Trace: [ 42.851385][ T3642] [ 42.851474][ T3642] __dump_stack+0x1d/0x30 [ 42.851501][ T3642] dump_stack_lvl+0xe8/0x140 [ 42.851526][ T3642] dump_stack+0x15/0x1b [ 42.851585][ T3642] should_fail_ex+0x265/0x280 [ 42.851626][ T3642] ? __se_sys_memfd_create+0x1cc/0x590 [ 42.851661][ T3642] should_failslab+0x8c/0xb0 [ 42.851698][ T3642] __kmalloc_cache_noprof+0x4c/0x320 [ 42.851731][ T3642] ? fput+0x8f/0xc0 [ 42.851749][ T3642] __se_sys_memfd_create+0x1cc/0x590 [ 42.851783][ T3642] __x64_sys_memfd_create+0x31/0x40 [ 42.851817][ T3642] x64_sys_call+0x122f/0x2fb0 [ 42.851863][ T3642] do_syscall_64+0xd0/0x1a0 [ 42.851892][ T3642] ? clear_bhb_loop+0x40/0x90 [ 42.851914][ T3642] ? clear_bhb_loop+0x40/0x90 [ 42.851937][ T3642] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.851967][ T3642] RIP: 0033:0x7fb0d1a5e969 [ 42.851986][ T3642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.852055][ T3642] RSP: 002b:00007fb0d00c6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 42.852079][ T3642] RAX: ffffffffffffffda RBX: 0000000000000446 RCX: 00007fb0d1a5e969 [ 42.852096][ T3642] RDX: 00007fb0d00c6ef0 RSI: 0000000000000000 RDI: 00007fb0d1ae1444 [ 42.852112][ T3642] RBP: 0000200000000d40 R08: 00007fb0d00c6bb7 R09: 00007fb0d00c6e40 [ 42.852128][ T3642] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 42.852145][ T3642] R13: 00007fb0d00c6ef0 R14: 00007fb0d00c6eb0 R15: 0000200000000480 [ 42.852192][ T3642] [ 43.052250][ T3642] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3642 comm=syz.3.74 [ 43.693259][ T3660] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3660 comm=syz.1.83 [ 43.919506][ T29] kauditd_printk_skb: 1644 callbacks suppressed [ 43.919594][ T29] audit: type=1400 audit(1748140292.577:1736): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.984807][ T29] audit: type=1400 audit(1748140292.647:1737): avc: denied { read write } for pid=3664 comm="syz.3.85" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.031859][ T29] audit: type=1400 audit(1748140292.697:1738): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.073524][ T3672] FAULT_INJECTION: forcing a failure. [ 44.073524][ T3672] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 44.086991][ T3672] CPU: 0 UID: 0 PID: 3672 Comm: syz.4.86 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 44.087025][ T3672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 44.087041][ T3672] Call Trace: [ 44.087048][ T3672] [ 44.087074][ T3672] __dump_stack+0x1d/0x30 [ 44.087101][ T3672] dump_stack_lvl+0xe8/0x140 [ 44.087124][ T3672] dump_stack+0x15/0x1b [ 44.087146][ T3672] should_fail_ex+0x265/0x280 [ 44.087191][ T3672] should_fail+0xb/0x20 [ 44.087274][ T3672] should_fail_usercopy+0x1a/0x20 [ 44.087371][ T3672] _copy_to_user+0x20/0xa0 [ 44.087394][ T3672] simple_read_from_buffer+0xb5/0x130 [ 44.087421][ T3672] proc_fail_nth_read+0x100/0x140 [ 44.087457][ T3672] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 44.087545][ T3672] vfs_read+0x19d/0x6f0 [ 44.087642][ T3672] ? __rcu_read_unlock+0x4f/0x70 [ 44.087692][ T3672] ? __fget_files+0x184/0x1c0 [ 44.087731][ T3672] ksys_read+0xda/0x1a0 [ 44.087803][ T3672] __x64_sys_read+0x40/0x50 [ 44.087830][ T3672] x64_sys_call+0x2d77/0x2fb0 [ 44.087859][ T3672] do_syscall_64+0xd0/0x1a0 [ 44.087889][ T3672] ? clear_bhb_loop+0x40/0x90 [ 44.087982][ T3672] ? clear_bhb_loop+0x40/0x90 [ 44.088010][ T3672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.088037][ T3672] RIP: 0033:0x7f9cea0fd37c [ 44.088132][ T3672] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 44.088156][ T3672] RSP: 002b:00007f9ce8767030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 44.088327][ T3672] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fd37c [ 44.088339][ T3672] RDX: 000000000000000f RSI: 00007f9ce87670a0 RDI: 0000000000000003 [ 44.088351][ T3672] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 44.088364][ T3672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.088389][ T3672] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 44.088409][ T3672] [ 44.120100][ T29] audit: type=1400 audit(1748140292.737:1739): avc: denied { map_create } for pid=3671 comm="syz.4.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 44.309313][ T29] audit: type=1400 audit(1748140292.737:1740): avc: denied { prog_load } for pid=3671 comm="syz.4.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 44.328589][ T29] audit: type=1400 audit(1748140292.737:1741): avc: denied { create } for pid=3671 comm="syz.4.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 44.340312][ T3675] audit: audit_backlog=65 > audit_backlog_limit=64 [ 44.349400][ T29] audit: type=1400 audit(1748140292.747:1742): avc: denied { open } for pid=3669 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 44.355654][ T3675] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 44.374674][ T29] audit: type=1400 audit(1748140292.747:1743): avc: denied { prog_load } for pid=3669 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.921893][ T29] kauditd_printk_skb: 4881 callbacks suppressed [ 48.921908][ T29] audit: type=1326 audit(1748140297.587:6624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4023 comm="syz.3.228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 48.951919][ T29] audit: type=1326 audit(1748140297.587:6625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4023 comm="syz.3.228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 48.975405][ T29] audit: type=1326 audit(1748140297.587:6626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4023 comm="syz.3.228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 48.998934][ T29] audit: type=1326 audit(1748140297.587:6627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 49.022426][ T29] audit: type=1326 audit(1748140297.587:6628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 49.045728][ T29] audit: type=1326 audit(1748140297.587:6629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 49.069168][ T29] audit: type=1326 audit(1748140297.587:6630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 49.092399][ T29] audit: type=1326 audit(1748140297.587:6631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 49.115640][ T29] audit: type=1326 audit(1748140297.587:6632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 49.138984][ T29] audit: type=1326 audit(1748140297.587:6633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4000 comm="syz.1.218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 53.931944][ T29] kauditd_printk_skb: 4500 callbacks suppressed [ 53.931963][ T29] audit: type=1326 audit(1748140302.597:11134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.4.338" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9cea0f5927 code=0x7ffc0000 [ 53.963303][ T29] audit: type=1326 audit(1748140302.597:11135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.4.338" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9cea09ab39 code=0x7ffc0000 [ 53.986733][ T29] audit: type=1326 audit(1748140302.597:11136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.4.338" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f9cea0fe969 code=0x7ffc0000 [ 54.010242][ T29] audit: type=1326 audit(1748140302.597:11137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4326 comm="syz.1.349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 54.033785][ T29] audit: type=1326 audit(1748140302.597:11138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4326 comm="syz.1.349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 54.048438][ T4339] audit: audit_backlog=65 > audit_backlog_limit=64 [ 54.057141][ T29] audit: type=1326 audit(1748140302.597:11139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4326 comm="syz.1.349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 54.063671][ T4339] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 54.063688][ T4339] audit: backlog limit exceeded [ 54.070719][ T4339] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.566852][ T4556] pim6reg1: entered promiscuous mode [ 57.572350][ T4556] pim6reg1: entered allmulticast mode [ 58.407571][ T4585] pim6reg1: entered promiscuous mode [ 58.413052][ T4585] pim6reg1: entered allmulticast mode [ 58.753950][ T4617] pim6reg1: entered promiscuous mode [ 58.759468][ T4617] pim6reg1: entered allmulticast mode [ 58.941543][ T29] kauditd_printk_skb: 4256 callbacks suppressed [ 58.941570][ T29] audit: type=1400 audit(1748140307.607:15394): avc: denied { prog_load } for pid=4632 comm="syz.3.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 58.967112][ T29] audit: type=1400 audit(1748140307.607:15395): avc: denied { prog_load } for pid=4632 comm="syz.3.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 58.986297][ T29] audit: type=1400 audit(1748140307.607:15396): avc: denied { open } for pid=4632 comm="syz.3.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 59.007522][ T29] audit: type=1400 audit(1748140307.607:15397): avc: denied { map_create } for pid=4634 comm="syz.0.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 59.026893][ T29] audit: type=1400 audit(1748140307.607:15398): avc: denied { prog_load } for pid=4634 comm="syz.0.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 59.030713][ T4637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 59.046083][ T29] audit: type=1326 audit(1748140307.607:15399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4634 comm="syz.0.476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 59.052768][ T4637] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 59.052787][ T4637] audit: backlog limit exceeded [ 59.056661][ T4637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 59.192125][ T4655] pim6reg1: entered promiscuous mode [ 59.197515][ T4655] pim6reg1: entered allmulticast mode [ 59.428291][ T4685] pim6reg1: entered promiscuous mode [ 59.433891][ T4685] pim6reg1: entered allmulticast mode [ 59.708282][ T4726] pim6reg1: entered promiscuous mode [ 59.713916][ T4726] pim6reg1: entered allmulticast mode [ 60.044053][ T4757] pim6reg1: entered promiscuous mode [ 60.049429][ T4757] pim6reg1: entered allmulticast mode [ 60.335190][ T4788] pim6reg1: entered promiscuous mode [ 60.340697][ T4788] pim6reg1: entered allmulticast mode [ 60.615028][ T4825] pim6reg1: entered promiscuous mode [ 60.620571][ T4825] pim6reg1: entered allmulticast mode [ 60.867380][ T4851] pim6reg1: entered promiscuous mode [ 60.872897][ T4851] pim6reg1: entered allmulticast mode [ 61.171372][ T4884] pim6reg1: entered promiscuous mode [ 61.176744][ T4884] pim6reg1: entered allmulticast mode [ 63.341946][ T5086] pim6reg1: entered promiscuous mode [ 63.347370][ T5086] pim6reg1: entered allmulticast mode [ 63.955016][ T29] kauditd_printk_skb: 6260 callbacks suppressed [ 63.955036][ T29] audit: type=1326 audit(1748140312.617:21658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5099 comm="syz.2.683" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 63.985079][ T29] audit: type=1326 audit(1748140312.617:21659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5099 comm="syz.2.683" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 64.008637][ T29] audit: type=1326 audit(1748140312.617:21660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5099 comm="syz.2.683" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 64.032235][ T29] audit: type=1326 audit(1748140312.617:21661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5122 comm="syz.3.693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 64.055872][ T29] audit: type=1326 audit(1748140312.617:21662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5122 comm="syz.3.693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 64.079272][ T29] audit: type=1326 audit(1748140312.617:21663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5122 comm="syz.3.693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 64.081993][ T5127] pim6reg1: entered promiscuous mode [ 64.102795][ T29] audit: type=1326 audit(1748140312.627:21664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 64.108103][ T5127] pim6reg1: entered allmulticast mode [ 64.137025][ T29] audit: type=1326 audit(1748140312.627:21665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 64.160354][ T29] audit: type=1326 audit(1748140312.627:21666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.688" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 64.183860][ T29] audit: type=1326 audit(1748140312.627:21667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5099 comm="syz.2.683" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 64.440054][ T5152] pim6reg1: entered promiscuous mode [ 64.445435][ T5152] pim6reg1: entered allmulticast mode [ 64.967490][ T5187] pim6reg1: entered promiscuous mode [ 64.972927][ T5187] pim6reg1: entered allmulticast mode [ 65.280997][ T5213] pim6reg1: entered promiscuous mode [ 65.286493][ T5213] pim6reg1: entered allmulticast mode [ 65.493520][ T5243] pim6reg1: entered promiscuous mode [ 65.498874][ T5243] pim6reg1: entered allmulticast mode [ 66.327186][ T5274] pim6reg1: entered promiscuous mode [ 66.332717][ T5274] pim6reg1: entered allmulticast mode [ 66.584737][ T5307] pim6reg1: entered promiscuous mode [ 66.590391][ T5307] pim6reg1: entered allmulticast mode [ 67.423837][ T5345] pim6reg1: entered promiscuous mode [ 67.429214][ T5345] pim6reg1: entered allmulticast mode [ 67.708375][ T5383] pim6reg1: entered promiscuous mode [ 67.713866][ T5383] pim6reg1: entered allmulticast mode [ 68.348062][ T5414] pim6reg1: entered promiscuous mode [ 68.353454][ T5414] pim6reg1: entered allmulticast mode [ 68.587286][ T5447] pim6reg1: entered promiscuous mode [ 68.592732][ T5447] pim6reg1: entered allmulticast mode [ 68.847681][ T5479] pim6reg1: entered promiscuous mode [ 68.853082][ T5479] pim6reg1: entered allmulticast mode [ 68.963816][ T29] kauditd_printk_skb: 5634 callbacks suppressed [ 68.963834][ T29] audit: type=1400 audit(1748140317.627:27303): avc: denied { name_bind } for pid=5483 comm="syz.2.855" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 68.992674][ T29] audit: type=1326 audit(1748140317.627:27302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5473 comm="syz.1.851" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 69.016207][ T29] audit: type=1326 audit(1748140317.627:27304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5473 comm="syz.1.851" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 69.039938][ T29] audit: type=1326 audit(1748140317.627:27305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5473 comm="syz.1.851" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 69.062954][ T5487] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.063509][ T29] audit: type=1400 audit(1748140317.627:27306): avc: denied { map_create } for pid=5483 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 69.070049][ T5487] audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 [ 69.070063][ T5487] audit: backlog limit exceeded [ 69.072330][ T5487] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.089435][ T29] audit: type=1400 audit(1748140317.627:27307): avc: denied { prog_load } for pid=5483 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 69.456887][ T5505] pim6reg1: entered promiscuous mode [ 69.462326][ T5505] pim6reg1: entered allmulticast mode [ 69.723921][ T5532] pim6reg1: entered promiscuous mode [ 69.729380][ T5532] pim6reg1: entered allmulticast mode [ 70.380640][ T5566] pim6reg1: entered promiscuous mode [ 70.386018][ T5566] pim6reg1: entered allmulticast mode [ 70.684250][ T5590] pim6reg1: entered promiscuous mode [ 70.689827][ T5590] pim6reg1: entered allmulticast mode [ 71.385154][ T5627] pim6reg1: entered promiscuous mode [ 71.390640][ T5627] pim6reg1: entered allmulticast mode [ 71.650264][ T5653] pim6reg1: entered promiscuous mode [ 71.655633][ T5653] pim6reg1: entered allmulticast mode [ 71.909051][ T5688] pim6reg1: entered promiscuous mode [ 71.914772][ T5688] pim6reg1: entered allmulticast mode [ 72.761820][ T5720] pim6reg1: entered promiscuous mode [ 72.767194][ T5720] pim6reg1: entered allmulticast mode [ 73.046658][ T5748] pim6reg1: entered promiscuous mode [ 73.052212][ T5748] pim6reg1: entered allmulticast mode [ 73.814275][ T5776] pim6reg1: entered promiscuous mode [ 73.819736][ T5776] pim6reg1: entered allmulticast mode [ 73.970127][ T29] kauditd_printk_skb: 4398 callbacks suppressed [ 73.970145][ T29] audit: type=1326 audit(1748140322.627:31704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.000010][ T29] audit: type=1326 audit(1748140322.637:31705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.023510][ T29] audit: type=1326 audit(1748140322.637:31706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.047150][ T29] audit: type=1326 audit(1748140322.637:31707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5754 comm="syz.0.973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 74.070611][ T29] audit: type=1326 audit(1748140322.637:31708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5754 comm="syz.0.973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 74.094202][ T29] audit: type=1326 audit(1748140322.637:31709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5754 comm="syz.0.973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 74.117646][ T29] audit: type=1326 audit(1748140322.637:31710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.141211][ T29] audit: type=1326 audit(1748140322.637:31711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.164632][ T29] audit: type=1326 audit(1748140322.637:31712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.188143][ T29] audit: type=1326 audit(1748140322.637:31713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 74.340850][ T5807] pim6reg1: entered promiscuous mode [ 74.346213][ T5807] pim6reg1: entered allmulticast mode [ 74.841916][ T5839] pim6reg1: entered promiscuous mode [ 74.847375][ T5839] pim6reg1: entered allmulticast mode [ 75.510917][ T5874] pim6reg1: entered promiscuous mode [ 75.516336][ T5874] pim6reg1: entered allmulticast mode [ 75.973989][ T5902] pim6reg1: entered promiscuous mode [ 75.979425][ T5902] pim6reg1: entered allmulticast mode [ 76.198419][ T5907] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1038'. [ 76.209962][ T5907] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 76.218689][ T5907] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 76.227527][ T5907] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 76.236264][ T5907] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 76.246589][ T5907] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 76.255527][ T5907] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 76.264530][ T5907] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 76.273589][ T5907] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 76.713032][ T5922] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 77.529418][ T5944] pim6reg1: entered promiscuous mode [ 77.534802][ T5944] pim6reg1: entered allmulticast mode [ 78.001447][ T5970] pim6reg1: entered promiscuous mode [ 78.006907][ T5970] pim6reg1: entered allmulticast mode [ 78.370355][ T6001] pim6reg1: entered promiscuous mode [ 78.375745][ T6001] pim6reg1: entered allmulticast mode [ 78.936575][ T6039] pim6reg1: entered promiscuous mode [ 78.942008][ T6039] pim6reg1: entered allmulticast mode [ 78.981985][ T29] kauditd_printk_skb: 3322 callbacks suppressed [ 78.982004][ T29] audit: type=1326 audit(1748140327.647:35036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.3.1084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 79.011946][ T29] audit: type=1326 audit(1748140327.647:35037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.3.1084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 79.035400][ T29] audit: type=1326 audit(1748140327.647:35038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.3.1084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 79.058961][ T29] audit: type=1326 audit(1748140327.647:35039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6022 comm="syz.0.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 79.082414][ T29] audit: type=1326 audit(1748140327.647:35040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6022 comm="syz.0.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 79.106147][ T29] audit: type=1326 audit(1748140327.647:35041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6022 comm="syz.0.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 79.129716][ T29] audit: type=1326 audit(1748140327.647:35042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.3.1084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 79.153157][ T29] audit: type=1326 audit(1748140327.647:35043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.3.1084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 79.176570][ T29] audit: type=1326 audit(1748140327.647:35044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.3.1084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 79.191969][ T6042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 79.505512][ T6064] pim6reg1: entered promiscuous mode [ 79.510925][ T6064] pim6reg1: entered allmulticast mode [ 80.342279][ T6097] pim6reg1: entered promiscuous mode [ 80.347809][ T6097] pim6reg1: entered allmulticast mode [ 81.139480][ T6129] pim6reg1: entered promiscuous mode [ 81.144905][ T6129] pim6reg1: entered allmulticast mode [ 81.423200][ T6154] pim6reg1: entered promiscuous mode [ 81.428568][ T6154] pim6reg1: entered allmulticast mode [ 82.276507][ T6193] pim6reg1: entered promiscuous mode [ 82.282006][ T6193] pim6reg1: entered allmulticast mode [ 82.682233][ T6229] pim6reg1: entered promiscuous mode [ 82.687678][ T6229] pim6reg1: entered allmulticast mode [ 83.340367][ T6256] pim6reg1: entered promiscuous mode [ 83.345764][ T6256] pim6reg1: entered allmulticast mode [ 83.998245][ T29] kauditd_printk_skb: 3545 callbacks suppressed [ 83.998263][ T29] audit: type=1326 audit(1748140332.657:38588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 84.028161][ T29] audit: type=1326 audit(1748140332.657:38589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 84.051676][ T29] audit: type=1326 audit(1748140332.657:38590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 84.075216][ T29] audit: type=1326 audit(1748140332.657:38591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6261 comm="syz.2.1188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 84.098760][ T29] audit: type=1326 audit(1748140332.657:38592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6261 comm="syz.2.1188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 84.122320][ T29] audit: type=1326 audit(1748140332.657:38593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6261 comm="syz.2.1188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 84.145870][ T29] audit: type=1326 audit(1748140332.667:38594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 84.150907][ T6283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.169527][ T29] audit: type=1326 audit(1748140332.667:38595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1189" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 84.176042][ T6283] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 84.295373][ T6292] pim6reg1: entered promiscuous mode [ 84.300968][ T6292] pim6reg1: entered allmulticast mode [ 85.227910][ T6329] pim6reg1: entered promiscuous mode [ 85.233322][ T6329] pim6reg1: entered allmulticast mode [ 85.692967][ T6366] pim6reg1: entered promiscuous mode [ 85.698341][ T6366] pim6reg1: entered allmulticast mode [ 87.018204][ T6394] pim6reg1: entered promiscuous mode [ 87.023618][ T6394] pim6reg1: entered allmulticast mode [ 89.007401][ T29] kauditd_printk_skb: 2956 callbacks suppressed [ 89.007419][ T29] audit: type=1326 audit(1748140337.667:41551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 89.037324][ T29] audit: type=1326 audit(1748140337.667:41552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 89.060779][ T29] audit: type=1326 audit(1748140337.667:41553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 89.084458][ T29] audit: type=1326 audit(1748140337.697:41554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 89.107989][ T29] audit: type=1326 audit(1748140337.697:41555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 89.131420][ T29] audit: type=1326 audit(1748140337.697:41556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 89.154926][ T29] audit: type=1326 audit(1748140337.707:41557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 89.157847][ T3317] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.178462][ T29] audit: type=1326 audit(1748140337.707:41558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.0.1272" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 89.184997][ T3317] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 92.136319][ T6595] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 92.509613][ T6600] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 93.559913][ T6637] pim6reg1: entered promiscuous mode [ 93.565283][ T6637] pim6reg1: entered allmulticast mode [ 93.973473][ T6668] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 94.010043][ T29] kauditd_printk_skb: 2487 callbacks suppressed [ 94.010060][ T29] audit: type=1326 audit(1748140342.677:44024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6655 comm="syz.1.1340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 94.039988][ T29] audit: type=1326 audit(1748140342.677:44025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6655 comm="syz.1.1340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 94.063478][ T29] audit: type=1326 audit(1748140342.677:44026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6655 comm="syz.1.1340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 94.087262][ T29] audit: type=1326 audit(1748140342.727:44027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6655 comm="syz.1.1340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 94.110781][ T29] audit: type=1326 audit(1748140342.727:44028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6655 comm="syz.1.1340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 94.134322][ T29] audit: type=1326 audit(1748140342.727:44029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6655 comm="syz.1.1340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 94.157937][ T29] audit: type=1326 audit(1748140342.727:44030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.1342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 94.181368][ T29] audit: type=1326 audit(1748140342.727:44031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.1342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 94.205045][ T29] audit: type=1326 audit(1748140342.727:44032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.1342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 94.228610][ T29] audit: type=1326 audit(1748140342.727:44033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.1342" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 95.908335][ T6716] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 98.032372][ T6768] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 99.023180][ T29] kauditd_printk_skb: 2115 callbacks suppressed [ 99.023199][ T29] audit: type=1400 audit(1748140347.687:46149): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.054047][ T29] audit: type=1400 audit(1748140347.697:46150): avc: denied { prog_load } for pid=6792 comm="syz.2.1390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.073276][ T29] audit: type=1326 audit(1748140347.697:46151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 99.096765][ T29] audit: type=1326 audit(1748140347.697:46152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 99.120522][ T29] audit: type=1326 audit(1748140347.697:46153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 99.144191][ T29] audit: type=1326 audit(1748140347.697:46154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 99.167720][ T29] audit: type=1326 audit(1748140347.697:46155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 99.191135][ T29] audit: type=1326 audit(1748140347.697:46156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 99.215578][ T29] audit: type=1326 audit(1748140347.707:46157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 99.239889][ T29] audit: type=1326 audit(1748140347.707:46158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6785 comm="syz.1.1387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 100.659515][ T6831] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 102.962072][ T6899] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 104.029728][ T29] kauditd_printk_skb: 2732 callbacks suppressed [ 104.029746][ T29] audit: type=1326 audit(1748140352.687:48891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 104.059537][ T29] audit: type=1326 audit(1748140352.697:48892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 104.083234][ T29] audit: type=1326 audit(1748140352.697:48893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 104.107190][ T29] audit: type=1326 audit(1748140352.697:48894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 104.130934][ T29] audit: type=1326 audit(1748140352.697:48895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 104.154448][ T29] audit: type=1326 audit(1748140352.707:48896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 104.177984][ T29] audit: type=1326 audit(1748140352.707:48897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 104.201512][ T29] audit: type=1326 audit(1748140352.717:48898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 104.225048][ T29] audit: type=1326 audit(1748140352.717:48899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 104.248764][ T29] audit: type=1326 audit(1748140352.727:48900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6910 comm="syz.0.1436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 104.484074][ T6924] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 105.439708][ T6945] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 106.614983][ T6980] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 108.051411][ T7008] FAULT_INJECTION: forcing a failure. [ 108.051411][ T7008] name failslab, interval 1, probability 0, space 0, times 0 [ 108.064145][ T7008] CPU: 0 UID: 0 PID: 7008 Comm: syz.4.1472 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 108.064173][ T7008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 108.064188][ T7008] Call Trace: [ 108.064195][ T7008] [ 108.064205][ T7008] __dump_stack+0x1d/0x30 [ 108.064230][ T7008] dump_stack_lvl+0xe8/0x140 [ 108.064249][ T7008] dump_stack+0x15/0x1b [ 108.064330][ T7008] should_fail_ex+0x265/0x280 [ 108.064367][ T7008] should_failslab+0x8c/0xb0 [ 108.064430][ T7008] __kmalloc_node_noprof+0xa9/0x410 [ 108.064458][ T7008] ? qdisc_alloc+0x65/0x440 [ 108.064488][ T7008] qdisc_alloc+0x65/0x440 [ 108.064581][ T7008] ? nla_strcmp+0xc3/0xe0 [ 108.064601][ T7008] qdisc_create+0xc0/0x970 [ 108.064643][ T7008] tc_modify_qdisc+0xdc7/0x1310 [ 108.064672][ T7008] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 108.064695][ T7008] rtnetlink_rcv_msg+0x65a/0x6d0 [ 108.064801][ T7008] netlink_rcv_skb+0x120/0x220 [ 108.064909][ T7008] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 108.064937][ T7008] rtnetlink_rcv+0x1c/0x30 [ 108.065061][ T7008] netlink_unicast+0x59e/0x670 [ 108.065179][ T7008] netlink_sendmsg+0x58b/0x6b0 [ 108.065199][ T7008] ? __pfx_netlink_sendmsg+0x10/0x10 [ 108.065218][ T7008] __sock_sendmsg+0x142/0x180 [ 108.065243][ T7008] ____sys_sendmsg+0x31e/0x4e0 [ 108.065280][ T7008] ___sys_sendmsg+0x17b/0x1d0 [ 108.065309][ T7008] __x64_sys_sendmsg+0xd4/0x160 [ 108.065331][ T7008] x64_sys_call+0x2999/0x2fb0 [ 108.065437][ T7008] do_syscall_64+0xd0/0x1a0 [ 108.065459][ T7008] ? clear_bhb_loop+0x40/0x90 [ 108.065479][ T7008] ? clear_bhb_loop+0x40/0x90 [ 108.065546][ T7008] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.065565][ T7008] RIP: 0033:0x7f9cea0fe969 [ 108.065583][ T7008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.065728][ T7008] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.065808][ T7008] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 108.065820][ T7008] RDX: 0000000000000000 RSI: 00002000000007c0 RDI: 0000000000000005 [ 108.065830][ T7008] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 108.065841][ T7008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.065852][ T7008] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 108.065868][ T7008] [ 109.041405][ T29] kauditd_printk_skb: 2375 callbacks suppressed [ 109.041419][ T29] audit: type=1326 audit(1748140357.707:51276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.2.1473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 109.071701][ T29] audit: type=1326 audit(1748140357.707:51277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.2.1473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 109.095368][ T29] audit: type=1326 audit(1748140357.707:51278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.2.1473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 109.118902][ T29] audit: type=1326 audit(1748140357.707:51279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7028 comm="syz.0.1481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 109.142343][ T29] audit: type=1326 audit(1748140357.707:51280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7028 comm="syz.0.1481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 109.165826][ T29] audit: type=1326 audit(1748140357.707:51281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7028 comm="syz.0.1481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 109.189506][ T29] audit: type=1326 audit(1748140357.717:51282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.2.1473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 109.212952][ T29] audit: type=1326 audit(1748140357.717:51283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.2.1473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 109.236496][ T29] audit: type=1326 audit(1748140357.717:51284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.2.1473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 109.260083][ T29] audit: type=1326 audit(1748140357.717:51285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7028 comm="syz.0.1481" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 109.429297][ T7042] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 112.078059][ T7123] FAULT_INJECTION: forcing a failure. [ 112.078059][ T7123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.091258][ T7123] CPU: 1 UID: 0 PID: 7123 Comm: syz.2.1518 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 112.091301][ T7123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 112.091316][ T7123] Call Trace: [ 112.091323][ T7123] [ 112.091332][ T7123] __dump_stack+0x1d/0x30 [ 112.091354][ T7123] dump_stack_lvl+0xe8/0x140 [ 112.091400][ T7123] dump_stack+0x15/0x1b [ 112.091417][ T7123] should_fail_ex+0x265/0x280 [ 112.091457][ T7123] should_fail+0xb/0x20 [ 112.091497][ T7123] should_fail_usercopy+0x1a/0x20 [ 112.091610][ T7123] _copy_to_user+0x20/0xa0 [ 112.091640][ T7123] simple_read_from_buffer+0xb5/0x130 [ 112.091675][ T7123] proc_fail_nth_read+0x100/0x140 [ 112.091711][ T7123] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 112.091744][ T7123] vfs_read+0x19d/0x6f0 [ 112.091822][ T7123] ? __rcu_read_unlock+0x4f/0x70 [ 112.091857][ T7123] ? __fget_files+0x184/0x1c0 [ 112.091894][ T7123] ksys_read+0xda/0x1a0 [ 112.092051][ T7123] __x64_sys_read+0x40/0x50 [ 112.092086][ T7123] x64_sys_call+0x2d77/0x2fb0 [ 112.092166][ T7123] do_syscall_64+0xd0/0x1a0 [ 112.092192][ T7123] ? clear_bhb_loop+0x40/0x90 [ 112.092220][ T7123] ? clear_bhb_loop+0x40/0x90 [ 112.092262][ T7123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.092285][ T7123] RIP: 0033:0x7fb88cd0d37c [ 112.092301][ T7123] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 112.092319][ T7123] RSP: 002b:00007fb88b377030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 112.092340][ T7123] RAX: ffffffffffffffda RBX: 00007fb88cf35fa0 RCX: 00007fb88cd0d37c [ 112.092357][ T7123] RDX: 000000000000000f RSI: 00007fb88b3770a0 RDI: 0000000000000004 [ 112.092374][ T7123] RBP: 00007fb88b377090 R08: 0000000000000000 R09: 0000000000000000 [ 112.092390][ T7123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.092406][ T7123] R13: 0000000000000000 R14: 00007fb88cf35fa0 R15: 00007fff226f7cf8 [ 112.092429][ T7123] [ 112.351397][ T7133] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1523'. [ 114.050064][ T29] kauditd_printk_skb: 3011 callbacks suppressed [ 114.050082][ T29] audit: type=1400 audit(1748140362.717:54246): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.084444][ T29] audit: type=1326 audit(1748140362.717:54247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7174 comm="syz.2.1539" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 114.108022][ T29] audit: type=1326 audit(1748140362.717:54248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7174 comm="syz.2.1539" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 114.131642][ T29] audit: type=1326 audit(1748140362.717:54249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7174 comm="syz.2.1539" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 114.155571][ T29] audit: type=1326 audit(1748140362.747:54250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7174 comm="syz.2.1539" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 114.155609][ T29] audit: type=1326 audit(1748140362.747:54251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7174 comm="syz.2.1539" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 114.202706][ T29] audit: type=1326 audit(1748140362.747:54252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7174 comm="syz.2.1539" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 114.231576][ T29] audit: type=1400 audit(1748140362.747:54253): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.256250][ T29] audit: type=1400 audit(1748140362.797:54254): avc: denied { prog_load } for pid=7194 comm="syz.4.1548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.275667][ T29] audit: type=1400 audit(1748140362.847:54255): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 115.154762][ T7229] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 115.987525][ T7262] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1575'. [ 117.186391][ T7299] FAULT_INJECTION: forcing a failure. [ 117.186391][ T7299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.199566][ T7299] CPU: 0 UID: 0 PID: 7299 Comm: gtp Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 117.199599][ T7299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 117.199613][ T7299] Call Trace: [ 117.199703][ T7299] [ 117.199712][ T7299] __dump_stack+0x1d/0x30 [ 117.199738][ T7299] dump_stack_lvl+0xe8/0x140 [ 117.199833][ T7299] dump_stack+0x15/0x1b [ 117.199856][ T7299] should_fail_ex+0x265/0x280 [ 117.199898][ T7299] should_fail+0xb/0x20 [ 117.199988][ T7299] should_fail_usercopy+0x1a/0x20 [ 117.200025][ T7299] strncpy_from_user+0x25/0x230 [ 117.200065][ T7299] ? kmem_cache_alloc_noprof+0x186/0x310 [ 117.200094][ T7299] ? getname_flags+0x80/0x3b0 [ 117.200201][ T7299] getname_flags+0xae/0x3b0 [ 117.200243][ T7299] __x64_sys_link+0x33/0x70 [ 117.200350][ T7299] x64_sys_call+0x2af9/0x2fb0 [ 117.200380][ T7299] do_syscall_64+0xd0/0x1a0 [ 117.200409][ T7299] ? clear_bhb_loop+0x40/0x90 [ 117.200435][ T7299] ? clear_bhb_loop+0x40/0x90 [ 117.200510][ T7299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.200544][ T7299] RIP: 0033:0x7fb0d1a5e969 [ 117.200569][ T7299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.200593][ T7299] RSP: 002b:00007fb0d00c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 117.200618][ T7299] RAX: ffffffffffffffda RBX: 00007fb0d1c85fa0 RCX: 00007fb0d1a5e969 [ 117.200641][ T7299] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000200000000180 [ 117.200658][ T7299] RBP: 00007fb0d00c7090 R08: 0000000000000000 R09: 0000000000000000 [ 117.200690][ T7299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.200702][ T7299] R13: 0000000000000000 R14: 00007fb0d1c85fa0 R15: 00007fff1c39a5b8 [ 117.200735][ T7299] [ 118.337235][ T7329] syz.0.1602 uses obsolete (PF_INET,SOCK_PACKET) [ 118.357319][ T7331] netlink: 'syz.1.1603': attribute type 10 has an invalid length. [ 118.368722][ T7331] team0: Port device dummy0 added [ 118.885384][ T7341] IPVS: set_ctl: invalid protocol: 255 172.30.1.3:20002 [ 119.061870][ T29] kauditd_printk_skb: 3022 callbacks suppressed [ 119.061890][ T29] audit: type=1326 audit(1748140367.727:57242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.2.1608" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb88cd05927 code=0x7ffc0000 [ 119.092287][ T29] audit: type=1326 audit(1748140367.727:57243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.2.1608" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb88ccaab39 code=0x7ffc0000 [ 119.115814][ T29] audit: type=1326 audit(1748140367.727:57244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.2.1608" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb88cd0e969 code=0x7ffc0000 [ 119.139351][ T29] audit: type=1326 audit(1748140367.727:57245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7326 comm="syz.3.1601" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 119.162978][ T29] audit: type=1326 audit(1748140367.727:57246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7326 comm="syz.3.1601" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 119.186510][ T29] audit: type=1326 audit(1748140367.727:57247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7326 comm="syz.3.1601" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 119.210044][ T29] audit: type=1326 audit(1748140367.727:57248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7333 comm="syz.0.1604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 119.214885][ T7349] audit: audit_backlog=65 > audit_backlog_limit=64 [ 119.233566][ T29] audit: type=1326 audit(1748140367.727:57249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7333 comm="syz.0.1604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 119.233604][ T29] audit: type=1326 audit(1748140367.727:57250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7333 comm="syz.0.1604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 120.293302][ T7395] netlink: 'syz.0.1627': attribute type 10 has an invalid length. [ 120.304663][ T7395] team0: Port device dummy0 added [ 121.097815][ T7422] FAULT_INJECTION: forcing a failure. [ 121.097815][ T7422] name failslab, interval 1, probability 0, space 0, times 0 [ 121.110593][ T7422] CPU: 0 UID: 0 PID: 7422 Comm: syz.3.1639 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 121.110746][ T7422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 121.110759][ T7422] Call Trace: [ 121.110795][ T7422] [ 121.110802][ T7422] __dump_stack+0x1d/0x30 [ 121.110826][ T7422] dump_stack_lvl+0xe8/0x140 [ 121.110850][ T7422] dump_stack+0x15/0x1b [ 121.110873][ T7422] should_fail_ex+0x265/0x280 [ 121.110912][ T7422] should_failslab+0x8c/0xb0 [ 121.110964][ T7422] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 121.110985][ T7422] ? hugetlbfs_alloc_inode+0xbc/0x100 [ 121.111020][ T7422] hugetlbfs_alloc_inode+0xbc/0x100 [ 121.111050][ T7422] ? __pfx_hugetlbfs_alloc_inode+0x10/0x10 [ 121.111106][ T7422] alloc_inode+0x3d/0x170 [ 121.111138][ T7422] new_inode+0x1d/0xe0 [ 121.111204][ T7422] hugetlbfs_get_inode+0x7b/0x370 [ 121.111231][ T7422] hugetlb_file_setup+0x192/0x3d0 [ 121.111251][ T7422] ksys_mmap_pgoff+0x157/0x310 [ 121.111287][ T7422] x64_sys_call+0x1602/0x2fb0 [ 121.111307][ T7422] do_syscall_64+0xd0/0x1a0 [ 121.111328][ T7422] ? clear_bhb_loop+0x40/0x90 [ 121.111348][ T7422] ? clear_bhb_loop+0x40/0x90 [ 121.111384][ T7422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 121.111404][ T7422] RIP: 0033:0x7fb0d1a5e969 [ 121.111417][ T7422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.111433][ T7422] RSP: 002b:00007fb0d00c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 121.111450][ T7422] RAX: ffffffffffffffda RBX: 00007fb0d1c85fa0 RCX: 00007fb0d1a5e969 [ 121.111461][ T7422] RDX: 0000000002000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 121.111472][ T7422] RBP: 00007fb0d00c7090 R08: ffffffffffffffff R09: 0000000000000000 [ 121.111483][ T7422] R10: 000200000005c832 R11: 0000000000000246 R12: 0000000000000001 [ 121.111501][ T7422] R13: 0000000000000000 R14: 00007fb0d1c85fa0 R15: 00007fff1c39a5b8 [ 121.111517][ T7422] [ 122.310853][ T7479] syzkaller0: entered promiscuous mode [ 122.316491][ T7479] syzkaller0: entered allmulticast mode [ 122.395988][ T7482] FAULT_INJECTION: forcing a failure. [ 122.395988][ T7482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 122.409347][ T7482] CPU: 0 UID: 0 PID: 7482 Comm: syz.1.1664 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 122.409447][ T7482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 122.409463][ T7482] Call Trace: [ 122.409472][ T7482] [ 122.409480][ T7482] __dump_stack+0x1d/0x30 [ 122.409500][ T7482] dump_stack_lvl+0xe8/0x140 [ 122.409520][ T7482] dump_stack+0x15/0x1b [ 122.409540][ T7482] should_fail_ex+0x265/0x280 [ 122.409702][ T7482] should_fail_alloc_page+0xf2/0x100 [ 122.409746][ T7482] __alloc_frozen_pages_noprof+0xff/0x360 [ 122.409794][ T7482] alloc_pages_mpol+0xb3/0x250 [ 122.409825][ T7482] alloc_pages_noprof+0x90/0x130 [ 122.409854][ T7482] pte_alloc_one+0x2a/0x110 [ 122.409895][ T7482] __pte_alloc+0x32/0x290 [ 122.409971][ T7482] ? mas_state_walk+0x574/0x650 [ 122.409993][ T7482] handle_mm_fault+0x1d74/0x2ae0 [ 122.410042][ T7482] ? mas_walk+0xf2/0x120 [ 122.410071][ T7482] do_user_addr_fault+0x636/0x1090 [ 122.410176][ T7482] exc_page_fault+0x54/0xc0 [ 122.410199][ T7482] asm_exc_page_fault+0x26/0x30 [ 122.410225][ T7482] RIP: 0033:0x7fa9fdb60d66 [ 122.410245][ T7482] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 122.410268][ T7482] RSP: 002b:00007fa9fc3064a0 EFLAGS: 00010246 [ 122.410286][ T7482] RAX: 0000000000000001 RBX: 00007fa9fc306540 RCX: 0000000000000101 [ 122.410328][ T7482] RDX: 0000000000000050 RSI: 0000000000000001 RDI: 00007fa9fc3065e0 [ 122.410340][ T7482] RBP: 0000000000000102 R08: 00007fa9f3ee7000 R09: 0000000000000000 [ 122.410355][ T7482] R10: 0000000000000000 R11: 00007fa9fc306550 R12: 0000000000000001 [ 122.410371][ T7482] R13: 00007fa9fdd3bfc0 R14: 0000000000000000 R15: 00007fa9fc3065e0 [ 122.410394][ T7482] [ 122.588225][ T7482] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 122.872018][ T7520] FAULT_INJECTION: forcing a failure. [ 122.872018][ T7520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.885216][ T7520] CPU: 1 UID: 0 PID: 7520 Comm: syz.2.1681 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 122.885295][ T7520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 122.885312][ T7520] Call Trace: [ 122.885320][ T7520] [ 122.885330][ T7520] __dump_stack+0x1d/0x30 [ 122.885353][ T7520] dump_stack_lvl+0xe8/0x140 [ 122.885441][ T7520] dump_stack+0x15/0x1b [ 122.885463][ T7520] should_fail_ex+0x265/0x280 [ 122.885552][ T7520] should_fail+0xb/0x20 [ 122.885672][ T7520] should_fail_usercopy+0x1a/0x20 [ 122.885697][ T7520] _copy_from_user+0x1c/0xb0 [ 122.885721][ T7520] memdup_user_nul+0x5f/0xe0 [ 122.885748][ T7520] sel_write_enforce+0x9c/0x2d0 [ 122.885776][ T7520] vfs_writev+0x3eb/0x870 [ 122.885799][ T7520] ? __pfx_sel_write_enforce+0x10/0x10 [ 122.885875][ T7520] ? mutex_lock+0xd/0x30 [ 122.885982][ T7520] do_writev+0xe7/0x210 [ 122.885999][ T7520] __x64_sys_writev+0x45/0x50 [ 122.886152][ T7520] x64_sys_call+0x2006/0x2fb0 [ 122.886175][ T7520] do_syscall_64+0xd0/0x1a0 [ 122.886203][ T7520] ? clear_bhb_loop+0x40/0x90 [ 122.886224][ T7520] ? clear_bhb_loop+0x40/0x90 [ 122.886287][ T7520] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.886309][ T7520] RIP: 0033:0x7fb88cd0e969 [ 122.886323][ T7520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.886340][ T7520] RSP: 002b:00007fb88b377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 122.886362][ T7520] RAX: ffffffffffffffda RBX: 00007fb88cf35fa0 RCX: 00007fb88cd0e969 [ 122.886378][ T7520] RDX: 0000000000000001 RSI: 0000200000000040 RDI: 0000000000000003 [ 122.886419][ T7520] RBP: 00007fb88b377090 R08: 0000000000000000 R09: 0000000000000000 [ 122.886434][ T7520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.886449][ T7520] R13: 0000000000000000 R14: 00007fb88cf35fa0 R15: 00007fff226f7cf8 [ 122.886479][ T7520] [ 123.588134][ T7558] FAULT_INJECTION: forcing a failure. [ 123.588134][ T7558] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.601512][ T7558] CPU: 1 UID: 0 PID: 7558 Comm: syz.2.1697 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 123.601541][ T7558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 123.601553][ T7558] Call Trace: [ 123.601560][ T7558] [ 123.601569][ T7558] __dump_stack+0x1d/0x30 [ 123.601597][ T7558] dump_stack_lvl+0xe8/0x140 [ 123.601685][ T7558] dump_stack+0x15/0x1b [ 123.601704][ T7558] should_fail_ex+0x265/0x280 [ 123.601739][ T7558] should_fail+0xb/0x20 [ 123.601853][ T7558] should_fail_usercopy+0x1a/0x20 [ 123.601878][ T7558] _copy_to_user+0x20/0xa0 [ 123.601903][ T7558] simple_read_from_buffer+0xb5/0x130 [ 123.601928][ T7558] proc_fail_nth_read+0x100/0x140 [ 123.601987][ T7558] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 123.602022][ T7558] vfs_read+0x19d/0x6f0 [ 123.602054][ T7558] ? __rcu_read_unlock+0x4f/0x70 [ 123.602153][ T7558] ? __fget_files+0x184/0x1c0 [ 123.602230][ T7558] ksys_read+0xda/0x1a0 [ 123.602324][ T7558] __x64_sys_read+0x40/0x50 [ 123.602355][ T7558] x64_sys_call+0x2d77/0x2fb0 [ 123.602385][ T7558] do_syscall_64+0xd0/0x1a0 [ 123.602452][ T7558] ? clear_bhb_loop+0x40/0x90 [ 123.602587][ T7558] ? clear_bhb_loop+0x40/0x90 [ 123.602615][ T7558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.602642][ T7558] RIP: 0033:0x7fb88cd0d37c [ 123.602703][ T7558] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 123.602727][ T7558] RSP: 002b:00007fb88b377030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 123.602808][ T7558] RAX: ffffffffffffffda RBX: 00007fb88cf35fa0 RCX: 00007fb88cd0d37c [ 123.602825][ T7558] RDX: 000000000000000f RSI: 00007fb88b3770a0 RDI: 0000000000000003 [ 123.602842][ T7558] RBP: 00007fb88b377090 R08: 0000000000000000 R09: 0000000000000000 [ 123.602858][ T7558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.602873][ T7558] R13: 0000000000000001 R14: 00007fb88cf35fa0 R15: 00007fff226f7cf8 [ 123.602913][ T7558] [ 123.852006][ T7568] FAULT_INJECTION: forcing a failure. [ 123.852006][ T7568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.865314][ T7568] CPU: 0 UID: 0 PID: 7568 Comm: syz.3.1701 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 123.865368][ T7568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 123.865396][ T7568] Call Trace: [ 123.865475][ T7568] [ 123.865487][ T7568] __dump_stack+0x1d/0x30 [ 123.865507][ T7568] dump_stack_lvl+0xe8/0x140 [ 123.865569][ T7568] dump_stack+0x15/0x1b [ 123.865603][ T7568] should_fail_ex+0x265/0x280 [ 123.865666][ T7568] should_fail+0xb/0x20 [ 123.865793][ T7568] should_fail_usercopy+0x1a/0x20 [ 123.865811][ T7568] _copy_from_user+0x1c/0xb0 [ 123.865831][ T7568] kstrtouint_from_user+0x69/0xf0 [ 123.865859][ T7568] ? avc_policy_seqno+0x15/0x30 [ 123.865877][ T7568] proc_fail_nth_write+0x50/0x160 [ 123.865971][ T7568] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 123.866005][ T7568] vfs_write+0x266/0x8d0 [ 123.866027][ T7568] ? vfs_read+0x47f/0x6f0 [ 123.866066][ T7568] ? __rcu_read_unlock+0x4f/0x70 [ 123.866085][ T7568] ? __fget_files+0x184/0x1c0 [ 123.866112][ T7568] ksys_write+0xda/0x1a0 [ 123.866180][ T7568] __x64_sys_write+0x40/0x50 [ 123.866215][ T7568] x64_sys_call+0x2cdd/0x2fb0 [ 123.866235][ T7568] do_syscall_64+0xd0/0x1a0 [ 123.866257][ T7568] ? clear_bhb_loop+0x40/0x90 [ 123.866289][ T7568] ? clear_bhb_loop+0x40/0x90 [ 123.866308][ T7568] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.866326][ T7568] RIP: 0033:0x7fb0d1a5d41f [ 123.866339][ T7568] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 123.866389][ T7568] RSP: 002b:00007fb0d00c7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 123.866406][ T7568] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb0d1a5d41f [ 123.866418][ T7568] RDX: 0000000000000001 RSI: 00007fb0d00c70a0 RDI: 0000000000000003 [ 123.866429][ T7568] RBP: 00007fb0d00c7090 R08: 0000000000000000 R09: 0000000000000000 [ 123.866439][ T7568] R10: 0000200000e86000 R11: 0000000000000293 R12: 0000000000000001 [ 123.866523][ T7568] R13: 0000000000000000 R14: 00007fb0d1c85fa0 R15: 00007fff1c39a5b8 [ 123.866538][ T7568] [ 124.082177][ T29] kauditd_printk_skb: 2697 callbacks suppressed [ 124.082195][ T29] audit: type=1326 audit(1748140372.537:59874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7547 comm="syz.4.1693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9cea0f5927 code=0x7ffc0000 [ 124.112038][ T29] audit: type=1326 audit(1748140372.537:59875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7547 comm="syz.4.1693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9cea09ab39 code=0x7ffc0000 [ 124.135526][ T29] audit: type=1326 audit(1748140372.537:59876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7547 comm="syz.4.1693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f9cea0fe969 code=0x7ffc0000 [ 124.159405][ T29] audit: type=1326 audit(1748140372.737:59877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7551 comm="syz.1.1694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 124.183180][ T29] audit: type=1326 audit(1748140372.737:59878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7551 comm="syz.1.1694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 124.206985][ T29] audit: type=1326 audit(1748140372.737:59879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7551 comm="syz.1.1694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7fa9fdc9e969 code=0x7ffc0000 [ 124.230483][ T29] audit: type=1400 audit(1748140372.737:59881): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 124.255281][ T29] audit: type=1326 audit(1748140372.737:59880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7551 comm="syz.1.1694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa9fdc95927 code=0x7ffc0000 [ 124.268233][ T7578] audit: audit_backlog=65 > audit_backlog_limit=64 [ 124.279265][ T29] audit: type=1326 audit(1748140372.737:59882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7551 comm="syz.1.1694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa9fdc3ab39 code=0x7ffc0000 [ 124.451289][ T7585] netlink: 'syz.1.1708': attribute type 13 has an invalid length. [ 124.492014][ T7585] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.499247][ T7585] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.537872][ T7585] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 124.548152][ T7585] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 124.558005][ T7588] netlink: 'syz.1.1708': attribute type 10 has an invalid length. [ 124.582529][ T7585] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.591622][ T7585] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.600845][ T7585] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.610028][ T7585] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.629956][ T7588] batman_adv: batadv0: Adding interface: team0 [ 124.636186][ T7588] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.661567][ T7588] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 125.190847][ T7610] IPv6: NLM_F_CREATE should be specified when creating new route [ 125.270478][ T7618] netlink: 'syz.1.1720': attribute type 1 has an invalid length. [ 125.284188][ T7618] 8021q: adding VLAN 0 to HW filter on device bond1 [ 125.293018][ T7618] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1720'. [ 125.302030][ T7618] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1720'. [ 126.010062][ T7635] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1727'. [ 126.024453][ T7635] team0 (unregistering): Port device team_slave_0 removed [ 126.033525][ T7635] team0 (unregistering): Port device team_slave_1 removed [ 126.305064][ T7652] mmap: syz.1.1734 (7652) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 126.855861][ T7664] FAULT_INJECTION: forcing a failure. [ 126.855861][ T7664] name failslab, interval 1, probability 0, space 0, times 0 [ 126.868563][ T7664] CPU: 1 UID: 0 PID: 7664 Comm: syz.4.1739 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 126.868595][ T7664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 126.868649][ T7664] Call Trace: [ 126.868658][ T7664] [ 126.868667][ T7664] __dump_stack+0x1d/0x30 [ 126.868695][ T7664] dump_stack_lvl+0xe8/0x140 [ 126.868751][ T7664] dump_stack+0x15/0x1b [ 126.868767][ T7664] should_fail_ex+0x265/0x280 [ 126.868807][ T7664] should_failslab+0x8c/0xb0 [ 126.868862][ T7664] kmem_cache_alloc_node_noprof+0x57/0x320 [ 126.868890][ T7664] ? __alloc_skb+0x101/0x320 [ 126.868934][ T7664] ? __rtnl_unlock+0x95/0xb0 [ 126.869112][ T7664] __alloc_skb+0x101/0x320 [ 126.869152][ T7664] netlink_ack+0xfd/0x500 [ 126.869193][ T7664] netlink_rcv_skb+0x192/0x220 [ 126.869236][ T7664] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 126.869331][ T7664] rtnetlink_rcv+0x1c/0x30 [ 126.869360][ T7664] netlink_unicast+0x59e/0x670 [ 126.869403][ T7664] netlink_sendmsg+0x58b/0x6b0 [ 126.869494][ T7664] ? __pfx_netlink_sendmsg+0x10/0x10 [ 126.869514][ T7664] __sock_sendmsg+0x142/0x180 [ 126.869550][ T7664] ____sys_sendmsg+0x31e/0x4e0 [ 126.869605][ T7664] ___sys_sendmsg+0x17b/0x1d0 [ 126.869727][ T7664] __x64_sys_sendmsg+0xd4/0x160 [ 126.869753][ T7664] x64_sys_call+0x2999/0x2fb0 [ 126.869794][ T7664] do_syscall_64+0xd0/0x1a0 [ 126.869819][ T7664] ? clear_bhb_loop+0x40/0x90 [ 126.869847][ T7664] ? clear_bhb_loop+0x40/0x90 [ 126.869885][ T7664] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.869910][ T7664] RIP: 0033:0x7f9cea0fe969 [ 126.869925][ T7664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.869959][ T7664] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 126.869977][ T7664] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 126.869993][ T7664] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 126.870010][ T7664] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 126.870025][ T7664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.870056][ T7664] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 126.870084][ T7664] [ 127.164285][ T7670] netlink: 'syz.4.1741': attribute type 5 has an invalid length. [ 127.487267][ T7683] netlink: 'syz.1.1747': attribute type 1 has an invalid length. [ 127.504678][ T7687] SELinux: syz.3.1749 (7687) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 127.522489][ T7689] 8021q: adding VLAN 0 to HW filter on device bond2 [ 128.533119][ T7711] wg2: entered promiscuous mode [ 128.538047][ T7711] wg2: entered allmulticast mode [ 128.856207][ T7733] FAULT_INJECTION: forcing a failure. [ 128.856207][ T7733] name failslab, interval 1, probability 0, space 0, times 0 [ 128.866286][ T7735] FAULT_INJECTION: forcing a failure. [ 128.866286][ T7735] name failslab, interval 1, probability 0, space 0, times 0 [ 128.868889][ T7733] CPU: 0 UID: 0 PID: 7733 Comm: syz.0.1766 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 128.868929][ T7733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 128.868946][ T7733] Call Trace: [ 128.868956][ T7733] [ 128.868966][ T7733] __dump_stack+0x1d/0x30 [ 128.869066][ T7733] dump_stack_lvl+0xe8/0x140 [ 128.869092][ T7733] dump_stack+0x15/0x1b [ 128.869115][ T7733] should_fail_ex+0x265/0x280 [ 128.869207][ T7733] should_failslab+0x8c/0xb0 [ 128.869250][ T7733] kmem_cache_alloc_node_noprof+0x57/0x320 [ 128.869280][ T7733] ? __alloc_skb+0x101/0x320 [ 128.869360][ T7733] __alloc_skb+0x101/0x320 [ 128.869401][ T7733] ? audit_log_start+0x365/0x6c0 [ 128.869444][ T7733] audit_log_start+0x380/0x6c0 [ 128.869514][ T7733] audit_seccomp+0x48/0x100 [ 128.869548][ T7733] ? __seccomp_filter+0x68c/0x10d0 [ 128.869680][ T7733] __seccomp_filter+0x69d/0x10d0 [ 128.869711][ T7733] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 128.869759][ T7733] ? vfs_write+0x75e/0x8d0 [ 128.869810][ T7733] ? __rcu_read_unlock+0x4f/0x70 [ 128.869873][ T7733] ? __fget_files+0x184/0x1c0 [ 128.869954][ T7733] __secure_computing+0x82/0x150 [ 128.869983][ T7733] syscall_trace_enter+0xcf/0x1e0 [ 128.870016][ T7733] do_syscall_64+0xaa/0x1a0 [ 128.870063][ T7733] ? clear_bhb_loop+0x40/0x90 [ 128.870092][ T7733] ? clear_bhb_loop+0x40/0x90 [ 128.870214][ T7733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.870245][ T7733] RIP: 0033:0x7f10c823e969 [ 128.870265][ T7733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.870353][ T7733] RSP: 002b:00007f10c68a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000006a [ 128.870380][ T7733] RAX: ffffffffffffffda RBX: 00007f10c8465fa0 RCX: 00007f10c823e969 [ 128.870398][ T7733] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 128.870478][ T7733] RBP: 00007f10c68a7090 R08: 0000000000000000 R09: 0000000000000000 [ 128.870496][ T7733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.870512][ T7733] R13: 0000000000000000 R14: 00007f10c8465fa0 R15: 00007fffa39c2128 [ 128.870535][ T7733] [ 129.097538][ T7735] CPU: 1 UID: 0 PID: 7735 Comm: syz.4.1767 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 129.097563][ T7735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 129.097644][ T7735] Call Trace: [ 129.097650][ T7735] [ 129.097657][ T7735] __dump_stack+0x1d/0x30 [ 129.097676][ T7735] dump_stack_lvl+0xe8/0x140 [ 129.097698][ T7735] dump_stack+0x15/0x1b [ 129.097715][ T7735] should_fail_ex+0x265/0x280 [ 129.097746][ T7735] should_failslab+0x8c/0xb0 [ 129.097774][ T7735] kmem_cache_alloc_noprof+0x50/0x310 [ 129.097792][ T7735] ? getname_flags+0x80/0x3b0 [ 129.097932][ T7735] getname_flags+0x80/0x3b0 [ 129.097960][ T7735] user_path_at+0x28/0x130 [ 129.097979][ T7735] __se_sys_mount+0x25b/0x2e0 [ 129.098063][ T7735] ? fput+0x8f/0xc0 [ 129.098082][ T7735] __x64_sys_mount+0x67/0x80 [ 129.098107][ T7735] x64_sys_call+0xd36/0x2fb0 [ 129.098185][ T7735] do_syscall_64+0xd0/0x1a0 [ 129.098207][ T7735] ? clear_bhb_loop+0x40/0x90 [ 129.098226][ T7735] ? clear_bhb_loop+0x40/0x90 [ 129.098254][ T7735] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 129.098287][ T7735] RIP: 0033:0x7f9cea0fe969 [ 129.098306][ T7735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.098329][ T7735] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.098352][ T7735] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 129.098364][ T7735] RDX: 0000200000000280 RSI: 0000200000000300 RDI: 0000000000000000 [ 129.098376][ T7735] RBP: 00007f9ce8767090 R08: 00002000000001c0 R09: 0000000000000000 [ 129.098387][ T7735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.098468][ T7735] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 129.098484][ T7735] [ 129.098794][ T29] kauditd_printk_skb: 2722 callbacks suppressed [ 129.098809][ T29] audit: type=1326 audit(1748140377.757:62599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 129.237529][ T7743] audit: audit_backlog=65 > audit_backlog_limit=64 [ 129.242045][ T29] audit: type=1326 audit(1748140377.757:62600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 129.250051][ T7743] audit: audit_lost=76 audit_rate_limit=0 audit_backlog_limit=64 [ 129.257977][ T29] audit: type=1326 audit(1748140377.757:62601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 129.266047][ T7743] audit: backlog limit exceeded [ 129.274162][ T29] audit: type=1326 audit(1748140377.767:62602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 129.406280][ T29] audit: type=1326 audit(1748140377.767:62603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fb0d19fab39 code=0x7ffc0000 [ 129.429709][ T29] audit: type=1326 audit(1748140377.767:62604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7fb0d1a5e969 code=0x7ffc0000 [ 129.453200][ T29] audit: type=1326 audit(1748140377.777:62605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7708 comm="syz.3.1757" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb0d1a55927 code=0x7ffc0000 [ 129.561905][ T7755] pim6reg1: entered promiscuous mode [ 129.567378][ T7755] pim6reg1: entered allmulticast mode [ 129.657100][ T7766] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 129.718095][ T7775] FAULT_INJECTION: forcing a failure. [ 129.718095][ T7775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 129.731533][ T7775] CPU: 0 UID: 0 PID: 7775 Comm: syz.0.1783 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 129.731569][ T7775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 129.731584][ T7775] Call Trace: [ 129.731644][ T7775] [ 129.731652][ T7775] __dump_stack+0x1d/0x30 [ 129.731678][ T7775] dump_stack_lvl+0xe8/0x140 [ 129.731703][ T7775] dump_stack+0x15/0x1b [ 129.731721][ T7775] should_fail_ex+0x265/0x280 [ 129.731842][ T7775] should_fail_alloc_page+0xf2/0x100 [ 129.731887][ T7775] __alloc_frozen_pages_noprof+0xff/0x360 [ 129.731954][ T7775] alloc_pages_mpol+0xb3/0x250 [ 129.731983][ T7775] vma_alloc_folio_noprof+0x1aa/0x300 [ 129.732044][ T7775] handle_mm_fault+0x1056/0x2ae0 [ 129.732078][ T7775] ? mas_walk+0xf2/0x120 [ 129.732126][ T7775] do_user_addr_fault+0x636/0x1090 [ 129.732161][ T7775] exc_page_fault+0x54/0xc0 [ 129.732257][ T7775] asm_exc_page_fault+0x26/0x30 [ 129.732359][ T7775] RIP: 0033:0x7f10c81ebf6b [ 129.732378][ T7775] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 129.732400][ T7775] RSP: 002b:00007f10c68a4e10 EFLAGS: 00010246 [ 129.732461][ T7775] RAX: 00007f10c68a6f30 RBX: 00007f10c8433620 RCX: 0000000000000000 [ 129.732477][ T7775] RDX: 00007f10c68a6f78 RSI: 00007f10c829dbf8 RDI: 00007f10c68a4e30 [ 129.732493][ T7775] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 129.732508][ T7775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.732522][ T7775] R13: 0000000000000000 R14: 00007f10c8465fa0 R15: 00007fffa39c2128 [ 129.732543][ T7775] [ 129.732554][ T7775] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 129.873290][ T7791] pim6reg1: entered promiscuous mode [ 129.911985][ T7791] pim6reg1: entered allmulticast mode [ 130.104192][ T7812] FAULT_INJECTION: forcing a failure. [ 130.104192][ T7812] name failslab, interval 1, probability 0, space 0, times 0 [ 130.117005][ T7812] CPU: 1 UID: 0 PID: 7812 Comm: syz.4.1797 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 130.117088][ T7812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 130.117166][ T7812] Call Trace: [ 130.117174][ T7812] [ 130.117183][ T7812] __dump_stack+0x1d/0x30 [ 130.117220][ T7812] dump_stack_lvl+0xe8/0x140 [ 130.117246][ T7812] dump_stack+0x15/0x1b [ 130.117368][ T7812] should_fail_ex+0x265/0x280 [ 130.117462][ T7812] should_failslab+0x8c/0xb0 [ 130.117582][ T7812] __kmalloc_noprof+0xa5/0x3e0 [ 130.117608][ T7812] ? alloc_pipe_info+0x1c9/0x350 [ 130.117646][ T7812] alloc_pipe_info+0x1c9/0x350 [ 130.117675][ T7812] splice_direct_to_actor+0x592/0x680 [ 130.117753][ T7812] ? file_has_perm+0x324/0x370 [ 130.117794][ T7812] ? __pfx_direct_splice_actor+0x10/0x10 [ 130.117830][ T7812] do_splice_direct+0xda/0x150 [ 130.117869][ T7812] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 130.117902][ T7812] do_sendfile+0x380/0x640 [ 130.117926][ T7812] __x64_sys_sendfile64+0x105/0x150 [ 130.117983][ T7812] x64_sys_call+0xb39/0x2fb0 [ 130.118053][ T7812] do_syscall_64+0xd0/0x1a0 [ 130.118086][ T7812] ? clear_bhb_loop+0x40/0x90 [ 130.118115][ T7812] ? clear_bhb_loop+0x40/0x90 [ 130.118199][ T7812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.118228][ T7812] RIP: 0033:0x7f9cea0fe969 [ 130.118253][ T7812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.118312][ T7812] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 130.118339][ T7812] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 130.118356][ T7812] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 130.118371][ T7812] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 130.118387][ T7812] R10: 000000007ffff000 R11: 0000000000000246 R12: 0000000000000001 [ 130.118401][ T7812] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 130.118423][ T7812] [ 130.561184][ T7838] FAULT_INJECTION: forcing a failure. [ 130.561184][ T7838] name failslab, interval 1, probability 0, space 0, times 0 [ 130.573961][ T7838] CPU: 0 UID: 0 PID: 7838 Comm: syz.2.1807 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 130.573994][ T7838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 130.574009][ T7838] Call Trace: [ 130.574017][ T7838] [ 130.574026][ T7838] __dump_stack+0x1d/0x30 [ 130.574048][ T7838] dump_stack_lvl+0xe8/0x140 [ 130.574133][ T7838] dump_stack+0x15/0x1b [ 130.574155][ T7838] should_fail_ex+0x265/0x280 [ 130.574200][ T7838] should_failslab+0x8c/0xb0 [ 130.574256][ T7838] kmem_cache_alloc_noprof+0x50/0x310 [ 130.574276][ T7838] ? do_set_mempolicy+0x17c/0x3e0 [ 130.574350][ T7838] do_set_mempolicy+0x17c/0x3e0 [ 130.574449][ T7838] __x64_sys_set_mempolicy+0x139/0x170 [ 130.574473][ T7838] x64_sys_call+0x273c/0x2fb0 [ 130.574500][ T7838] do_syscall_64+0xd0/0x1a0 [ 130.574524][ T7838] ? clear_bhb_loop+0x40/0x90 [ 130.574552][ T7838] ? clear_bhb_loop+0x40/0x90 [ 130.574598][ T7838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.574621][ T7838] RIP: 0033:0x7fb88cd0e969 [ 130.574635][ T7838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.574675][ T7838] RSP: 002b:00007fb88b377038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ee [ 130.574699][ T7838] RAX: ffffffffffffffda RBX: 00007fb88cf35fa0 RCX: 00007fb88cd0e969 [ 130.574716][ T7838] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 130.574758][ T7838] RBP: 00007fb88b377090 R08: 0000000000000000 R09: 0000000000000000 [ 130.574770][ T7838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.574781][ T7838] R13: 0000000000000000 R14: 00007fb88cf35fa0 R15: 00007fff226f7cf8 [ 130.574801][ T7838] [ 130.920705][ T7851] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 131.012954][ T7857] binfmt_misc: register: failed to install interpreter file ./file2 [ 131.308270][ T7873] FAULT_INJECTION: forcing a failure. [ 131.308270][ T7873] name failslab, interval 1, probability 0, space 0, times 0 [ 131.321140][ T7873] CPU: 0 UID: 0 PID: 7873 Comm: syz.4.1822 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 131.321218][ T7873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.321230][ T7873] Call Trace: [ 131.321236][ T7873] [ 131.321243][ T7873] __dump_stack+0x1d/0x30 [ 131.321264][ T7873] dump_stack_lvl+0xe8/0x140 [ 131.321327][ T7873] dump_stack+0x15/0x1b [ 131.321343][ T7873] should_fail_ex+0x265/0x280 [ 131.321380][ T7873] should_failslab+0x8c/0xb0 [ 131.321439][ T7873] kmem_cache_alloc_node_noprof+0x57/0x320 [ 131.321460][ T7873] ? __alloc_skb+0x101/0x320 [ 131.321496][ T7873] __alloc_skb+0x101/0x320 [ 131.321537][ T7873] ? audit_log_start+0x365/0x6c0 [ 131.321628][ T7873] audit_log_start+0x380/0x6c0 [ 131.321675][ T7873] audit_seccomp+0x48/0x100 [ 131.321702][ T7873] ? __seccomp_filter+0x68c/0x10d0 [ 131.321798][ T7873] __seccomp_filter+0x69d/0x10d0 [ 131.321821][ T7873] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 131.321883][ T7873] ? vfs_write+0x75e/0x8d0 [ 131.321962][ T7873] ? __rcu_read_unlock+0x4f/0x70 [ 131.322053][ T7873] ? __fget_files+0x184/0x1c0 [ 131.322092][ T7873] __secure_computing+0x82/0x150 [ 131.322121][ T7873] syscall_trace_enter+0xcf/0x1e0 [ 131.322178][ T7873] do_syscall_64+0xaa/0x1a0 [ 131.322206][ T7873] ? clear_bhb_loop+0x40/0x90 [ 131.322310][ T7873] ? clear_bhb_loop+0x40/0x90 [ 131.322332][ T7873] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 131.322353][ T7873] RIP: 0033:0x7f9cea0fe969 [ 131.322367][ T7873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.322390][ T7873] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 0000000000000026 [ 131.322422][ T7873] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 131.322491][ T7873] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [ 131.322503][ T7873] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 131.322516][ T7873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.322527][ T7873] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 131.322544][ T7873] [ 131.633827][ T7882] FAULT_INJECTION: forcing a failure. [ 131.633827][ T7882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.646956][ T7882] CPU: 0 UID: 0 PID: 7882 Comm: +}[@ Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 131.647010][ T7882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.647027][ T7882] Call Trace: [ 131.647035][ T7882] [ 131.647045][ T7882] __dump_stack+0x1d/0x30 [ 131.647072][ T7882] dump_stack_lvl+0xe8/0x140 [ 131.647097][ T7882] dump_stack+0x15/0x1b [ 131.647119][ T7882] should_fail_ex+0x265/0x280 [ 131.647201][ T7882] should_fail+0xb/0x20 [ 131.647242][ T7882] should_fail_usercopy+0x1a/0x20 [ 131.647268][ T7882] _copy_to_user+0x20/0xa0 [ 131.647298][ T7882] simple_read_from_buffer+0xb5/0x130 [ 131.647391][ T7882] proc_fail_nth_read+0x100/0x140 [ 131.647428][ T7882] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 131.647584][ T7882] vfs_read+0x19d/0x6f0 [ 131.647609][ T7882] ? __rcu_read_unlock+0x4f/0x70 [ 131.647677][ T7882] ? __fget_files+0x184/0x1c0 [ 131.647713][ T7882] ? up_write+0x18/0x60 [ 131.647785][ T7882] ksys_read+0xda/0x1a0 [ 131.647820][ T7882] __x64_sys_read+0x40/0x50 [ 131.647855][ T7882] x64_sys_call+0x2d77/0x2fb0 [ 131.647880][ T7882] do_syscall_64+0xd0/0x1a0 [ 131.647961][ T7882] ? clear_bhb_loop+0x40/0x90 [ 131.648017][ T7882] ? clear_bhb_loop+0x40/0x90 [ 131.648043][ T7882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 131.648064][ T7882] RIP: 0033:0x7fa9fdc9d37c [ 131.648080][ T7882] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 131.648104][ T7882] RSP: 002b:00007fa9fc307030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 131.648127][ T7882] RAX: ffffffffffffffda RBX: 00007fa9fdec5fa0 RCX: 00007fa9fdc9d37c [ 131.648143][ T7882] RDX: 000000000000000f RSI: 00007fa9fc3070a0 RDI: 0000000000000006 [ 131.648212][ T7882] RBP: 00007fa9fc307090 R08: 0000000000000000 R09: 0000000000000000 [ 131.648223][ T7882] R10: 0000000000003032 R11: 0000000000000246 R12: 0000000000000001 [ 131.648235][ T7882] R13: 0000000000000000 R14: 00007fa9fdec5fa0 R15: 00007ffecfa78d58 [ 131.648252][ T7882] [ 132.260303][ T7917] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 132.755128][ T7919] FAULT_INJECTION: forcing a failure. [ 132.755128][ T7919] name failslab, interval 1, probability 0, space 0, times 0 [ 132.767984][ T7919] CPU: 0 UID: 0 PID: 7919 Comm: syz.4.1841 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 132.768023][ T7919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 132.768114][ T7919] Call Trace: [ 132.768147][ T7919] [ 132.768154][ T7919] __dump_stack+0x1d/0x30 [ 132.768175][ T7919] dump_stack_lvl+0xe8/0x140 [ 132.768193][ T7919] dump_stack+0x15/0x1b [ 132.768209][ T7919] should_fail_ex+0x265/0x280 [ 132.768317][ T7919] should_failslab+0x8c/0xb0 [ 132.768350][ T7919] kmem_cache_alloc_noprof+0x50/0x310 [ 132.768378][ T7919] ? skb_clone+0x151/0x1f0 [ 132.768429][ T7919] skb_clone+0x151/0x1f0 [ 132.768507][ T7919] __netlink_deliver_tap+0x2c9/0x500 [ 132.768538][ T7919] netlink_unicast+0x64c/0x670 [ 132.768577][ T7919] netlink_sendmsg+0x58b/0x6b0 [ 132.768648][ T7919] ? __pfx_netlink_sendmsg+0x10/0x10 [ 132.768735][ T7919] __sock_sendmsg+0x142/0x180 [ 132.768778][ T7919] ____sys_sendmsg+0x31e/0x4e0 [ 132.768801][ T7919] ___sys_sendmsg+0x17b/0x1d0 [ 132.768871][ T7919] __x64_sys_sendmsg+0xd4/0x160 [ 132.768897][ T7919] x64_sys_call+0x2999/0x2fb0 [ 132.768925][ T7919] do_syscall_64+0xd0/0x1a0 [ 132.768949][ T7919] ? clear_bhb_loop+0x40/0x90 [ 132.769047][ T7919] ? clear_bhb_loop+0x40/0x90 [ 132.769076][ T7919] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.769101][ T7919] RIP: 0033:0x7f9cea0fe969 [ 132.769115][ T7919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.769134][ T7919] RSP: 002b:00007f9ce8767038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 132.769153][ T7919] RAX: ffffffffffffffda RBX: 00007f9cea325fa0 RCX: 00007f9cea0fe969 [ 132.769176][ T7919] RDX: 0000000000000000 RSI: 0000200000006040 RDI: 0000000000000005 [ 132.769188][ T7919] RBP: 00007f9ce8767090 R08: 0000000000000000 R09: 0000000000000000 [ 132.769207][ T7919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.769220][ T7919] R13: 0000000000000000 R14: 00007f9cea325fa0 R15: 00007ffef821a658 [ 132.769239][ T7919] [ 133.110239][ T7935] FAULT_INJECTION: forcing a failure. [ 133.110239][ T7935] name failslab, interval 1, probability 0, space 0, times 0 [ 133.122946][ T7935] CPU: 1 UID: 0 PID: 7935 Comm: syz.1.1849 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 133.123038][ T7935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 133.123054][ T7935] Call Trace: [ 133.123062][ T7935] [ 133.123071][ T7935] __dump_stack+0x1d/0x30 [ 133.123097][ T7935] dump_stack_lvl+0xe8/0x140 [ 133.123117][ T7935] dump_stack+0x15/0x1b [ 133.123138][ T7935] should_fail_ex+0x265/0x280 [ 133.123233][ T7935] should_failslab+0x8c/0xb0 [ 133.123274][ T7935] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 133.123355][ T7935] ? sidtab_sid2str_get+0xa0/0x130 [ 133.123401][ T7935] ? skb_put+0xa9/0xf0 [ 133.123510][ T7935] kmemdup_noprof+0x2b/0x70 [ 133.123536][ T7935] sidtab_sid2str_get+0xa0/0x130 [ 133.123576][ T7935] security_sid_to_context_core+0x1eb/0x2e0 [ 133.123616][ T7935] security_sid_to_context+0x27/0x40 [ 133.123713][ T7935] avc_audit_post_callback+0x9d/0x520 [ 133.123758][ T7935] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 133.123884][ T7935] common_lsm_audit+0x1b8/0x230 [ 133.123918][ T7935] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 133.123975][ T7935] slow_avc_audit+0x104/0x140 [ 133.124030][ T7935] avc_has_perm+0x128/0x150 [ 133.124057][ T7935] selinux_bpf+0xa3/0xc0 [ 133.124091][ T7935] security_bpf+0x52/0x90 [ 133.124182][ T7935] __sys_bpf+0x1bf/0x790 [ 133.124264][ T7935] __x64_sys_bpf+0x41/0x50 [ 133.124343][ T7935] x64_sys_call+0x2478/0x2fb0 [ 133.124372][ T7935] do_syscall_64+0xd0/0x1a0 [ 133.124408][ T7935] ? clear_bhb_loop+0x40/0x90 [ 133.124436][ T7935] ? clear_bhb_loop+0x40/0x90 [ 133.124529][ T7935] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.124551][ T7935] RIP: 0033:0x7fa9fdc9e969 [ 133.124566][ T7935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.124583][ T7935] RSP: 002b:00007fa9fc307038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 133.124623][ T7935] RAX: ffffffffffffffda RBX: 00007fa9fdec5fa0 RCX: 00007fa9fdc9e969 [ 133.124639][ T7935] RDX: 0000000000000048 RSI: 00002000000000c0 RDI: 0000000000000000 [ 133.124656][ T7935] RBP: 00007fa9fc307090 R08: 0000000000000000 R09: 0000000000000000 [ 133.124672][ T7935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.124764][ T7935] R13: 0000000000000000 R14: 00007fa9fdec5fa0 R15: 00007ffecfa78d58 [ 133.124786][ T7935] [ 133.420974][ T7949] netlink: 'syz.1.1854': attribute type 4 has an invalid length. [ 133.428747][ T7949] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.1854'. [ 134.109348][ T29] kauditd_printk_skb: 1848 callbacks suppressed [ 134.109375][ T29] audit: type=1326 audit(1748140382.767:64449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 134.151762][ T29] audit: type=1326 audit(1748140382.797:64450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 134.175332][ T29] audit: type=1326 audit(1748140382.797:64451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 134.198830][ T29] audit: type=1326 audit(1748140382.797:64452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 134.222259][ T29] audit: type=1326 audit(1748140382.797:64453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 134.245865][ T29] audit: type=1326 audit(1748140382.807:64454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f10c8235927 code=0x7ffc0000 [ 134.269419][ T29] audit: type=1326 audit(1748140382.807:64455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f10c81dab39 code=0x7ffc0000 [ 134.293003][ T29] audit: type=1326 audit(1748140382.807:64456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7944 comm="syz.0.1852" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f10c823e969 code=0x7ffc0000 [ 134.316969][ T29] audit: type=1400 audit(1748140382.817:64457): avc: denied { map_create } for pid=7962 comm="syz.4.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 134.336284][ T29] audit: type=1400 audit(1748140382.817:64458): avc: denied { prog_load } for pid=7962 comm="syz.4.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 134.452646][ T7972] bond1: entered promiscuous mode [ 134.457748][ T7972] bond1: entered allmulticast mode [ 134.479769][ T7972] 8021q: adding VLAN 0 to HW filter on device bond1 [ 134.490354][ T7972] bond1 (unregistering): Released all slaves [ 134.935967][ T7996] netlink: 'syz.4.1871': attribute type 4 has an invalid length. [ 134.943812][ T7996] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.1871'. [ 135.732391][ T8009] bond1: entered promiscuous mode [ 135.737457][ T8009] bond1: entered allmulticast mode [ 135.742956][ T8009] 8021q: adding VLAN 0 to HW filter on device bond1 [ 135.752818][ T8009] bond1 (unregistering): Released all slaves [ 135.817088][ T8012] FAULT_INJECTION: forcing a failure. [ 135.817088][ T8012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.830357][ T8012] CPU: 1 UID: 0 PID: 8012 Comm: syz.3.1877 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 135.830390][ T8012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 135.830459][ T8012] Call Trace: [ 135.830465][ T8012] [ 135.830492][ T8012] __dump_stack+0x1d/0x30 [ 135.830513][ T8012] dump_stack_lvl+0xe8/0x140 [ 135.830537][ T8012] dump_stack+0x15/0x1b [ 135.830558][ T8012] should_fail_ex+0x265/0x280 [ 135.830605][ T8012] should_fail+0xb/0x20 [ 135.830724][ T8012] should_fail_usercopy+0x1a/0x20 [ 135.830751][ T8012] _copy_from_iter+0xcf/0xdd0 [ 135.830776][ T8012] ? __build_skb_around+0x1a0/0x200 [ 135.830821][ T8012] ? __build_skb+0x59/0x70 [ 135.830876][ T8012] netlink_sendmsg+0x471/0x6b0 [ 135.830933][ T8012] ? __pfx_netlink_sendmsg+0x10/0x10 [ 135.830959][ T8012] __sock_sendmsg+0x142/0x180 [ 135.830995][ T8012] __sys_sendto+0x268/0x330 [ 135.831113][ T8012] __x64_sys_sendto+0x76/0x90 [ 135.831178][ T8012] x64_sys_call+0x2eb6/0x2fb0 [ 135.831207][ T8012] do_syscall_64+0xd0/0x1a0 [ 135.831231][ T8012] ? clear_bhb_loop+0x40/0x90 [ 135.831295][ T8012] ? clear_bhb_loop+0x40/0x90 [ 135.831358][ T8012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.831384][ T8012] RIP: 0033:0x7fb0d1a5e969 [ 135.831399][ T8012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.831434][ T8012] RSP: 002b:00007fb0d00c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 135.831455][ T8012] RAX: ffffffffffffffda RBX: 00007fb0d1c85fa0 RCX: 00007fb0d1a5e969 [ 135.831472][ T8012] RDX: 0000000000000ec1 RSI: 0000200000000100 RDI: 0000000000000003 [ 135.831489][ T8012] RBP: 00007fb0d00c7090 R08: 0000000000000000 R09: 9e5e111c47e3504f [ 135.831505][ T8012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.831551][ T8012] R13: 0000000000000000 R14: 00007fb0d1c85fa0 R15: 00007fff1c39a5b8 [ 135.831571][ T8012] [ 136.049281][ T8019] FAULT_INJECTION: forcing a failure. [ 136.049281][ T8019] name failslab, interval 1, probability 0, space 0, times 0 [ 136.062095][ T8019] CPU: 1 UID: 0 PID: 8019 Comm: syz.3.1879 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 136.062134][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 136.062150][ T8019] Call Trace: [ 136.062159][ T8019] [ 136.062169][ T8019] __dump_stack+0x1d/0x30 [ 136.062194][ T8019] dump_stack_lvl+0xe8/0x140 [ 136.062213][ T8019] dump_stack+0x15/0x1b [ 136.062267][ T8019] should_fail_ex+0x265/0x280 [ 136.062302][ T8019] should_failslab+0x8c/0xb0 [ 136.062333][ T8019] kmem_cache_alloc_noprof+0x50/0x310 [ 136.062388][ T8019] ? skb_clone+0x151/0x1f0 [ 136.062423][ T8019] skb_clone+0x151/0x1f0 [ 136.062451][ T8019] __netlink_deliver_tap+0x2c9/0x500 [ 136.062480][ T8019] netlink_unicast+0x64c/0x670 [ 136.062544][ T8019] netlink_sendmsg+0x58b/0x6b0 [ 136.062572][ T8019] ? __pfx_netlink_sendmsg+0x10/0x10 [ 136.062598][ T8019] __sock_sendmsg+0x142/0x180 [ 136.062634][ T8019] ____sys_sendmsg+0x31e/0x4e0 [ 136.062745][ T8019] ___sys_sendmsg+0x17b/0x1d0 [ 136.062801][ T8019] __x64_sys_sendmsg+0xd4/0x160 [ 136.062829][ T8019] x64_sys_call+0x2999/0x2fb0 [ 136.062850][ T8019] do_syscall_64+0xd0/0x1a0 [ 136.062879][ T8019] ? clear_bhb_loop+0x40/0x90 [ 136.062907][ T8019] ? clear_bhb_loop+0x40/0x90 [ 136.062938][ T8019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.062965][ T8019] RIP: 0033:0x7fb0d1a5e969 [ 136.062984][ T8019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.063005][ T8019] RSP: 002b:00007fb0d00c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 136.063024][ T8019] RAX: ffffffffffffffda RBX: 00007fb0d1c85fa0 RCX: 00007fb0d1a5e969 [ 136.063036][ T8019] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 136.063131][ T8019] RBP: 00007fb0d00c7090 R08: 0000000000000000 R09: 0000000000000000 [ 136.063147][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.063164][ T8019] R13: 0000000000000000 R14: 00007fb0d1c85fa0 R15: 00007fff1c39a5b8 [ 136.063244][ T8019] [ 136.289429][ T8019] bond1: entered promiscuous mode [ 136.294791][ T8019] bond1: entered allmulticast mode [ 136.319938][ T8019] 8021q: adding VLAN 0 to HW filter on device bond1 [ 136.340255][ T8019] bond1 (unregistering): Released all slaves [ 137.002933][ T8075] FAULT_INJECTION: forcing a failure. [ 137.002933][ T8075] name failslab, interval 1, probability 0, space 0, times 0 [ 137.015808][ T8075] CPU: 0 UID: 0 PID: 8075 Comm: syz.2.1899 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 137.015893][ T8075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.015925][ T8075] Call Trace: [ 137.015932][ T8075] [ 137.015939][ T8075] __dump_stack+0x1d/0x30 [ 137.015960][ T8075] dump_stack_lvl+0xe8/0x140 [ 137.015979][ T8075] dump_stack+0x15/0x1b [ 137.016000][ T8075] should_fail_ex+0x265/0x280 [ 137.016045][ T8075] should_failslab+0x8c/0xb0 [ 137.016126][ T8075] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 137.016213][ T8075] ? __d_alloc+0x3d/0x350 [ 137.016244][ T8075] __d_alloc+0x3d/0x350 [ 137.016268][ T8075] d_alloc_parallel+0x53/0xc40 [ 137.016296][ T8075] ? __rcu_read_unlock+0x4f/0x70 [ 137.016317][ T8075] ? __d_lookup+0x316/0x340 [ 137.016339][ T8075] ? try_to_unlazy+0x25e/0x3a0 [ 137.016458][ T8075] path_openat+0x6b5/0x2170 [ 137.016499][ T8075] do_filp_open+0x109/0x230 [ 137.016537][ T8075] do_sys_openat2+0xa6/0x110 [ 137.016599][ T8075] __x64_sys_openat+0xf2/0x120 [ 137.016662][ T8075] x64_sys_call+0x1af/0x2fb0 [ 137.016691][ T8075] do_syscall_64+0xd0/0x1a0 [ 137.016717][ T8075] ? clear_bhb_loop+0x40/0x90 [ 137.016765][ T8075] ? clear_bhb_loop+0x40/0x90 [ 137.016937][ T8075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.016960][ T8075] RIP: 0033:0x7fb88cd0e969 [ 137.016975][ T8075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.016993][ T8075] RSP: 002b:00007fb88b377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 137.017011][ T8075] RAX: ffffffffffffffda RBX: 00007fb88cf35fa0 RCX: 00007fb88cd0e969 [ 137.017023][ T8075] RDX: 000000000000275a RSI: 0000200000000080 RDI: ffffffffffffff9c [ 137.017116][ T8075] RBP: 00007fb88b377090 R08: 0000000000000000 R09: 0000000000000000 [ 137.017134][ T8075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.017150][ T8075] R13: 0000000000000000 R14: 00007fb88cf35fa0 R15: 00007fff226f7cf8 [ 137.017231][ T8075] [ 137.380366][ T8087] loop0: detected capacity change from 0 to 164 [ 137.393686][ T8088] ================================================================== [ 137.401819][ T8088] BUG: KCSAN: data-race in blkdev_open / queue_limits_commit_update [ 137.409937][ T8088] [ 137.412274][ T8088] read to 0xffff88810232cc3c of 4 bytes by task 8089 on cpu 1: [ 137.419834][ T8088] blkdev_open+0x161/0x290 [ 137.424291][ T8088] do_dentry_open+0x646/0xa20 [ 137.429013][ T8088] vfs_open+0x37/0x1e0 [ 137.433096][ T8088] path_openat+0x1c5e/0x2170 [ 137.437697][ T8088] do_filp_open+0x109/0x230 [ 137.442208][ T8088] do_sys_openat2+0xa6/0x110 [ 137.446813][ T8088] __x64_sys_openat+0xf2/0x120 [ 137.451587][ T8088] x64_sys_call+0x1af/0x2fb0 [ 137.456191][ T8088] do_syscall_64+0xd0/0x1a0 [ 137.460710][ T8088] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.466611][ T8088] [ 137.468953][ T8088] write to 0xffff88810232cbb8 of 176 bytes by task 8088 on cpu 0: [ 137.476760][ T8088] queue_limits_commit_update+0x4c/0x110 [ 137.482409][ T8088] loop_configure+0x79c/0xa50 [ 137.487108][ T8088] lo_ioctl+0x559/0x15d0 [ 137.491459][ T8088] blkdev_ioctl+0x352/0x440 [ 137.495974][ T8088] __se_sys_ioctl+0xcb/0x140 [ 137.500575][ T8088] __x64_sys_ioctl+0x43/0x50 [ 137.505173][ T8088] x64_sys_call+0x19a8/0x2fb0 [ 137.509861][ T8088] do_syscall_64+0xd0/0x1a0 [ 137.514374][ T8088] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.520275][ T8088] [ 137.522597][ T8088] Reported by Kernel Concurrency Sanitizer on: [ 137.528752][ T8088] CPU: 0 UID: 0 PID: 8088 Comm: syz.3.1905 Not tainted 6.15.0-rc7-syzkaller-00144-gb1427432d3b6 #0 PREEMPT(voluntary) [ 137.541175][ T8088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.551244][ T8088] ================================================================== [ 137.567455][ T8088] loop3: detected capacity change from 0 to 512 [ 137.584361][ T8087] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.594579][ T8088] EXT4-fs: Ignoring removed nobh option [ 137.601021][ T8087] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.611627][ T8087] Symlink component flag not implemented [ 137.617368][ T8087] Symlink component flag not implemented [ 137.624228][ T8087] Symlink component flag not implemented (7) [ 137.630421][ T8087] Symlink component flag not implemented (116) [ 137.637738][ T8088] EXT4-fs error (device loop3): ext4_free_branches:1023: inode #11: comm syz.3.1905: invalid indirect mapped block 256 (level 2) [ 137.652697][ T8088] EXT4-fs (loop3): Remounting filesystem read-only [ 137.652820][ T3322] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.659338][ T8088] EXT4-fs (loop3): 2 truncates cleaned up [ 137.675113][ T8088] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 137.687578][ T3322] rock: directory entry would overflow storage [ 137.687591][ T3322] rock: sig=0x4f50, size=4, remaining=3 [ 137.687606][ T3322] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 137.689429][ T3322] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.695535][ T8088] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 137.700114][ T3322] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.732971][ T3322] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.741396][ T3322] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 137.749902][ T3322] rock: directory entry would overflow storage [ 137.756069][ T3322] rock: sig=0x4f50, size=4, remaining=3 [ 137.761665][ T3322] iso9660: Corrupted directory entry in block 3 of inode 1856 [ 137.769303][ T3322] VFS: Lookup of '' in iso9660 loop0 would have caused loop [ 137.776979][ T3322] VFS: Lookup of '' in iso9660 loop0 would have caused loop [ 138.016941][ T113] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.063228][ T113] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.123604][ T113] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.186561][ T113] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.301186][ T113] bridge_slave_1: left allmulticast mode [ 138.306930][ T113] bridge_slave_1: left promiscuous mode [ 138.312752][ T113] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.352681][ T113] bridge_slave_0: left allmulticast mode [ 138.358383][ T113] bridge_slave_0: left promiscuous mode [ 138.364119][ T113] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.512016][ T113] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 138.532386][ T113] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 138.552109][ T113] bond0 (unregistering): Released all slaves [ 138.613392][ T113] hsr_slave_0: left promiscuous mode [ 138.629669][ T113] hsr_slave_1: left promiscuous mode [ 138.635415][ T113] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 138.642929][ T113] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 138.670167][ T113] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 138.677619][ T113] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 138.703298][ T113] veth1_macvtap: left promiscuous mode [ 138.708842][ T113] veth0_macvtap: left promiscuous mode [ 138.729701][ T113] veth1_vlan: left promiscuous mode [ 138.735155][ T113] veth0_vlan: left promiscuous mode [ 138.882311][ T113] team0 (unregistering): Port device team_slave_1 removed [ 138.901145][ T113] team0 (unregistering): Port device team_slave_0 removed [ 138.961027][ T113] team0 (unregistering): Port device dummy0 removed [ 139.109754][ T29] kauditd_printk_skb: 6154 callbacks suppressed [ 139.109770][ T29] audit: type=1400 audit(1748140387.777:70613): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.143543][ T3045] audit: audit_backlog=65 > audit_backlog_limit=64 [ 139.150130][ T3045] audit: audit_lost=79 audit_rate_limit=0 audit_backlog_limit=64 [ 139.157859][ T3045] audit: backlog limit exceeded [ 139.162817][ T29] audit: type=1400 audit(1748140387.807:70614): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.184573][ T29] audit: type=1400 audit(1748140387.807:70615): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.205937][ T29] audit: type=1400 audit(1748140387.807:70616): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.227206][ T29] audit: type=1400 audit(1748140387.807:70617): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.248549][ T29] audit: type=1400 audit(1748140387.807:70618): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.269786][ T29] audit: type=1400 audit(1748140387.807:70619): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.119647][ T29] kauditd_printk_skb: 43471 callbacks suppressed [ 144.119666][ T29] audit: type=1400 audit(1748140392.777:109057): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.119725][ T3045] audit: audit_backlog=65 > audit_backlog_limit=64 [ 144.126066][ T29] audit: type=1400 audit(1748140392.777:109058): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.147288][ T3045] audit: audit_lost=1758 audit_rate_limit=0 audit_backlog_limit=64 [ 144.153793][ T29] audit: type=1400 audit(1748140392.777:109059): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.174966][ T3045] audit: backlog limit exceeded [ 144.182868][ T29] audit: type=1400 audit(1748140392.777:109060): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.204422][ T3045] audit: audit_backlog=65 > audit_backlog_limit=64 [ 144.208955][ T29] audit: type=1400 audit(1748140392.777:109061): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.230790][ T3045] audit: audit_lost=1759 audit_rate_limit=0 audit_backlog_limit=64