last executing test programs: 2m42.469071456s ago: executing program 32 (id=2381): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fcdbdf2503000000050005010000000000000080140000000d6cc16c3a390f6ae2aca5b15dceb1764c744cd8386e421214219b7332abcd2f415ee6873c68b5298a36cbef6af966a868b5da74a0bcf169d460"], 0x34}, 0x1, 0x0, 0x0, 0x20009805}, 0x4000080) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x4b, 0x0, 0x50, 0x5}]}}, 0x0, 0x36, 0x0, 0x1, 0x3ff}, 0x28) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="801100001a000100feffffff00010000fc020100000000000000000000000001fc0100000000000000000000000000014001071c4e2300050a0000003a000000", @ANYRES8=r0, @ANYBLOB="30a1279c781c41c82e348c5630b5fef016cff0412801b348008673032244ed9973ffef030f5622cd381b94248da5742ff4362007246ad7439af1a55ddc4c2777cd7836bbc16b13c9a46667c2a64d45aa081feb1a6b19dd7116cc0ef3cd", @ANYBLOB="ff020000000000000000000000000001000004d46c000000e000000100000000000000000000000000000000000000009201000000000000a39b000000000000ffff0000000000001c25080000000000050000000000000081000000000000000000000000000000ffffffffffffffff00000000000000001f000000000000000300000000000000f9fffffffc030000ff0000008000000000350000020001002000000000000000480003006465666c61746500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000481001"], 0x1180}, 0x1, 0x0, 0x0, 0x40044}, 0x840) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000340)=[{&(0x7f0000001800)=""/248, 0xf8}], 0x1, 0x40000004, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x700, 0x80, 0x1, 0xfffffffe, {{0xa, 0x4, 0x2, 0x1, 0x28, 0x67, 0x0, 0x1, 0x29, 0x0, @loopback, @empty, {[@generic={0x88, 0x12, "2aee295956b91e6865658395c2a332bb"}]}}}}}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r5, &(0x7f0000000f40)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2400c042) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x400, 0x0, @private1, 0x200000}, 0x1c) sendto$inet6(r6, &(0x7f00000001c0)='N', 0x1, 0x80, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @private2}, 0x1c) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x3, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x80000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20010814) close(r9) 2m33.476185723s ago: executing program 33 (id=2630): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000400)='nmi_handler\x00', r1}, 0x62) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 2m16.573104651s ago: executing program 34 (id=2643): socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000001800)=""/248, 0xf8}], 0x1, 0x40000004, 0x0) 2m12.524028951s ago: executing program 35 (id=2667): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="05000000040000000801000001000800000000004a8f7b9ca54ba27394", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = openat(0xffffffffffffff9c, 0x0, 0x2040, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getegid() lchown(&(0x7f0000000040)='./bus\x00', 0x0, r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = syz_io_uring_setup(0x3798, &(0x7f00000008c0)={0x0, 0xc458, 0x80, 0x100000, 0x3a}, &(0x7f0000000500)=0x0, &(0x7f0000000a40)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000000)=0xff8, 0x0, 0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x1002002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_io_uring_submit(r5, r6, &(0x7f0000000b00)=@IORING_OP_UNLINKAT={0x24, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r7, r7) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@loopback, @in6=@remote, 0x4e23, 0x0, 0x4e20, 0x200, 0x2, 0xa0, 0x20, 0x6c, 0x0, r7}, {0x1, 0x8, 0xffffffbffffffffb, 0x90000000, 0x7, 0x8000, 0x3, 0xf}, {0x7, 0x8, 0x8, 0x1}, 0x28, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x3f}, 0x4d5, 0xff}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x1, 0x2, 0x7, 0x100, 0x984, 0xbbe9}}, 0xe8) io_uring_enter(r4, 0x627, 0x4c1, 0x43, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x800004, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb:\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0, 0x0, 0x7, 0x1, 0x2, 0x5c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, 0x0, 0x8000}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r10, 0x89f3, &(0x7f0000000040)={'syztnl1\x00', &(0x7f0000000280)={'ip6_vti0\x00', r11, 0x0, 0x0, 0x3, 0x0, 0x30000, @loopback, @local, 0x8000, 0x0, 0x1, 0x6}}) 2m9.354235714s ago: executing program 36 (id=2687): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000040)={0x18, 0x0, {0x1, @broadcast, 'ip6gre0\x00'}}, 0x1e) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x1, @empty, 'ip_vti0\x00'}}, 0x1e) socket$nl_route(0x10, 0x3, 0x0) ioctl$PPPOEIOCSFWD(r4, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'veth0_to_team\x00'}}) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, &(0x7f00000000c0)={[{@quota}, {@bsdgroups}, {@nouid32}, {@errors_remount}, {@jqfmt_vfsv1}, {@oldalloc}, {@bsdgroups}]}, 0x2, 0x46b, &(0x7f0000000580)="$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") socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000680)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m0.512525297s ago: executing program 37 (id=2742): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001e00100000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000fcffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 1m34.149613808s ago: executing program 4 (id=3363): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f00000009c0)=ANY=[@ANYRES8=r0], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x240080) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='leases_conflict\x00', r3}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x50) r6 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe00}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r5, 0x4000, r7}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x5, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r12 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r12, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="3801000010000100feffffff00010000fc00000000000000000000000000000164010101000000000000000000000000000107144e230005000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x94) 1m34.062356167s ago: executing program 4 (id=3365): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kfree\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x18) pivot_root(&(0x7f0000000000)='.\x00', &(0x7f00000004c0)='./file1\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r1}, &(0x7f0000000900), &(0x7f0000000940)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r8}, 0xc) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000080)={[{@i_version}, {@nogrpid}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$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") fallocate(0xffffffffffffffff, 0x0, 0xbf5, 0x2000402) 1m34.003131732s ago: executing program 4 (id=3370): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfffff000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000003c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@lazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@nombcache}]}, 0x1, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000080)=ANY=[], 0xfe37, 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100)='./file2\x00') munmap(&(0x7f0000a88000/0x1000)=nil, 0x1000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001100)="02965d1f5ec3de3d", 0x8}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 1m33.415657681s ago: executing program 4 (id=3381): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kfree\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x18) pivot_root(&(0x7f0000000000)='.\x00', &(0x7f00000004c0)='./file1\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r1}, &(0x7f0000000900), &(0x7f0000000940)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r8}, 0xc) r9 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) fallocate(r9, 0x0, 0xbf5, 0x2000402) 1m33.159151766s ago: executing program 4 (id=3385): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x15b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00\x00\x00\x00\x00\x00\x00'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 1m32.944171297s ago: executing program 4 (id=3387): io_uring_setup(0x4d3f, &(0x7f0000000200)={0x0, 0xca6a, 0x40, 0x3, 0x6}) socket$kcm(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1000, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000068000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000212c0011800a0001006c696d69740000001c0002800c00024000000000000000030c0001400000000000000101480000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000001c0003800c00008008000340000000020c0000800800034000000002"], 0xf8}}, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r5, @ANYRES32=r4], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b000000050010000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="0000000002"], 0x48) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="18000000041401002dbd7000fedbdf250800010000000000ba30b28e994c1a08d1ca4eb6b8b4889cdd4e786eb807e04eb88b935d785f3d3201c58033c88e160d2745a91b08363bcc34006d0009788455ec9ad10b24"], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$lock(r9, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r9, 0x7, &(0x7f0000000140)={0x1, 0x1, 0x7, 0x5}) socket$pppl2tp(0x18, 0x1, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r4, 0x58, &(0x7f0000000500)}, 0x10) 1m31.455823504s ago: executing program 8 (id=3396): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="03000000000000000000210000000c00018008000100", @ANYRES32], 0x20}}, 0x0) 1m31.441596155s ago: executing program 8 (id=3397): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20010814) close(r1) 1m31.383315171s ago: executing program 8 (id=3399): mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000540)={'\x00', 0x7e, 0x7527, 0x5c8, 0x7fff, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 1m31.169276672s ago: executing program 8 (id=3402): syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x4, "d57e190d001e6e1d16c1711bbd8adbf65bd846957b378a02340c68117aa1b390", "b0b4170e157cddfb9792c8e37bafb99e319950347e93f4d34870ee24c0ea06d56270e45c8d3e7d708161ba81dd33c54b", "01acae6f69ea1443db8d53af54944d4894a87f20c65bfb8e0c8cfb67", {"38f5e54b3dc7c070b4d66f0f9565df74", "d2653a13d554fee0e7be27c873db314d"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x42}, 0xe0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xffff}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newtfilter={0x40, 0x2c, 0xd3f, 0x70bd24, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xfff3, 0x1}, {}, {0x5, 0x8}}, [@filter_kind_options=@f_flower={{0xb}, {0x10, 0x2, [@TCA_FLOWER_KEY_ETH_DST={0xa}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x8848}, 0x4000010) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) 1m30.087925399s ago: executing program 8 (id=3406): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x15b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00\x00\x00\x00\x00\x00\x00'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 1m30.001661097s ago: executing program 8 (id=3407): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000400000000000000000000850000005000000085000000d000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20009805}, 0x4000080) 1m18.510919121s ago: executing program 38 (id=3364): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) connect$netlink(r4, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) getsockname$packet(r4, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8014}, 0x4004000) 1m18.478878615s ago: executing program 39 (id=3375): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000003, 0x7}, 0x0, 0x10000, 0x5, 0x5, 0x8, 0x20005, 0x0, 0x0, 0xfffffffd, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x4}, 0x18) r6 = dup(r0) sendmsg$NL80211_CMD_LEAVE_OCB(r6, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4008014}, 0x20044800) 1m17.30549279s ago: executing program 40 (id=3387): io_uring_setup(0x4d3f, &(0x7f0000000200)={0x0, 0xca6a, 0x40, 0x3, 0x6}) socket$kcm(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1000, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000068000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000212c0011800a0001006c696d69740000001c0002800c00024000000000000000030c0001400000000000000101480000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000001c0003800c00008008000340000000020c0000800800034000000002"], 0xf8}}, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r5, @ANYRES32=r4], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b000000050010000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="0000000002"], 0x48) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="18000000041401002dbd7000fedbdf250800010000000000ba30b28e994c1a08d1ca4eb6b8b4889cdd4e786eb807e04eb88b935d785f3d3201c58033c88e160d2745a91b08363bcc34006d0009788455ec9ad10b24"], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$lock(r9, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r9, 0x7, &(0x7f0000000140)={0x1, 0x1, 0x7, 0x5}) socket$pppl2tp(0x18, 0x1, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r4, 0x58, &(0x7f0000000500)}, 0x10) 1m16.067605002s ago: executing program 1 (id=3492): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1e0000000040000013617082c8", @ANYRES64=r0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='erofs_lookup\x00', r2}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_raw(r3, &(0x7f0000000240)={0x1d, r4}, 0x10) close(r3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r5}, 0x18) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r6, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000004000000000000000000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r9, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r7}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x20, 0xf, &(0x7f0000000040)=ANY=[@ANYRESDEC=r10, @ANYRES64=r2], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r11, 0x0, 0x1}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r7, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000ac0)="b0", 0x18000}], 0x11}}], 0x2, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000004000000000000000022c79fa61c0a154595a54a01b0ac31bdd924af60c35898f9d726a745851eb0ac823287c84b51e2806c6879ea0e96e2868efa129e7a532fd78c7d31f8d9b4c5c157b095f23242d7f6e74e54dd987805390d0906f2a6e713f2394b61b56e0180f1e85304d3b4a73a53fde89ea9a50a408208a4d62c6dbf86d8edb296c259036317157f32da069c8699cd53dccf60f984faed5b38531399364562ae8b205fa4c346b0d91e5dc0e6989d04ef08444e2d5c76a0619cf649bfef8fd8f2f3563fb34e7cfea3f948d461"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r12}, 0x10) socket$xdp(0x2c, 0x3, 0x0) 1m15.962017773s ago: executing program 1 (id=3493): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d000000061000000001000046"], &(0x7f0000000f40)=""/4096, 0x36, 0x1000, 0x9, 0x40}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r2}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a"], 0xfc}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000001800000700000085100000fbffffff186400000300000010000000020000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x27, &(0x7f0000000000)=""/114}, 0xa8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)='/proc\x00\x00\x00\x00\x00\x00\x00\x00D\x00\x00v4\x00\x00s/\x92Ync_\x00le\xf44.\xab%nN\xd4\xfc\x11\x00\xd1l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) unshare(0x400) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x0, 0x80) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0x4020940d, &(0x7f0000000440)={0x3, 0x80000001, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x18) socket$netlink(0x10, 0x3, 0x0) r4 = getgid() lchown(0x0, 0x0, r4) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x5, 0x0) setresgid(r5, 0xffffffffffffffff, 0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setgid(0x0) 1m15.860510103s ago: executing program 1 (id=3494): r0 = socket(0x40000000015, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x94) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m15.797046449s ago: executing program 1 (id=3495): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10840, &(0x7f00000001c0)=ANY=[], 0x1, 0x26c, &(0x7f0000000340)="$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") syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x8000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x94eb2000) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xdafbe5d6891b6e4) r1 = inotify_init1(0x0) r2 = inotify_add_watch(r1, &(0x7f0000000440)='.\x00', 0x20000000) write$binfmt_elf32(r0, &(0x7f0000005640)=ANY=[@ANYRES16=r2], 0x69) close(r0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000010240)={0x0, 0x0, 0x0}, 0x0) execve(&(0x7f0000019140)='./file0\x00', 0x0, &(0x7f0000000040)={[&(0x7f0000000200)=' ', &(0x7f0000000000)='\v\x00\x00\x00']}) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x0) 1m15.287312009s ago: executing program 1 (id=3496): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x15b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00\x00\x00\x00\x00\x00\x00'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 1m15.269063171s ago: executing program 1 (id=3497): ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="03000000000000000000210000000c00018008000100", @ANYRES32=r0], 0x20}}, 0x0) 1m14.511173666s ago: executing program 41 (id=3407): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000400000000000000000000850000005000000085000000d000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20009805}, 0x4000080) 1m13.596582156s ago: executing program 3 (id=3499): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x103000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 1m11.529187551s ago: executing program 3 (id=3501): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000005f40)=[{{&(0x7f0000000d00)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000003400)=ANY=[@ANYBLOB="20000000000000000000000007000000440cd1700000000700000e0f940401001400000000000000000600000200000002000000000000001100000000000000000000000100000009000000000000001400000000000000eaffffff0100000006000000000000001400000000000000000000000200000006"], 0x80}}, {{&(0x7f00000010c0)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=ANY=[], 0x28}}], 0x2, 0x4000004) 1m11.515024672s ago: executing program 3 (id=3502): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=@newtfilter={0x84, 0x2c, 0xd27, 0x70bd2a, 0x25dfdc00, {0x0, 0x0, 0x0, r1, {0x0, 0x4}, {}, {0xfff2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x2, 0x2, 0x6, 0x100000a, 0x8}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x40010}, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) close(r2) 1m11.442780769s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d000000061000000001000046"], &(0x7f0000000f40)=""/4096, 0x36, 0x1000, 0x9, 0x40}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r2}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a"], 0xfc}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000001800000700000085100000fbffffff186400000300000010000000020000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x27, &(0x7f0000000000)=""/114}, 0xa8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)='/proc\x00\x00\x00\x00\x00\x00\x00\x00D\x00\x00v4\x00\x00s/\x92Ync_\x00le\xf44.\xab%nN\xd4\xfc\x11\x00\xd1l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) unshare(0x400) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x0, 0x80) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0x4020940d, &(0x7f0000000440)={0x3, 0x80000001, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x18) socket$netlink(0x10, 0x3, 0x0) r4 = getgid() lchown(0x0, 0x0, r4) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x5, 0x0) 1m11.397384373s ago: executing program 3 (id=3505): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/12], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x15b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00\x00\x00\x00\x00\x00\x00'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 1m11.374183556s ago: executing program 3 (id=3507): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x103000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 1m7.554448573s ago: executing program 2 (id=3560): r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0xc, 0x882) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000018c0), r3) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f00000004c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002abd7000ffdbdf25090000006400038008000100010000000800030004000000140002007665744e315f6d616376746170000000060004000200000008000500e0000000140002006970766c616e31"], 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 1m7.430819625s ago: executing program 2 (id=3562): io_uring_enter(0xffffffffffffffff, 0x207a98, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000000000d02000000000000000000000b020000000000eaa8dd6564551090ebb1bf90f81c22097b2b3d9245fad83b0d611807348af57811d0b44b75546e59161e80084f27673eff4b0f43b542c1ca0fec4c5e7dfeff5784e3fc4dd0494faa57deb796e9a5f23b417f42a3026e446638ad4387097511dc6167517308a6d56f3c76fa5ffbc3caa9e5fb11b27d39b8173c6ad716ef257e7285826000e4a1b051ede0c7486b6c05d1ab1c34419b173e7f958ac50b75b04f7c6fd596fef95727e298c54bab3b77f7858bd85aeaac6f0f"], &(0x7f0000000000)=""/247, 0x32, 0xf7, 0x1}, 0x28) process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xae4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r2, 0x0, 0x9}, 0x18) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002b80)=ANY=[@ANYBLOB="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"], 0x1d0}, 0x1, 0x0, 0x0, 0x10}, 0x4000800) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x4898, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}}) socket$phonet_pipe(0x23, 0x5, 0x2) 1m7.244826133s ago: executing program 2 (id=3566): r0 = io_uring_setup(0x1cb5, &(0x7f00000003c0)={0x0, 0x8352, 0x2000, 0x0, 0x2fe}) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc97c, 0x1, @perf_config_ext={0x2, 0x3}, 0x0, 0xa88, 0x8409, 0x5, 0x0, 0x3c, 0xfffe, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f00000000c0)='./cgroup/../file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="808d94c8328c0c70296683b808bc617e12004bdb386abf6963ea797180bdbeac51aaec001afe93824e4d43b92c584f99d7e849e2de4a858ce44e8c15abe3d27da8adce4caafa314a67f5731277145ec039a24c65139fdb018df3cb9e0262ee384e44f8dba825c1d00eb7d2a5bc9c1e68728289f1b1730fbc30be149dbc21db8fbed4f3c9435aa82eb1bb90880444c56d5b37365729137a6ee8b13d577083625d89baee05f0923deec422160a41b5c421", @ANYRES16=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) fcntl$dupfd(r4, 0x406, r4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000001040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r5}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) syz_emit_ethernet(0x52, &(0x7f00000006c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @igmp={{0xf, 0x4, 0x3, 0x0, 0x44, 0x66, 0x0, 0x9, 0x2, 0x0, @loopback, @multicast1, {[@timestamp_prespec={0x44, 0xc, 0x8d, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}]}, @timestamp_prespec={0x44, 0x1c, 0xbe, 0x3, 0xe, [{@dev={0xac, 0x14, 0x14, 0x1f}, 0x4}, {@empty, 0x28d}, {@local, 0x2}]}]}}, {0x16, 0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x20000810) 1m7.07144595s ago: executing program 2 (id=3568): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh]}}}}}}}, 0x0) 1m7.002294997s ago: executing program 2 (id=3571): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x15b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00\x00\x00\x00\x00\x00\x00'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 1m6.944096583s ago: executing program 2 (id=3573): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b00000005001000030000000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32], 0x48) 1m0.18624861s ago: executing program 42 (id=3497): ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="03000000000000000000210000000c00018008000100", @ANYRES32=r0], 0x20}}, 0x0) 56.251042998s ago: executing program 43 (id=3507): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x103000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 51.800005797s ago: executing program 44 (id=3573): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b00000005001000030000000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32], 0x48) 2.63103706s ago: executing program 9 (id=5076): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='reno', 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0xfffffffffffffecc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a31000000ff08000540000000020900020073797a310000000008000a40fffffffc0800034000000010400000000e0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c000180060001"], 0xd8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x20c0, 0x82, 0x3a}, 0x18) 2.550511438s ago: executing program 9 (id=5079): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x54, r1, 0x1, 0x70bd29, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x4a}, {0x6, 0x11, 0xa2}, {0x8, 0x13, 0x6}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x44080}, 0x4048000) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x401, 0x800, 0x6, 0x3}, 0x10) 2.491328824s ago: executing program 9 (id=5083): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a300000000060000000060a010400000000000000000100000008000b400000000038000480340001800b0001006e756d67656e00002400028008000340000000010800014000000000080004400000000008000240000000000900010073797a30"], 0xd4}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func, @map_fd, @generic, @initr0, @exit, @alu, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0xc, 0xff5c, &(0x7f0000000340)=""/222}, 0x23) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'gretap0\x00', 0x0, 0x700, 0x1, 0x71d4, 0x1, {{0xe, 0x4, 0x2, 0x9, 0x38, 0x68, 0x0, 0x8, 0xa, 0x0, @multicast1, @empty, {[@rr={0x7, 0x1b, 0x29, [@local, @rand_addr=0x64010100, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @rand_addr=0x64010102]}, @timestamp={0x44, 0x8, 0xf0, 0x0, 0x0, [0x7499]}]}}}}}) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_getaddr={0x78, 0x16, 0x200, 0x70bd2d, 0x25dfdbfc, {0x2, 0x3f, 0x48, 0x0, r4}, [@IFA_CACHEINFO={0x14, 0x6, {0x4, 0x9, 0x6e5, 0xcf3}}, @IFA_BROADCAST={0x8, 0x4, @private=0xa010101}, @IFA_CACHEINFO={0x14, 0x6, {0x2, 0xffffb96d, 0xaf, 0x8}}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x2}, @IFA_RT_PRIORITY={0x8, 0x9, 0x7}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x1}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x1}, @IFA_BROADCAST={0x8, 0x4, @multicast1}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000100}, 0x4004000) 2.478472335s ago: executing program 9 (id=5084): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/11, @ANYRESOCT], 0x50) socket$nl_sock_diag(0x10, 0x3, 0x4) r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x10000000}, 0xc) close(r0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r1, 0x406, r2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) fadvise64(0xffffffffffffffff, 0x807f, 0x1000000, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r6, 0x0, 0x200}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000140)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r7, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x400480c}, 0x0) r8 = socket$pppl2tp(0x18, 0x1, 0x1) r9 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r8, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r9, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r8, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) syz_io_uring_setup(0x73d3, &(0x7f0000000680)={0x0, 0x7d89, 0x10100, 0x3, 0x289}, &(0x7f0000000540), &(0x7f0000000700)) 2.42395283s ago: executing program 9 (id=5086): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x103000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000081811", @ANYRES32=r1], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 2.42335514s ago: executing program 0 (id=5087): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r1 = syz_open_dev$sg(&(0x7f0000000080), 0xffff0000, 0x40) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000600)={0x0, 0x7, 0x8}) (fail_nth: 7) 2.309794641s ago: executing program 0 (id=5090): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18030000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x15b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00\x00\x00\x00\x00\x00\x00'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 2.202594602s ago: executing program 0 (id=5091): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) fallocate(r1, 0x0, 0xbf5, 0x2000402) 2.096575703s ago: executing program 5 (id=5092): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0}, 0x0, &(0x7f0000000500)='%-010d \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000018c0), r2) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f00000004c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000ffdbdf25090000006400038008000100010000000800030004000000140002007665744e315f6d616376746170000000060004000200000008000500e0000000140002006970766c616e31"], 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 1.883215304s ago: executing program 5 (id=5096): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/11, @ANYRESOCT], 0x50) socket$nl_sock_diag(0x10, 0x3, 0x4) r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x10000000}, 0xc) close(r0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r1, 0x406, r2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) fadvise64(0xffffffffffffffff, 0x807f, 0x1000000, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r6, 0x0, 0x200}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000140)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r7, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x400480c}, 0x0) r8 = socket$pppl2tp(0x18, 0x1, 0x1) r9 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r8, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r9, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r8, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) syz_io_uring_setup(0x73d3, &(0x7f0000000680)={0x0, 0x7d89, 0x10100, 0x3, 0x289}, &(0x7f0000000540), &(0x7f0000000700)) 1.881770864s ago: executing program 0 (id=5098): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x44, 0x6, 0x4e0, 0x138, 0x138, 0x138, 0x1d0, 0x1d0, 0x448, 0x448, 0x448, 0x448, 0x448, 0x6, 0x0, {[{{@ip={@local, @multicast1, 0xffffff00, 0xff000000, 'batadv_slave_1\x00', 'veth1_macvtap\x00', {}, {}, 0xb3, 0x1, 0x14}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x4, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @dev={0xac, 0x14, 0x14, 0x17}}}}, {{@ip={@broadcast, @remote, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {}, {}, 0x2e, 0x0, 0x1}, 0x0, 0xb0, 0x1d8, 0x0, {}, [@common=@set={{0x40}, {{0x0, [0x7, 0x1, 0x1, 0x7, 0x4, 0x6], 0x5, 0x3}}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x4000000, {0x0, 0x0, 0x0, r9, {0x0, 0x1}, {0xffff, 0xffff}, {0x6, 0xfff3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x7, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x1, 0xffffffff, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x80002, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x4000, 0x0, 0x0, 0xfffffffe, 0x6, 0x0, 0x0, 0x272, 0xb, 0x9, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0xe, 0x0, 0x2, 0xfffffffd, 0x0, 0x80007, 0x4, 0x0, 0x0, 0x0, 0x2, 0xfffffffd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xb9a, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x5e, 0x6, 0x8, 0x0, 0x0, 0x1, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff, 0xffff8000, 0x0, 0xffffffff, 0x1, 0x0, 0x800009, 0x0, 0x0, 0x8, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x0, 0x2000000, 0x100, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xb6, 0x0, 0x1, 0x0, 0x7, 0x8, 0x0, 0xffffffff, 0xffff, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x4000, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x9, 0x1, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0x0, 0x2, 0x13, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0xaa, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x26c, 0x4, 0x7, 0x102, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe6]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xff, 0x2, 0x3, 0x0, 0x19, 0x40000000}, 0x0, 0x100007f, 0x2}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x4890) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05000000040000000800000008"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r11}, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000580)=@xdp={0x2c, 0xdd86, r4, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="27030200590214000600002fb96d", 0xe}], 0x1}, 0x40084) 1.858505126s ago: executing program 5 (id=5099): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r5, 0x0, 0x4890) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000580)=@xdp={0x2c, 0xdd86, r4, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="27030200590214000600002fb96d", 0xe}], 0x1}, 0x40084) (fail_nth: 2) 1.857193676s ago: executing program 6 (id=5100): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) syz_usb_disconnect(r1) syz_usb_connect(0x0, 0x24, &(0x7f0000000740)=ANY=[], 0x0) close(0x3) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x2, [0x1, 0x3]}, 0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f00000002c0)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x207, &(0x7f0000000200)={[{@errors_remount}, {@nolazytime}]}, 0x1, 0x46b, &(0x7f0000000600)="$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") 1.564377315s ago: executing program 5 (id=5102): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc7) r5 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x6, 0x40, 0x3, 0x0, 0x4000000000, 0xd4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x100882, 0x7ff, 0x6, 0x3, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12011, r5, 0x0) select(0x40, &(0x7f0000000040)={0x6, 0x1d, 0x8000, 0x1, 0xffffffff, 0x9, 0x8000000000000001, 0x28e}, &(0x7f0000000080)={0x9, 0x3ff, 0x5, 0xbd9e, 0x2f, 0x0, 0xa558, 0x3d37}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18020000002000000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0/../file0\x00'}) getsockopt$inet_buf(r7, 0x0, 0x2f, &(0x7f00000002c0)=""/193, &(0x7f0000000240)=0xc1) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) sendmsg$AUDIT_USER_AVC(r7, &(0x7f00000006c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000580)={0x50, 0x453, 0x10, 0x70bd2c, 0x25dfdbfd, "e8323bbbb3ddce840bf553df386f4e37eafa723a651ba2737dd74895a7e040848200120e95da0a736e0f62669f9dbe2110b46325ef42bc17371a33f7ff8ba861", ["", "", "", "", "", ""]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) mount$bind(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000d00)=ANY=[@ANYBLOB="fc0000001b0001000000000001000000fe88000000000000000000000000010100000000000000000000000000000001000000000000000002"], 0xfc}, 0x1, 0x0, 0x0, 0x1}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="faffffff", @ANYRES16, @ANYBLOB="000225bd70000a00000002000000300007800800020044adaa1b080002000d0000000c0003002ebf00000000000008000200040000000800010080"], 0x88}, 0x1, 0x0, 0x0, 0x8001}, 0x48004) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ptrace(0x10, r9) ptrace$getregset(0x4212, r9, 0x201, &(0x7f0000000240)={0x0}) getdents(r8, &(0x7f0000000100)=""/49, 0x31) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r8, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) 1.547787837s ago: executing program 5 (id=5104): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x109a42, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e000000000020000100050000000000000000000300000008000000f30000007f"], 0x58) close(r2) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 1.508631551s ago: executing program 5 (id=5106): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x103000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 1.438446518s ago: executing program 0 (id=5108): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) alarm(0x10000) 1.427224779s ago: executing program 0 (id=5109): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a1f000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2eb2b00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c00048048000180080001"], 0x122}, 0x1, 0x0, 0x0, 0x40}, 0x24008854) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r4, 0x400455c8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r5, 0x0, 0x4}, 0x18) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f00000002c0)={0x72, "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"}) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r7, 0x800448f0, &(0x7f0000000140)) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0xd85fd000) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x303}, "00f0ffffff00", "f3c59f09beb94c4ca8aa5f28b46f8f65", "0500", "2cc8058741ebd267"}, 0x28) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="20002a00000c01a700fdbc000000000001080000fdffffffffff1b594b792490647b000000"], 0x34}}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x183, 0x6}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r10}, 0x10) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000700)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {0x3}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r11 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r11, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x65) 902.921361ms ago: executing program 6 (id=5110): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) r3 = epoll_create1(0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/wakeup_count', 0x80800, 0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r4, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x7, 0x6361, 0x5, 0xffffffff, 0x6}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x240080c1}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000840)=@newqdisc={0x88, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0x0, 0x6}, {0x2, 0xb}, {0xffe0, 0xb}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x9, [0xd, 0x2, 0xb, 0x0, 0x2, 0x0, 0xf, 0xd, 0xc, 0xb, 0x2, 0x5, 0x7, 0xe, 0xf, 0xd], 0x0, [0x5, 0xe9, 0x5, 0x6, 0x6, 0x4, 0x8, 0x7, 0x8, 0x1000, 0x1, 0x1, 0x810, 0x81, 0x1, 0xfffc], [0x3, 0x9, 0x1, 0x4, 0x7fff, 0x5, 0x8, 0x3, 0x5, 0x6, 0x6, 0x6, 0x2, 0x5, 0x5, 0x1cb3]}}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x404c065}, 0x4008000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$USBDEVFS_DISCSIGNAL(r10, 0x8010550e, &(0x7f00000001c0)={0xff, 0x0}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x74, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r13}, 0x10) munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r11}, 0x10) close(r0) 756.221275ms ago: executing program 6 (id=5111): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[], 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x4000010) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1000, 0x10, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r4, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) 755.505015ms ago: executing program 6 (id=5112): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x4000010) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1000, 0x10, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r4, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) 721.607758ms ago: executing program 6 (id=5113): bpf$PROG_LOAD(0x5, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) capget(&(0x7f00000008c0)={0x19980330}, 0x0) (fail_nth: 3) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x7fffffff, 0x0) 663.018234ms ago: executing program 6 (id=5114): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) sendfile(r0, r0, 0x0, 0x40000f63c) 549.756246ms ago: executing program 7 (id=5115): syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 418.751528ms ago: executing program 7 (id=5116): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x100000, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) clock_getres(0x0, 0x0) (fail_nth: 2) 408.463699ms ago: executing program 9 (id=5117): mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x50e33000) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200082, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e) r4 = socket$inet6(0xa, 0x5, 0x84) shutdown(r4, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet6(r4, &(0x7f0000000140)="eb", 0x1, 0x20008010, &(0x7f00000000c0)={0xa, 0x4e23, 0x5, @remote, 0x1}, 0x1c) close(r4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)=0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) r8 = memfd_create(&(0x7f00000002c0)='\x02A\xbbL\xeb\xbd]\x9c\x9aU\x9c\xcbb\xcc\xfa0\xf5JoeN\x8c\x86\xfa\xb3\x0e&\xfe\xa8NF\x96\t\x01\xceJ\xc3\x8f+\xe8\xa7v\x80\xfaj\xfe\x11\x0e\xed6\x00\x00\x00\x00\x00\x00\f\xd7\xe7\xdb?\xf3\xd9\xa3\xd6a\x1a\xfch}7K\xca\x90KA\x02\xd6\x94U\x1am\x8c\xcb\x9cv\xddV\xf0S\xcc\xd0\x14\x8c\xb3!\xa8\xeajy@\xa0\xdc~\xea\xfd\xfb\x12\x88Xa\x16\xcb\xe4\x03\x1e\xac\xf2\xe9\xf1<\xff\x0f\x1eG\xd7Kl|O\xc5\xf4\xfc\xe6\x1e\xe0v\xf0\xf1\xce9\xb6\xab\x8d\v\xe8\xf0BF\x9e\x9b\x93\xf2\x98\x06\xd6\xd9\x8c\a:\xb3\xafU\x1fa\x86\x18\xf8\xb0\xed\x05V:\x06\x9d\xf3\xcc\xfc\xee\x0e%Zb!_\f\x92\xdf\xc3\xd9\xa08#\x12\xe6\xa0xj/\xc2NIz\xedI\x81\x05\x10v,\x96\xff\xa1FtN(7{\x9d\xd2\x04taa\x98;\x83C}9\x05J@\xebJ\xd9\xb3\xa7Pk\x84\x8bf\xd6\xc0_\x0e|\xb6\xa2\xe4\x03\x06.\'\xd8.q\xe9\xef\xb3\x10\x86`q\xe7)\xb7\x16R\xa4}#\x90\x02\x11\x7f\xd5]\x05?\xa5~\xe4\xcb^0C\x8a\xae^\xf9\xf2\'\xe1\x1c\xbe)=\xd0\xcc\x06HD\xe6\x8a>v\f\x9d\xf7\xd7\xfc\xb4\x18\xb3!%\x02T\xb1\xdc\xbd\xf1\xa5\x947\nq\xe6\xd04}\xad\xb3', 0x7) pwrite64(r8, 0x0, 0x0, 0x111ffe) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x40840) r10 = syz_clone(0x9108a100, &(0x7f0000000640)="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", 0x1000, &(0x7f0000001640), &(0x7f0000001680), &(0x7f00000016c0)="816de44f69a6843cbec0b91dbfcd2719970d0227842657c00ea4843baf2293f89226ad6e1264893e6d65e19a37ae2f21fea12242fd223ed2563d5b0dc6a42e94e94ca74bbb74723873345cc7385aeb67cb72da896d982bd5b7bd0d2771a6b2c3de560a2154896ad5675c618392000c3f5bb99e067740656a55d79e4dff7487428b786b0ce04633e3de42efca1cd926279e47497baced6aad304713509f355b6cd4d7c781f54f7cb8a1ca1dde1156cdb3a40ad508e38ba58487cf6f8a135e925ee8b056f2cef35dac8b1be366726c2c8c964b2d") fstat(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001900)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)="0f9995f7d9d690d2fb58e518ee0cfb1eab0d180e975b2844b663ad31302a70836b86c4ff31b8bf0f8eb8869881348f641025e40ad99b26aed6e0d66ad8e2332e867f9fde7ff73fd8ec8990b4ddd18637b5b5fc7fe13072538840687737e7b6103a3d78", 0x63}, {&(0x7f0000000400)="606a613949a1ecfed33a5571be039720757a44cfb475221cb61a53762a0c511f229a8ddf7ea3c90353ef164c889d72512f9fb3551fafca506469ad9691204c2e4b77ade8bebef7d59138f19b10e51a9225040243", 0x54}], 0x2, &(0x7f0000001d40)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=r8, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="1c00006202000000000000000000ee50cc1bbc304ef14ca26baa32905481c9c10acf48d9999207c71b9eab897680484a0636c5c6b096a5bd980df40a5d30171f84b19d1492a031b7a7b14803c58282d0bd8f608771f74d3a53d6041c85288cf085ae1fd4b1daba8d02a9a85b11a7c30f36c55d561ca0aced2143e3b04ed5b05931ec2aad55812f9305e432ea95b5db31c31d4893951f037071851760e4935dffd9620033f82736d577c4ce77f1b8421681669ed991cffbb4619a146a0c43b22524501702e243fbbd6ad8d10111", @ANYRES32=r10, @ANYRESDEC=r11, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=0xee01, @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xd0}, 0x8001) fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', r0, r7, 0x400) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r15}, 0x10) r16 = signalfd(0xffffffffffffffff, &(0x7f0000000300)={[0x3]}, 0x8) faccessat2(r16, &(0x7f0000000000)='\x00', 0x2, 0x1100) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) 98.90912ms ago: executing program 7 (id=5118): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x11, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) (fail_nth: 1) 52.216744ms ago: executing program 7 (id=5119): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) alarm(0x10000) 37.064926ms ago: executing program 7 (id=5120): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) setxattr(0x0, &(0x7f0000000240)=@known='security.apparmor\x00', 0x0, 0x0, 0x0) 0s ago: executing program 7 (id=5121): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1200000004000000040000001200000000"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="05"], 0x10) socket(0x10, 0x803, 0x0) close(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000000)=0x13) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000040)=0x5) ioctl$TCSETSW2(r6, 0x402c542c, &(0x7f0000000100)={0xfffffff8, 0xaeb, 0xe57, 0x1, 0x7, "3ce6920887000000000000000d00", 0x4, 0x1ff}) write(r6, &(0x7f0000000740)="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", 0x5e7) ioctl$TIOCSTI(r6, 0x5412, &(0x7f00000001c0)=0xd) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[], 0x0) kernel console output (not intermixed with test programs): 24675][T18194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 317.224688][T18194] Call Trace: [ 317.224695][T18194] [ 317.224745][T18194] __dump_stack+0x1d/0x30 [ 317.224767][T18194] dump_stack_lvl+0xe8/0x140 [ 317.224786][T18194] dump_stack+0x15/0x1b [ 317.224802][T18194] should_fail_ex+0x265/0x280 [ 317.224836][T18194] should_failslab+0x8c/0xb0 [ 317.224863][T18194] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 317.224900][T18194] ? __d_alloc+0x3d/0x340 [ 317.224971][T18194] __d_alloc+0x3d/0x340 [ 317.224996][T18194] ? __rcu_read_unlock+0x4f/0x70 [ 317.225021][T18194] d_alloc_parallel+0x58/0xc70 [ 317.225040][T18194] ? lockref_get_not_dead+0x120/0x1c0 [ 317.225130][T18194] ? __rcu_read_unlock+0x4f/0x70 [ 317.225153][T18194] __lookup_slow+0x8c/0x250 [ 317.225179][T18194] lookup_slow+0x3c/0x60 [ 317.225197][T18194] walk_component+0x1ec/0x220 [ 317.225224][T18194] path_lookupat+0xfe/0x2a0 [ 317.225281][T18194] filename_lookup+0x147/0x340 [ 317.225361][T18194] user_path_at+0x3e/0x130 [ 317.225427][T18194] do_sys_truncate+0x5c/0x130 [ 317.225452][T18194] __x64_sys_truncate+0x31/0x40 [ 317.225529][T18194] x64_sys_call+0x1a2f/0x3000 [ 317.225609][T18194] do_syscall_64+0xd2/0x200 [ 317.225628][T18194] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 317.225652][T18194] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 317.225734][T18194] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.225753][T18194] RIP: 0033:0x7fae6a9cefc9 [ 317.225768][T18194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.225785][T18194] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 317.225804][T18194] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 317.225846][T18194] RDX: 0000000000000000 RSI: 00000000000042d9 RDI: 00002000000002c0 [ 317.225910][T18194] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 317.226074][T18194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.226086][T18194] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 317.226103][T18194] [ 317.243668][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 317.245997][ T29] audit: type=1400 audit(1761361230.974:38222): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 317.255765][ T3043] audit: audit_lost=144 audit_rate_limit=0 audit_backlog_limit=64 [ 317.265823][ T29] audit: type=1400 audit(1761361230.974:38223): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 317.269057][ T3043] audit: backlog limit exceeded [ 317.272090][ T29] audit: type=1400 audit(1761361230.974:38224): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 317.281934][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 317.285131][ T29] audit: type=1400 audit(1761361230.974:38225): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 317.593964][T18216] __nla_validate_parse: 1 callbacks suppressed [ 317.593977][T18216] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4214'. [ 317.700761][T18222] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 317.707318][T18222] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 317.707397][T18222] vhci_hcd vhci_hcd.0: Device attached [ 317.736945][T18228] vhci_hcd: connection closed [ 317.737050][T10896] vhci_hcd: stop threads [ 317.737061][T10896] vhci_hcd: release socket [ 317.737069][T10896] vhci_hcd: disconnect device [ 317.738835][T18234] FAULT_INJECTION: forcing a failure. [ 317.738835][T18234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.738859][T18234] CPU: 1 UID: 0 PID: 18234 Comm: syz.0.4222 Not tainted syzkaller #0 PREEMPT(voluntary) [ 317.738918][T18234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 317.738928][T18234] Call Trace: [ 317.738934][T18234] [ 317.738941][T18234] __dump_stack+0x1d/0x30 [ 317.738961][T18234] dump_stack_lvl+0xe8/0x140 [ 317.738977][T18234] dump_stack+0x15/0x1b [ 317.739027][T18234] should_fail_ex+0x265/0x280 [ 317.739043][T18234] should_fail+0xb/0x20 [ 317.739056][T18234] should_fail_usercopy+0x1a/0x20 [ 317.739076][T18234] _copy_to_user+0x20/0xa0 [ 317.739101][T18234] simple_read_from_buffer+0xb5/0x130 [ 317.739246][T18234] proc_fail_nth_read+0x10e/0x150 [ 317.739276][T18234] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 317.739325][T18234] vfs_read+0x1a8/0x770 [ 317.739345][T18234] ? __rcu_read_unlock+0x4f/0x70 [ 317.739393][T18234] ? __fget_files+0x184/0x1c0 [ 317.739417][T18234] ksys_read+0xda/0x1a0 [ 317.739436][T18234] __x64_sys_read+0x40/0x50 [ 317.739459][T18234] x64_sys_call+0x27c0/0x3000 [ 317.739535][T18234] do_syscall_64+0xd2/0x200 [ 317.739629][T18234] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 317.739706][T18234] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 317.739730][T18234] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.739747][T18234] RIP: 0033:0x7fe7ba97d9dc [ 317.739762][T18234] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 317.739883][T18234] RSP: 002b:00007fe7b93df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 317.739905][T18234] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97d9dc [ 317.739916][T18234] RDX: 000000000000000f RSI: 00007fe7b93df0a0 RDI: 0000000000000003 [ 317.739926][T18234] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 317.739936][T18234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.739948][T18234] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 317.739966][T18234] [ 317.788875][T18238] binfmt_misc: register: failed to install interpreter file ./file0 [ 317.789999][T18238] sch_tbf: burst 1023 is lower than device lo mtu (65550) ! [ 317.907619][T18249] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4225'. [ 318.001074][T18265] veth2: entered promiscuous mode [ 318.001090][T18265] veth2: entered allmulticast mode [ 318.205786][T18294] FAULT_INJECTION: forcing a failure. [ 318.205786][T18294] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 318.205815][T18294] CPU: 1 UID: 0 PID: 18294 Comm: syz.9.4233 Not tainted syzkaller #0 PREEMPT(voluntary) [ 318.205980][T18294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 318.205991][T18294] Call Trace: [ 318.205999][T18294] [ 318.206007][T18294] __dump_stack+0x1d/0x30 [ 318.206029][T18294] dump_stack_lvl+0xe8/0x140 [ 318.206093][T18294] dump_stack+0x15/0x1b [ 318.206108][T18294] should_fail_ex+0x265/0x280 [ 318.206146][T18294] should_fail+0xb/0x20 [ 318.206162][T18294] should_fail_usercopy+0x1a/0x20 [ 318.206183][T18294] _copy_from_user+0x1c/0xb0 [ 318.206206][T18294] __sys_bpf+0x183/0x7c0 [ 318.206288][T18294] __x64_sys_bpf+0x41/0x50 [ 318.206315][T18294] x64_sys_call+0x2aee/0x3000 [ 318.206337][T18294] do_syscall_64+0xd2/0x200 [ 318.206418][T18294] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 318.206444][T18294] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 318.206469][T18294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 318.206488][T18294] RIP: 0033:0x7f010b2eefc9 [ 318.206526][T18294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.206542][T18294] RSP: 002b:00007f0109d4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.206558][T18294] RAX: ffffffffffffffda RBX: 00007f010b545fa0 RCX: 00007f010b2eefc9 [ 318.206568][T18294] RDX: 0000000000000050 RSI: 0000200000000140 RDI: 0000000000000000 [ 318.206593][T18294] RBP: 00007f0109d4f090 R08: 0000000000000000 R09: 0000000000000000 [ 318.206606][T18294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.206618][T18294] R13: 00007f010b546038 R14: 00007f010b545fa0 R15: 00007ffd70e4f4b8 [ 318.206639][T18294] [ 318.290017][T18306] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4236'. [ 318.666329][T18340] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4239'. [ 318.757352][T18364] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(6) [ 318.763878][T18364] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 318.771610][T18364] vhci_hcd vhci_hcd.0: Device attached [ 318.782849][T18365] vhci_hcd: connection closed [ 318.783180][T10886] vhci_hcd: stop threads [ 318.792228][T10886] vhci_hcd: release socket [ 318.796661][T10886] vhci_hcd: disconnect device [ 318.950068][T13038] Bluetooth: hci0: sending frame failed (-49) [ 318.956222][ T3570] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 319.070321][T18399] netlink: 'syz.9.4255': attribute type 4 has an invalid length. [ 319.284916][T18421] netlink: 'syz.9.4264': attribute type 39 has an invalid length. [ 319.611387][T18447] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(3) [ 319.617923][T18447] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 319.625516][T18447] vhci_hcd vhci_hcd.0: Device attached [ 319.632825][T18448] vhci_hcd: connection closed [ 319.633038][T10886] vhci_hcd: stop threads [ 319.642076][T10886] vhci_hcd: release socket [ 319.646509][T10886] vhci_hcd: disconnect device [ 319.878613][T18460] FAULT_INJECTION: forcing a failure. [ 319.878613][T18460] name failslab, interval 1, probability 0, space 0, times 0 [ 319.891304][T18460] CPU: 1 UID: 0 PID: 18460 Comm: syz.5.4280 Not tainted syzkaller #0 PREEMPT(voluntary) [ 319.891330][T18460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 319.891359][T18460] Call Trace: [ 319.891365][T18460] [ 319.891372][T18460] __dump_stack+0x1d/0x30 [ 319.891394][T18460] dump_stack_lvl+0xe8/0x140 [ 319.891415][T18460] dump_stack+0x15/0x1b [ 319.891432][T18460] should_fail_ex+0x265/0x280 [ 319.891498][T18460] should_failslab+0x8c/0xb0 [ 319.891566][T18460] kmem_cache_alloc_noprof+0x50/0x480 [ 319.891589][T18460] ? audit_log_start+0x342/0x720 [ 319.891609][T18460] audit_log_start+0x342/0x720 [ 319.891626][T18460] ? kstrtouint+0x76/0xc0 [ 319.891662][T18460] audit_seccomp+0x48/0x100 [ 319.891689][T18460] ? __seccomp_filter+0x82d/0x1250 [ 319.891721][T18460] __seccomp_filter+0x83e/0x1250 [ 319.891822][T18460] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 319.891851][T18460] ? vfs_write+0x7e8/0x960 [ 319.891965][T18460] ? __rcu_read_unlock+0x4f/0x70 [ 319.891985][T18460] ? __fget_files+0x184/0x1c0 [ 319.892011][T18460] __secure_computing+0x82/0x150 [ 319.892037][T18460] syscall_trace_enter+0xcf/0x1e0 [ 319.892081][T18460] do_syscall_64+0xac/0x200 [ 319.892099][T18460] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 319.892120][T18460] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 319.892196][T18460] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.892216][T18460] RIP: 0033:0x7fdf7473efc9 [ 319.892229][T18460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.892244][T18460] RSP: 002b:00007fdf7319f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 319.892261][T18460] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473efc9 [ 319.892320][T18460] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 319.892333][T18460] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 319.892346][T18460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.892358][T18460] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 319.892376][T18460] [ 320.233285][T18470] FAULT_INJECTION: forcing a failure. [ 320.233285][T18470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.246418][T18470] CPU: 0 UID: 0 PID: 18470 Comm: syz.6.4283 Not tainted syzkaller #0 PREEMPT(voluntary) [ 320.246444][T18470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 320.246455][T18470] Call Trace: [ 320.246514][T18470] [ 320.246520][T18470] __dump_stack+0x1d/0x30 [ 320.246615][T18470] dump_stack_lvl+0xe8/0x140 [ 320.246642][T18470] dump_stack+0x15/0x1b [ 320.246657][T18470] should_fail_ex+0x265/0x280 [ 320.246673][T18470] should_fail+0xb/0x20 [ 320.246686][T18470] should_fail_usercopy+0x1a/0x20 [ 320.246761][T18470] copy_fpstate_to_sigframe+0x628/0x7d0 [ 320.246791][T18470] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 320.246863][T18470] ? kmem_cache_free+0xe4/0x3d0 [ 320.246952][T18470] ? x86_task_fpu+0x36/0x60 [ 320.247077][T18470] get_sigframe+0x34d/0x490 [ 320.247096][T18470] ? get_signal+0xdc7/0xf70 [ 320.247114][T18470] x64_setup_rt_frame+0xa8/0x580 [ 320.247174][T18470] arch_do_signal_or_restart+0x23e/0x440 [ 320.247250][T18470] irqentry_exit_to_user_mode+0x5b/0xa0 [ 320.247286][T18470] irqentry_exit+0x12/0x50 [ 320.247305][T18470] asm_exc_page_fault+0x26/0x30 [ 320.247321][T18470] RIP: 0033:0x7efe7164ea6a [ 320.247337][T18470] Code: 90 8b 45 04 ba 03 00 00 00 c1 e0 04 03 45 64 39 c6 48 0f 42 f0 45 31 c9 31 ff e8 91 05 14 00 8b 75 00 ba 03 00 00 00 45 89 e0 <49> 89 45 00 41 b9 00 00 00 10 b9 01 80 00 00 31 ff c1 e6 06 e8 6d [ 320.247351][T18470] RSP: 002b:00007efe701eefd0 EFLAGS: 00010217 [ 320.247365][T18470] RAX: ffffffffffffffff RBX: 00007efe719e5fa0 RCX: 00007efe7178f003 [ 320.247375][T18470] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000000 [ 320.247385][T18470] RBP: 0000200000000140 R08: 00000000ffffffff R09: 0000000000000000 [ 320.247405][T18470] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 320.247415][T18470] R13: 0000000000000000 R14: 00000000000005c2 R15: 0000000000000000 [ 320.247429][T18470] [ 320.498782][T18476] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4286'. [ 320.625266][T18489] FAULT_INJECTION: forcing a failure. [ 320.625266][T18489] name failslab, interval 1, probability 0, space 0, times 0 [ 320.638151][T18489] CPU: 0 UID: 0 PID: 18489 Comm: syz.5.4292 Not tainted syzkaller #0 PREEMPT(voluntary) [ 320.638238][T18489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 320.638251][T18489] Call Trace: [ 320.638257][T18489] [ 320.638306][T18489] __dump_stack+0x1d/0x30 [ 320.638329][T18489] dump_stack_lvl+0xe8/0x140 [ 320.638349][T18489] dump_stack+0x15/0x1b [ 320.638365][T18489] should_fail_ex+0x265/0x280 [ 320.638461][T18489] ? netdevice_event+0x2ae/0x610 [ 320.638490][T18489] should_failslab+0x8c/0xb0 [ 320.638537][T18489] __kmalloc_cache_noprof+0x4c/0x4a0 [ 320.638566][T18489] ? __pfx_netdevice_event+0x10/0x10 [ 320.638601][T18489] netdevice_event+0x2ae/0x610 [ 320.638636][T18489] ? __pfx_del_netdev_ips+0x10/0x10 [ 320.638709][T18489] ? __pfx_pass_all_filter+0x10/0x10 [ 320.638807][T18489] ? __pfx_netdevice_event+0x10/0x10 [ 320.638834][T18489] raw_notifier_call_chain+0x6f/0x1b0 [ 320.638857][T18489] ? call_netdevice_notifiers_info+0x9c/0x100 [ 320.638909][T18489] call_netdevice_notifiers_info+0xae/0x100 [ 320.638930][T18489] unregister_netdevice_many_notify+0xe76/0x1690 [ 320.639009][T18489] unregister_netdevice_queue+0x1f5/0x220 [ 320.639041][T18489] __tun_detach+0x82c/0xb30 [ 320.639094][T18489] ? __pfx_tun_chr_close+0x10/0x10 [ 320.639120][T18489] tun_chr_close+0x5a/0x100 [ 320.639145][T18489] __fput+0x29b/0x650 [ 320.639207][T18489] fput_close_sync+0x6e/0x120 [ 320.639223][T18489] __x64_sys_close+0x56/0xf0 [ 320.639294][T18489] x64_sys_call+0x273c/0x3000 [ 320.639315][T18489] do_syscall_64+0xd2/0x200 [ 320.639374][T18489] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 320.639397][T18489] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 320.639425][T18489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 320.639443][T18489] RIP: 0033:0x7fdf7473efc9 [ 320.639456][T18489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.639518][T18489] RSP: 002b:00007fdf7319f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 320.639535][T18489] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473efc9 [ 320.639546][T18489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 320.639556][T18489] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 320.639567][T18489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.639649][T18489] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 320.639726][T18489] [ 320.948737][T18487] syzkaller0: entered promiscuous mode [ 320.954420][T18487] syzkaller0: entered allmulticast mode [ 321.173498][T18503] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 321.180088][T18503] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 321.187680][T18503] vhci_hcd vhci_hcd.0: Device attached [ 321.206595][T18504] vhci_hcd: connection closed [ 321.207691][ T42] vhci_hcd: stop threads [ 321.216698][ T42] vhci_hcd: release socket [ 321.221125][ T42] vhci_hcd: disconnect device [ 321.349045][T18516] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4299'. [ 321.366563][T18514] syzkaller0: entered promiscuous mode [ 321.372150][T18514] syzkaller0: entered allmulticast mode [ 321.383604][T18516] ip6tnl1: entered allmulticast mode [ 321.411182][T18520] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4303'. [ 321.420411][T18521] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4303'. [ 322.191549][ T29] kauditd_printk_skb: 26665 callbacks suppressed [ 322.191564][ T29] audit: type=1400 audit(1761361235.984:54391): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 322.204272][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 322.219209][ T29] audit: type=1400 audit(1761361235.984:54392): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 322.225576][ T3043] audit: audit_lost=3646 audit_rate_limit=0 audit_backlog_limit=64 [ 322.225588][ T3043] audit: backlog limit exceeded [ 322.226572][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 322.246901][ T29] audit: type=1400 audit(1761361235.984:54393): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 322.249239][ T29] audit: type=1400 audit(1761361235.984:54394): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 322.254821][ T3043] audit: audit_lost=3647 audit_rate_limit=0 audit_backlog_limit=64 [ 322.259666][ T29] audit: type=1400 audit(1761361235.984:54395): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 322.366624][T18577] FAULT_INJECTION: forcing a failure. [ 322.366624][T18577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.379830][T18577] CPU: 0 UID: 0 PID: 18577 Comm: syz.6.4328 Not tainted syzkaller #0 PREEMPT(voluntary) [ 322.379853][T18577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 322.379863][T18577] Call Trace: [ 322.379870][T18577] [ 322.379954][T18577] __dump_stack+0x1d/0x30 [ 322.379973][T18577] dump_stack_lvl+0xe8/0x140 [ 322.379991][T18577] dump_stack+0x15/0x1b [ 322.380006][T18577] should_fail_ex+0x265/0x280 [ 322.380022][T18577] should_fail+0xb/0x20 [ 322.380036][T18577] should_fail_usercopy+0x1a/0x20 [ 322.380084][T18577] _copy_to_user+0x20/0xa0 [ 322.380110][T18577] simple_read_from_buffer+0xb5/0x130 [ 322.380132][T18577] proc_fail_nth_read+0x10e/0x150 [ 322.380156][T18577] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 322.380212][T18577] vfs_read+0x1a8/0x770 [ 322.380233][T18577] ? __fget_files+0x184/0x1c0 [ 322.380307][T18577] ? __rcu_read_unlock+0x4f/0x70 [ 322.380404][T18577] ? __fget_files+0x184/0x1c0 [ 322.380429][T18577] ksys_read+0xda/0x1a0 [ 322.380452][T18577] __x64_sys_read+0x40/0x50 [ 322.380472][T18577] x64_sys_call+0x27c0/0x3000 [ 322.380523][T18577] do_syscall_64+0xd2/0x200 [ 322.380545][T18577] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 322.380569][T18577] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 322.380597][T18577] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 322.380639][T18577] RIP: 0033:0x7efe7178d9dc [ 322.380654][T18577] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 322.380671][T18577] RSP: 002b:00007efe701ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 322.380688][T18577] RAX: ffffffffffffffda RBX: 00007efe719e5fa0 RCX: 00007efe7178d9dc [ 322.380699][T18577] RDX: 000000000000000f RSI: 00007efe701ef0a0 RDI: 0000000000000003 [ 322.380709][T18577] RBP: 00007efe701ef090 R08: 0000000000000000 R09: 0000000000000000 [ 322.380797][T18577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.380808][T18577] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 322.380822][T18577] [ 322.402804][T18573] netlink: 'syz.7.4317': attribute type 21 has an invalid length. [ 322.574969][T18583] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4329'. [ 322.582479][T18573] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4317'. [ 322.647191][T18586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18586 comm=syz.7.4331 [ 322.688894][T18593] FAULT_INJECTION: forcing a failure. [ 322.688894][T18593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.702068][T18593] CPU: 1 UID: 0 PID: 18593 Comm: syz.6.4334 Not tainted syzkaller #0 PREEMPT(voluntary) [ 322.702092][T18593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 322.702103][T18593] Call Trace: [ 322.702108][T18593] [ 322.702183][T18593] __dump_stack+0x1d/0x30 [ 322.702203][T18593] dump_stack_lvl+0xe8/0x140 [ 322.702222][T18593] dump_stack+0x15/0x1b [ 322.702285][T18593] should_fail_ex+0x265/0x280 [ 322.702304][T18593] should_fail+0xb/0x20 [ 322.702319][T18593] should_fail_usercopy+0x1a/0x20 [ 322.702336][T18593] _copy_from_user+0x1c/0xb0 [ 322.702371][T18593] kstrtouint_from_user+0x69/0xf0 [ 322.702396][T18593] ? 0xffffffff81000000 [ 322.702407][T18593] ? selinux_file_permission+0x1e4/0x320 [ 322.702432][T18593] proc_fail_nth_write+0x50/0x160 [ 322.702462][T18593] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 322.702527][T18593] vfs_write+0x269/0x960 [ 322.702546][T18593] ? vfs_read+0x4e6/0x770 [ 322.702583][T18593] ? __rcu_read_unlock+0x4f/0x70 [ 322.702604][T18593] ? __fget_files+0x184/0x1c0 [ 322.702629][T18593] ksys_write+0xda/0x1a0 [ 322.702653][T18593] __x64_sys_write+0x40/0x50 [ 322.702723][T18593] x64_sys_call+0x2802/0x3000 [ 322.702790][T18593] do_syscall_64+0xd2/0x200 [ 322.702809][T18593] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 322.702862][T18593] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 322.702964][T18593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 322.702984][T18593] RIP: 0033:0x7efe7178da7f [ 322.702999][T18593] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 322.703016][T18593] RSP: 002b:00007efe701ef030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 322.703065][T18593] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe7178da7f [ 322.703077][T18593] RDX: 0000000000000001 RSI: 00007efe701ef0a0 RDI: 0000000000000003 [ 322.703090][T18593] RBP: 00007efe701ef090 R08: 0000000000000000 R09: 0000000000000000 [ 322.703102][T18593] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 322.703112][T18593] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 322.703129][T18593] [ 323.022223][ T12] Bluetooth: hci0: Frame reassembly failed (-84) [ 323.073052][T18618] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4345'. [ 323.158648][T18624] bond1: option lacp_active: mode dependency failed, not supported in mode balance-tlb(5) [ 323.171983][T18624] bond1 (unregistering): Released all slaves [ 323.332378][T18645] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4358'. [ 323.392245][T18652] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 323.398805][T18652] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 323.406448][T18652] vhci_hcd vhci_hcd.0: Device attached [ 323.448828][T18655] vhci_hcd: connection closed [ 323.449350][T10896] vhci_hcd: stop threads [ 323.458312][T10896] vhci_hcd: release socket [ 323.462754][T10896] vhci_hcd: disconnect device [ 323.790707][T18675] FAULT_INJECTION: forcing a failure. [ 323.790707][T18675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.803889][T18675] CPU: 0 UID: 0 PID: 18675 Comm: syz.6.4370 Not tainted syzkaller #0 PREEMPT(voluntary) [ 323.803998][T18675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 323.804009][T18675] Call Trace: [ 323.804015][T18675] [ 323.804022][T18675] __dump_stack+0x1d/0x30 [ 323.804042][T18675] dump_stack_lvl+0xe8/0x140 [ 323.804059][T18675] dump_stack+0x15/0x1b [ 323.804075][T18675] should_fail_ex+0x265/0x280 [ 323.804125][T18675] should_fail+0xb/0x20 [ 323.804141][T18675] should_fail_usercopy+0x1a/0x20 [ 323.804161][T18675] strncpy_from_user+0x25/0x230 [ 323.804187][T18675] ? kmem_cache_alloc_noprof+0x242/0x480 [ 323.804299][T18675] ? getname_flags+0x80/0x3b0 [ 323.804328][T18675] getname_flags+0xae/0x3b0 [ 323.804351][T18675] __x64_sys_renameat2+0x5f/0x90 [ 323.804376][T18675] x64_sys_call+0x3f9/0x3000 [ 323.804456][T18675] do_syscall_64+0xd2/0x200 [ 323.804474][T18675] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 323.804500][T18675] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 323.804583][T18675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.804605][T18675] RIP: 0033:0x7efe7178efc9 [ 323.804619][T18675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.804637][T18675] RSP: 002b:00007efe701ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 323.804655][T18675] RAX: ffffffffffffffda RBX: 00007efe719e5fa0 RCX: 00007efe7178efc9 [ 323.804666][T18675] RDX: ffffffffffffff9c RSI: 0000200000000080 RDI: ffffffffffffff9c [ 323.804700][T18675] RBP: 00007efe701ef090 R08: 0000000000000002 R09: 0000000000000000 [ 323.804710][T18675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.804720][T18675] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 323.804738][T18675] [ 324.009154][T18677] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4371'. [ 324.285051][T18693] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4378'. [ 324.366766][T18701] FAULT_INJECTION: forcing a failure. [ 324.366766][T18701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 324.379930][T18701] CPU: 1 UID: 0 PID: 18701 Comm: syz.5.4381 Not tainted syzkaller #0 PREEMPT(voluntary) [ 324.379959][T18701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 324.380022][T18701] Call Trace: [ 324.380030][T18701] [ 324.380038][T18701] __dump_stack+0x1d/0x30 [ 324.380061][T18701] dump_stack_lvl+0xe8/0x140 [ 324.380079][T18701] dump_stack+0x15/0x1b [ 324.380156][T18701] should_fail_ex+0x265/0x280 [ 324.380176][T18701] should_fail+0xb/0x20 [ 324.380193][T18701] should_fail_usercopy+0x1a/0x20 [ 324.380214][T18701] _copy_to_user+0x20/0xa0 [ 324.380237][T18701] simple_read_from_buffer+0xb5/0x130 [ 324.380304][T18701] proc_fail_nth_read+0x10e/0x150 [ 324.380333][T18701] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 324.380357][T18701] vfs_read+0x1a8/0x770 [ 324.380411][T18701] ? kmem_cache_free+0xe4/0x3d0 [ 324.380439][T18701] ? fdget+0xcc/0x110 [ 324.380476][T18701] ksys_read+0xda/0x1a0 [ 324.380497][T18701] __x64_sys_read+0x40/0x50 [ 324.380520][T18701] x64_sys_call+0x27c0/0x3000 [ 324.380542][T18701] do_syscall_64+0xd2/0x200 [ 324.380561][T18701] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 324.380615][T18701] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.380632][T18701] RIP: 0033:0x7fdf7473d9dc [ 324.380645][T18701] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 324.380659][T18701] RSP: 002b:00007fdf7319f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 324.380675][T18701] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473d9dc [ 324.380762][T18701] RDX: 000000000000000f RSI: 00007fdf7319f0a0 RDI: 0000000000000004 [ 324.380772][T18701] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 324.380783][T18701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.380793][T18701] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 324.380807][T18701] [ 324.592724][T18704] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4382'. [ 324.664308][T18708] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 324.670887][T18708] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 324.678583][T18708] vhci_hcd vhci_hcd.0: Device attached [ 324.714982][T18711] vhci_hcd: connection closed [ 324.716040][ T42] vhci_hcd: stop threads [ 324.725121][ T42] vhci_hcd: release socket [ 324.729522][ T42] vhci_hcd: disconnect device [ 324.784518][T18719] netlink: 'syz.9.4388': attribute type 4 has an invalid length. [ 324.792317][T18719] netlink: 152 bytes leftover after parsing attributes in process `syz.9.4388'. [ 324.850312][T18725] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4390'. [ 324.866487][T18726] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4390'. [ 324.968042][T18735] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4394'. [ 325.081458][T13038] Bluetooth: hci0: command 0x1003 tx timeout [ 325.081528][ T3570] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 325.333293][T18749] FAULT_INJECTION: forcing a failure. [ 325.333293][T18749] name failslab, interval 1, probability 0, space 0, times 0 [ 325.346062][T18749] CPU: 0 UID: 0 PID: 18749 Comm: syz.7.4401 Not tainted syzkaller #0 PREEMPT(voluntary) [ 325.346131][T18749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 325.346144][T18749] Call Trace: [ 325.346216][T18749] [ 325.346223][T18749] __dump_stack+0x1d/0x30 [ 325.346242][T18749] dump_stack_lvl+0xe8/0x140 [ 325.346261][T18749] dump_stack+0x15/0x1b [ 325.346284][T18749] should_fail_ex+0x265/0x280 [ 325.346301][T18749] should_failslab+0x8c/0xb0 [ 325.346340][T18749] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 325.346365][T18749] ? __alloc_skb+0x101/0x320 [ 325.346387][T18749] __alloc_skb+0x101/0x320 [ 325.346410][T18749] netlink_alloc_large_skb+0xbf/0xf0 [ 325.346502][T18749] netlink_sendmsg+0x3cf/0x6b0 [ 325.346519][T18749] ? __pfx_netlink_sendmsg+0x10/0x10 [ 325.346535][T18749] __sock_sendmsg+0x145/0x180 [ 325.346554][T18749] ____sys_sendmsg+0x31e/0x4e0 [ 325.346586][T18749] ___sys_sendmsg+0x17b/0x1d0 [ 325.346625][T18749] __x64_sys_sendmsg+0xd4/0x160 [ 325.346715][T18749] x64_sys_call+0x191e/0x3000 [ 325.346733][T18749] do_syscall_64+0xd2/0x200 [ 325.346752][T18749] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 325.346779][T18749] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 325.346851][T18749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.346868][T18749] RIP: 0033:0x7fae6a9cefc9 [ 325.346881][T18749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.346896][T18749] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 325.346935][T18749] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 325.346946][T18749] RDX: 0000000004044040 RSI: 0000200000000080 RDI: 0000000000000003 [ 325.346957][T18749] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 325.346968][T18749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.346978][T18749] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 325.346993][T18749] [ 325.561304][T18747] syzkaller0: entered promiscuous mode [ 325.566785][T18747] syzkaller0: entered allmulticast mode [ 325.609172][T18753] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4398'. [ 325.673711][T18760] FAULT_INJECTION: forcing a failure. [ 325.673711][T18760] name failslab, interval 1, probability 0, space 0, times 0 [ 325.686353][T18760] CPU: 1 UID: 0 PID: 18760 Comm: syz.0.4405 Not tainted syzkaller #0 PREEMPT(voluntary) [ 325.686391][T18760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 325.686403][T18760] Call Trace: [ 325.686411][T18760] [ 325.686419][T18760] __dump_stack+0x1d/0x30 [ 325.686440][T18760] dump_stack_lvl+0xe8/0x140 [ 325.686457][T18760] dump_stack+0x15/0x1b [ 325.686471][T18760] should_fail_ex+0x265/0x280 [ 325.686541][T18760] should_failslab+0x8c/0xb0 [ 325.686567][T18760] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 325.686663][T18760] ? __d_alloc+0x3d/0x340 [ 325.686691][T18760] __d_alloc+0x3d/0x340 [ 325.686718][T18760] d_alloc+0x2e/0x100 [ 325.686742][T18760] lookup_one_qstr_excl+0x99/0x250 [ 325.686773][T18760] filename_create+0x149/0x230 [ 325.686791][T18760] do_mknodat+0xe7/0x610 [ 325.686861][T18760] __x64_sys_mknodat+0x5e/0x70 [ 325.686881][T18760] x64_sys_call+0x2ed7/0x3000 [ 325.686901][T18760] do_syscall_64+0xd2/0x200 [ 325.686917][T18760] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 325.686991][T18760] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 325.687017][T18760] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.687036][T18760] RIP: 0033:0x7fe7ba97efc9 [ 325.687052][T18760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.687076][T18760] RSP: 002b:00007fe7b93df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 325.687094][T18760] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97efc9 [ 325.687107][T18760] RDX: 00000000000021c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 325.687121][T18760] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 325.687134][T18760] R10: 0000000000000103 R11: 0000000000000246 R12: 0000000000000001 [ 325.687147][T18760] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 325.687166][T18760] [ 325.922195][T18767] : renamed from veth0_to_bond (while UP) [ 326.131727][T18797] FAULT_INJECTION: forcing a failure. [ 326.131727][T18797] name failslab, interval 1, probability 0, space 0, times 0 [ 326.144530][T18797] CPU: 1 UID: 0 PID: 18797 Comm: syz.6.4421 Not tainted syzkaller #0 PREEMPT(voluntary) [ 326.144575][T18797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 326.144658][T18797] Call Trace: [ 326.144664][T18797] [ 326.144671][T18797] __dump_stack+0x1d/0x30 [ 326.144756][T18797] dump_stack_lvl+0xe8/0x140 [ 326.144773][T18797] dump_stack+0x15/0x1b [ 326.144787][T18797] should_fail_ex+0x265/0x280 [ 326.144806][T18797] ? rtnl_newlink+0x5c/0x12d0 [ 326.144827][T18797] should_failslab+0x8c/0xb0 [ 326.144905][T18797] __kmalloc_cache_noprof+0x4c/0x4a0 [ 326.144960][T18797] rtnl_newlink+0x5c/0x12d0 [ 326.145015][T18797] ? xas_load+0x413/0x430 [ 326.145043][T18797] ? try_charge_memcg+0x215/0xa10 [ 326.145068][T18797] ? __rcu_read_unlock+0x4f/0x70 [ 326.145094][T18797] ? __rcu_read_unlock+0x4f/0x70 [ 326.145121][T18797] ? avc_has_perm_noaudit+0x1b1/0x200 [ 326.145157][T18797] ? cred_has_capability+0x210/0x280 [ 326.145188][T18797] ? selinux_capable+0x31/0x40 [ 326.145209][T18797] ? security_capable+0x83/0x90 [ 326.145305][T18797] ? ns_capable+0x7d/0xb0 [ 326.145327][T18797] ? __pfx_rtnl_newlink+0x10/0x10 [ 326.145371][T18797] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 326.145453][T18797] netlink_rcv_skb+0x123/0x220 [ 326.145482][T18797] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 326.145507][T18797] rtnetlink_rcv+0x1c/0x30 [ 326.145551][T18797] netlink_unicast+0x5c0/0x690 [ 326.145576][T18797] netlink_sendmsg+0x58b/0x6b0 [ 326.145673][T18797] ? __pfx_netlink_sendmsg+0x10/0x10 [ 326.145692][T18797] __sock_sendmsg+0x145/0x180 [ 326.145752][T18797] ____sys_sendmsg+0x31e/0x4e0 [ 326.145784][T18797] ___sys_sendmsg+0x17b/0x1d0 [ 326.145850][T18797] __x64_sys_sendmsg+0xd4/0x160 [ 326.145930][T18797] x64_sys_call+0x191e/0x3000 [ 326.146020][T18797] do_syscall_64+0xd2/0x200 [ 326.146035][T18797] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 326.146059][T18797] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 326.146165][T18797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.146203][T18797] RIP: 0033:0x7efe7178efc9 [ 326.146228][T18797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.146245][T18797] RSP: 002b:00007efe701ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 326.146263][T18797] RAX: ffffffffffffffda RBX: 00007efe719e5fa0 RCX: 00007efe7178efc9 [ 326.146274][T18797] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 326.146285][T18797] RBP: 00007efe701ef090 R08: 0000000000000000 R09: 0000000000000000 [ 326.146298][T18797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.146310][T18797] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 326.146326][T18797] [ 326.635654][T18830] FAULT_INJECTION: forcing a failure. [ 326.635654][T18830] name failslab, interval 1, probability 0, space 0, times 0 [ 326.648398][T18830] CPU: 0 UID: 0 PID: 18830 Comm: syz.7.4434 Not tainted syzkaller #0 PREEMPT(voluntary) [ 326.648435][T18830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 326.648446][T18830] Call Trace: [ 326.648452][T18830] [ 326.648459][T18830] __dump_stack+0x1d/0x30 [ 326.648526][T18830] dump_stack_lvl+0xe8/0x140 [ 326.648545][T18830] dump_stack+0x15/0x1b [ 326.648559][T18830] should_fail_ex+0x265/0x280 [ 326.648601][T18830] should_failslab+0x8c/0xb0 [ 326.648697][T18830] kmem_cache_alloc_noprof+0x50/0x480 [ 326.648720][T18830] ? audit_log_start+0x342/0x720 [ 326.648738][T18830] audit_log_start+0x342/0x720 [ 326.648771][T18830] ? kstrtouint+0x76/0xc0 [ 326.648827][T18830] audit_seccomp+0x48/0x100 [ 326.648851][T18830] ? __seccomp_filter+0x82d/0x1250 [ 326.648872][T18830] __seccomp_filter+0x83e/0x1250 [ 326.648895][T18830] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 326.649017][T18830] ? vfs_write+0x7e8/0x960 [ 326.649037][T18830] ? __rcu_read_unlock+0x4f/0x70 [ 326.649097][T18830] ? __fget_files+0x184/0x1c0 [ 326.649120][T18830] __secure_computing+0x82/0x150 [ 326.649145][T18830] syscall_trace_enter+0xcf/0x1e0 [ 326.649169][T18830] do_syscall_64+0xac/0x200 [ 326.649186][T18830] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 326.649230][T18830] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 326.649253][T18830] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.649273][T18830] RIP: 0033:0x7fae6a9cefc9 [ 326.649289][T18830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.649341][T18830] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 326.649426][T18830] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 326.649443][T18830] RDX: 0000200000000140 RSI: 0000000000000001 RDI: 0000000000000000 [ 326.649455][T18830] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 326.649468][T18830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.649480][T18830] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 326.649528][T18830] [ 326.940309][T18852] FAULT_INJECTION: forcing a failure. [ 326.940309][T18852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.953558][T18852] CPU: 0 UID: 0 PID: 18852 Comm: syz.9.4445 Not tainted syzkaller #0 PREEMPT(voluntary) [ 326.953585][T18852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 326.953597][T18852] Call Trace: [ 326.953605][T18852] [ 326.953613][T18852] __dump_stack+0x1d/0x30 [ 326.953713][T18852] dump_stack_lvl+0xe8/0x140 [ 326.953734][T18852] dump_stack+0x15/0x1b [ 326.953751][T18852] should_fail_ex+0x265/0x280 [ 326.953770][T18852] should_fail+0xb/0x20 [ 326.953806][T18852] should_fail_usercopy+0x1a/0x20 [ 326.953900][T18852] _copy_to_user+0x20/0xa0 [ 326.953921][T18852] simple_read_from_buffer+0xb5/0x130 [ 326.953944][T18852] proc_fail_nth_read+0x10e/0x150 [ 326.953968][T18852] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 326.954025][T18852] vfs_read+0x1a8/0x770 [ 326.954046][T18852] ? __rcu_read_unlock+0x4f/0x70 [ 326.954139][T18852] ? __fget_files+0x184/0x1c0 [ 326.954221][T18852] ksys_read+0xda/0x1a0 [ 326.954240][T18852] __x64_sys_read+0x40/0x50 [ 326.954328][T18852] x64_sys_call+0x27c0/0x3000 [ 326.954402][T18852] do_syscall_64+0xd2/0x200 [ 326.954420][T18852] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 326.954446][T18852] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 326.954474][T18852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.954556][T18852] RIP: 0033:0x7f010b2ed9dc [ 326.954572][T18852] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 326.954587][T18852] RSP: 002b:00007f0109d4f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 326.954604][T18852] RAX: ffffffffffffffda RBX: 00007f010b545fa0 RCX: 00007f010b2ed9dc [ 326.954615][T18852] RDX: 000000000000000f RSI: 00007f0109d4f0a0 RDI: 0000000000000003 [ 326.954625][T18852] RBP: 00007f0109d4f090 R08: 0000000000000000 R09: 0000000000000000 [ 326.954688][T18852] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 326.954757][T18852] R13: 00007f010b546038 R14: 00007f010b545fa0 R15: 00007ffd70e4f4b8 [ 326.954853][T18852] [ 327.201264][ T29] kauditd_printk_skb: 27377 callbacks suppressed [ 327.201361][ T29] audit: type=1400 audit(1761361240.984:75246): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 327.238612][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 327.245215][ T3043] audit: audit_lost=5824 audit_rate_limit=0 audit_backlog_limit=64 [ 327.246627][T18872] audit: audit_backlog=65 > audit_backlog_limit=64 [ 327.253325][ T3043] audit: backlog limit exceeded [ 327.259784][T18872] audit: audit_lost=5825 audit_rate_limit=0 audit_backlog_limit=64 [ 327.266308][T18869] audit: audit_backlog=65 > audit_backlog_limit=64 [ 327.272668][T18872] audit: backlog limit exceeded [ 327.274438][T18873] audit: audit_backlog=65 > audit_backlog_limit=64 [ 327.279516][T18869] audit: audit_lost=5826 audit_rate_limit=0 audit_backlog_limit=64 [ 327.474792][T18902] xt_CT: You must specify a L4 protocol and not use inversions on it [ 327.477784][T18908] FAULT_INJECTION: forcing a failure. [ 327.477784][T18908] name failslab, interval 1, probability 0, space 0, times 0 [ 327.495652][T18908] CPU: 0 UID: 0 PID: 18908 Comm: syz.0.4470 Not tainted syzkaller #0 PREEMPT(voluntary) [ 327.495678][T18908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 327.495688][T18908] Call Trace: [ 327.495695][T18908] [ 327.495703][T18908] __dump_stack+0x1d/0x30 [ 327.495785][T18908] dump_stack_lvl+0xe8/0x140 [ 327.495878][T18908] dump_stack+0x15/0x1b [ 327.495926][T18908] should_fail_ex+0x265/0x280 [ 327.495945][T18908] ? audit_log_d_path+0x8d/0x150 [ 327.495969][T18908] should_failslab+0x8c/0xb0 [ 327.495992][T18908] __kmalloc_cache_noprof+0x4c/0x4a0 [ 327.496069][T18908] audit_log_d_path+0x8d/0x150 [ 327.496087][T18908] audit_log_d_path_exe+0x42/0x70 [ 327.496189][T18908] audit_log_task+0x1e9/0x250 [ 327.496215][T18908] ? kstrtouint+0x76/0xc0 [ 327.496240][T18908] audit_seccomp+0x61/0x100 [ 327.496357][T18908] ? __seccomp_filter+0x82d/0x1250 [ 327.496377][T18908] __seccomp_filter+0x83e/0x1250 [ 327.496401][T18908] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 327.496457][T18908] ? vfs_write+0x7e8/0x960 [ 327.496491][T18908] __secure_computing+0x82/0x150 [ 327.496512][T18908] syscall_trace_enter+0xcf/0x1e0 [ 327.496558][T18908] do_syscall_64+0xac/0x200 [ 327.496609][T18908] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 327.496681][T18908] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 327.496724][T18908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.496741][T18908] RIP: 0033:0x7fe7ba97efc9 [ 327.496754][T18908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.496783][T18908] RSP: 002b:00007fe7b93df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000043 [ 327.496802][T18908] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97efc9 [ 327.496814][T18908] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.496824][T18908] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 327.496878][T18908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.496889][T18908] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 327.496903][T18908] [ 327.499979][T18903] FAULT_INJECTION: forcing a failure. [ 327.499979][T18903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.725152][T18903] CPU: 1 UID: 0 PID: 18903 Comm: syz.7.4469 Not tainted syzkaller #0 PREEMPT(voluntary) [ 327.725175][T18903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 327.725185][T18903] Call Trace: [ 327.725245][T18903] [ 327.725252][T18903] __dump_stack+0x1d/0x30 [ 327.725272][T18903] dump_stack_lvl+0xe8/0x140 [ 327.725288][T18903] dump_stack+0x15/0x1b [ 327.725302][T18903] should_fail_ex+0x265/0x280 [ 327.725318][T18903] should_fail+0xb/0x20 [ 327.725331][T18903] should_fail_usercopy+0x1a/0x20 [ 327.725368][T18903] _copy_to_user+0x20/0xa0 [ 327.725388][T18903] simple_read_from_buffer+0xb5/0x130 [ 327.725477][T18903] proc_fail_nth_read+0x10e/0x150 [ 327.725508][T18903] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 327.725581][T18903] vfs_read+0x1a8/0x770 [ 327.725603][T18903] ? __rcu_read_unlock+0x4f/0x70 [ 327.725705][T18903] ? __fget_files+0x184/0x1c0 [ 327.725728][T18903] ksys_read+0xda/0x1a0 [ 327.725850][T18903] __x64_sys_read+0x40/0x50 [ 327.725873][T18903] x64_sys_call+0x27c0/0x3000 [ 327.725934][T18903] do_syscall_64+0xd2/0x200 [ 327.726055][T18903] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 327.726077][T18903] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 327.726148][T18903] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.726167][T18903] RIP: 0033:0x7fae6a9cd9dc [ 327.726180][T18903] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 327.726195][T18903] RSP: 002b:00007fae6942f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 327.726211][T18903] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cd9dc [ 327.726221][T18903] RDX: 000000000000000f RSI: 00007fae6942f0a0 RDI: 0000000000000003 [ 327.726277][T18903] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 327.726348][T18903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.726361][T18903] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 327.726378][T18903] [ 328.251031][T10896] Bluetooth: hci0: Frame reassembly failed (-84) [ 328.313243][T18975] __nla_validate_parse: 7 callbacks suppressed [ 328.313256][T18975] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4499'. [ 328.435692][T18991] syzkaller0: entered promiscuous mode [ 328.441196][T18991] syzkaller0: entered allmulticast mode [ 329.050165][T19009] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4514'. [ 329.432454][T19059] serio: Serial port ptm1 [ 329.531971][T19055] bridge0: entered promiscuous mode [ 329.537363][T19055] macsec1: entered promiscuous mode [ 329.543877][T19055] bridge0: port 3(macsec1) entered blocking state [ 329.550363][T19055] bridge0: port 3(macsec1) entered disabled state [ 329.561470][T19055] macsec1: entered allmulticast mode [ 329.566855][T19055] bridge0: entered allmulticast mode [ 329.580107][T19055] macsec1: left allmulticast mode [ 329.585242][T19055] bridge0: left allmulticast mode [ 329.609303][T19055] bridge0: left promiscuous mode [ 330.015274][T19093] FAULT_INJECTION: forcing a failure. [ 330.015274][T19093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.028368][T19093] CPU: 0 UID: 0 PID: 19093 Comm: syz.5.4548 Not tainted syzkaller #0 PREEMPT(voluntary) [ 330.028391][T19093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 330.028437][T19093] Call Trace: [ 330.028444][T19093] [ 330.028452][T19093] __dump_stack+0x1d/0x30 [ 330.028475][T19093] dump_stack_lvl+0xe8/0x140 [ 330.028510][T19093] dump_stack+0x15/0x1b [ 330.028554][T19093] should_fail_ex+0x265/0x280 [ 330.028570][T19093] should_fail+0xb/0x20 [ 330.028584][T19093] should_fail_usercopy+0x1a/0x20 [ 330.028605][T19093] _copy_from_user+0x1c/0xb0 [ 330.028654][T19093] __sys_bpf+0x183/0x7c0 [ 330.028750][T19093] __x64_sys_bpf+0x41/0x50 [ 330.028785][T19093] x64_sys_call+0x2aee/0x3000 [ 330.028857][T19093] do_syscall_64+0xd2/0x200 [ 330.028873][T19093] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 330.028896][T19093] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 330.028949][T19093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.028971][T19093] RIP: 0033:0x7fdf7473efc9 [ 330.028987][T19093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.029004][T19093] RSP: 002b:00007fdf7319f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 330.029071][T19093] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473efc9 [ 330.029084][T19093] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 330.029096][T19093] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 330.029107][T19093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.029117][T19093] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 330.029132][T19093] [ 330.281559][ T3570] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 330.310320][T19116] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4557'. [ 330.362366][T19121] FAULT_INJECTION: forcing a failure. [ 330.362366][T19121] name failslab, interval 1, probability 0, space 0, times 0 [ 330.368294][T19123] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4559'. [ 330.375244][T19121] CPU: 0 UID: 0 PID: 19121 Comm: syz.9.4558 Not tainted syzkaller #0 PREEMPT(voluntary) [ 330.375272][T19121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 330.375285][T19121] Call Trace: [ 330.375292][T19121] [ 330.375300][T19121] __dump_stack+0x1d/0x30 [ 330.375350][T19121] dump_stack_lvl+0xe8/0x140 [ 330.375370][T19121] dump_stack+0x15/0x1b [ 330.375387][T19121] should_fail_ex+0x265/0x280 [ 330.375448][T19121] should_failslab+0x8c/0xb0 [ 330.375473][T19121] __kvmalloc_node_noprof+0x12e/0x670 [ 330.375542][T19121] ? alloc_netdev_mqs+0xa5/0xa50 [ 330.375627][T19121] ? __pfx_macsec_setup+0x10/0x10 [ 330.375663][T19121] alloc_netdev_mqs+0xa5/0xa50 [ 330.375743][T19121] rtnl_create_link+0x239/0x710 [ 330.375773][T19121] rtnl_newlink_create+0x14c/0x620 [ 330.375796][T19121] ? security_capable+0x83/0x90 [ 330.375921][T19121] ? netlink_ns_capable+0x86/0xa0 [ 330.375947][T19121] rtnl_newlink+0xf29/0x12d0 [ 330.376017][T19121] ? try_charge_memcg+0x215/0xa10 [ 330.376040][T19121] ? __rcu_read_unlock+0x4f/0x70 [ 330.376063][T19121] ? css_rstat_updated+0xb7/0x240 [ 330.376082][T19121] ? __account_obj_stock+0x211/0x350 [ 330.376106][T19121] ? __rcu_read_unlock+0x4f/0x70 [ 330.376178][T19121] ? avc_has_perm_noaudit+0x1b1/0x200 [ 330.376221][T19121] ? cred_has_capability+0x210/0x280 [ 330.376318][T19121] ? selinux_capable+0x31/0x40 [ 330.376338][T19121] ? security_capable+0x83/0x90 [ 330.376431][T19121] ? ns_capable+0x7d/0xb0 [ 330.376452][T19121] ? __pfx_rtnl_newlink+0x10/0x10 [ 330.376472][T19121] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 330.376493][T19121] ? avc_has_perm_noaudit+0x1b1/0x200 [ 330.376608][T19121] netlink_rcv_skb+0x123/0x220 [ 330.376633][T19121] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 330.376740][T19121] rtnetlink_rcv+0x1c/0x30 [ 330.376759][T19121] netlink_unicast+0x5c0/0x690 [ 330.376845][T19121] netlink_sendmsg+0x58b/0x6b0 [ 330.376864][T19121] ? __pfx_netlink_sendmsg+0x10/0x10 [ 330.376882][T19121] __sock_sendmsg+0x145/0x180 [ 330.376904][T19121] ____sys_sendmsg+0x31e/0x4e0 [ 330.376990][T19121] ___sys_sendmsg+0x17b/0x1d0 [ 330.377065][T19121] __x64_sys_sendmsg+0xd4/0x160 [ 330.377164][T19121] x64_sys_call+0x191e/0x3000 [ 330.377184][T19121] do_syscall_64+0xd2/0x200 [ 330.377201][T19121] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 330.377292][T19121] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 330.377320][T19121] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.377340][T19121] RIP: 0033:0x7f010b2eefc9 [ 330.377355][T19121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.377436][T19121] RSP: 002b:00007f0109d4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 330.377455][T19121] RAX: ffffffffffffffda RBX: 00007f010b545fa0 RCX: 00007f010b2eefc9 [ 330.377467][T19121] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 330.377479][T19121] RBP: 00007f0109d4f090 R08: 0000000000000000 R09: 0000000000000000 [ 330.377553][T19121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.377566][T19121] R13: 00007f010b546038 R14: 00007f010b545fa0 R15: 00007ffd70e4f4b8 [ 330.377626][T19121] [ 330.581620][T19128] sctp: [Deprecated]: syz.9.4562 (pid 19128) Use of int in max_burst socket option. [ 330.581620][T19128] Use struct sctp_assoc_value instead [ 330.712543][T19131] FAULT_INJECTION: forcing a failure. [ 330.712543][T19131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.725719][T19131] CPU: 1 UID: 0 PID: 19131 Comm: syz.0.4561 Not tainted syzkaller #0 PREEMPT(voluntary) [ 330.725746][T19131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 330.725758][T19131] Call Trace: [ 330.725765][T19131] [ 330.725772][T19131] __dump_stack+0x1d/0x30 [ 330.725794][T19131] dump_stack_lvl+0xe8/0x140 [ 330.725894][T19131] dump_stack+0x15/0x1b [ 330.725911][T19131] should_fail_ex+0x265/0x280 [ 330.725968][T19131] should_fail+0xb/0x20 [ 330.725984][T19131] should_fail_usercopy+0x1a/0x20 [ 330.726045][T19131] _copy_to_user+0x20/0xa0 [ 330.726065][T19131] simple_read_from_buffer+0xb5/0x130 [ 330.726086][T19131] proc_fail_nth_read+0x10e/0x150 [ 330.726132][T19131] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 330.726158][T19131] vfs_read+0x1a8/0x770 [ 330.726179][T19131] ? __rcu_read_unlock+0x4f/0x70 [ 330.726225][T19131] ? __fget_files+0x184/0x1c0 [ 330.726250][T19131] ksys_read+0xda/0x1a0 [ 330.726301][T19131] __x64_sys_read+0x40/0x50 [ 330.726320][T19131] x64_sys_call+0x27c0/0x3000 [ 330.726341][T19131] do_syscall_64+0xd2/0x200 [ 330.726409][T19131] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 330.726432][T19131] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 330.726459][T19131] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.726478][T19131] RIP: 0033:0x7fe7ba97d9dc [ 330.726534][T19131] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 330.726569][T19131] RSP: 002b:00007fe7b93df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 330.726588][T19131] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97d9dc [ 330.726599][T19131] RDX: 000000000000000f RSI: 00007fe7b93df0a0 RDI: 0000000000000004 [ 330.726610][T19131] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 330.726625][T19131] R10: 0000200000001340 R11: 0000000000000246 R12: 0000000000000001 [ 330.726635][T19131] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 330.726650][T19131] [ 330.728082][T19128] netlink: 32 bytes leftover after parsing attributes in process `syz.9.4562'. [ 330.754371][T19137] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4564'. [ 331.341923][T19175] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4575'. [ 331.577738][T10896] Bluetooth: hci0: Frame reassembly failed (-84) [ 332.052077][T19214] FAULT_INJECTION: forcing a failure. [ 332.052077][T19214] name failslab, interval 1, probability 0, space 0, times 0 [ 332.064755][T19214] CPU: 0 UID: 0 PID: 19214 Comm: syz.5.4592 Not tainted syzkaller #0 PREEMPT(voluntary) [ 332.064778][T19214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 332.064863][T19214] Call Trace: [ 332.064871][T19214] [ 332.064880][T19214] __dump_stack+0x1d/0x30 [ 332.064899][T19214] dump_stack_lvl+0xe8/0x140 [ 332.064915][T19214] dump_stack+0x15/0x1b [ 332.064929][T19214] should_fail_ex+0x265/0x280 [ 332.064945][T19214] should_failslab+0x8c/0xb0 [ 332.064996][T19214] __kmalloc_noprof+0xa5/0x570 [ 332.065062][T19214] ? security_prepare_creds+0x52/0x120 [ 332.065091][T19214] security_prepare_creds+0x52/0x120 [ 332.065118][T19214] prepare_creds+0x34a/0x4c0 [ 332.065227][T19214] copy_creds+0x8f/0x3f0 [ 332.065252][T19214] copy_process+0x658/0x2000 [ 332.065278][T19214] ? kstrtouint+0x76/0xc0 [ 332.065319][T19214] ? __rcu_read_unlock+0x4f/0x70 [ 332.065340][T19214] kernel_clone+0x16c/0x5c0 [ 332.065361][T19214] ? vfs_write+0x7e8/0x960 [ 332.065385][T19214] __x64_sys_clone+0xe6/0x120 [ 332.065469][T19214] x64_sys_call+0x119c/0x3000 [ 332.065491][T19214] do_syscall_64+0xd2/0x200 [ 332.065584][T19214] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 332.065633][T19214] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 332.065658][T19214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.065679][T19214] RIP: 0033:0x7fdf7473efc9 [ 332.065694][T19214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 332.065734][T19214] RSP: 002b:00007fdf7317dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 332.065753][T19214] RAX: ffffffffffffffda RBX: 00007fdf74996090 RCX: 00007fdf7473efc9 [ 332.065765][T19214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040042600 [ 332.065813][T19214] RBP: 00007fdf7317e090 R08: 0000000000000000 R09: 0000000000000000 [ 332.065824][T19214] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 332.065837][T19214] R13: 00007fdf74996128 R14: 00007fdf74996090 R15: 00007ffd770d65c8 [ 332.065873][T19214] [ 332.222240][ T29] kauditd_printk_skb: 41961 callbacks suppressed [ 332.222253][ T29] audit: type=1400 audit(1761361245.964:102350): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 332.249087][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 332.254471][ T29] audit: type=1400 audit(1761361246.024:102351): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 332.262437][ T3043] audit: audit_lost=10780 audit_rate_limit=0 audit_backlog_limit=64 [ 332.270410][ T29] audit: type=1400 audit(1761361246.024:102352): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 332.273431][ T3043] audit: backlog limit exceeded [ 332.279726][ T29] audit: type=1400 audit(1761361246.024:102353): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 332.301527][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 332.307448][ T29] audit: type=1400 audit(1761361246.024:102354): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 332.328702][ T3043] audit: audit_lost=10781 audit_rate_limit=0 audit_backlog_limit=64 [ 332.569213][T19228] FAULT_INJECTION: forcing a failure. [ 332.569213][T19228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 332.582432][T19228] CPU: 1 UID: 0 PID: 19228 Comm: syz.6.4599 Not tainted syzkaller #0 PREEMPT(voluntary) [ 332.582539][T19228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 332.582552][T19228] Call Trace: [ 332.582559][T19228] [ 332.582633][T19228] __dump_stack+0x1d/0x30 [ 332.582652][T19228] dump_stack_lvl+0xe8/0x140 [ 332.582670][T19228] dump_stack+0x15/0x1b [ 332.582686][T19228] should_fail_ex+0x265/0x280 [ 332.582712][T19228] should_fail+0xb/0x20 [ 332.582726][T19228] should_fail_usercopy+0x1a/0x20 [ 332.582743][T19228] _copy_to_user+0x20/0xa0 [ 332.582764][T19228] simple_read_from_buffer+0xb5/0x130 [ 332.582844][T19228] proc_fail_nth_read+0x10e/0x150 [ 332.582869][T19228] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 332.582919][T19228] vfs_read+0x1a8/0x770 [ 332.582941][T19228] ? __rcu_read_unlock+0x4f/0x70 [ 332.583018][T19228] ? __fget_files+0x184/0x1c0 [ 332.583112][T19228] ksys_read+0xda/0x1a0 [ 332.583133][T19228] __x64_sys_read+0x40/0x50 [ 332.583188][T19228] x64_sys_call+0x27c0/0x3000 [ 332.583211][T19228] do_syscall_64+0xd2/0x200 [ 332.583229][T19228] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 332.583285][T19228] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 332.583371][T19228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.583400][T19228] RIP: 0033:0x7efe7178d9dc [ 332.583413][T19228] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 332.583428][T19228] RSP: 002b:00007efe701ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 332.583444][T19228] RAX: ffffffffffffffda RBX: 00007efe719e5fa0 RCX: 00007efe7178d9dc [ 332.583457][T19228] RDX: 000000000000000f RSI: 00007efe701ef0a0 RDI: 0000000000000003 [ 332.583541][T19228] RBP: 00007efe701ef090 R08: 0000000000000000 R09: 0000000000000000 [ 332.583552][T19228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.583562][T19228] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 332.583619][T19228] [ 332.863114][T19236] netlink: 'syz.5.4603': attribute type 21 has an invalid length. [ 332.872167][T19237] netlink: 'syz.5.4603': attribute type 21 has an invalid length. [ 333.287171][T19270] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4617'. [ 333.461638][T19279] netlink: 'syz.0.4619': attribute type 1 has an invalid length. [ 333.651296][ T3570] Bluetooth: hci0: command 0x1003 tx timeout [ 333.657305][T13038] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 333.774741][T19294] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4628'. [ 334.088923][T19319] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4640'. [ 334.480402][T19355] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4656'. [ 334.549292][T19360] netlink: 32 bytes leftover after parsing attributes in process `syz.9.4659'. [ 334.621469][T19364] FAULT_INJECTION: forcing a failure. [ 334.621469][T19364] name failslab, interval 1, probability 0, space 0, times 0 [ 334.634139][T19364] CPU: 1 UID: 0 PID: 19364 Comm: syz.0.4661 Not tainted syzkaller #0 PREEMPT(voluntary) [ 334.634165][T19364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 334.634237][T19364] Call Trace: [ 334.634243][T19364] [ 334.634251][T19364] __dump_stack+0x1d/0x30 [ 334.634276][T19364] dump_stack_lvl+0xe8/0x140 [ 334.634295][T19364] dump_stack+0x15/0x1b [ 334.634311][T19364] should_fail_ex+0x265/0x280 [ 334.634332][T19364] should_failslab+0x8c/0xb0 [ 334.634356][T19364] kmem_cache_alloc_noprof+0x50/0x480 [ 334.634378][T19364] ? getname_flags+0x80/0x3b0 [ 334.634471][T19364] getname_flags+0x80/0x3b0 [ 334.634518][T19364] do_sys_openat2+0x60/0x110 [ 334.634538][T19364] __x64_sys_openat+0xf2/0x120 [ 334.634559][T19364] x64_sys_call+0x2eab/0x3000 [ 334.634635][T19364] do_syscall_64+0xd2/0x200 [ 334.634651][T19364] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 334.634677][T19364] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 334.634781][T19364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.634805][T19364] RIP: 0033:0x7fe7ba97d810 [ 334.634895][T19364] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 334.634911][T19364] RSP: 002b:00007fe7b93deb70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 334.634929][T19364] RAX: ffffffffffffffda RBX: 000000000000a401 RCX: 00007fe7ba97d810 [ 334.634941][T19364] RDX: 000000000000a401 RSI: 00007fe7b93dec10 RDI: 00000000ffffff9c [ 334.634952][T19364] RBP: 00007fe7b93dec10 R08: 0000000000000000 R09: 0000000000000000 [ 334.634964][T19364] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 334.634975][T19364] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 334.635007][T19364] [ 334.789928][T19377] FAULT_INJECTION: forcing a failure. [ 334.789928][T19377] name failslab, interval 1, probability 0, space 0, times 0 [ 334.828731][T19377] CPU: 0 UID: 0 PID: 19377 Comm: syz.5.4667 Not tainted syzkaller #0 PREEMPT(voluntary) [ 334.828756][T19377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 334.828769][T19377] Call Trace: [ 334.828782][T19377] [ 334.828791][T19377] __dump_stack+0x1d/0x30 [ 334.828815][T19377] dump_stack_lvl+0xe8/0x140 [ 334.828896][T19377] dump_stack+0x15/0x1b [ 334.828976][T19377] should_fail_ex+0x265/0x280 [ 334.829035][T19377] should_failslab+0x8c/0xb0 [ 334.829062][T19377] kmem_cache_alloc_noprof+0x50/0x480 [ 334.829088][T19377] ? getname_flags+0x80/0x3b0 [ 334.829141][T19377] getname_flags+0x80/0x3b0 [ 334.829165][T19377] user_path_at+0x28/0x130 [ 334.829184][T19377] __se_sys_pivot_root+0xbf/0x700 [ 334.829215][T19377] ? fput+0x8f/0xc0 [ 334.829235][T19377] __x64_sys_pivot_root+0x31/0x40 [ 334.829261][T19377] x64_sys_call+0x144/0x3000 [ 334.829280][T19377] do_syscall_64+0xd2/0x200 [ 334.829295][T19377] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 334.829328][T19377] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 334.829357][T19377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.829379][T19377] RIP: 0033:0x7fdf7473efc9 [ 334.829480][T19377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 334.829495][T19377] RSP: 002b:00007fdf7319f038 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 334.829512][T19377] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473efc9 [ 334.829526][T19377] RDX: 0000000000000000 RSI: 0000200000001600 RDI: 00002000000002c0 [ 334.829539][T19377] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 334.829611][T19377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.829673][T19377] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 334.829692][T19377] [ 335.613716][T19420] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4684'. [ 336.095450][T19463] FAULT_INJECTION: forcing a failure. [ 336.095450][T19463] name failslab, interval 1, probability 0, space 0, times 0 [ 336.108157][T19463] CPU: 1 UID: 0 PID: 19463 Comm: syz.7.4706 Not tainted syzkaller #0 PREEMPT(voluntary) [ 336.108212][T19463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 336.108223][T19463] Call Trace: [ 336.108229][T19463] [ 336.108236][T19463] __dump_stack+0x1d/0x30 [ 336.108258][T19463] dump_stack_lvl+0xe8/0x140 [ 336.108279][T19463] dump_stack+0x15/0x1b [ 336.108314][T19463] should_fail_ex+0x265/0x280 [ 336.108332][T19463] ? ipv6_add_addr+0x389/0x830 [ 336.108352][T19463] should_failslab+0x8c/0xb0 [ 336.108449][T19463] __kmalloc_cache_noprof+0x4c/0x4a0 [ 336.108483][T19463] ipv6_add_addr+0x389/0x830 [ 336.108567][T19463] inet6_addr_add+0x26e/0x6a0 [ 336.108592][T19463] ? selinux_capable+0x31/0x40 [ 336.108666][T19463] ? should_fail_ex+0xdb/0x280 [ 336.108826][T19463] addrconf_add_ifaddr+0x1ab/0x270 [ 336.108852][T19463] inet6_ioctl+0xb0/0x190 [ 336.108875][T19463] ? ioctl_has_perm+0x257/0x2a0 [ 336.108935][T19463] sock_do_ioctl+0x73/0x220 [ 336.108991][T19463] sock_ioctl+0x41b/0x610 [ 336.109011][T19463] ? __pfx_sock_ioctl+0x10/0x10 [ 336.109171][T19463] __se_sys_ioctl+0xce/0x140 [ 336.109190][T19463] __x64_sys_ioctl+0x43/0x50 [ 336.109209][T19463] x64_sys_call+0x1816/0x3000 [ 336.109240][T19463] do_syscall_64+0xd2/0x200 [ 336.109259][T19463] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 336.109330][T19463] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 336.109353][T19463] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.109370][T19463] RIP: 0033:0x7fae6a9cefc9 [ 336.109456][T19463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.109470][T19463] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.109516][T19463] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 336.109527][T19463] RDX: 0000200000005b80 RSI: 0000000000008916 RDI: 0000000000000003 [ 336.109540][T19463] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 336.109552][T19463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.109564][T19463] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 336.109705][T19463] [ 336.394067][T19468] FAULT_INJECTION: forcing a failure. [ 336.394067][T19468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.407183][T19468] CPU: 1 UID: 0 PID: 19468 Comm: syz.7.4708 Not tainted syzkaller #0 PREEMPT(voluntary) [ 336.407211][T19468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 336.407221][T19468] Call Trace: [ 336.407257][T19468] [ 336.407266][T19468] __dump_stack+0x1d/0x30 [ 336.407284][T19468] dump_stack_lvl+0xe8/0x140 [ 336.407303][T19468] dump_stack+0x15/0x1b [ 336.407394][T19468] should_fail_ex+0x265/0x280 [ 336.407414][T19468] should_fail+0xb/0x20 [ 336.407430][T19468] should_fail_usercopy+0x1a/0x20 [ 336.407506][T19468] _copy_from_user+0x1c/0xb0 [ 336.407529][T19468] ___sys_sendmsg+0xc1/0x1d0 [ 336.407569][T19468] __x64_sys_sendmsg+0xd4/0x160 [ 336.407631][T19468] x64_sys_call+0x191e/0x3000 [ 336.407652][T19468] do_syscall_64+0xd2/0x200 [ 336.407670][T19468] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 336.407702][T19468] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 336.407728][T19468] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.407746][T19468] RIP: 0033:0x7fae6a9cefc9 [ 336.407759][T19468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.407848][T19468] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.407867][T19468] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 336.407880][T19468] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 336.407892][T19468] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 336.407905][T19468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.407973][T19468] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 336.407988][T19468] [ 336.645172][T19479] netlink: 48 bytes leftover after parsing attributes in process `syz.7.4713'. [ 336.857701][T19503] bond1: entered promiscuous mode [ 336.862852][T19503] bond1: entered allmulticast mode [ 336.877228][T19503] 8021q: adding VLAN 0 to HW filter on device bond1 [ 336.900113][T19503] bond1 (unregistering): Released all slaves [ 337.031975][T19515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.055379][T19515] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.128091][T19515] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 337.231474][ T29] kauditd_printk_skb: 22831 callbacks suppressed [ 337.231487][ T29] audit: type=1400 audit(1761361251.024:123277): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 337.242204][T19524] FAULT_INJECTION: forcing a failure. [ 337.242204][T19524] name failslab, interval 1, probability 0, space 0, times 0 [ 337.263385][ T29] audit: type=1326 audit(1761361251.024:123278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19523 comm="syz.9.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f010b2eefc9 code=0x7ffc0000 [ 337.271908][T19524] CPU: 0 UID: 0 PID: 19524 Comm: syz.9.4732 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.271950][T19524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 337.271960][T19524] Call Trace: [ 337.271966][T19524] [ 337.271974][T19524] __dump_stack+0x1d/0x30 [ 337.271993][T19524] dump_stack_lvl+0xe8/0x140 [ 337.272011][T19524] dump_stack+0x15/0x1b [ 337.272092][T19524] should_fail_ex+0x265/0x280 [ 337.272112][T19524] should_failslab+0x8c/0xb0 [ 337.272137][T19524] kmem_cache_alloc_noprof+0x50/0x480 [ 337.272164][T19524] ? audit_log_start+0x342/0x720 [ 337.272248][T19524] audit_log_start+0x342/0x720 [ 337.272280][T19524] ? kstrtouint+0x76/0xc0 [ 337.272307][T19524] audit_seccomp+0x48/0x100 [ 337.272332][T19524] ? __seccomp_filter+0x82d/0x1250 [ 337.272382][T19524] __seccomp_filter+0x83e/0x1250 [ 337.272416][T19524] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 337.272448][T19524] ? vfs_write+0x7e8/0x960 [ 337.272475][T19524] ? kmem_cache_free+0xe4/0x3d0 [ 337.272503][T19524] ? 0xffffffffff600000 [ 337.272515][T19524] ? 0xffffffffff600000 [ 337.272528][T19524] __secure_computing+0x82/0x150 [ 337.272552][T19524] syscall_trace_enter+0xcf/0x1e0 [ 337.272647][T19524] do_syscall_64+0xac/0x200 [ 337.272665][T19524] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 337.272691][T19524] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 337.272718][T19524] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.272739][T19524] RIP: 0033:0x7f010b2eefc9 [ 337.272802][T19524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.272834][T19524] RSP: 002b:00007f0109d4efe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 337.272852][T19524] RAX: ffffffffffffffda RBX: 00007f010b545fa0 RCX: 00007f010b2eefc9 [ 337.272909][T19524] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c9a4080 [ 337.272921][T19524] RBP: 00007f0109d4f090 R08: ffffffffff600000 R09: ffffffffff600000 [ 337.272934][T19524] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 337.272945][T19524] R13: 00007f010b546038 R14: 00007f010b545fa0 R15: 00007ffd70e4f4b8 [ 337.272959][T19524] ? 0xffffffffff600000 [ 337.272971][T19524] ? 0xffffffffff600000 [ 337.272985][T19524] [ 337.272993][T19524] audit: audit_lost=11418 audit_rate_limit=0 audit_backlog_limit=64 [ 337.295707][ T29] audit: type=1326 audit(1761361251.024:123279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19523 comm="syz.9.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f010b2eefc9 code=0x7ffc0000 [ 337.305816][T19524] audit: out of memory in audit_log_start [ 337.324595][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 337.326563][ T29] audit: type=1326 audit(1761361251.024:123280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19523 comm="syz.9.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f010b2eefc9 code=0x7ffc0000 [ 337.326589][ T29] audit: type=1326 audit(1761361251.024:123281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19523 comm="syz.9.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f010b2eefc9 code=0x7ffc0000 [ 337.331175][ T3043] audit: audit_lost=11419 audit_rate_limit=0 audit_backlog_limit=64 [ 337.335378][ T29] audit: type=1326 audit(1761361251.024:123282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19523 comm="syz.9.4732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f010b2eefc9 code=0x7ffc0000 [ 337.768888][T19549] FAULT_INJECTION: forcing a failure. [ 337.768888][T19549] name failslab, interval 1, probability 0, space 0, times 0 [ 337.781610][T19549] CPU: 0 UID: 0 PID: 19549 Comm: syz.6.4743 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.781688][T19549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 337.781699][T19549] Call Trace: [ 337.781705][T19549] [ 337.781712][T19549] __dump_stack+0x1d/0x30 [ 337.781735][T19549] dump_stack_lvl+0xe8/0x140 [ 337.781756][T19549] dump_stack+0x15/0x1b [ 337.781827][T19549] should_fail_ex+0x265/0x280 [ 337.781894][T19549] should_failslab+0x8c/0xb0 [ 337.781916][T19549] kmem_cache_alloc_noprof+0x50/0x480 [ 337.781979][T19549] ? security_inode_alloc+0x37/0x100 [ 337.781998][T19549] security_inode_alloc+0x37/0x100 [ 337.782016][T19549] inode_init_always_gfp+0x4b7/0x500 [ 337.782070][T19549] ? __pfx_hugetlbfs_alloc_inode+0x10/0x10 [ 337.782097][T19549] alloc_inode+0x58/0x170 [ 337.782116][T19549] new_inode+0x1d/0xe0 [ 337.782136][T19549] hugetlbfs_get_inode+0x7b/0x370 [ 337.782161][T19549] hugetlb_file_setup+0x192/0x3d0 [ 337.782193][T19549] ksys_mmap_pgoff+0x157/0x310 [ 337.782247][T19549] x64_sys_call+0x14a3/0x3000 [ 337.782267][T19549] do_syscall_64+0xd2/0x200 [ 337.782344][T19549] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 337.782367][T19549] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 337.782392][T19549] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.782414][T19549] RIP: 0033:0x7efe7178efc9 [ 337.782483][T19549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.782497][T19549] RSP: 002b:00007efe701ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 337.782513][T19549] RAX: ffffffffffffffda RBX: 00007efe719e5fa0 RCX: 00007efe7178efc9 [ 337.782524][T19549] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 337.782610][T19549] RBP: 00007efe701ef090 R08: ffffffffffffffff R09: 0000000000000000 [ 337.782621][T19549] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000001 [ 337.782633][T19549] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 337.782649][T19549] [ 338.161131][T19579] binfmt_misc: register: failed to install interpreter file ./file0 [ 338.321721][T19593] binfmt_misc: register: failed to install interpreter file ./file0 [ 338.426493][T19607] FAULT_INJECTION: forcing a failure. [ 338.426493][T19607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.439882][T19607] CPU: 1 UID: 0 PID: 19607 Comm: syz.7.4769 Not tainted syzkaller #0 PREEMPT(voluntary) [ 338.439975][T19607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 338.439986][T19607] Call Trace: [ 338.439993][T19607] [ 338.440001][T19607] __dump_stack+0x1d/0x30 [ 338.440023][T19607] dump_stack_lvl+0xe8/0x140 [ 338.440106][T19607] dump_stack+0x15/0x1b [ 338.440132][T19607] should_fail_ex+0x265/0x280 [ 338.440152][T19607] should_fail+0xb/0x20 [ 338.440167][T19607] should_fail_usercopy+0x1a/0x20 [ 338.440185][T19607] _copy_from_user+0x1c/0xb0 [ 338.440207][T19607] ___sys_sendmsg+0xc1/0x1d0 [ 338.440259][T19607] __sys_sendmmsg+0x178/0x300 [ 338.440292][T19607] __x64_sys_sendmmsg+0x57/0x70 [ 338.440354][T19607] x64_sys_call+0x1c4a/0x3000 [ 338.440374][T19607] do_syscall_64+0xd2/0x200 [ 338.440394][T19607] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 338.440421][T19607] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 338.440515][T19607] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 338.440537][T19607] RIP: 0033:0x7fae6a9cefc9 [ 338.440592][T19607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.440745][T19607] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 338.440762][T19607] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 338.440774][T19607] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 000000000000000a [ 338.440788][T19607] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 338.440833][T19607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.440844][T19607] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 338.440860][T19607] [ 338.980712][T19638] syzkaller0: entered promiscuous mode [ 338.986398][T19638] syzkaller0: entered allmulticast mode [ 339.164327][T19643] syzkaller0: entered promiscuous mode [ 339.169836][T19643] syzkaller0: entered allmulticast mode [ 339.373646][T19677] netlink: 'syz.9.4798': attribute type 1 has an invalid length. [ 339.400044][T19677] 8021q: adding VLAN 0 to HW filter on device bond1 [ 339.429719][T19677] bond1: (slave ip6gretap1): making interface the new active one [ 339.438875][T19677] bond1: (slave ip6gretap1): Enslaving as an active interface with an up link [ 339.529037][T19694] syzkaller0: entered promiscuous mode [ 339.534551][T19694] syzkaller0: entered allmulticast mode [ 339.541874][T19697] netlink: 'syz.7.4806': attribute type 12 has an invalid length. [ 339.668598][T19704] syzkaller0: entered promiscuous mode [ 339.674136][T19704] syzkaller0: entered allmulticast mode [ 339.807150][T19719] FAULT_INJECTION: forcing a failure. [ 339.807150][T19719] name failslab, interval 1, probability 0, space 0, times 0 [ 339.819941][T19719] CPU: 1 UID: 0 PID: 19719 Comm: syz.7.4815 Not tainted syzkaller #0 PREEMPT(voluntary) [ 339.819968][T19719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 339.819981][T19719] Call Trace: [ 339.819989][T19719] [ 339.819997][T19719] __dump_stack+0x1d/0x30 [ 339.820071][T19719] dump_stack_lvl+0xe8/0x140 [ 339.820092][T19719] dump_stack+0x15/0x1b [ 339.820109][T19719] should_fail_ex+0x265/0x280 [ 339.820131][T19719] ? audit_log_d_path+0x8d/0x150 [ 339.820151][T19719] should_failslab+0x8c/0xb0 [ 339.820176][T19719] __kmalloc_cache_noprof+0x4c/0x4a0 [ 339.820224][T19719] audit_log_d_path+0x8d/0x150 [ 339.820244][T19719] audit_log_d_path_exe+0x42/0x70 [ 339.820263][T19719] audit_log_task+0x1e9/0x250 [ 339.820358][T19719] audit_seccomp+0x61/0x100 [ 339.820472][T19719] ? __seccomp_filter+0x82d/0x1250 [ 339.820507][T19719] __seccomp_filter+0x83e/0x1250 [ 339.820531][T19719] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 339.820555][T19719] ? vfs_write+0x7e8/0x960 [ 339.820577][T19719] __secure_computing+0x82/0x150 [ 339.820639][T19719] syscall_trace_enter+0xcf/0x1e0 [ 339.820666][T19719] do_syscall_64+0xac/0x200 [ 339.820684][T19719] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 339.820708][T19719] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 339.820788][T19719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.820813][T19719] RIP: 0033:0x7fae6a9cd9dc [ 339.820826][T19719] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 339.820840][T19719] RSP: 002b:00007fae6942f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 339.820856][T19719] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cd9dc [ 339.820869][T19719] RDX: 000000000000000f RSI: 00007fae6942f0a0 RDI: 0000000000000003 [ 339.820880][T19719] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 339.820890][T19719] R10: 0000000060010002 R11: 0000000000000246 R12: 0000000000000002 [ 339.820901][T19719] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 339.820915][T19719] [ 340.072094][T19730] syzkaller0: entered promiscuous mode [ 340.077611][T19730] syzkaller0: entered allmulticast mode [ 340.117106][T19741] FAULT_INJECTION: forcing a failure. [ 340.117106][T19741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.130659][T19741] CPU: 0 UID: 0 PID: 19741 Comm: syz.6.4824 Not tainted syzkaller #0 PREEMPT(voluntary) [ 340.130682][T19741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 340.130695][T19741] Call Trace: [ 340.130701][T19741] [ 340.130709][T19741] __dump_stack+0x1d/0x30 [ 340.130734][T19741] dump_stack_lvl+0xe8/0x140 [ 340.130810][T19741] dump_stack+0x15/0x1b [ 340.130825][T19741] should_fail_ex+0x265/0x280 [ 340.130851][T19741] should_fail_alloc_page+0xf2/0x100 [ 340.130879][T19741] __alloc_frozen_pages_noprof+0xff/0x360 [ 340.131011][T19741] alloc_pages_mpol+0xb3/0x260 [ 340.131104][T19741] folio_alloc_mpol_noprof+0x39/0x80 [ 340.131123][T19741] shmem_get_folio_gfp+0x3cf/0xd60 [ 340.131153][T19741] shmem_fallocate+0x57c/0x840 [ 340.131253][T19741] vfs_fallocate+0x3b6/0x400 [ 340.131277][T19741] __x64_sys_fallocate+0x7a/0xd0 [ 340.131356][T19741] x64_sys_call+0x2518/0x3000 [ 340.131520][T19741] do_syscall_64+0xd2/0x200 [ 340.131536][T19741] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 340.131560][T19741] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 340.131661][T19741] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.131679][T19741] RIP: 0033:0x7efe7178efc9 [ 340.131693][T19741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.131711][T19741] RSP: 002b:00007efe701ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 340.131745][T19741] RAX: ffffffffffffffda RBX: 00007efe719e5fa0 RCX: 00007efe7178efc9 [ 340.131756][T19741] RDX: 0000000000000bf5 RSI: 0000000000000000 RDI: 0000000000000003 [ 340.131767][T19741] RBP: 00007efe701ef090 R08: 0000000000000000 R09: 0000000000000000 [ 340.131777][T19741] R10: 0000000002000402 R11: 0000000000000246 R12: 0000000000000001 [ 340.131787][T19741] R13: 00007efe719e6038 R14: 00007efe719e5fa0 R15: 00007ffee4eec358 [ 340.131802][T19741] [ 340.433264][T19756] FAULT_INJECTION: forcing a failure. [ 340.433264][T19756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.446422][T19756] CPU: 1 UID: 0 PID: 19756 Comm: syz.5.4829 Not tainted syzkaller #0 PREEMPT(voluntary) [ 340.446514][T19756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 340.446527][T19756] Call Trace: [ 340.446535][T19756] [ 340.446543][T19756] __dump_stack+0x1d/0x30 [ 340.446567][T19756] dump_stack_lvl+0xe8/0x140 [ 340.446587][T19756] dump_stack+0x15/0x1b [ 340.446605][T19756] should_fail_ex+0x265/0x280 [ 340.446623][T19756] should_fail+0xb/0x20 [ 340.446644][T19756] should_fail_usercopy+0x1a/0x20 [ 340.446724][T19756] _copy_from_user+0x1c/0xb0 [ 340.446814][T19756] __sys_bpf+0x183/0x7c0 [ 340.446838][T19756] __x64_sys_bpf+0x41/0x50 [ 340.446938][T19756] x64_sys_call+0x2aee/0x3000 [ 340.446960][T19756] do_syscall_64+0xd2/0x200 [ 340.446989][T19756] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 340.447019][T19756] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 340.447048][T19756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.447120][T19756] RIP: 0033:0x7fdf7473efc9 [ 340.447133][T19756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.447149][T19756] RSP: 002b:00007fdf7319f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 340.447168][T19756] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473efc9 [ 340.447180][T19756] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 340.447250][T19756] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 340.447272][T19756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.447290][T19756] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 340.447306][T19756] [ 340.691856][T19763] netlink: 'syz.5.4832': attribute type 9 has an invalid length. [ 340.699673][T19763] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4832'. [ 340.962011][T19774] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4837'. [ 341.048800][T19780] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4840'. [ 341.320692][T19796] FAULT_INJECTION: forcing a failure. [ 341.320692][T19796] name failslab, interval 1, probability 0, space 0, times 0 [ 341.333429][T19796] CPU: 1 UID: 0 PID: 19796 Comm: syz.0.4845 Not tainted syzkaller #0 PREEMPT(voluntary) [ 341.333516][T19796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 341.333526][T19796] Call Trace: [ 341.333531][T19796] [ 341.333538][T19796] __dump_stack+0x1d/0x30 [ 341.333560][T19796] dump_stack_lvl+0xe8/0x140 [ 341.333638][T19796] dump_stack+0x15/0x1b [ 341.333656][T19796] should_fail_ex+0x265/0x280 [ 341.333675][T19796] should_failslab+0x8c/0xb0 [ 341.333709][T19796] kmem_cache_alloc_noprof+0x50/0x480 [ 341.333737][T19796] ? getname_flags+0x80/0x3b0 [ 341.333784][T19796] getname_flags+0x80/0x3b0 [ 341.333828][T19796] do_readlinkat+0x64/0x320 [ 341.333849][T19796] __x64_sys_readlink+0x47/0x60 [ 341.333867][T19796] x64_sys_call+0x28de/0x3000 [ 341.333889][T19796] do_syscall_64+0xd2/0x200 [ 341.333907][T19796] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 341.333983][T19796] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 341.334006][T19796] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.334024][T19796] RIP: 0033:0x7fe7ba97efc9 [ 341.334036][T19796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.334053][T19796] RSP: 002b:00007fe7b93df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 341.334090][T19796] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97efc9 [ 341.334102][T19796] RDX: 000000000000100e RSI: 0000200000000540 RDI: 0000200000000200 [ 341.334113][T19796] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 341.334127][T19796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.334139][T19796] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 341.334156][T19796] [ 341.594008][T19808] xt_hashlimit: max too large, truncated to 1048576 [ 341.604352][T19808] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 341.638701][T19810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=19810 comm=syz.0.4850 [ 342.113239][T19838] bridge1: entered allmulticast mode [ 342.241369][ T3043] audit_log_start: 44012 callbacks suppressed [ 342.241385][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 342.254151][ T3043] audit: audit_lost=19267 audit_rate_limit=0 audit_backlog_limit=64 [ 342.262171][ T3043] audit: backlog limit exceeded [ 342.267180][T19845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 342.273711][T19845] audit: audit_lost=19268 audit_rate_limit=0 audit_backlog_limit=64 [ 342.281724][T19845] audit: backlog limit exceeded [ 342.287156][T19848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 342.293725][T19848] audit: audit_lost=19269 audit_rate_limit=0 audit_backlog_limit=64 [ 342.301836][T19848] audit: backlog limit exceeded [ 342.308219][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 342.317420][T19845] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4866'. [ 342.432259][T19847] FAULT_INJECTION: forcing a failure. [ 342.432259][T19847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.445422][T19847] CPU: 0 UID: 0 PID: 19847 Comm: syz.5.4867 Not tainted syzkaller #0 PREEMPT(voluntary) [ 342.445445][T19847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 342.445476][T19847] Call Trace: [ 342.445483][T19847] [ 342.445491][T19847] __dump_stack+0x1d/0x30 [ 342.445512][T19847] dump_stack_lvl+0xe8/0x140 [ 342.445530][T19847] dump_stack+0x15/0x1b [ 342.445546][T19847] should_fail_ex+0x265/0x280 [ 342.445631][T19847] should_fail+0xb/0x20 [ 342.445648][T19847] should_fail_usercopy+0x1a/0x20 [ 342.445665][T19847] _copy_to_user+0x20/0xa0 [ 342.445685][T19847] simple_read_from_buffer+0xb5/0x130 [ 342.445708][T19847] proc_fail_nth_read+0x10e/0x150 [ 342.445784][T19847] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 342.445809][T19847] vfs_read+0x1a8/0x770 [ 342.445833][T19847] ? __rcu_read_unlock+0x4f/0x70 [ 342.445916][T19847] ? __fget_files+0x184/0x1c0 [ 342.446081][T19847] ksys_read+0xda/0x1a0 [ 342.446103][T19847] __x64_sys_read+0x40/0x50 [ 342.446126][T19847] x64_sys_call+0x27c0/0x3000 [ 342.446162][T19847] do_syscall_64+0xd2/0x200 [ 342.446218][T19847] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 342.446244][T19847] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 342.446321][T19847] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.446338][T19847] RIP: 0033:0x7fdf7473d9dc [ 342.446354][T19847] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 342.446450][T19847] RSP: 002b:00007fdf7319f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 342.446469][T19847] RAX: ffffffffffffffda RBX: 00007fdf74995fa0 RCX: 00007fdf7473d9dc [ 342.446482][T19847] RDX: 000000000000000f RSI: 00007fdf7319f0a0 RDI: 0000000000000005 [ 342.446494][T19847] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 342.446506][T19847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.446519][T19847] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 342.446536][T19847] [ 342.798532][T19875] FAULT_INJECTION: forcing a failure. [ 342.798532][T19875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.811673][T19875] CPU: 0 UID: 0 PID: 19875 Comm: syz.0.4876 Not tainted syzkaller #0 PREEMPT(voluntary) [ 342.811700][T19875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 342.811711][T19875] Call Trace: [ 342.811718][T19875] [ 342.811801][T19875] __dump_stack+0x1d/0x30 [ 342.811821][T19875] dump_stack_lvl+0xe8/0x140 [ 342.811837][T19875] dump_stack+0x15/0x1b [ 342.811878][T19875] should_fail_ex+0x265/0x280 [ 342.811898][T19875] should_fail+0xb/0x20 [ 342.811912][T19875] should_fail_usercopy+0x1a/0x20 [ 342.811929][T19875] strncpy_from_user+0x25/0x230 [ 342.811995][T19875] ? kmem_cache_alloc_noprof+0x242/0x480 [ 342.812020][T19875] ? getname_flags+0x80/0x3b0 [ 342.812046][T19875] getname_flags+0xae/0x3b0 [ 342.812149][T19875] do_sys_openat2+0x60/0x110 [ 342.812170][T19875] __x64_sys_openat+0xf2/0x120 [ 342.812190][T19875] x64_sys_call+0x2eab/0x3000 [ 342.812231][T19875] do_syscall_64+0xd2/0x200 [ 342.812291][T19875] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 342.812365][T19875] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 342.812393][T19875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.812411][T19875] RIP: 0033:0x7fe7ba97efc9 [ 342.812495][T19875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.812511][T19875] RSP: 002b:00007fe7b93df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 342.812527][T19875] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97efc9 [ 342.812537][T19875] RDX: 0000000000804040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 342.812548][T19875] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 342.812587][T19875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.812599][T19875] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 342.812665][T19875] [ 342.832654][T19880] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4881'. [ 343.114766][T19906] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4887'. [ 343.958959][T19947] netlink: 'syz.5.4905': attribute type 10 has an invalid length. [ 343.991462][T19947] veth0_vlan: entered allmulticast mode [ 344.012216][T19947] veth0_vlan: left promiscuous mode [ 344.032586][T19947] veth0_vlan: entered promiscuous mode [ 344.061855][T19947] team0: Device veth0_vlan failed to register rx_handler [ 344.302705][T19975] FAULT_INJECTION: forcing a failure. [ 344.302705][T19975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.315969][T19975] CPU: 1 UID: 0 PID: 19975 Comm: syz.5.4918 Not tainted syzkaller #0 PREEMPT(voluntary) [ 344.315994][T19975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 344.316006][T19975] Call Trace: [ 344.316012][T19975] [ 344.316021][T19975] __dump_stack+0x1d/0x30 [ 344.316118][T19975] dump_stack_lvl+0xe8/0x140 [ 344.316138][T19975] dump_stack+0x15/0x1b [ 344.316156][T19975] should_fail_ex+0x265/0x280 [ 344.316174][T19975] should_fail+0xb/0x20 [ 344.316238][T19975] should_fail_usercopy+0x1a/0x20 [ 344.316258][T19975] _copy_from_user+0x1c/0xb0 [ 344.316282][T19975] kstrtouint_from_user+0x69/0xf0 [ 344.316326][T19975] ? 0xffffffff81000000 [ 344.316339][T19975] ? selinux_file_permission+0x1e4/0x320 [ 344.316364][T19975] proc_fail_nth_write+0x50/0x160 [ 344.316469][T19975] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 344.316495][T19975] vfs_write+0x269/0x960 [ 344.316580][T19975] ? vfs_read+0x4e6/0x770 [ 344.316599][T19975] ? __rcu_read_unlock+0x4f/0x70 [ 344.316652][T19975] ? __fget_files+0x184/0x1c0 [ 344.316678][T19975] ksys_write+0xda/0x1a0 [ 344.316708][T19975] __x64_sys_write+0x40/0x50 [ 344.316730][T19975] x64_sys_call+0x2802/0x3000 [ 344.316759][T19975] do_syscall_64+0xd2/0x200 [ 344.316775][T19975] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 344.316800][T19975] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 344.316878][T19975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.316900][T19975] RIP: 0033:0x7fdf7473da7f [ 344.316953][T19975] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 344.316966][T19975] RSP: 002b:00007fdf7319f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 344.316984][T19975] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdf7473da7f [ 344.316996][T19975] RDX: 0000000000000001 RSI: 00007fdf7319f0a0 RDI: 0000000000000003 [ 344.317008][T19975] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 344.317021][T19975] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 344.317095][T19975] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 344.317165][T19975] [ 345.639444][T20068] FAULT_INJECTION: forcing a failure. [ 345.639444][T20068] name failslab, interval 1, probability 0, space 0, times 0 [ 345.652293][T20068] CPU: 1 UID: 0 PID: 20068 Comm: syz.7.4958 Not tainted syzkaller #0 PREEMPT(voluntary) [ 345.652317][T20068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 345.652327][T20068] Call Trace: [ 345.652333][T20068] [ 345.652339][T20068] __dump_stack+0x1d/0x30 [ 345.652366][T20068] dump_stack_lvl+0xe8/0x140 [ 345.652405][T20068] dump_stack+0x15/0x1b [ 345.652431][T20068] should_fail_ex+0x265/0x280 [ 345.652447][T20068] should_failslab+0x8c/0xb0 [ 345.652473][T20068] kmem_cache_alloc_noprof+0x50/0x480 [ 345.652517][T20068] ? alloc_uid+0x106/0x370 [ 345.652541][T20068] alloc_uid+0x106/0x370 [ 345.652648][T20068] ? __sys_setuid+0xd1/0x310 [ 345.652668][T20068] __sys_setuid+0x12c/0x310 [ 345.652684][T20068] __x64_sys_setuid+0x1e/0x30 [ 345.652702][T20068] x64_sys_call+0x1a84/0x3000 [ 345.652743][T20068] do_syscall_64+0xd2/0x200 [ 345.652787][T20068] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 345.652808][T20068] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 345.652864][T20068] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.652884][T20068] RIP: 0033:0x7fae6a9cefc9 [ 345.652899][T20068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.652985][T20068] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000069 [ 345.653000][T20068] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 345.653011][T20068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000ee01 [ 345.653021][T20068] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 345.653032][T20068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.653056][T20068] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 345.653071][T20068] [ 345.955990][T20078] FAULT_INJECTION: forcing a failure. [ 345.955990][T20078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 345.969177][T20078] CPU: 1 UID: 0 PID: 20078 Comm: syz.9.4964 Not tainted syzkaller #0 PREEMPT(voluntary) [ 345.969200][T20078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 345.969248][T20078] Call Trace: [ 345.969255][T20078] [ 345.969264][T20078] __dump_stack+0x1d/0x30 [ 345.969286][T20078] dump_stack_lvl+0xe8/0x140 [ 345.969302][T20078] dump_stack+0x15/0x1b [ 345.969316][T20078] should_fail_ex+0x265/0x280 [ 345.969381][T20078] should_fail+0xb/0x20 [ 345.969457][T20078] should_fail_usercopy+0x1a/0x20 [ 345.969474][T20078] _copy_from_iter+0xd2/0xe80 [ 345.969495][T20078] ? should_failslab+0x8c/0xb0 [ 345.969521][T20078] ? __build_skb_around+0x1ab/0x200 [ 345.969578][T20078] ? __build_skb+0x59/0x70 [ 345.969600][T20078] ? is_vmalloc_addr+0x37/0x90 [ 345.969699][T20078] netlink_sendmsg+0x471/0x6b0 [ 345.969725][T20078] ? __pfx_netlink_sendmsg+0x10/0x10 [ 345.969765][T20078] __sock_sendmsg+0x145/0x180 [ 345.969789][T20078] sock_write_iter+0x1a7/0x1f0 [ 345.969813][T20078] ? __pfx_sock_write_iter+0x10/0x10 [ 345.969900][T20078] vfs_write+0x52a/0x960 [ 345.969924][T20078] ksys_write+0xda/0x1a0 [ 345.969997][T20078] __x64_sys_write+0x40/0x50 [ 345.970018][T20078] x64_sys_call+0x2802/0x3000 [ 345.970040][T20078] do_syscall_64+0xd2/0x200 [ 345.970121][T20078] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 345.970233][T20078] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 345.970257][T20078] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.970275][T20078] RIP: 0033:0x7f010b2eefc9 [ 345.970346][T20078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.970362][T20078] RSP: 002b:00007f0109d4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.970380][T20078] RAX: ffffffffffffffda RBX: 00007f010b545fa0 RCX: 00007f010b2eefc9 [ 345.970393][T20078] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000003 [ 345.970444][T20078] RBP: 00007f0109d4f090 R08: 0000000000000000 R09: 0000000000000000 [ 345.970493][T20078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.970504][T20078] R13: 00007f010b546038 R14: 00007f010b545fa0 R15: 00007ffd70e4f4b8 [ 345.970589][T20078] [ 346.253587][T20084] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4967'. [ 346.298562][T20088] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=20088 comm=syz.9.4970 [ 346.365077][T20094] macsec1: entered promiscuous mode [ 346.370315][T20094] bridge0: entered promiscuous mode [ 346.483191][T20118] netlink: 'syz.6.4984': attribute type 7 has an invalid length. [ 346.490997][T20118] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4984'. [ 346.514806][T20118] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 346.803574][T20152] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5001'. [ 346.836203][T20152] netlink: 'syz.7.5001': attribute type 15 has an invalid length. [ 347.172379][T20172] FAULT_INJECTION: forcing a failure. [ 347.172379][T20172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 347.185524][T20172] CPU: 0 UID: 0 PID: 20172 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 347.185552][T20172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 347.185565][T20172] Call Trace: [ 347.185572][T20172] [ 347.185580][T20172] __dump_stack+0x1d/0x30 [ 347.185605][T20172] dump_stack_lvl+0xe8/0x140 [ 347.185695][T20172] dump_stack+0x15/0x1b [ 347.185714][T20172] should_fail_ex+0x265/0x280 [ 347.185734][T20172] should_fail+0xb/0x20 [ 347.185750][T20172] should_fail_usercopy+0x1a/0x20 [ 347.185831][T20172] _copy_from_user+0x1c/0xb0 [ 347.185856][T20172] ___sys_sendmsg+0xc1/0x1d0 [ 347.185896][T20172] __x64_sys_sendmsg+0xd4/0x160 [ 347.186077][T20172] x64_sys_call+0x191e/0x3000 [ 347.186099][T20172] do_syscall_64+0xd2/0x200 [ 347.186184][T20172] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 347.186212][T20172] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 347.186248][T20172] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.186269][T20172] RIP: 0033:0x7fae6a9cefc9 [ 347.186285][T20172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.186317][T20172] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 347.186337][T20172] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 347.186350][T20172] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 347.186363][T20172] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 347.186413][T20172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.186424][T20172] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 347.186439][T20172] [ 347.255432][ T3043] audit_log_start: 27116 callbacks suppressed [ 347.255478][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 347.257861][ T29] audit: type=1400 audit(1761361260.984:160033): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 347.262259][ T3043] audit: audit_lost=22884 audit_rate_limit=0 audit_backlog_limit=64 [ 347.262273][ T3043] audit: backlog limit exceeded [ 347.266749][ T29] audit: type=1400 audit(1761361260.984:160034): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 347.266768][ T29] audit: type=1400 audit(1761361260.984:160035): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 347.266816][ T29] audit: type=1400 audit(1761361260.984:160036): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 347.276449][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 347.278592][ T29] audit: type=1400 audit(1761361260.984:160037): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 347.284531][ T3043] audit: audit_lost=22885 audit_rate_limit=0 audit_backlog_limit=64 [ 347.477410][T20185] netlink: 168 bytes leftover after parsing attributes in process `syz.9.5016'. [ 347.904751][T20234] FAULT_INJECTION: forcing a failure. [ 347.904751][T20234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 347.917896][T20234] CPU: 0 UID: 0 PID: 20234 Comm: syz.7.5038 Not tainted syzkaller #0 PREEMPT(voluntary) [ 347.917965][T20234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 347.918027][T20234] Call Trace: [ 347.918107][T20234] [ 347.918123][T20234] __dump_stack+0x1d/0x30 [ 347.918147][T20234] dump_stack_lvl+0xe8/0x140 [ 347.918166][T20234] dump_stack+0x15/0x1b [ 347.918183][T20234] should_fail_ex+0x265/0x280 [ 347.918282][T20234] should_fail+0xb/0x20 [ 347.918297][T20234] should_fail_usercopy+0x1a/0x20 [ 347.918318][T20234] _copy_from_user+0x1c/0xb0 [ 347.918341][T20234] ___sys_sendmsg+0xc1/0x1d0 [ 347.918445][T20234] __x64_sys_sendmsg+0xd4/0x160 [ 347.918476][T20234] x64_sys_call+0x191e/0x3000 [ 347.918498][T20234] do_syscall_64+0xd2/0x200 [ 347.918575][T20234] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 347.918598][T20234] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 347.918626][T20234] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.918646][T20234] RIP: 0033:0x7fae6a9cefc9 [ 347.918660][T20234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.918676][T20234] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 347.918696][T20234] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 347.918763][T20234] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 347.918775][T20234] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 347.918788][T20234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.918801][T20234] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 347.918832][T20234] [ 348.223912][T20263] xt_hashlimit: max too large, truncated to 1048576 [ 348.240524][T20266] netlink: 'syz.9.5051': attribute type 15 has an invalid length. [ 348.248470][T20266] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5051'. [ 348.261203][T20266] netlink: 'syz.9.5051': attribute type 15 has an invalid length. [ 348.261305][ T364] netdevsim netdevsim9 netdevsim0: set [0, 0] type 1 family 0 port 2816 - 0 [ 348.261348][T20266] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5051'. [ 348.315199][ T364] netdevsim netdevsim9 netdevsim1: set [0, 0] type 1 family 0 port 2816 - 0 [ 348.351213][ T364] netdevsim netdevsim9 netdevsim2: set [0, 0] type 1 family 0 port 2816 - 0 [ 348.361142][ T364] netdevsim netdevsim9 netdevsim3: set [0, 0] type 1 family 0 port 2816 - 0 [ 348.559295][T20305] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.566637][T20305] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.586366][T20311] FAULT_INJECTION: forcing a failure. [ 348.586366][T20311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 348.599640][T20311] CPU: 1 UID: 0 PID: 20311 Comm: syz.0.5073 Not tainted syzkaller #0 PREEMPT(voluntary) [ 348.599665][T20311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 348.599677][T20311] Call Trace: [ 348.599683][T20311] [ 348.599702][T20311] __dump_stack+0x1d/0x30 [ 348.599725][T20311] dump_stack_lvl+0xe8/0x140 [ 348.599746][T20311] dump_stack+0x15/0x1b [ 348.599764][T20311] should_fail_ex+0x265/0x280 [ 348.599788][T20311] should_fail+0xb/0x20 [ 348.599803][T20311] should_fail_usercopy+0x1a/0x20 [ 348.599891][T20311] _copy_to_user+0x20/0xa0 [ 348.599910][T20311] simple_read_from_buffer+0xb5/0x130 [ 348.599931][T20311] proc_fail_nth_read+0x10e/0x150 [ 348.600028][T20311] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 348.600052][T20311] vfs_read+0x1a8/0x770 [ 348.600111][T20311] ? __fget_files+0x184/0x1c0 [ 348.600134][T20311] ? __rcu_read_unlock+0x4f/0x70 [ 348.600188][T20311] ? __fget_files+0x184/0x1c0 [ 348.600214][T20311] ksys_read+0xda/0x1a0 [ 348.600237][T20311] __x64_sys_read+0x40/0x50 [ 348.600261][T20311] x64_sys_call+0x27c0/0x3000 [ 348.600306][T20311] do_syscall_64+0xd2/0x200 [ 348.600321][T20311] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 348.600401][T20311] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 348.600424][T20311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.600442][T20311] RIP: 0033:0x7fe7ba97d9dc [ 348.600454][T20311] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 348.600470][T20311] RSP: 002b:00007fe7b93df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 348.600515][T20311] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97d9dc [ 348.600598][T20311] RDX: 000000000000000f RSI: 00007fe7b93df0a0 RDI: 0000000000000003 [ 348.600612][T20311] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 348.600625][T20311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 348.600636][T20311] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 348.600651][T20311] [ 349.015580][T20305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 349.037641][T20347] FAULT_INJECTION: forcing a failure. [ 349.037641][T20347] name failslab, interval 1, probability 0, space 0, times 0 [ 349.050323][T20347] CPU: 0 UID: 0 PID: 20347 Comm: syz.0.5087 Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.050400][T20347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 349.050412][T20347] Call Trace: [ 349.050419][T20347] [ 349.050427][T20347] __dump_stack+0x1d/0x30 [ 349.050506][T20347] dump_stack_lvl+0xe8/0x140 [ 349.050603][T20347] dump_stack+0x15/0x1b [ 349.050621][T20347] should_fail_ex+0x265/0x280 [ 349.050657][T20347] should_failslab+0x8c/0xb0 [ 349.050679][T20347] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 349.050704][T20347] ? __alloc_skb+0x101/0x320 [ 349.050740][T20347] __alloc_skb+0x101/0x320 [ 349.050764][T20347] ? audit_log_start+0x342/0x720 [ 349.050781][T20347] audit_log_start+0x3a0/0x720 [ 349.050878][T20347] audit_seccomp+0x48/0x100 [ 349.050908][T20347] ? __seccomp_filter+0x82d/0x1250 [ 349.050929][T20347] __seccomp_filter+0x83e/0x1250 [ 349.050951][T20347] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 349.051030][T20347] ? vfs_write+0x7e8/0x960 [ 349.051052][T20347] ? __rcu_read_unlock+0x4f/0x70 [ 349.051073][T20347] ? __rcu_read_unlock+0x4f/0x70 [ 349.051108][T20305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 349.051095][T20347] __secure_computing+0x82/0x150 [ 349.051144][T20347] syscall_trace_enter+0xcf/0x1e0 [ 349.051166][T20347] do_syscall_64+0xac/0x200 [ 349.051181][T20347] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 349.051225][T20347] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 349.051253][T20347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.051329][T20347] RIP: 0033:0x7fe7ba97d9dc [ 349.051344][T20347] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 349.051361][T20347] RSP: 002b:00007fe7b93df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 349.051380][T20347] RAX: ffffffffffffffda RBX: 00007fe7babd5fa0 RCX: 00007fe7ba97d9dc [ 349.051422][T20347] RDX: 000000000000000f RSI: 00007fe7b93df0a0 RDI: 0000000000000003 [ 349.051434][T20347] RBP: 00007fe7b93df090 R08: 0000000000000000 R09: 0000000000000000 [ 349.051446][T20347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.051458][T20347] R13: 00007fe7babd6038 R14: 00007fe7babd5fa0 R15: 00007fffc3353568 [ 349.051475][T20347] [ 349.283232][T20305] veth0_vlan: left allmulticast mode [ 349.299100][T20305] vlan2: left allmulticast mode [ 349.359964][ T42] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.400091][ T42] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.442763][ T42] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.469403][ T42] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.586007][T20371] FAULT_INJECTION: forcing a failure. [ 349.586007][T20371] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.599099][T20371] CPU: 1 UID: 0 PID: 20371 Comm: syz.5.5099 Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.599136][T20371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 349.599148][T20371] Call Trace: [ 349.599156][T20371] [ 349.599164][T20371] __dump_stack+0x1d/0x30 [ 349.599186][T20371] dump_stack_lvl+0xe8/0x140 [ 349.599205][T20371] dump_stack+0x15/0x1b [ 349.599303][T20371] should_fail_ex+0x265/0x280 [ 349.599320][T20371] should_fail+0xb/0x20 [ 349.599334][T20371] should_fail_usercopy+0x1a/0x20 [ 349.599422][T20371] _copy_from_user+0x1c/0xb0 [ 349.599442][T20371] kstrtouint_from_user+0x69/0xf0 [ 349.599460][T20371] ? 0xffffffff81000000 [ 349.599472][T20371] ? selinux_file_permission+0x1e4/0x320 [ 349.599526][T20371] proc_fail_nth_write+0x50/0x160 [ 349.599621][T20371] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 349.599645][T20371] vfs_write+0x269/0x960 [ 349.599671][T20371] ? vfs_read+0x4e6/0x770 [ 349.599690][T20371] ? __rcu_read_unlock+0x4f/0x70 [ 349.599827][T20371] ? __fget_files+0x184/0x1c0 [ 349.599849][T20371] ksys_write+0xda/0x1a0 [ 349.599871][T20371] __x64_sys_write+0x40/0x50 [ 349.599896][T20371] x64_sys_call+0x2802/0x3000 [ 349.599988][T20371] do_syscall_64+0xd2/0x200 [ 349.600004][T20371] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 349.600059][T20371] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 349.600084][T20371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.600101][T20371] RIP: 0033:0x7fdf7473da7f [ 349.600114][T20371] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 349.600129][T20371] RSP: 002b:00007fdf7319f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 349.600201][T20371] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdf7473da7f [ 349.600214][T20371] RDX: 0000000000000001 RSI: 00007fdf7319f0a0 RDI: 0000000000000006 [ 349.600224][T20371] RBP: 00007fdf7319f090 R08: 0000000000000000 R09: 0000000000000000 [ 349.600240][T20371] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 349.600250][T20371] R13: 00007fdf74996038 R14: 00007fdf74995fa0 R15: 00007ffd770d65c8 [ 349.600265][T20371] [ 349.914991][T20377] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 349.944444][T20392] --map-set only usable from mangle table [ 350.034336][ T364] Bluetooth: hci2: Frame reassembly failed (-84) [ 350.659580][T20402] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5111'. [ 350.692793][T20404] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5112'. [ 351.001454][T20398] Bluetooth: hci0: command 0x1003 tx timeout [ 351.001464][T13038] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 351.030914][T20413] FAULT_INJECTION: forcing a failure. [ 351.030914][T20413] name failslab, interval 1, probability 0, space 0, times 0 [ 351.043705][T20413] CPU: 1 UID: 0 PID: 20413 Comm: syz.7.5116 Not tainted syzkaller #0 PREEMPT(voluntary) [ 351.043729][T20413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 351.043740][T20413] Call Trace: [ 351.043746][T20413] [ 351.043754][T20413] __dump_stack+0x1d/0x30 [ 351.043841][T20413] dump_stack_lvl+0xe8/0x140 [ 351.043858][T20413] dump_stack+0x15/0x1b [ 351.043873][T20413] should_fail_ex+0x265/0x280 [ 351.043889][T20413] should_failslab+0x8c/0xb0 [ 351.043915][T20413] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 351.043997][T20413] ? __alloc_skb+0x101/0x320 [ 351.044035][T20413] __alloc_skb+0x101/0x320 [ 351.044057][T20413] ? audit_log_start+0x342/0x720 [ 351.044077][T20413] audit_log_start+0x3a0/0x720 [ 351.044094][T20413] ? kstrtouint+0x76/0xc0 [ 351.044187][T20413] audit_seccomp+0x48/0x100 [ 351.044216][T20413] ? __seccomp_filter+0x82d/0x1250 [ 351.044239][T20413] __seccomp_filter+0x83e/0x1250 [ 351.044317][T20413] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 351.044360][T20413] ? vfs_write+0x7e8/0x960 [ 351.044388][T20413] __secure_computing+0x82/0x150 [ 351.044461][T20413] syscall_trace_enter+0xcf/0x1e0 [ 351.044486][T20413] do_syscall_64+0xac/0x200 [ 351.044507][T20413] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 351.044671][T20413] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 351.044698][T20413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.044719][T20413] RIP: 0033:0x7fae6a9cefc9 [ 351.044772][T20413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.044789][T20413] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e5 [ 351.044809][T20413] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 351.044822][T20413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.044834][T20413] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 351.044875][T20413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 351.044886][T20413] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 351.044901][T20413] [ 351.271030][T20415] netlink: 'syz.9.5117': attribute type 10 has an invalid length. [ 351.281979][T20415] team0 (unregistering): Port device team_slave_0 removed [ 351.298757][T20417] FAULT_INJECTION: forcing a failure. [ 351.298757][T20417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 351.311838][T20417] CPU: 1 UID: 0 PID: 20417 Comm: syz.7.5118 Not tainted syzkaller #0 PREEMPT(voluntary) [ 351.311865][T20417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 351.311877][T20417] Call Trace: [ 351.311885][T20417] [ 351.311894][T20417] __dump_stack+0x1d/0x30 [ 351.312003][T20417] dump_stack_lvl+0xe8/0x140 [ 351.312023][T20417] dump_stack+0x15/0x1b [ 351.312040][T20417] should_fail_ex+0x265/0x280 [ 351.312059][T20417] should_fail+0xb/0x20 [ 351.312075][T20417] should_fail_usercopy+0x1a/0x20 [ 351.312096][T20417] _copy_from_user+0x1c/0xb0 [ 351.312116][T20417] ___sys_sendmsg+0xc1/0x1d0 [ 351.312174][T20417] __sys_sendmmsg+0x178/0x300 [ 351.312208][T20417] __x64_sys_sendmmsg+0x57/0x70 [ 351.312226][T20417] x64_sys_call+0x1c4a/0x3000 [ 351.312280][T20417] do_syscall_64+0xd2/0x200 [ 351.312298][T20417] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 351.312325][T20417] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 351.312350][T20417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.312415][T20417] RIP: 0033:0x7fae6a9cefc9 [ 351.312447][T20417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.312464][T20417] RSP: 002b:00007fae6942f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 351.312482][T20417] RAX: ffffffffffffffda RBX: 00007fae6ac25fa0 RCX: 00007fae6a9cefc9 [ 351.312501][T20417] RDX: 0000000000000001 RSI: 0000200000000780 RDI: 0000000000000003 [ 351.312513][T20417] RBP: 00007fae6942f090 R08: 0000000000000000 R09: 0000000000000000 [ 351.312525][T20417] R10: 0000000004008804 R11: 0000000000000246 R12: 0000000000000001 [ 351.312538][T20417] R13: 00007fae6ac26038 R14: 00007fae6ac25fa0 R15: 00007fff5da6bc78 [ 351.312632][T20417] [ 351.312902][T20415] team0 (unregistering): Port device team_slave_1 removed [ 351.501356][T19943] ================================================================== [ 351.509465][T19943] BUG: KCSAN: data-race in fill_mg_cmtime / inode_set_ctime_current [ 351.517454][T19943] [ 351.519773][T19943] write to 0xffff888103862c80 of 8 bytes by task 19941 on cpu 0: [ 351.527479][T19943] inode_set_ctime_current+0x533/0x770 [ 351.532946][T19943] shmem_mknod+0x11b/0x180 [ 351.537361][T19943] shmem_create+0x34/0x50 [ 351.541683][T19943] path_openat+0x1105/0x2170 [ 351.546266][T19943] do_filp_open+0x109/0x230 [ 351.550763][T19943] do_sys_openat2+0xa6/0x110 [ 351.555341][T19943] __x64_sys_openat+0xf2/0x120 [ 351.560099][T19943] x64_sys_call+0x2eab/0x3000 [ 351.564777][T19943] do_syscall_64+0xd2/0x200 [ 351.569280][T19943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.575172][T19943] [ 351.577484][T19943] read to 0xffff888103862c80 of 8 bytes by task 19943 on cpu 1: [ 351.585103][T19943] fill_mg_cmtime+0x86/0x260 [ 351.589694][T19943] generic_fillattr+0x24a/0x340 [ 351.594550][T19943] shmem_getattr+0x181/0x200 [ 351.599175][T19943] vfs_getattr_nosec+0x146/0x1e0 [ 351.604107][T19943] vfs_statx+0x113/0x390 [ 351.608347][T19943] vfs_fstatat+0x115/0x170 [ 351.612855][T19943] __se_sys_newfstatat+0x55/0x260 [ 351.617904][T19943] __x64_sys_newfstatat+0x55/0x70 [ 351.622949][T19943] x64_sys_call+0x135a/0x3000 [ 351.627628][T19943] do_syscall_64+0xd2/0x200 [ 351.632131][T19943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.638023][T19943] [ 351.640334][T19943] value changed: 0x0000000068fc3d6f -> 0x0000000068fc3d71 [ 351.647433][T19943] [ 351.649760][T19943] Reported by Kernel Concurrency Sanitizer on: [ 351.655914][T19943] CPU: 1 UID: 0 PID: 19943 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 351.665285][T19943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 351.675329][T19943] ================================================================== [ 351.962846][ T3570] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 352.041298][ T3570] Bluetooth: hci2: command 0x1003 tx timeout [ 352.041367][ T44] Bluetooth: hci2: Opcode 0x1003 failed: -110 [ 352.261240][ T29] kauditd_printk_skb: 44999 callbacks suppressed [ 352.261254][ T29] audit: type=1400 audit(1761361266.044:184145): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 352.267516][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 352.267707][ T29] audit: type=1400 audit(1761361266.054:184146): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 352.288959][ T3043] audit: audit_lost=29851 audit_rate_limit=0 audit_backlog_limit=64 [ 352.295485][ T29] audit: type=1400 audit(1761361266.054:184147): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 352.316768][ T3043] audit: backlog limit exceeded [ 352.324752][ T29] audit: type=1400 audit(1761361266.054:184148): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 352.348333][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 352.350875][ T29] audit: type=1400 audit(1761361266.054:184149): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 352.372092][ T3043] audit: audit_lost=29852 audit_rate_limit=0 audit_backlog_limit=64 [ 357.271683][ T29] kauditd_printk_skb: 56720 callbacks suppressed [ 357.271695][ T29] audit: type=1400 audit(1761361271.064:240605): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 357.277522][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 357.278079][ T29] audit: type=1400 audit(1761361271.064:240606): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 357.299374][ T3043] audit: audit_lost=29941 audit_rate_limit=0 audit_backlog_limit=64 [ 357.299392][ T3043] audit: backlog limit exceeded [ 357.305906][ T29] audit: type=1400 audit(1761361271.064:240607): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 357.327576][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 357.335036][ T29] audit: type=1400 audit(1761361271.064:240608): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 357.339861][ T3043] audit: audit_lost=29942 audit_rate_limit=0 audit_backlog_limit=64 [ 357.361122][ T29] audit: type=1400 audit(1761361271.064:240609): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0