last executing test programs: 3.398930988s ago: executing program 0 (id=11619): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000001a40)=@newqdisc={0x58, 0x24, 0xd0f, 0x70bd2d, 0x3, {0x60, 0x0, 0x0, r3, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0xa, 0x0, 0x5, 0x0, 0x9, 0x10000}}, {0x4}}]}, @qdisc_kind_options=@q_drr={0x8}, @TCA_RATE={0x6, 0x5, {0x6, 0x62}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000011c0), 0x2401, 0x0) write$P9_RWALK(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="30ff95fe11"], 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x5, 0x0, 0x9, 0x2200, 0xffffffffffffffff, 0x80000001, '\x00', r3, r4, 0x0, 0x3, 0x3, 0xf}, 0x50) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01072bbd70e44000000005"], 0x14}, 0x1, 0x0, 0x0, 0x40c0}, 0x4000090) syz_io_uring_submit(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r0) 3.14455072s ago: executing program 0 (id=11621): write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x4, @loopback}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @private=0xa010102}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8004}, 0x0) 3.143927631s ago: executing program 0 (id=11622): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$kcm(0x23, 0x5, 0x0) pipe2$9p(&(0x7f0000000000), 0x80080) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x1c}], 0x4) r5 = socket$kcm(0x2, 0xa, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000080)={0x0, 'syzkaller1\x00', {0x4}, 0x1}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @link_local}) syslog(0x2, &(0x7f0000000040)=""/10, 0xa) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) pwrite64(r0, &(0x7f0000000580)="00a3bc376376862f5c5dc232386e4462b1b5615a286e8a6c7e9657fd1a020ff071fe33128852c85251845f6925695589a56aaafcfbc088dce6eb41e827c21a3d6d848121d9fc5b371c5ff28276174a740618680eb616e6e505803f1e5a96b3c706f79804f7f10660664a7155fe77ce70da97a18001e0ed04d5931598ef9624639e22904ec4b16cc313a681190ac41b0318ea23131968", 0x96, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x19, 0x2, 0x6, 0x2, 0x2130, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x5, 0x2, 0x4}, 0x50) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x1000}], 0x1, 0x0, 0x0, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0xfffffda5, &(0x7f0000000280)={&(0x7f0000000480)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0xf, 0x1}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0xa}, @qdisc_kind_options=@q_sfb={{}, {0x0, 0x2, @TCA_SFB_PARMS={0x0, 0x1, {0x227, 0x7, 0x8, 0x7fff, 0x1, 0xc, 0x8, 0x7fff, 0x1}}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x804}, 0x44800) 2.284468807s ago: executing program 2 (id=11638): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}, 0x1, 0x0, 0x0, 0x4000810}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'geneve0\x00', {0x2, 0x4e24, @loopback}}) 2.264544859s ago: executing program 2 (id=11639): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8ff20c2c10f0093d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) io_setup(0xb, &(0x7f00000003c0)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f00000000000000001400020002000000ffffff53a2513743897e44000d0001007564703aa3"], 0x54}}, 0x0) 2.25548698s ago: executing program 3 (id=11641): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x80) fchdir(r1) symlink(&(0x7f0000000300)='./file0/../file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r2 = syz_io_uring_setup(0x109, &(0x7f0000000140)={0x0, 0x114df, 0x0, 0x1, 0x87}, &(0x7f00000000c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r1, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x29c780}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r5, 0x0, 0x401}, 0x11) io_uring_enter(r2, 0x3518, 0xaddf, 0x2, 0x0, 0x0) 2.197185145s ago: executing program 0 (id=11644): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2, 0xfffffffc, @empty, 0x80000001}, 0x1c) r1 = dup(r0) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) (fail_nth: 3) 2.009642292s ago: executing program 2 (id=11645): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000085e3ffff6c000000180100002000002020207b1af8138920d3d4c28557313200000005000000b70300000000000000000000000000000183d265da062c3f3c786bae47ae0000000004276f30035de0ae41aecc99aa3208e7a8"], &(0x7f0000001480)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000980)=0xfffffffffffffffa) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="280000001800010000000000000000000200000008000000e00000020c00088008000c00", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r4, &(0x7f0000000700)) r5 = socket$inet(0xa, 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r8, &(0x7f0000000000)={0x18, 0x0, {0x1, @empty, 'lo\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x4, @empty, 'ip_vti0\x00'}}, 0x1e) close(r8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x7fffffff, 0x18f, 0xc6}, 0x9c) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @empty, 0x3}, 0x1c) sendto$inet6(r6, &(0x7f0000847fff)='X', 0x34000, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r9, 0xffffffffffffffff, 0x0) pidfd_send_signal(r1, 0x8, &(0x7f0000000180)={0x2f, 0x3, 0x6}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000880)='sys_enter\x00', r11}, 0x18) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0xfffffffffffffe7c, 0x0, 0x0) capget(&(0x7f0000000740)={0x20080522, r3}, &(0x7f0000000780)={0x7d, 0x9, 0xe1, 0x46, 0x1, 0xff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800a420c594e5800000000000003200000032000000020000000e0000000300000f020000000100000000000000e65b00000500000000"], 0x0, 0x4e, 0x0, 0x8, 0x8}, 0x28) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x3c8, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000200)={@empty, 0x71}) 1.704532769s ago: executing program 0 (id=11648): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES8, @ANYRES64, @ANYRESDEC=0x0, @ANYRESHEX], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000000c001e"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4008050) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES16=r1, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newqdisc={0x2c, 0x24, 0x1, 0x70bd2a, 0x25dfcbfe, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0xfff1}, {0xa, 0xffff}, {0x5}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r2], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYRES16=0x0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0xfffffffffffff001}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x12c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r7 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000840)='./file0\x00', &(0x7f0000000080), 0x18) utimensat(r7, 0x0, 0x0, 0x0) r8 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r8, 0x29, 0x37, &(0x7f0000000140)=@fragment={0xb6, 0x0, 0x92, 0x0, 0x0, 0x1b, 0x65}, 0x8) sendto$inet6(r8, 0x0, 0x0, 0x404cc40, &(0x7f0000000380)={0xa, 0x4e22, 0xffffff7c, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x7}, 0x1c) r9 = dup(r3) msgget$private(0x0, 0x0) syz_clone(0x4a01080, &(0x7f0000000200)="de2c7fa4f0b286ff102d61fcffb8a40d34610a39d9a3a6ee14b10736eb6b32a6475d3dd819bd8b59bbd11640", 0x2c, &(0x7f0000000400), &(0x7f0000000440), &(0x7f00000004c0)="58889e80c1e9e13e5b946b93f90690fbed8e80098da2f88814dcc0fc4a500c91f18cc7065f1f31be7dbd725c6fdcc83ae78cb6f37c2337fadf80658f3af071f2fd88d2c4d5fe2a2281c78992f52833aa9247c2ceb14a4d5e3d146c4b4981cc6510968785ecba3d4ff64eb5059845a37b0e8fa6d2cd0829dfc5bae0e1d5cd5513ff0017a82a3b0696bf1fd773496d29ac71a2bea6dadf0f75e3eb910d7db9714ec6865f3f3d331707a1d08d4c93fd176c96237166e7e9a75eb134eb07eb883e75572c2e36175ba37c58ebd9040261e58534665480f306d3272b19d3e3922ad635c98e27dd8c43b49b86edf440f28695ef95abad") getuid() statx(r9, &(0x7f0000000000)='./file0\x00', 0x100, 0x10, &(0x7f0000000040)) 1.631529765s ago: executing program 0 (id=11649): socket$netlink(0x10, 0x3, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = mq_open(&(0x7f0000001600)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\aXg\xbb\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x8a=\x0f\n*\x8a\x99\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5\x00\x00\x00\x00\x00\x00\x00\x01\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbbV\x1a\x8a\x03#T\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8', 0x40, 0xb, 0x0) fcntl$setlease(r1, 0x400, 0x0) mq_open(&(0x7f0000000780)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\xc0\x00\t\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x2, 0x136, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) 1.600062278s ago: executing program 3 (id=11650): r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x7, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x15c, 0x9, 0x6, 0x301, 0x0, 0x0, {0x17, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x7fffffff}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_COMMENT={0xa, 0x1a, '(#^#:\x00'}]}, @IPSET_ATTR_DATA={0x4c, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x9}, @IPSET_ATTR_IFACE={0x14, 0x17, 'erspan0\x00'}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010100}}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xe}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x81}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_COMMENT={0x12, 0x1a, '[[!!{a*@\xf9^{}@\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}]}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x101}}]}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_COMMENT={0xb, 0x1a, '+\'!%\xda\xda&'}]}, @IPSET_ATTR_ADT={0x64, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x13, 0x1a, 'key_or_keyring:'}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x411}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x5, 0x1a, '\x00'}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40}, 0x24000091) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) syz_emit_ethernet(0x295, &(0x7f0000000540)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x21, 0x4, 0x0, 0x9, 0x287, 0x66, 0x0, 0xff, 0x2f, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp={0x44, 0x10, 0x38, 0x0, 0xf, [0x1b9b2427, 0x4, 0x0]}, @cipso={0x86, 0x15, 0x3, [{0x6, 0xf, "b5002f9638acfe4bbd6b14738a"}]}, @cipso={0x86, 0x4a, 0x3, [{0x3, 0x10, "5341283224975cb21f5ee78b5c51"}, {0x1, 0xb, "658c094128a12b7463"}, {0x7, 0x8, "3e1dcadcae52"}, {0x0, 0xf, "f9c1fe826591e4f5795d281846"}, {0x0, 0xd, "e02adb542d2073a8a90932"}, {0x5, 0x5, "a46b29"}]}]}}, {{0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x880b, 0xfb, 0x2, [0x7], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "2a6d8e2d19"}, {0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x86dd, [0x76, 0x1000], "afe21ce059398e31495baf164172bf382fbb787a6e2068977d44671ef527"}, {0x8, 0x88be, 0x4, {{0x6, 0x1, 0x40, 0x1, 0x1, 0x1, 0x5, 0x9}, 0x1, {0x10}}}, {0x8, 0x22eb, 0x0, {{0x2, 0x2, 0x2, 0x0, 0x1, 0x1, 0x0, 0x5}, 0x2, {0xee1, 0x5, 0x2, 0x1a, 0x1, 0x0, 0x1}}}, {0x8, 0x6558, 0x1, "10f6deea52b4135d5817d399ad717b9f12424ae6ef621ad52683e255e6e599e953ae099166dbf7ed4ac8c04cb2ef1f980efe1a507375a8784f5eafffec6c1092aaaf7a15cf115e0e1cea016ad46c4254949d795db949c4322c68a466756b8aa0d9ac534d46cc9318e341e4e014b6a1c4753964f34f0755e5194a73d36381fe4151717654abeb9e04e2f75b3c1bf625ca2b660eb6eeb332b4e98c50"}}}}}}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001040)={0xc, {"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", 0x1000}}, 0x1006) 1.57921214s ago: executing program 2 (id=11651): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x80) fchdir(r1) symlink(&(0x7f0000000300)='./file0/../file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r2 = syz_io_uring_setup(0x109, &(0x7f0000000140)={0x0, 0x114df, 0x0, 0x1, 0x87}, &(0x7f00000000c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r1, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x29c780}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r5, 0x0, 0x401}, 0x11) io_uring_enter(r2, 0x3518, 0xaddf, 0x2, 0x0, 0x0) 1.554729612s ago: executing program 3 (id=11652): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x20000223, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095", @ANYRESOCT=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = mq_open(&(0x7f0000001600)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\aXg\xbb\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x8a=\x0f\n*\x8a\x99\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5\x00\x00\x00\x00\x00\x00\x00\x01\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbbV\x1a\x8a\x03#T\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8', 0x40, 0xb, 0x0) fcntl$setlease(r0, 0x400, 0x0) mq_open(&(0x7f0000000780)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\xc0\x00\t\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x2, 0x136, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b000000000000000000000000800000000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) 1.427669364s ago: executing program 1 (id=11654): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x800000, 0x2, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='mmap_lock_acquire_returned\x00', r4}, 0x18) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r5 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x21891d, &(0x7f0000000500)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000}}, {@noblock_validity}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000}}, {@resgid={'resgid', 0x3d, r1}}, {@noinit_itable}, {@quota}, {@noauto_da_alloc}, {@sysvgroups}, {@resgid, 0x32}]}, 0x1, 0x4e8, &(0x7f0000000f40)="$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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) getgid() setgroups(0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010006000000000002000100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r0, @ANYBLOB="02000000", @ANYRES32=r0, @ANYBLOB="02000200", @ANYRES32=r0, @ANYBLOB="040001000000000008000000", @ANYRES8=r5, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB="10000400000000002000060000000000"], 0x74, 0x2) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000300)={0x1, 0x0, 0x9, 0x5, @vifc_lcl_addr=@broadcast, @loopback}, 0x10) r8 = socket$tipc(0x1e, 0x5, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000003c0)={0x4, 0x28, '\x00', 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0]}) bind$tipc(r8, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x0, 0xfffffffd}}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r9 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r9, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e24}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00"/11], 0x50) 1.229610561s ago: executing program 2 (id=11657): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r4 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000017c0)=r3, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x10}, 0x50) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x789, &(0x7f0000000fc0)="$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") creat(&(0x7f00000000c0)='./file0\x00', 0x81) sendmsg$nl_route(r4, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=@newnexthop={0x18, 0x68, 0x400, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x41f74ddd2b1ea6a9, 0x0, 0x9}}, 0x18}, 0x1, 0x0, 0x0, 0x200608a0}, 0x40040d0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd_index=0x3, 0xffffffffffffffff, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r0, 0x627, 0x4c1, 0x43, 0x0, 0x30) 1.147122608s ago: executing program 1 (id=11658): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0, 0x50}}, 0x20000010) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) getgid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000004000000000000000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x14, 0x10, &(0x7f0000000880)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b70800000c0000997b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000ff040000f0ffffffb71e7275ab1943ab79afa3", @ANYRES16=r2], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000001c0)='afs_cb_break\x00', r3, 0x0, 0x400000040}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x6004040) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r6, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"/267], 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$RTC_RD_TIME(r7, 0x80247009, &(0x7f0000000600)) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_OSF_TTL={0x5, 0x2, 0xe}]}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x6c}, 0x1, 0x0, 0x0, 0x4000850}, 0x20000040) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}, {0x2}}}, 0x24}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r11, 0x0, 0x2}, 0x18) 968.117084ms ago: executing program 1 (id=11662): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000085e3ffff6c000000180100002000002020207b1af8138920d3d4c28557313200000005000000b70300000000000000000000000000000183d265da062c3f3c786bae47ae0000000004276f30035de0ae41aecc99aa3208e7a8"], &(0x7f0000001480)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000980)=0xfffffffffffffffa) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="280000001800010000000000000000000200000008000000e00000020c00088008000c00", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r4, &(0x7f0000000700)) r5 = socket$inet(0xa, 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r8, &(0x7f0000000000)={0x18, 0x0, {0x1, @empty, 'lo\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x4, @empty, 'ip_vti0\x00'}}, 0x1e) close(r8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x7fffffff, 0x18f, 0xc6}, 0x9c) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @empty, 0x3}, 0x1c) sendto$inet6(r6, &(0x7f0000847fff)='X', 0x34000, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r9, 0xffffffffffffffff, 0x0) pidfd_send_signal(r1, 0x8, &(0x7f0000000180)={0x2f, 0x3, 0x6}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000880)='sys_enter\x00', r11}, 0x18) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0xfffffffffffffe7c, 0x0, 0x0) capget(&(0x7f0000000740)={0x20080522, r3}, &(0x7f0000000780)={0x7d, 0x9, 0xe1, 0x46, 0x1, 0xff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800a420c594e5800000000000003200000032000000020000000e0000000300000f020000000100000000000000e65b00000500000000"], 0x0, 0x4e, 0x0, 0x8, 0x8}, 0x28) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x3c8, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000200)={@empty, 0x71}) 814.875768ms ago: executing program 1 (id=11664): socket$inet(0xa, 0x1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf593}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) syz_io_uring_setup(0x110, &(0x7f0000000380)={0x0, 0x5885, 0x102, 0x2, 0xffeffc03}, &(0x7f0000000340)=0x0, &(0x7f0000000240)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000180), 0xfa, 0x58f, &(0x7f0000002d00)="$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") r2 = creat(&(0x7f0000000000)='./file1\x00', 0x14c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000fdffffffffffffff000007000000060000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) fallocate(r2, 0x0, 0x9, 0x2000403) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x64) pwritev2(r3, &(0x7f0000000100)=[{&(0x7f0000000340)="a39526145ea437121e9191ada5211b2c7b10eb618248a8d05e4ba3968633d10d5892da8baff78e605a610e7673e571277efcf531ec434ca60c831f5e7b7ee72b3014964f6f8d64cc2ab7600b00000a00000000001949a13f3a08c1d5f27fbbab2ec9997774a1b990afb7", 0x6a}], 0x1, 0x5412, 0x0, 0x0) 690.743449ms ago: executing program 3 (id=11665): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) io_setup(0xb, &(0x7f00000003c0)=0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) io_submit(r2, 0x2, &(0x7f0000000a80)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r3, 0x0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x8, 0x9, r3, &(0x7f0000000380)="ba419f8d4fda55572b", 0x9, 0x8, 0x0, 0x0, r3}]) 689.184169ms ago: executing program 4 (id=11666): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000085e3ffff6c000000180100002000002020207b1af8138920d3d4c285573132000000050000"], &(0x7f0000001480)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000980)=0xfffffffffffffffa) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="280000001800010000000000000000000200000008000000e00000020c00088008000c00", @ANYRES32=r4, @ANYBLOB="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"], 0x28}}, 0x0) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r4, &(0x7f0000000700)) r5 = socket$inet(0xa, 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = socket$pppoe(0x18, 0x1, 0x0) r9 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r9, &(0x7f0000000000)={0x18, 0x0, {0x1, @empty, 'lo\x00'}}, 0x1e) connect$pppoe(r8, &(0x7f0000000080)={0x18, 0x0, {0x4, @empty, 'ip_vti0\x00'}}, 0x1e) close(r9) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x7fffffff, 0x18f, 0xc6}, 0x9c) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @empty, 0x3}, 0x1c) sendto$inet6(r6, &(0x7f0000847fff)='X', 0x34000, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r10, 0xffffffffffffffff, 0x0) pidfd_send_signal(r1, 0x8, &(0x7f0000000180)={0x2f, 0x3, 0x6}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000880)='sys_enter\x00', r11}, 0x18) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0xfffffffffffffe7c, 0x0, 0x0) capget(&(0x7f0000000740)={0x20080522, r3}, &(0x7f0000000780)={0x7d, 0x9, 0xe1, 0x46, 0x1, 0xff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800a420c594e5800000000000003200000032000000020000000e0000000300000f020000000100000000000000e65b000005000000000000000500000002000000fbffffff09000000"], 0x0, 0x4e, 0x0, 0x8, 0x8}, 0x28) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x3c8, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000200)={@empty, 0x71}) 540.160393ms ago: executing program 3 (id=11667): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x80) fchdir(r1) symlink(&(0x7f0000000300)='./file0/../file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r2 = syz_io_uring_setup(0x109, &(0x7f0000000140)={0x0, 0x114df, 0x0, 0x1, 0x87}, &(0x7f00000000c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r1, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x29c780}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r5, 0x0, 0x401}, 0x11) io_uring_enter(r2, 0x3518, 0xaddf, 0x2, 0x0, 0x0) 464.711879ms ago: executing program 4 (id=11668): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x34, 0x0, @void}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x200000a0) sendmmsg(r3, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000400"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000180)=[{0x5, 0x4, 0xd, 0x6}, {0x4, 0x4, 0x3, 0x2}], 0x10, 0x26}, 0x94) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7040010000000f00002008000300", @ANYRES32=r2, @ANYBLOB="05002f0000000000"], 0x24}}, 0x18) 458.86336ms ago: executing program 3 (id=11669): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) r0 = socket$kcm(0x23, 0x5, 0x0) pipe2$9p(&(0x7f0000000000), 0x80080) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x1c}], 0x4) r5 = socket$kcm(0x2, 0xa, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000080)={0x0, 'syzkaller1\x00', {0x4}, 0x1}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @link_local}) syslog(0x2, &(0x7f0000000040)=""/10, 0xa) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) pwrite64(r0, &(0x7f0000000580)="00a3bc376376862f5c5dc232386e4462b1b5615a286e8a6c7e9657fd1a020ff071fe33128852c85251845f6925695589a56aaafcfbc088dce6eb41e827c21a3d6d848121d9fc5b371c5ff28276174a740618680eb616e6e505803f1e5a96b3c706f79804f7f10660664a7155fe77ce70da97a18001e0ed04d5931598ef9624639e22904ec4b16cc313a681190ac41b0318ea23131968", 0x96, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x19, 0x2, 0x6, 0x2, 0x2130, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x5, 0x2, 0x4}, 0x50) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x1000}], 0x1, 0x0, 0x0, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0xfffffda5, &(0x7f0000000280)={&(0x7f0000000480)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0xf, 0x1}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0xa}, @qdisc_kind_options=@q_sfb={{}, {0x0, 0x2, @TCA_SFB_PARMS={0x0, 0x1, {0x227, 0x7, 0x8, 0x7fff, 0x1, 0xc, 0x8, 0x7fff, 0x1}}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x804}, 0x44800) 384.140886ms ago: executing program 4 (id=11670): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8ff20c2c10f0093d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r1}, 0x18) io_setup(0xb, &(0x7f00000003c0)=0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) io_submit(r2, 0x2, &(0x7f0000000a80)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r3, 0x0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x8, 0x9, r3, &(0x7f0000000380)="ba419f8d4fda55572b", 0x9, 0x8, 0x0, 0x0, r3}]) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000181100b1bb50311328b6e4a780671e6ce7aceec3b778", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 261.546797ms ago: executing program 4 (id=11671): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) 257.586668ms ago: executing program 1 (id=11672): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES8, @ANYRES64, @ANYRESDEC=0x0, @ANYRESHEX], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000000c001e"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4008050) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES16=r1, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newqdisc={0x2c, 0x24, 0x1, 0x70bd2a, 0x25dfcbfe, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0xfff1}, {0xa, 0xffff}, {0x5}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r2], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYRES16=0x0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0xfffffffffffff001}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x12c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r7 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000840)='./file0\x00', &(0x7f0000000080), 0x18) utimensat(r7, 0x0, 0x0, 0x0) r8 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r8, 0x29, 0x37, &(0x7f0000000140)=@fragment={0xb6, 0x0, 0x92, 0x0, 0x0, 0x1b, 0x65}, 0x8) sendto$inet6(r8, 0x0, 0x0, 0x404cc40, &(0x7f0000000380)={0xa, 0x4e22, 0xffffff7c, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x7}, 0x1c) r9 = dup(r3) msgget$private(0x0, 0x0) syz_clone(0x4a01080, &(0x7f0000000200)="de2c7fa4f0b286ff102d61fcffb8a40d34610a39d9a3a6ee14b10736eb6b32a6475d3dd819bd8b59bbd11640", 0x2c, &(0x7f0000000400), &(0x7f0000000440), &(0x7f00000004c0)="58889e80c1e9e13e5b946b93f90690fbed8e80098da2f88814dcc0fc4a500c91f18cc7065f1f31be7dbd725c6fdcc83ae78cb6f37c2337fadf80658f3af071f2fd88d2c4d5fe2a2281c78992f52833aa9247c2ceb14a4d5e3d146c4b4981cc6510968785ecba3d4ff64eb5059845a37b0e8fa6d2cd0829dfc5bae0e1d5cd5513ff0017a82a3b0696bf1fd773496d29ac71a2bea6dadf0f75e3eb910d7db9714ec6865f3f3d331707a1d08d4c93fd176c96237166e7e9a75eb134eb07eb883e75572c2e36175ba37c58ebd9040261e58534665480f306d3272b19d3e3922ad635c98e27dd8c43b49b86edf440f28695ef95abad") getuid() statx(r9, &(0x7f0000000000)='./file0\x00', 0x100, 0x10, &(0x7f0000000040)) 214.982731ms ago: executing program 4 (id=11673): prlimit64(0x0, 0xe, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x36e084fcb6392193, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d00000004000000040000000701"], 0x50) 178.325465ms ago: executing program 2 (id=11674): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x18) unshare(0x20000400) capset(0x0, 0x0) syz_clone(0x24001100, 0x0, 0x8, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000000c0)=0x7) ioctl$TCSETSW2(r1, 0x5408, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x2, 0x4, "23900000aa82dc1ecf00"}) ioctl$TIOCGPGRP(r0, 0x5437, 0x0) 157.823527ms ago: executing program 4 (id=11675): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x20000223, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095", @ANYRESOCT=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = mq_open(&(0x7f0000001600)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\aXg\xbb\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x8a=\x0f\n*\x8a\x99\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5\x00\x00\x00\x00\x00\x00\x00\x01\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbbV\x1a\x8a\x03#T\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8', 0x40, 0xb, 0x0) fcntl$setlease(r0, 0x400, 0x0) mq_open(&(0x7f0000000780)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\xc0\x00\t\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x2, 0x136, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b000000000000000000000000800000000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) 0s ago: executing program 1 (id=11676): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x7, 0x0, 0x6, "750538d1ee602ec4802a04ea7cdcd151bb2cd9893bc31f80718336d9bd3517076db9ad1f6a120d8be6d7f81cd81ec275000386e7d95f0669b740a5418d69d0", 0x10000000000001}, 0x60) recvmmsg(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, 0x0}, 0xb}], 0x1, 0x40000000, 0x0) socket$tipc(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000240)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0xffff, 0xb7, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040), 0x1e) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000080)=@gcm_128={{0x303}, "ba28597967d1b54c", "9712b0d86846b5ecc522bc6f13a6e30c", "ea0292da", "9e87dc79f4c04982"}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x7, 0x8, 0x0, 0x3, 0x82, 0x0, 0x281c4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x8080, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) kernel console output (not intermixed with test programs): BIOS Google 10/25/2025 [ 638.116225][T31184] Call Trace: [ 638.116234][T31184] [ 638.116244][T31184] __dump_stack+0x1d/0x30 [ 638.116271][T31184] dump_stack_lvl+0x95/0xd0 [ 638.116315][T31184] dump_stack+0x15/0x1b [ 638.116336][T31184] should_fail_ex+0x265/0x280 [ 638.116364][T31184] should_fail+0xb/0x20 [ 638.116388][T31184] should_fail_usercopy+0x1a/0x20 [ 638.116423][T31184] _copy_from_user+0x1c/0xb0 [ 638.116533][T31184] ___sys_recvmsg+0xaa/0x370 [ 638.116565][T31184] ? _parse_integer+0x27/0x40 [ 638.116595][T31184] do_recvmmsg+0x1ef/0x540 [ 638.116704][T31184] ? fput+0x8f/0xc0 [ 638.116732][T31184] __x64_sys_recvmmsg+0xe5/0x170 [ 638.116765][T31184] x64_sys_call+0x2b75/0x3000 [ 638.116791][T31184] do_syscall_64+0xca/0x2b0 [ 638.116888][T31184] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 638.116914][T31184] RIP: 0033:0x7ff72f73f749 [ 638.116930][T31184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 638.116950][T31184] RSP: 002b:00007ff72e186038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 638.116971][T31184] RAX: ffffffffffffffda RBX: 00007ff72f996090 RCX: 00007ff72f73f749 [ 638.116984][T31184] RDX: 0000000000000001 RSI: 00002000000023c0 RDI: 0000000000000003 [ 638.117023][T31184] RBP: 00007ff72e186090 R08: 0000000000000000 R09: 0000000000000000 [ 638.117099][T31184] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000001 [ 638.117112][T31184] R13: 00007ff72f996128 R14: 00007ff72f996090 R15: 00007ffc87fa8a48 [ 638.117132][T31184] [ 638.411457][T31200] xt_TPROXY: Can be used only with -p tcp or -p udp [ 638.462583][T31206] netlink: 12 bytes leftover after parsing attributes in process `wg1'. [ 638.509297][T31214] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.607793][T31214] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.629622][T31224] random: crng reseeded on system resumption [ 638.662471][T31214] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.734006][T31214] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.781895][T31238] xt_TPROXY: Can be used only with -p tcp or -p udp [ 638.827175][ T5998] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.850238][ T5998] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.876622][ T5998] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.898707][ T5998] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.963254][T31252] netlink: 116 bytes leftover after parsing attributes in process `wg1'. [ 639.578865][T31280] tipc: Enabling of bearer rejected, already enabled [ 639.727838][T31288] netlink: 88 bytes leftover after parsing attributes in process `wg1'. [ 639.778907][T31294] netlink: 104 bytes leftover after parsing attributes in process `syz.0.10282'. [ 639.847240][T31309] xt_TPROXY: Can be used only with -p tcp or -p udp [ 640.318186][T31340] syzkaller0: entered promiscuous mode [ 640.323864][T31340] syzkaller0: entered allmulticast mode [ 640.334600][T31351] random: crng reseeded on system resumption [ 640.450792][T31365] netlink: 'syz.1.10311': attribute type 10 has an invalid length. [ 640.501892][T31365] netlink: 'syz.1.10311': attribute type 10 has an invalid length. [ 640.511619][ T4411] __ib_cache_gid_add: unable to add gid fe80:0000:0000:0000:a8aa:aaff:feaa:aa17 error=-28 [ 640.523319][T31365] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 640.571336][T31369] syzkaller0: entered promiscuous mode [ 640.576933][T31369] syzkaller0: entered allmulticast mode [ 640.713163][T31390] random: crng reseeded on system resumption [ 640.910517][T31404] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10327'. [ 640.985253][T31414] xt_TPROXY: Can be used only with -p tcp or -p udp [ 641.003583][T31416] random: crng reseeded on system resumption [ 642.004415][T31451] random: crng reseeded on system resumption [ 642.144837][T31458] netlink: 68 bytes leftover after parsing attributes in process `wg1'. [ 642.257543][T31476] random: crng reseeded on system resumption [ 642.308683][T31482] netlink: 68 bytes leftover after parsing attributes in process `wg1'. [ 642.350714][T31485] FAULT_INJECTION: forcing a failure. [ 642.350714][T31485] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 642.364202][T31485] CPU: 0 UID: 0 PID: 31485 Comm: syz.0.10360 Not tainted syzkaller #0 PREEMPT(voluntary) [ 642.364256][T31485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 642.364377][T31485] Call Trace: [ 642.364385][T31485] [ 642.364401][T31485] __dump_stack+0x1d/0x30 [ 642.364432][T31485] dump_stack_lvl+0x95/0xd0 [ 642.364459][T31485] dump_stack+0x15/0x1b [ 642.364505][T31485] should_fail_ex+0x265/0x280 [ 642.364539][T31485] should_fail+0xb/0x20 [ 642.364565][T31485] should_fail_usercopy+0x1a/0x20 [ 642.364709][T31485] _copy_from_user+0x1c/0xb0 [ 642.364741][T31485] ___sys_sendmsg+0xc1/0x1d0 [ 642.364856][T31485] __x64_sys_sendmsg+0xd4/0x160 [ 642.364897][T31485] x64_sys_call+0x17ba/0x3000 [ 642.364950][T31485] do_syscall_64+0xca/0x2b0 [ 642.364989][T31485] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 642.365036][T31485] RIP: 0033:0x7fbc59d7f749 [ 642.365119][T31485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 642.365143][T31485] RSP: 002b:00007fbc587e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 642.365166][T31485] RAX: ffffffffffffffda RBX: 00007fbc59fd5fa0 RCX: 00007fbc59d7f749 [ 642.365181][T31485] RDX: 0000000000004880 RSI: 0000200000000780 RDI: 0000000000000003 [ 642.365194][T31485] RBP: 00007fbc587e7090 R08: 0000000000000000 R09: 0000000000000000 [ 642.365206][T31485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 642.365218][T31485] R13: 00007fbc59fd6038 R14: 00007fbc59fd5fa0 R15: 00007ffd7903ec48 [ 642.365279][T31485] [ 642.869662][T31507] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10369'. [ 642.894373][T31507] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10369'. [ 642.919034][ T29] kauditd_printk_skb: 495 callbacks suppressed [ 642.919115][ T29] audit: type=1326 audit(1767499831.828:97516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 642.949416][ T29] audit: type=1326 audit(1767499831.838:97517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 642.974393][ T29] audit: type=1326 audit(1767499831.838:97518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 642.998400][ T29] audit: type=1326 audit(1767499831.838:97519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.022231][ T29] audit: type=1326 audit(1767499831.838:97520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.046468][ T29] audit: type=1326 audit(1767499831.838:97521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.070321][ T29] audit: type=1326 audit(1767499831.838:97522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.094084][ T29] audit: type=1326 audit(1767499831.838:97523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.117858][ T29] audit: type=1326 audit(1767499831.838:97524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.141694][ T29] audit: type=1326 audit(1767499831.838:97525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31509 comm="syz.3.10370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 643.376271][T31527] xt_TPROXY: Can be used only with -p tcp or -p udp [ 643.513625][T31531] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.591413][T31519] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10371'. [ 643.607662][T31519] bond1: option ad_user_port_key: invalid value (1136) [ 643.614709][T31519] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 643.623150][T31519] bond1 (unregistering): Released all slaves [ 643.640042][T31531] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.660609][T31529] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31529 comm=syz.3.10371 [ 643.719094][T31534] syzkaller0: entered promiscuous mode [ 643.724674][T31534] syzkaller0: entered allmulticast mode [ 643.733267][T31531] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.769723][T31544] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.789979][T31531] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.875531][T31544] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.909804][ T5998] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.918096][ T5998] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.934034][T31553] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10384'. [ 643.946713][T31544] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.966655][ T5998] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.986827][ T5998] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 644.004480][T31544] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 644.021370][T31553] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10384'. [ 644.119412][ T5998] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 644.135946][ T5998] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 644.153723][ T5998] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 644.167383][ T5998] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 644.233099][T31577] xt_TPROXY: Can be used only with -p tcp or -p udp [ 644.517330][T31583] syzkaller0: entered promiscuous mode [ 644.522991][T31583] syzkaller0: entered allmulticast mode [ 644.558629][T31584] FAULT_INJECTION: forcing a failure. [ 644.558629][T31584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 644.571772][T31584] CPU: 0 UID: 0 PID: 31584 Comm: syz.1.10395 Not tainted syzkaller #0 PREEMPT(voluntary) [ 644.571817][T31584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 644.571836][T31584] Call Trace: [ 644.571844][T31584] [ 644.571856][T31584] __dump_stack+0x1d/0x30 [ 644.571922][T31584] dump_stack_lvl+0x95/0xd0 [ 644.571991][T31584] dump_stack+0x15/0x1b [ 644.572079][T31584] should_fail_ex+0x265/0x280 [ 644.572110][T31584] should_fail+0xb/0x20 [ 644.572136][T31584] should_fail_usercopy+0x1a/0x20 [ 644.572169][T31584] _copy_from_user+0x1c/0xb0 [ 644.572216][T31584] sock_do_ioctl+0xe6/0x220 [ 644.572263][T31584] sock_ioctl+0x41b/0x610 [ 644.572307][T31584] ? __pfx_sock_ioctl+0x10/0x10 [ 644.572355][T31584] __se_sys_ioctl+0xce/0x140 [ 644.572434][T31584] __x64_sys_ioctl+0x43/0x50 [ 644.572474][T31584] x64_sys_call+0x14b0/0x3000 [ 644.572506][T31584] do_syscall_64+0xca/0x2b0 [ 644.572549][T31584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 644.572630][T31584] RIP: 0033:0x7ff72f73f749 [ 644.572708][T31584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 644.572736][T31584] RSP: 002b:00007ff72e165038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 644.572826][T31584] RAX: ffffffffffffffda RBX: 00007ff72f996180 RCX: 00007ff72f73f749 [ 644.572844][T31584] RDX: 0000200000000100 RSI: 0000000000008943 RDI: 0000000000000007 [ 644.572862][T31584] RBP: 00007ff72e165090 R08: 0000000000000000 R09: 0000000000000000 [ 644.572879][T31584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 644.572897][T31584] R13: 00007ff72f996218 R14: 00007ff72f996180 R15: 00007ffc87fa8a48 [ 644.572977][T31584] [ 644.946521][T31597] netlink: 12 bytes leftover after parsing attributes in process `syz.4.10401'. [ 644.974242][T31597] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10401'. [ 644.994697][T31592] syz_tun: refused to change device tx_queue_len [ 645.020627][T31601] random: crng reseeded on system resumption [ 645.232902][T31611] tipc: Started in network mode [ 645.237899][T31611] tipc: Node identity ac14140f, cluster identity 4711 [ 645.245098][T31611] tipc: New replicast peer: 255.255.255.83 [ 645.251032][T31611] tipc: Enabled bearer , priority 10 [ 645.400173][T31613] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 645.427236][T31614] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10405'. [ 645.481174][T31614] bond1: option ad_user_port_key: invalid value (1136) [ 645.488101][T31614] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 645.497962][T31614] bond1 (unregistering): Released all slaves [ 645.506687][T31609] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31609 comm=syz.0.10405 [ 645.520683][T31613] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 645.603741][T31619] syzkaller0: entered promiscuous mode [ 645.609413][T31619] syzkaller0: entered allmulticast mode [ 645.617283][T31613] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 645.722940][T31613] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 645.797173][ T5998] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 645.813176][ T5998] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 645.839250][ T5998] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 645.859681][ T5998] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 645.947720][T31641] random: crng reseeded on system resumption [ 645.996293][T31645] xt_TPROXY: Can be used only with -p tcp or -p udp [ 646.060290][T31651] xt_TPROXY: Can be used only with -p tcp or -p udp [ 646.121610][T31657] netlink: 36 bytes leftover after parsing attributes in process `syz.1.10423'. [ 646.308189][ T23] tipc: Node number set to 2886997007 [ 646.492110][T31677] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.566921][T31668] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10427'. [ 646.589905][T31668] bond2: option ad_user_port_key: invalid value (1136) [ 646.596912][T31668] bond2: option ad_user_port_key: allowed values 0 - 1023 [ 646.605330][T31668] bond2 (unregistering): Released all slaves [ 646.624282][T31673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31673 comm=syz.1.10427 [ 646.626583][T31677] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.700444][T31677] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.750110][T31677] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.804057][T31698] xt_TPROXY: Can be used only with -p tcp or -p udp [ 646.822887][T31696] tipc: Enabling of bearer rejected, already enabled [ 648.002036][T31749] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.059899][T31754] random: crng reseeded on system resumption [ 648.075822][T31749] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.096776][T31757] FAULT_INJECTION: forcing a failure. [ 648.096776][T31757] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 648.110104][T31757] CPU: 1 UID: 0 PID: 31757 Comm: syz.4.10460 Not tainted syzkaller #0 PREEMPT(voluntary) [ 648.110133][T31757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 648.110147][T31757] Call Trace: [ 648.110156][T31757] [ 648.110176][T31757] __dump_stack+0x1d/0x30 [ 648.110209][T31757] dump_stack_lvl+0x95/0xd0 [ 648.110287][T31757] dump_stack+0x15/0x1b [ 648.110313][T31757] should_fail_ex+0x265/0x280 [ 648.110344][T31757] should_fail+0xb/0x20 [ 648.110369][T31757] should_fail_usercopy+0x1a/0x20 [ 648.110455][T31757] copy_folio_from_iter_atomic+0x503/0x1150 [ 648.110562][T31757] ? shmem_write_begin+0xfc/0x1f0 [ 648.110595][T31757] ? shmem_write_begin+0x135/0x1f0 [ 648.110629][T31757] generic_perform_write+0x2c2/0x490 [ 648.110667][T31757] shmem_file_write_iter+0xc5/0xf0 [ 648.110755][T31757] do_iter_readv_writev+0x4a1/0x540 [ 648.110791][T31757] vfs_writev+0x2df/0x8b0 [ 648.110841][T31757] do_writev+0xe7/0x210 [ 648.110874][T31757] __x64_sys_writev+0x45/0x50 [ 648.110899][T31757] x64_sys_call+0x1ba5/0x3000 [ 648.110924][T31757] do_syscall_64+0xca/0x2b0 [ 648.111037][T31757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 648.111062][T31757] RIP: 0033:0x7fa48323f749 [ 648.111132][T31757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 648.111155][T31757] RSP: 002b:00007fa481ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 648.111221][T31757] RAX: ffffffffffffffda RBX: 00007fa483495fa0 RCX: 00007fa48323f749 [ 648.111235][T31757] RDX: 0000000000000003 RSI: 0000200000001000 RDI: 0000000000000003 [ 648.111336][T31757] RBP: 00007fa481ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 648.111354][T31757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 648.111442][T31757] R13: 00007fa483496038 R14: 00007fa483495fa0 R15: 00007ffff56cd758 [ 648.111464][T31757] [ 648.330160][ T4411] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.341984][ T4411] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.350792][ T4411] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.359131][ T4411] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.369865][ T29] kauditd_printk_skb: 311 callbacks suppressed [ 648.369884][ T29] audit: type=1326 audit(1767499837.238:97837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.399938][ T29] audit: type=1326 audit(1767499837.238:97838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.409041][T31749] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.423767][ T29] audit: type=1326 audit(1767499837.238:97839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.457338][ T29] audit: type=1326 audit(1767499837.238:97840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.481432][ T29] audit: type=1326 audit(1767499837.238:97841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.505235][ T29] audit: type=1326 audit(1767499837.238:97842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.529012][ T29] audit: type=1326 audit(1767499837.238:97843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.552857][ T29] audit: type=1326 audit(1767499837.238:97844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.576665][ T29] audit: type=1326 audit(1767499837.238:97845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.600496][ T29] audit: type=1326 audit(1767499837.238:97846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31759 comm="syz.4.10461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 648.651070][T31749] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.688106][T31765] tipc: Enabling of bearer rejected, already enabled [ 648.709274][ T5172] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.721381][ T5172] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.733286][ T5172] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.745370][ T5172] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 648.784737][T31771] FAULT_INJECTION: forcing a failure. [ 648.784737][T31771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 648.797917][T31771] CPU: 0 UID: 0 PID: 31771 Comm: syz.4.10466 Not tainted syzkaller #0 PREEMPT(voluntary) [ 648.798043][T31771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 648.798059][T31771] Call Trace: [ 648.798068][T31771] [ 648.798078][T31771] __dump_stack+0x1d/0x30 [ 648.798122][T31771] dump_stack_lvl+0x95/0xd0 [ 648.798150][T31771] dump_stack+0x15/0x1b [ 648.798183][T31771] should_fail_ex+0x265/0x280 [ 648.798207][T31771] should_fail+0xb/0x20 [ 648.798231][T31771] should_fail_usercopy+0x1a/0x20 [ 648.798262][T31771] _copy_from_iter+0xcf/0xe70 [ 648.798355][T31771] ? __alloc_skb+0x396/0x4b0 [ 648.798379][T31771] ? __alloc_skb+0x228/0x4b0 [ 648.798411][T31771] netlink_sendmsg+0x471/0x6b0 [ 648.798452][T31771] ? __pfx_netlink_sendmsg+0x10/0x10 [ 648.798544][T31771] __sock_sendmsg+0x145/0x180 [ 648.798571][T31771] ____sys_sendmsg+0x31e/0x4a0 [ 648.798607][T31771] ___sys_sendmsg+0x17b/0x1d0 [ 648.798781][T31771] __x64_sys_sendmsg+0xd4/0x160 [ 648.798825][T31771] x64_sys_call+0x17ba/0x3000 [ 648.798922][T31771] do_syscall_64+0xca/0x2b0 [ 648.799013][T31771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 648.799041][T31771] RIP: 0033:0x7fa48323f749 [ 648.799057][T31771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 648.799157][T31771] RSP: 002b:00007fa481ca7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 648.799178][T31771] RAX: ffffffffffffffda RBX: 00007fa483495fa0 RCX: 00007fa48323f749 [ 648.799191][T31771] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 648.799203][T31771] RBP: 00007fa481ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 648.799218][T31771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 648.799292][T31771] R13: 00007fa483496038 R14: 00007fa483495fa0 R15: 00007ffff56cd758 [ 648.799316][T31771] [ 649.061404][T31787] __nla_validate_parse: 3 callbacks suppressed [ 649.061426][T31787] netlink: 60 bytes leftover after parsing attributes in process `wg1'. [ 649.076082][T31787] netlink: 60 bytes leftover after parsing attributes in process `wg1'. [ 649.151735][T31796] tipc: Enabling of bearer rejected, already enabled [ 649.380034][T31818] FAULT_INJECTION: forcing a failure. [ 649.380034][T31818] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 649.393292][T31818] CPU: 1 UID: 0 PID: 31818 Comm: syz.1.10486 Not tainted syzkaller #0 PREEMPT(voluntary) [ 649.393328][T31818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 649.393346][T31818] Call Trace: [ 649.393355][T31818] [ 649.393366][T31818] __dump_stack+0x1d/0x30 [ 649.393396][T31818] dump_stack_lvl+0x95/0xd0 [ 649.393473][T31818] dump_stack+0x15/0x1b [ 649.393493][T31818] should_fail_ex+0x265/0x280 [ 649.393522][T31818] should_fail+0xb/0x20 [ 649.393600][T31818] should_fail_usercopy+0x1a/0x20 [ 649.393631][T31818] strncpy_from_user+0x27/0x260 [ 649.393674][T31818] getname_flags+0xae/0x3b0 [ 649.393700][T31818] io_openat_prep+0x12b/0x2c0 [ 649.393745][T31818] io_submit_sqes+0x70f/0x11b0 [ 649.393789][T31818] __se_sys_io_uring_enter+0x1bd/0x1a30 [ 649.393830][T31818] ? 0xffffffff81000000 [ 649.393875][T31818] ? __rcu_read_unlock+0x4f/0x70 [ 649.393974][T31818] ? proc_fail_nth_write+0x13b/0x160 [ 649.394005][T31818] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 649.394034][T31818] ? vfs_write+0x7e8/0x960 [ 649.394053][T31818] ? __rcu_read_unlock+0x4f/0x70 [ 649.394085][T31818] ? __fget_files+0x184/0x1c0 [ 649.394119][T31818] ? mutex_unlock+0x4f/0x90 [ 649.394145][T31818] ? fput+0x8f/0xc0 [ 649.394196][T31818] __x64_sys_io_uring_enter+0x78/0x90 [ 649.394232][T31818] x64_sys_call+0x27e4/0x3000 [ 649.394299][T31818] do_syscall_64+0xca/0x2b0 [ 649.394337][T31818] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 649.394425][T31818] RIP: 0033:0x7ff72f73f749 [ 649.394440][T31818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.394459][T31818] RSP: 002b:00007ff72e1a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 649.394479][T31818] RAX: ffffffffffffffda RBX: 00007ff72f995fa0 RCX: 00007ff72f73f749 [ 649.394492][T31818] RDX: 0000000000000000 RSI: 00000000000047f6 RDI: 0000000000000003 [ 649.394551][T31818] RBP: 00007ff72e1a7090 R08: 0000000000000000 R09: 0000000000000000 [ 649.394565][T31818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 649.394577][T31818] R13: 00007ff72f996038 R14: 00007ff72f995fa0 R15: 00007ffc87fa8a48 [ 649.394597][T31818] [ 649.671196][T31825] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10490'. [ 649.713475][T31827] tipc: Enabling of bearer rejected, already enabled [ 649.925351][T31855] FAULT_INJECTION: forcing a failure. [ 649.925351][T31855] name failslab, interval 1, probability 0, space 0, times 0 [ 649.938288][T31855] CPU: 1 UID: 0 PID: 31855 Comm: syz.4.10501 Not tainted syzkaller #0 PREEMPT(voluntary) [ 649.938329][T31855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 649.938346][T31855] Call Trace: [ 649.938355][T31855] [ 649.938365][T31855] __dump_stack+0x1d/0x30 [ 649.938395][T31855] dump_stack_lvl+0x95/0xd0 [ 649.938467][T31855] dump_stack+0x15/0x1b [ 649.938485][T31855] should_fail_ex+0x265/0x280 [ 649.938506][T31855] should_failslab+0x8c/0xb0 [ 649.938606][T31855] __kmalloc_cache_noprof+0x65/0x4c0 [ 649.938685][T31855] ? rtnl_newlink+0x5c/0x1360 [ 649.938702][T31855] ? __pfx_rtnl_newlink+0x10/0x10 [ 649.938747][T31855] rtnl_newlink+0x5c/0x1360 [ 649.938768][T31855] ? xas_load+0x413/0x430 [ 649.938794][T31855] ? try_charge_memcg+0x215/0xa10 [ 649.938827][T31855] ? __memcg_slab_free_hook+0x135/0x230 [ 649.938865][T31855] ? __rcu_read_unlock+0x4f/0x70 [ 649.938883][T31855] ? avc_has_perm_noaudit+0xab/0x130 [ 649.938902][T31855] ? cred_has_capability+0x210/0x280 [ 649.939062][T31855] ? selinux_capable+0x31/0x40 [ 649.939082][T31855] ? security_capable+0x83/0x90 [ 649.939111][T31855] ? ns_capable+0x7d/0xb0 [ 649.939136][T31855] ? __pfx_rtnl_newlink+0x10/0x10 [ 649.939204][T31855] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 649.939238][T31855] netlink_rcv_skb+0x123/0x220 [ 649.939282][T31855] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 649.939317][T31855] rtnetlink_rcv+0x1c/0x30 [ 649.939426][T31855] netlink_unicast+0x5c0/0x690 [ 649.939517][T31855] netlink_sendmsg+0x58b/0x6b0 [ 649.939547][T31855] ? __pfx_netlink_sendmsg+0x10/0x10 [ 649.939604][T31855] __sock_sendmsg+0x145/0x180 [ 649.939622][T31855] ____sys_sendmsg+0x31e/0x4a0 [ 649.939650][T31855] ___sys_sendmsg+0x17b/0x1d0 [ 649.939688][T31855] __x64_sys_sendmsg+0xd4/0x160 [ 649.939771][T31855] x64_sys_call+0x17ba/0x3000 [ 649.939860][T31855] do_syscall_64+0xca/0x2b0 [ 649.939891][T31855] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 649.939916][T31855] RIP: 0033:0x7fa48323f749 [ 649.939930][T31855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.939949][T31855] RSP: 002b:00007fa481ca7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 649.939993][T31855] RAX: ffffffffffffffda RBX: 00007fa483495fa0 RCX: 00007fa48323f749 [ 649.940004][T31855] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 649.940033][T31855] RBP: 00007fa481ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 649.940044][T31855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 649.940060][T31855] R13: 00007fa483496038 R14: 00007fa483495fa0 R15: 00007ffff56cd758 [ 649.940077][T31855] [ 650.392263][T31867] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10505'. [ 650.538962][T31877] xt_TPROXY: Can be used only with -p tcp or -p udp [ 650.713641][T31892] random: crng reseeded on system resumption [ 650.779742][T31895] netlink: 32 bytes leftover after parsing attributes in process `syz.2.10516'. [ 650.792055][T31895] FAULT_INJECTION: forcing a failure. [ 650.792055][T31895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 650.805725][T31895] CPU: 1 UID: 0 PID: 31895 Comm: syz.2.10516 Not tainted syzkaller #0 PREEMPT(voluntary) [ 650.805760][T31895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 650.805777][T31895] Call Trace: [ 650.805786][T31895] [ 650.805796][T31895] __dump_stack+0x1d/0x30 [ 650.805903][T31895] dump_stack_lvl+0x95/0xd0 [ 650.805931][T31895] dump_stack+0x15/0x1b [ 650.805962][T31895] should_fail_ex+0x265/0x280 [ 650.805989][T31895] should_fail_alloc_page+0xf2/0x100 [ 650.806039][T31895] __alloc_frozen_pages_noprof+0x109/0x360 [ 650.806085][T31895] alloc_pages_mpol+0xb3/0x260 [ 650.806134][T31895] alloc_pages_noprof+0x90/0x130 [ 650.806166][T31895] get_zeroed_page_noprof+0x1a/0x40 [ 650.806193][T31895] write_ldt+0x379/0x4b0 [ 650.806277][T31895] __se_sys_modify_ldt+0x6c/0x270 [ 650.806297][T31895] x64_sys_call+0x2d90/0x3000 [ 650.806405][T31895] do_syscall_64+0xca/0x2b0 [ 650.806475][T31895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.806500][T31895] RIP: 0033:0x7fc55f53f749 [ 650.806519][T31895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 650.806613][T31895] RSP: 002b:00007fc55dfa7038 EFLAGS: 00000246 ORIG_RAX: 000000000000009a [ 650.806638][T31895] RAX: ffffffffffffffda RBX: 00007fc55f795fa0 RCX: 00007fc55f53f749 [ 650.806653][T31895] RDX: 0000000000000010 RSI: 0000200000000480 RDI: 0000000000000011 [ 650.806666][T31895] RBP: 00007fc55dfa7090 R08: 0000000000000000 R09: 0000000000000000 [ 650.806680][T31895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 650.806766][T31895] R13: 00007fc55f796038 R14: 00007fc55f795fa0 R15: 00007ffccefa2cc8 [ 650.806789][T31895] [ 650.987828][T31902] netlink: 32 bytes leftover after parsing attributes in process `syz.3.10518'. [ 650.999215][T31902] netlink: 20 bytes leftover after parsing attributes in process `syz.3.10518'. [ 651.094399][T31905] syzkaller0: entered promiscuous mode [ 651.100018][T31905] syzkaller0: entered allmulticast mode [ 651.214248][T31919] random: crng reseeded on system resumption [ 651.576423][T31950] FAULT_INJECTION: forcing a failure. [ 651.576423][T31950] name failslab, interval 1, probability 0, space 0, times 0 [ 651.589745][T31950] CPU: 1 UID: 0 PID: 31950 Comm: syz.1.10539 Not tainted syzkaller #0 PREEMPT(voluntary) [ 651.589799][T31950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 651.589812][T31950] Call Trace: [ 651.589822][T31950] [ 651.589833][T31950] __dump_stack+0x1d/0x30 [ 651.589864][T31950] dump_stack_lvl+0x95/0xd0 [ 651.589892][T31950] dump_stack+0x15/0x1b [ 651.590020][T31950] should_fail_ex+0x265/0x280 [ 651.590048][T31950] should_failslab+0x8c/0xb0 [ 651.590070][T31950] kmem_cache_alloc_noprof+0x69/0x4b0 [ 651.590093][T31950] ? getname_flags+0x80/0x3b0 [ 651.590120][T31950] getname_flags+0x80/0x3b0 [ 651.590222][T31950] do_sys_openat2+0x60/0x150 [ 651.590257][T31950] __x64_sys_openat+0xf2/0x120 [ 651.590287][T31950] x64_sys_call+0x2b07/0x3000 [ 651.590375][T31950] do_syscall_64+0xca/0x2b0 [ 651.590416][T31950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.590444][T31950] RIP: 0033:0x7ff72f73f749 [ 651.590464][T31950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 651.590505][T31950] RSP: 002b:00007ff72e1a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 651.590525][T31950] RAX: ffffffffffffffda RBX: 00007ff72f995fa0 RCX: 00007ff72f73f749 [ 651.590542][T31950] RDX: 0000000000143042 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 651.590560][T31950] RBP: 00007ff72e1a7090 R08: 0000000000000000 R09: 0000000000000000 [ 651.590577][T31950] R10: 00000000000000f0 R11: 0000000000000246 R12: 0000000000000001 [ 651.590593][T31950] R13: 00007ff72f996038 R14: 00007ff72f995fa0 R15: 00007ffc87fa8a48 [ 651.590674][T31950] [ 651.839675][T31963] FAULT_INJECTION: forcing a failure. [ 651.839675][T31963] name failslab, interval 1, probability 0, space 0, times 0 [ 651.852432][T31963] CPU: 0 UID: 0 PID: 31963 Comm: syz.1.10545 Not tainted syzkaller #0 PREEMPT(voluntary) [ 651.852482][T31963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 651.852494][T31963] Call Trace: [ 651.852501][T31963] [ 651.852508][T31963] __dump_stack+0x1d/0x30 [ 651.852581][T31963] dump_stack_lvl+0x95/0xd0 [ 651.852609][T31963] dump_stack+0x15/0x1b [ 651.852663][T31963] should_fail_ex+0x265/0x280 [ 651.852746][T31963] should_failslab+0x8c/0xb0 [ 651.852766][T31963] __kmalloc_cache_noprof+0x65/0x4c0 [ 651.852788][T31963] ? io_manage_buffers_legacy+0x188/0x6c0 [ 651.852890][T31963] io_manage_buffers_legacy+0x188/0x6c0 [ 651.852919][T31963] __io_issue_sqe+0xfe/0x2e0 [ 651.852945][T31963] ? io_assign_file+0x56/0x200 [ 651.853048][T31963] io_issue_sqe+0x56/0xa80 [ 651.853093][T31963] ? io_provide_buffers_prep+0x1c7/0x1f0 [ 651.853117][T31963] io_submit_sqes+0x78b/0x11b0 [ 651.853153][T31963] __se_sys_io_uring_enter+0x1bd/0x1a30 [ 651.853221][T31963] ? 0xffffffff81000000 [ 651.853232][T31963] ? __rcu_read_unlock+0x4f/0x70 [ 651.853265][T31963] ? proc_fail_nth_write+0x13b/0x160 [ 651.853290][T31963] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 651.853336][T31963] ? vfs_write+0x7e8/0x960 [ 651.853411][T31963] ? __rcu_read_unlock+0x4f/0x70 [ 651.853428][T31963] ? __fget_files+0x184/0x1c0 [ 651.853450][T31963] ? mutex_unlock+0x4f/0x90 [ 651.853516][T31963] ? fput+0x8f/0xc0 [ 651.853541][T31963] __x64_sys_io_uring_enter+0x78/0x90 [ 651.853607][T31963] x64_sys_call+0x27e4/0x3000 [ 651.853634][T31963] do_syscall_64+0xca/0x2b0 [ 651.853687][T31963] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.853714][T31963] RIP: 0033:0x7ff72f73f749 [ 651.853733][T31963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 651.853781][T31963] RSP: 002b:00007ff72e1a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 651.853810][T31963] RAX: ffffffffffffffda RBX: 00007ff72f995fa0 RCX: 00007ff72f73f749 [ 651.853886][T31963] RDX: 0000000000000000 RSI: 00000000000047fa RDI: 0000000000000007 [ 651.853898][T31963] RBP: 00007ff72e1a7090 R08: 0000000000000000 R09: 0000000000000000 [ 651.853910][T31963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 651.853921][T31963] R13: 00007ff72f996038 R14: 00007ff72f995fa0 R15: 00007ffc87fa8a48 [ 651.853960][T31963] [ 652.316335][T31985] xt_TPROXY: Can be used only with -p tcp or -p udp [ 652.352320][T31989] SELinux: policydb version 1719152663 does not match my version range 15-35 [ 652.372222][T31989] SELinux: failed to load policy [ 652.658711][T32009] FAULT_INJECTION: forcing a failure. [ 652.658711][T32009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.671865][T32009] CPU: 0 UID: 0 PID: 32009 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 652.671898][T32009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 652.671916][T32009] Call Trace: [ 652.671925][T32009] [ 652.671934][T32009] __dump_stack+0x1d/0x30 [ 652.672019][T32009] dump_stack_lvl+0x95/0xd0 [ 652.672048][T32009] dump_stack+0x15/0x1b [ 652.672068][T32009] should_fail_ex+0x265/0x280 [ 652.672149][T32009] should_fail+0xb/0x20 [ 652.672169][T32009] should_fail_usercopy+0x1a/0x20 [ 652.672211][T32009] _copy_from_user+0x1c/0xb0 [ 652.672306][T32009] kstrtouint_from_user+0x69/0xf0 [ 652.672350][T32009] ? 0xffffffff81000000 [ 652.672363][T32009] ? selinux_file_permission+0x1e2/0x320 [ 652.672396][T32009] proc_fail_nth_write+0x50/0x160 [ 652.672498][T32009] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 652.672550][T32009] vfs_write+0x269/0x960 [ 652.672578][T32009] ? vfs_read+0x4e6/0x770 [ 652.672595][T32009] ? __rcu_read_unlock+0x4f/0x70 [ 652.672615][T32009] ? __fget_files+0x184/0x1c0 [ 652.672637][T32009] ? mutex_lock+0x58/0x90 [ 652.672693][T32009] ksys_write+0xda/0x1a0 [ 652.672714][T32009] __x64_sys_write+0x40/0x50 [ 652.672733][T32009] x64_sys_call+0x2847/0x3000 [ 652.672757][T32009] do_syscall_64+0xca/0x2b0 [ 652.672825][T32009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 652.672850][T32009] RIP: 0033:0x7fa48323e1ff [ 652.672868][T32009] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 652.672891][T32009] RSP: 002b:00007fa481ca7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 652.672914][T32009] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa48323e1ff [ 652.672944][T32009] RDX: 0000000000000001 RSI: 00007fa481ca70a0 RDI: 0000000000000003 [ 652.672996][T32009] RBP: 00007fa481ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 652.673012][T32009] R10: 0000000000989046 R11: 0000000000000293 R12: 0000000000000002 [ 652.673029][T32009] R13: 00007fa483496038 R14: 00007fa483495fa0 R15: 00007ffff56cd758 [ 652.673067][T32009] [ 652.891745][T32012] random: crng reseeded on system resumption [ 652.909064][T32013] lo speed is unknown, defaulting to 1000 [ 652.921485][T32013] lo speed is unknown, defaulting to 1000 [ 652.932999][T32013] lo speed is unknown, defaulting to 1000 [ 652.940231][T32013] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 652.951578][T32013] lo speed is unknown, defaulting to 1000 [ 652.958012][T32013] lo speed is unknown, defaulting to 1000 [ 652.964693][T32013] lo speed is unknown, defaulting to 1000 [ 652.971087][T32013] lo speed is unknown, defaulting to 1000 [ 652.977393][T32013] lo speed is unknown, defaulting to 1000 [ 653.181613][T32027] netlink: 40 bytes leftover after parsing attributes in process `syz.4.10570'. [ 653.218166][T32029] tipc: Enabling of bearer rejected, already enabled [ 653.225367][T32031] xt_TPROXY: Can be used only with -p tcp or -p udp [ 653.401466][ T29] kauditd_printk_skb: 438 callbacks suppressed [ 653.401485][ T29] audit: type=1400 audit(1767499842.318:98285): avc: denied { append } for pid=32038 comm="syz.4.10576" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 653.439994][ T29] audit: type=1400 audit(1767499842.358:98286): avc: denied { ioctl } for pid=32038 comm="syz.4.10576" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=151761 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 653.493705][ T29] audit: type=1326 audit(1767499842.408:98287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32040 comm="syz.4.10577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 653.517525][ T29] audit: type=1326 audit(1767499842.408:98288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32040 comm="syz.4.10577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 653.541330][ T29] audit: type=1326 audit(1767499842.408:98289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32040 comm="syz.4.10577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 653.588390][ T29] audit: type=1326 audit(1767499842.498:98290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32047 comm="syz.2.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 653.612310][ T29] audit: type=1326 audit(1767499842.498:98291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32047 comm="syz.2.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 653.636272][ T29] audit: type=1326 audit(1767499842.498:98292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32047 comm="syz.2.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 653.660278][ T29] audit: type=1326 audit(1767499842.498:98293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32047 comm="syz.2.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 653.683996][ T29] audit: type=1326 audit(1767499842.498:98294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32047 comm="syz.2.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 653.778002][T32059] tipc: Enabling of bearer rejected, already enabled [ 653.794226][T32061] xt_TPROXY: Can be used only with -p tcp or -p udp [ 653.807985][T32057] lo speed is unknown, defaulting to 1000 [ 654.342393][T32080] random: crng reseeded on system resumption [ 654.728033][T32100] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 654.735726][T32100] netlink: 176 bytes leftover after parsing attributes in process `syz.0.10599'. [ 655.191906][T32128] syzkaller0: entered promiscuous mode [ 655.197526][T32128] syzkaller0: entered allmulticast mode [ 655.449424][T32141] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.490471][T32132] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10610'. [ 655.506548][T32132] bond1: option ad_user_port_key: invalid value (1136) [ 655.513530][T32132] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 655.523977][T32132] bond1 (unregistering): Released all slaves [ 655.535855][T32141] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.554596][T32138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32138 comm=syz.0.10610 [ 655.580353][T32141] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.620523][T32153] netlink: 104 bytes leftover after parsing attributes in process `syz.4.10616'. [ 655.631909][T32141] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.655236][T32153] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.688649][ T5998] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.701037][ T5998] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.713563][ T5998] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.725412][ T4411] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.753048][T32153] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.803348][T32153] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.814317][T32162] netlink: 48 bytes leftover after parsing attributes in process `syz.2.10621'. [ 655.823659][T32162] netlink: 48 bytes leftover after parsing attributes in process `syz.2.10621'. [ 655.872385][T32153] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.946307][ T5998] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.966286][ T5998] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.982601][ T5998] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 656.014686][ T5998] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 656.068917][T32176] syzkaller0: entered promiscuous mode [ 656.074708][T32176] syzkaller0: entered allmulticast mode [ 656.110742][T32180] random: crng reseeded on system resumption [ 656.610409][T32221] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10635'. [ 656.630029][T32220] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 656.668831][T32221] bond1: option ad_user_port_key: invalid value (1136) [ 656.675812][T32221] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 656.699649][T32223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32223 comm=syz.0.10635 [ 656.714472][T32221] bond1 (unregistering): Released all slaves [ 656.741511][T32220] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 656.820456][T32220] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 656.850794][T32220] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 657.037909][T32242] syzkaller0: entered promiscuous mode [ 657.043583][T32242] syzkaller0: entered allmulticast mode [ 657.114881][T32248] xt_TPROXY: Can be used only with -p tcp or -p udp [ 657.253935][T32259] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10655'. [ 657.277727][T32265] xt_TPROXY: Can be used only with -p tcp or -p udp [ 657.330110][T32268] netlink: 12 bytes leftover after parsing attributes in process `wg1'. [ 657.664198][T32282] syzkaller0: entered promiscuous mode [ 657.669861][T32282] syzkaller0: entered allmulticast mode [ 657.911961][T32297] 9p: Bad value for 'version' [ 658.042425][T32304] xt_TPROXY: Can be used only with -p tcp or -p udp [ 658.467947][ T29] kauditd_printk_skb: 866 callbacks suppressed [ 658.467965][ T29] audit: type=1326 audit(1767499847.378:99161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.498335][ T29] audit: type=1326 audit(1767499847.378:99162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.522316][ T29] audit: type=1326 audit(1767499847.378:99163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.546033][ T29] audit: type=1326 audit(1767499847.378:99164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.569914][ T29] audit: type=1326 audit(1767499847.378:99165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.593824][ T29] audit: type=1326 audit(1767499847.378:99166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.617673][ T29] audit: type=1326 audit(1767499847.378:99167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.641483][ T29] audit: type=1326 audit(1767499847.378:99168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.665394][ T29] audit: type=1326 audit(1767499847.378:99169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.689205][ T29] audit: type=1326 audit(1767499847.378:99170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32320 comm="syz.2.10676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 658.723184][T32321] lo speed is unknown, defaulting to 1000 [ 659.876965][T32363] lo speed is unknown, defaulting to 1000 [ 660.383645][T32387] xt_TPROXY: Can be used only with -p tcp or -p udp [ 660.937053][T32409] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10712'. [ 660.996654][T32409] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10712'. [ 661.048586][ T5998] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 661.057121][ T5998] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 661.068356][ T5998] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 661.091238][ T5998] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 661.208569][T32419] lo speed is unknown, defaulting to 1000 [ 662.137111][T32451] syzkaller0: entered promiscuous mode [ 662.143051][T32451] syzkaller0: entered allmulticast mode [ 662.236375][T32463] tipc: Enabling of bearer rejected, already enabled [ 662.845142][T32488] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10741'. [ 663.412220][T32524] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10755'. [ 663.526183][ T29] kauditd_printk_skb: 742 callbacks suppressed [ 663.526197][ T29] audit: type=1326 audit(1767499852.438:99913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32526 comm="syz.2.10758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 663.571551][T32532] syzkaller0: entered promiscuous mode [ 663.577096][T32532] syzkaller0: entered allmulticast mode [ 663.598477][ T29] audit: type=1326 audit(1767499852.468:99914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32526 comm="syz.2.10758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 663.622474][ T29] audit: type=1326 audit(1767499852.468:99915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32526 comm="syz.2.10758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 663.964502][T32540] tipc: Enabling of bearer rejected, already enabled [ 663.972526][ T29] audit: type=1326 audit(1767499852.858:99916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 663.996635][ T29] audit: type=1326 audit(1767499852.858:99917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 664.020457][ T29] audit: type=1326 audit(1767499852.858:99918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 664.044184][ T29] audit: type=1326 audit(1767499852.858:99919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 664.068080][ T29] audit: type=1326 audit(1767499852.858:99920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 664.092000][ T29] audit: type=1326 audit(1767499852.858:99921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 664.115925][ T29] audit: type=1326 audit(1767499852.858:99922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32539 comm="syz.0.10763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 664.301255][T32546] lo speed is unknown, defaulting to 1000 [ 664.334503][T32549] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10766'. [ 664.396665][T32559] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10770'. [ 664.640316][T32579] random: crng reseeded on system resumption [ 664.714823][T32583] tipc: Enabling of bearer rejected, already enabled [ 665.267696][T32596] lo speed is unknown, defaulting to 1000 [ 665.572994][T32632] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10798'. [ 665.698479][T32648] xt_TPROXY: Can be used only with -p tcp or -p udp [ 665.834774][T32638] lo speed is unknown, defaulting to 1000 [ 666.054060][T32660] random: crng reseeded on system resumption [ 666.440105][T32670] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10811'. [ 666.531203][T32680] tipc: Enabling of bearer rejected, already enabled [ 666.619910][T32686] xt_TPROXY: Can be used only with -p tcp or -p udp [ 666.710115][T32692] syzkaller0: entered promiscuous mode [ 666.715790][T32692] syzkaller0: entered allmulticast mode [ 668.007528][T32740] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.090585][T32752] random: crng reseeded on system resumption [ 668.101328][T32740] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.182883][T32755] lo speed is unknown, defaulting to 1000 [ 668.191380][T32740] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.272159][T32740] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.347558][ T5172] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.367353][ T5172] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.389914][T32763] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.414292][ T5172] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.427017][ T5172] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.590851][T32763] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.629017][ T312] xt_TPROXY: Can be used only with -p tcp or -p udp [ 668.645175][ T29] kauditd_printk_skb: 1054 callbacks suppressed [ 668.645250][ T29] audit: type=1326 audit(1767499857.558:100977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=311 comm="syz.4.10854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 668.731240][T32763] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.832467][T32763] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 668.915770][ T5172] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.960668][ T5172] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 669.047728][ T5172] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 669.124340][ T5172] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 669.207322][ T29] audit: type=1326 audit(1767499857.558:100978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=311 comm="syz.4.10854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 669.230962][ T29] audit: type=1326 audit(1767499857.558:100979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=311 comm="syz.4.10854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 669.254653][ T29] audit: type=1326 audit(1767499857.558:100980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=311 comm="syz.4.10854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 669.278507][ T29] audit: type=1326 audit(1767499857.558:100981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=311 comm="syz.4.10854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 669.302545][ T29] audit: type=1326 audit(1767499857.988:100982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=315 comm="syz.3.10855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 669.326252][ T29] audit: type=1326 audit(1767499857.988:100983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=315 comm="syz.3.10855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 669.349861][ T29] audit: type=1326 audit(1767499857.988:100984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=315 comm="syz.3.10855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 669.373534][ T29] audit: type=1326 audit(1767499857.988:100985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=315 comm="syz.3.10855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 669.397408][ T29] audit: type=1326 audit(1767499857.988:100986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=315 comm="syz.3.10855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 669.579737][ T333] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 669.625167][ T321] lo speed is unknown, defaulting to 1000 [ 669.680859][ T340] random: crng reseeded on system resumption [ 669.691002][ T333] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 669.770418][ T333] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 669.910123][ T333] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.875413][ T370] tipc: Enabling of bearer rejected, already enabled [ 670.984255][ T375] random: crng reseeded on system resumption [ 671.237416][ T399] random: crng reseeded on system resumption [ 671.273337][ T403] tipc: Enabling of bearer rejected, already enabled [ 671.556472][ T423] lo speed is unknown, defaulting to 1000 [ 671.594049][ T426] netlink: 36 bytes leftover after parsing attributes in process `syz.0.10896'. [ 671.680888][ T432] syzkaller0: entered promiscuous mode [ 671.686541][ T432] syzkaller0: entered allmulticast mode [ 671.694172][ T434] tipc: Enabling of bearer rejected, already enabled [ 671.742983][ T438] netlink: 12 bytes leftover after parsing attributes in process `syz.4.10902'. [ 671.779282][ T441] xt_TPROXY: Can be used only with -p tcp or -p udp [ 672.043276][ T459] lo speed is unknown, defaulting to 1000 [ 672.164201][ T471] xt_TPROXY: Can be used only with -p tcp or -p udp [ 672.221732][ T469] syzkaller0: entered promiscuous mode [ 672.227356][ T469] syzkaller0: entered allmulticast mode [ 672.980712][ T505] lo speed is unknown, defaulting to 1000 [ 673.166391][ T520] syzkaller0: entered promiscuous mode [ 673.172023][ T520] syzkaller0: entered allmulticast mode [ 673.422904][ T539] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10940'. [ 673.551150][ T536] lo speed is unknown, defaulting to 1000 [ 674.116650][ T557] syzkaller0: entered promiscuous mode [ 674.122236][ T557] syzkaller0: entered allmulticast mode [ 674.138515][ T29] kauditd_printk_skb: 1161 callbacks suppressed [ 674.138535][ T29] audit: type=1326 audit(1767499863.048:102148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.168694][ T29] audit: type=1326 audit(1767499863.048:102149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.192389][ T29] audit: type=1326 audit(1767499863.048:102150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.215983][ T29] audit: type=1326 audit(1767499863.048:102151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.239591][ T29] audit: type=1326 audit(1767499863.048:102152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.263354][ T29] audit: type=1326 audit(1767499863.048:102153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.287056][ T29] audit: type=1326 audit(1767499863.048:102154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.310749][ T29] audit: type=1326 audit(1767499863.048:102155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.334393][ T29] audit: type=1326 audit(1767499863.048:102156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.358095][ T29] audit: type=1326 audit(1767499863.048:102157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=559 comm="syz.0.10948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 674.446077][ T5998] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 674.479476][ T5998] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 674.521706][ T5998] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 674.549690][ T5998] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 674.669745][ T584] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10958'. [ 674.733931][ T576] lo speed is unknown, defaulting to 1000 [ 674.890541][ T605] random: crng reseeded on system resumption [ 674.935091][ T603] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 675.020564][ T603] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 675.219883][ T603] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 675.312238][ T603] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 675.841194][ T643] tipc: Enabling of bearer rejected, already enabled [ 675.907933][ T647] netlink: 12 bytes leftover after parsing attributes in process `syz.4.10983'. [ 676.209945][ T654] lo speed is unknown, defaulting to 1000 [ 676.386000][ T674] random: crng reseeded on system resumption [ 677.683913][ T699] lo speed is unknown, defaulting to 1000 [ 677.699577][ T705] random: crng reseeded on system resumption [ 677.758979][ T708] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11005'. [ 677.775122][ T710] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11006'. [ 677.815098][ T708] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11005'. [ 678.962791][ T737] tipc: Enabling of bearer rejected, already enabled [ 678.986486][ T739] netlink: 32 bytes leftover after parsing attributes in process `syz.0.11018'. [ 678.999983][ T739] netlink: 20 bytes leftover after parsing attributes in process `syz.0.11018'. [ 679.010548][ T741] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11019'. [ 679.148718][ T29] kauditd_printk_skb: 788 callbacks suppressed [ 679.148737][ T29] audit: type=1326 audit(1767499868.068:102946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=158 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.178666][ T29] audit: type=1326 audit(1767499868.068:102947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.218092][ T29] audit: type=1326 audit(1767499868.068:102948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.241781][ T29] audit: type=1326 audit(1767499868.068:102949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.265420][ T29] audit: type=1326 audit(1767499868.068:102950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.289138][ T29] audit: type=1326 audit(1767499868.068:102951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.312833][ T29] audit: type=1326 audit(1767499868.078:102952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.351775][ T29] audit: type=1326 audit(1767499868.258:102953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.385559][ T29] audit: type=1326 audit(1767499868.298:102954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.409383][ T29] audit: type=1326 audit(1767499868.298:102955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=748 comm="syz.4.11021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 679.597150][ T759] random: crng reseeded on system resumption [ 680.268617][ T770] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11029'. [ 680.370488][ T775] tipc: Enabling of bearer rejected, already enabled [ 680.625320][ T791] random: crng reseeded on system resumption [ 681.397491][ T802] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11042'. [ 681.497613][ T807] random: crng reseeded on system resumption [ 681.522233][ T810] tipc: Enabling of bearer rejected, already enabled [ 681.600588][ T5172] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.615755][ T5172] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.649896][ T5172] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.682672][ T5172] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 682.438619][ T854] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11064'. [ 682.464429][ T856] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.522179][ T856] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.571112][ T856] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.660552][ T872] tipc: Enabling of bearer rejected, already enabled [ 682.672883][ T856] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.811634][ T884] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11077'. [ 682.897283][ T885] lo speed is unknown, defaulting to 1000 [ 683.117508][ T902] tipc: Enabling of bearer rejected, already enabled [ 683.827313][ T929] syzkaller0: entered promiscuous mode [ 683.832931][ T929] syzkaller0: entered allmulticast mode [ 683.895250][ T938] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11100'. [ 683.904430][ T938] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11100'. [ 683.913644][ T938] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11100'. [ 684.165445][ T29] kauditd_printk_skb: 498 callbacks suppressed [ 684.165464][ T29] audit: type=1326 audit(1767499873.078:103454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=955 comm="syz.3.11109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 684.198982][ T956] random: crng reseeded on system resumption [ 684.206010][ T959] tipc: Enabling of bearer rejected, already enabled [ 684.226164][ T29] audit: type=1326 audit(1767499873.088:103455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.249943][ T29] audit: type=1326 audit(1767499873.088:103456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.273600][ T29] audit: type=1326 audit(1767499873.088:103457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.297241][ T29] audit: type=1326 audit(1767499873.088:103458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.320926][ T29] audit: type=1326 audit(1767499873.088:103459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.344520][ T29] audit: type=1326 audit(1767499873.088:103460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.347675][ T957] lo speed is unknown, defaulting to 1000 [ 684.368132][ T29] audit: type=1326 audit(1767499873.088:103461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.368203][ T29] audit: type=1326 audit(1767499873.088:103462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.421270][ T29] audit: type=1326 audit(1767499873.088:103463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=958 comm="syz.4.11103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa48323f749 code=0x7ffc0000 [ 684.774849][ T987] lo speed is unknown, defaulting to 1000 [ 685.008552][ T1011] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11131'. [ 685.112731][ T1020] lo speed is unknown, defaulting to 1000 [ 685.287940][ T1041] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11144'. [ 685.372385][ T1048] random: crng reseeded on system resumption [ 685.770574][ T1052] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11148'. [ 685.779749][ T1052] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11148'. [ 685.788922][ T1052] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11148'. [ 685.820021][ T1052] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11148'. [ 686.178117][ T1066] lo speed is unknown, defaulting to 1000 [ 686.339378][ T1081] tipc: Enabling of bearer rejected, already enabled [ 686.431026][T28754] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 686.460662][T28754] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 686.486717][T28754] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 686.495558][T28754] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 686.626080][ T1106] random: crng reseeded on system resumption [ 686.666221][ T1105] lo speed is unknown, defaulting to 1000 [ 687.358038][ T1122] tipc: Enabling of bearer rejected, already enabled [ 687.442572][ T1128] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 687.493274][ T1128] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 687.553228][ T1128] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 687.653601][ T1128] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 687.720476][ T5808] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.752981][ T5808] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.786036][ T5808] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.817671][ T5808] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.996140][ T1168] random: crng reseeded on system resumption [ 688.471487][ T1171] __nla_validate_parse: 34 callbacks suppressed [ 688.471508][ T1171] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11192'. [ 688.545356][ T1177] tipc: Enabling of bearer rejected, already enabled [ 688.603813][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.606201][ T1188] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 688.613021][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.613044][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.653799][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.662961][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.672164][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.700506][ T1188] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 688.713045][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.722235][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.731358][ T1185] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11200'. [ 688.760416][ T1188] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 688.843555][ T1188] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 688.899806][ T5998] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.930336][ T5998] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.943561][ T5998] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.952263][ T5998] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.979252][ T1221] tipc: Enabling of bearer rejected, already enabled [ 689.240923][ T29] kauditd_printk_skb: 1154 callbacks suppressed [ 689.240942][ T29] audit: type=1326 audit(1767499878.158:104618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.295799][ T29] audit: type=1326 audit(1767499878.188:104619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.319632][ T29] audit: type=1326 audit(1767499878.188:104620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.343421][ T29] audit: type=1326 audit(1767499878.188:104621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.367148][ T29] audit: type=1326 audit(1767499878.188:104622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.390949][ T29] audit: type=1326 audit(1767499878.188:104623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.414724][ T29] audit: type=1326 audit(1767499878.188:104624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.438453][ T29] audit: type=1326 audit(1767499878.188:104625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.462229][ T29] audit: type=1326 audit(1767499878.188:104626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.485865][ T29] audit: type=1326 audit(1767499878.188:104627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1241 comm="syz.0.11222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc59d7f749 code=0x7ffc0000 [ 689.562211][T25637] syz_tun (unregistering): left allmulticast mode [ 689.568885][T25637] syz_tun (unregistering): left promiscuous mode [ 689.575353][T25637] bridge0: port 3(syz_tun) entered disabled state [ 689.590960][ T4411] smc: removing ib device syz1 [ 689.597106][ T3879] syz1: Port: 1 Link DOWN [ 689.605438][ T1253] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 689.633116][ T1257] tipc: Enabling of bearer rejected, already enabled [ 689.665012][ T1253] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 689.717347][ T1244] lo speed is unknown, defaulting to 1000 [ 689.786463][ T1253] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 689.826212][ T1279] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 689.900559][ T1244] chnl_net:caif_netlink_parms(): no params data found [ 689.976066][ T1253] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.019042][ T1244] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.026177][ T1244] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.053722][ T1244] bridge_slave_0: entered allmulticast mode [ 690.061237][ T1244] bridge_slave_0: entered promiscuous mode [ 690.068266][ T1244] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.075409][ T1244] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.121030][ T1244] bridge_slave_1: entered allmulticast mode [ 690.151475][ T1244] bridge_slave_1: entered promiscuous mode [ 690.206537][ T1244] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 690.224638][ T1304] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.245560][ T1244] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 690.275457][ T1304] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.293044][ T1295] bond1: option ad_user_port_key: invalid value (1136) [ 690.300288][ T1295] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 690.309492][ T1295] bond1 (unregistering): Released all slaves [ 690.321248][ T1244] team0: Port device team_slave_0 added [ 690.328113][ T1304] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.343941][ T1305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1305 comm=syz.4.11233 [ 690.345117][ T1244] team0: Port device team_slave_1 added [ 690.374606][ T1244] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 690.381702][ T1244] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 690.407664][ T1244] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 690.419657][ T1244] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 690.426640][ T1244] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 690.452674][ T1244] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 690.481638][ T1244] hsr_slave_0: entered promiscuous mode [ 690.487890][ T1244] hsr_slave_1: entered promiscuous mode [ 690.494192][ T1244] debugfs: 'hsr0' already exists in 'hsr' [ 690.499992][ T1244] Cannot create hsr debugfs directory [ 690.507716][ T1304] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.574759][ T1244] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.590942][ T4411] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.603250][ T5794] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.615421][ T4411] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.627623][ T5808] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.640906][ T1244] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.680007][ T1244] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.741022][ T1244] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.785970][ T1314] tipc: Enabling of bearer rejected, already enabled [ 691.282822][ T1339] syzkaller0: entered promiscuous mode [ 691.288560][ T1339] syzkaller0: entered allmulticast mode [ 691.331550][ T1342] lo speed is unknown, defaulting to 1000 [ 691.442173][ T1344] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.500451][ T1340] bond1: option ad_user_port_key: invalid value (1136) [ 691.507464][ T1340] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 691.515956][ T1340] bond1 (unregistering): Released all slaves [ 691.526603][ T1344] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.552871][ T1343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1343 comm=syz.0.11249 [ 691.580381][ T1344] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.640068][ T1344] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.755297][ T4411] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 691.767054][ T4411] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 691.778907][ T4411] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 691.791359][ T6006] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 692.356024][ T1370] lo speed is unknown, defaulting to 1000 [ 692.581012][ T1244] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 692.590156][ T1244] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 692.599418][ T1244] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 692.608557][ T1244] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 692.896908][ T1393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1393 comm=syz.2.11266 [ 692.934472][ T1390] bond1: option ad_user_port_key: invalid value (1136) [ 692.941440][ T1390] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 692.951699][ T1390] bond1 (unregistering): Released all slaves [ 692.969790][ T1717] bridge_slave_1: left allmulticast mode [ 692.975500][ T1717] bridge_slave_1: left promiscuous mode [ 692.981261][ T1717] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.990885][ T1717] bridge_slave_0: left allmulticast mode [ 692.996658][ T1717] bridge_slave_0: left promiscuous mode [ 693.002376][ T1717] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.093173][ T1717] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 693.539843][ T1717] bond1 (unregistering): (slave bond0): Releasing active interface [ 693.550579][ T1717] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 693.561017][ T1717] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 693.571111][ T1717] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 693.580731][ T1717] bond0 (unregistering): Released all slaves [ 693.589858][ T1717] bond1 (unregistering): Released all slaves [ 693.611297][ T4411] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 693.622458][ T1405] lo speed is unknown, defaulting to 1000 [ 693.645523][ T4411] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 693.653789][ T1717] tipc: Disabling bearer [ 693.658892][ T1717] tipc: Left network mode [ 693.663924][ T4411] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 693.672578][ T4411] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 693.681441][ T1717] IPVS: stopping backup sync thread 29174 ... [ 693.687701][ T1717] IPVS: stopping backup sync thread 29173 ... [ 693.695003][ T1717] IPVS: stopping backup sync thread 29172 ... [ 693.714357][ T1717] IPVS: stopping backup sync thread 29171 ... [ 693.736269][ T1717] hsr_slave_0: left promiscuous mode [ 693.742537][ T1717] hsr_slave_1: left promiscuous mode [ 693.748675][ T1717] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 693.756126][ T1717] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 693.764329][ T1717] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 693.771787][ T1717] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 693.781420][ T1717] veth1_macvtap: left promiscuous mode [ 693.787090][ T1717] veth0_macvtap: left promiscuous mode [ 693.792867][ T1717] veth1_vlan: left promiscuous mode [ 693.798371][ T1717] veth0_vlan: left promiscuous mode [ 693.923660][ T1244] 8021q: adding VLAN 0 to HW filter on device bond0 [ 693.938354][ T1244] 8021q: adding VLAN 0 to HW filter on device team0 [ 693.948390][ T5808] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.955539][ T5808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.967531][ T5808] bridge0: port 2(bridge_slave_1) entered blocking state [ 693.974735][ T5808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 694.042115][ T1429] tipc: Enabling of bearer rejected, already enabled [ 694.071486][ T1244] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 694.143712][ T1244] veth0_vlan: entered promiscuous mode [ 694.155422][ T1438] lo speed is unknown, defaulting to 1000 [ 694.157880][ T1244] veth1_vlan: entered promiscuous mode [ 694.203410][ T1244] veth0_macvtap: entered promiscuous mode [ 694.211009][ T1244] veth1_macvtap: entered promiscuous mode [ 694.227364][ T1244] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 694.242560][ T1244] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 694.254805][ T5808] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 694.264070][ T5808] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 694.274513][ T5808] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 694.285285][ T5808] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 694.305133][ T29] kauditd_printk_skb: 1061 callbacks suppressed [ 694.305150][ T29] audit: type=1400 audit(1767499883.218:105689): avc: denied { mounton } for pid=1244 comm="syz-executor" path="/root/syzkaller.qQCm6M/syz-tmp" dev="sda1" ino=2081 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 694.348774][ T29] audit: type=1400 audit(1767499883.248:105690): avc: denied { mount } for pid=1244 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 694.371170][ T29] audit: type=1400 audit(1767499883.248:105691): avc: denied { mount } for pid=1244 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 694.393790][ T29] audit: type=1400 audit(1767499883.268:105692): avc: denied { mounton } for pid=1244 comm="syz-executor" path="/root/syzkaller.qQCm6M/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 694.420723][ T29] audit: type=1400 audit(1767499883.268:105693): avc: denied { mounton } for pid=1244 comm="syz-executor" path="/root/syzkaller.qQCm6M/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=160917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 694.448902][ T29] audit: type=1400 audit(1767499883.268:105694): avc: denied { unmount } for pid=1244 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 694.471033][ T29] audit: type=1326 audit(1767499883.368:105695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1437 comm="syz.3.11283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 694.494857][ T29] audit: type=1326 audit(1767499883.368:105696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1437 comm="syz.3.11283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 694.518610][ T29] audit: type=1326 audit(1767499883.368:105697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1437 comm="syz.3.11283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 694.542403][ T29] audit: type=1326 audit(1767499883.378:105698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1437 comm="syz.3.11283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 694.620237][ T1450] __nla_validate_parse: 5 callbacks suppressed [ 694.620310][ T1450] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11286'. [ 695.020079][ T1468] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11292'. [ 695.077488][ T1472] xt_TPROXY: Can be used only with -p tcp or -p udp [ 695.448874][ T1490] siw: device registration error -23 [ 695.456436][ T1492] tipc: Enabling of bearer rejected, already enabled [ 695.472425][ T1494] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11304'. [ 695.590618][ T1506] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 695.719247][ T1519] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11314'. [ 695.796742][ T1523] tipc: Enabling of bearer rejected, already enabled [ 695.884285][ T1531] syzkaller0: entered promiscuous mode [ 695.890179][ T1531] syzkaller0: entered allmulticast mode [ 696.308053][ T1573] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11333'. [ 696.434373][ T1576] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 696.439778][ T1576] netlink: 176 bytes leftover after parsing attributes in process `syz.0.11335'. [ 696.915114][ T1597] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 696.970251][ T1597] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 696.971877][ T1596] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11342'. [ 696.998874][ T1596] bond1: option ad_user_port_key: invalid value (1136) [ 697.005833][ T1596] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 697.014383][ T1596] bond1 (unregistering): Released all slaves [ 697.029512][ T1598] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1598 comm=syz.3.11342 [ 697.043402][ T1597] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 697.088620][ T1604] tipc: Started in network mode [ 697.093678][ T1604] tipc: Node identity ac14140f, cluster identity 4711 [ 697.106785][ T1604] tipc: New replicast peer: 255.255.255.83 [ 697.112808][ T1604] tipc: Enabled bearer , priority 10 [ 697.120027][ T1597] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 697.168808][ T1613] lo speed is unknown, defaulting to 1000 [ 697.174282][ T1615] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 697.179204][ T1615] netlink: 176 bytes leftover after parsing attributes in process `syz.4.11350'. [ 697.254923][ T1624] xt_TPROXY: Can be used only with -p tcp or -p udp [ 697.401329][ T1630] syzkaller0: entered promiscuous mode [ 697.406862][ T1630] syzkaller0: entered allmulticast mode [ 697.551944][ T1646] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11364'. [ 697.586276][ T1648] lo speed is unknown, defaulting to 1000 [ 697.667156][ T1653] netlink: 40 bytes leftover after parsing attributes in process `syz.1.11367'. [ 697.715077][ T1657] xt_TPROXY: Can be used only with -p tcp or -p udp [ 698.055475][ T1717] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.067372][ T1717] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.079837][T28754] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.090955][T28754] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.108328][ T23] tipc: Node number set to 2886997007 [ 698.153751][ T1666] random: crng reseeded on system resumption [ 698.565077][ T1676] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.588570][ T1671] bond1: option ad_user_port_key: invalid value (1136) [ 698.595585][ T1671] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 698.604403][ T1671] bond1 (unregistering): Released all slaves [ 698.613826][ T1674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1674 comm=syz.0.11381 [ 698.650490][ T1676] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.671486][ T1683] random: crng reseeded on system resumption [ 698.700440][ T1676] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.734826][ T1682] syzkaller0: entered promiscuous mode [ 698.740421][ T1682] syzkaller0: entered allmulticast mode [ 698.751534][ T1676] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.763048][ T1685] lo speed is unknown, defaulting to 1000 [ 698.816660][ T6006] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.864696][ T5998] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.874861][ T5998] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 698.884625][ T1697] xt_TPROXY: Can be used only with -p tcp or -p udp [ 698.886076][ T5998] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 699.152705][ T1715] random: crng reseeded on system resumption [ 699.213400][ T1718] lo speed is unknown, defaulting to 1000 [ 699.438537][ T29] kauditd_printk_skb: 1235 callbacks suppressed [ 699.438559][ T29] audit: type=1326 audit(1767499888.288:106934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1712 comm="syz.2.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 699.468597][ T29] audit: type=1326 audit(1767499888.288:106935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1712 comm="syz.2.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc55f53f749 code=0x7ffc0000 [ 699.499369][ T29] audit: type=1400 audit(1767499888.408:106936): avc: denied { execute } for pid=1733 comm="syz.1.11399" dev="tmpfs" ino=3313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 699.521092][ T29] audit: type=1400 audit(1767499888.408:106937): avc: denied { execute_no_trans } for pid=1733 comm="syz.1.11399" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=3313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 699.666950][ T1739] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 699.747460][ T1735] __nla_validate_parse: 2 callbacks suppressed [ 699.747479][ T1735] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11398'. [ 699.764101][ T1739] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 699.781871][ T1735] bond1: option ad_user_port_key: invalid value (1136) [ 699.788860][ T1735] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 699.797408][ T1735] bond1 (unregistering): Released all slaves [ 699.810331][ T1737] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1737 comm=syz.0.11398 [ 699.841136][ T1739] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 699.860998][ T29] audit: type=1326 audit(1767499888.778:106938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1751 comm="syz.1.11405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f072116f749 code=0x7ffc0000 [ 699.884436][ T1750] syzkaller0: entered promiscuous mode [ 699.890271][ T1750] syzkaller0: entered allmulticast mode [ 699.894726][ T29] audit: type=1326 audit(1767499888.798:106939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1751 comm="syz.1.11405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f072116f749 code=0x7ffc0000 [ 699.919815][ T29] audit: type=1326 audit(1767499888.798:106940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1751 comm="syz.1.11405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f072116f749 code=0x7ffc0000 [ 699.943663][ T29] audit: type=1326 audit(1767499888.798:106941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1751 comm="syz.1.11405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f072116f749 code=0x7ffc0000 [ 699.967430][ T29] audit: type=1326 audit(1767499888.798:106942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1751 comm="syz.1.11405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f072116f749 code=0x7ffc0000 [ 699.991208][ T29] audit: type=1326 audit(1767499888.798:106943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1751 comm="syz.1.11405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f072116f749 code=0x7ffc0000 [ 700.016484][ T1739] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 700.170939][ T1759] random: crng reseeded on system resumption [ 700.316714][ T1769] netlink: 40 bytes leftover after parsing attributes in process `syz.4.11411'. [ 700.387042][ T1777] tipc: Enabling of bearer rejected, already enabled [ 700.636177][ T1784] lo speed is unknown, defaulting to 1000 [ 701.096028][ T1795] netlink: 40 bytes leftover after parsing attributes in process `syz.2.11423'. [ 701.126960][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.136260][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.145559][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.166919][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.176185][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.185369][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.212833][ T1797] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11424'. [ 701.337685][ T1807] tipc: Enabling of bearer rejected, already enabled [ 701.524348][ T1818] random: crng reseeded on system resumption [ 701.655767][ T1830] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 701.696024][ T1834] tipc: Enabling of bearer rejected, already enabled [ 701.979459][ T1852] syzkaller0: entered promiscuous mode [ 701.985158][ T1852] syzkaller0: entered allmulticast mode [ 702.095695][ T1861] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 702.427813][ T1871] tipc: Enabling of bearer rejected, already enabled [ 702.557286][ T1882] lo speed is unknown, defaulting to 1000 [ 702.590139][ T1887] random: crng reseeded on system resumption [ 702.644214][ T1889] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 703.344674][ T5808] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 703.371563][ T5808] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 703.380434][ T5808] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 703.388787][ T5808] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 703.465018][ T1920] lo speed is unknown, defaulting to 1000 [ 704.025352][ T1961] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 704.089835][ T1963] bond1: option ad_user_port_key: invalid value (1136) [ 704.096747][ T1963] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 704.106901][ T1963] bond1 (unregistering): Released all slaves [ 704.122419][ T1961] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 704.150305][ T1965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1965 comm=syz.4.11487 [ 704.250832][ T1961] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 704.300215][ T1961] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 704.357922][ T5808] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.377720][ T4411] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.391857][ T4411] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.404713][ T1972] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 704.435236][ T4411] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.452294][ T29] kauditd_printk_skb: 1095 callbacks suppressed [ 704.452336][ T29] audit: type=1326 audit(1767499893.368:108039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.492675][ T29] audit: type=1326 audit(1767499893.368:108040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.516453][ T29] audit: type=1326 audit(1767499893.368:108041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.540150][ T29] audit: type=1326 audit(1767499893.378:108042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1975 comm="syz.0.11495" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fbc59d7f749 code=0x0 [ 704.542713][ T1977] random: crng reseeded on system resumption [ 704.563408][ T29] audit: type=1326 audit(1767499893.378:108043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.563520][ T29] audit: type=1326 audit(1767499893.378:108044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.617012][ T29] audit: type=1326 audit(1767499893.378:108045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.640897][ T29] audit: type=1326 audit(1767499893.378:108046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.664777][ T29] audit: type=1326 audit(1767499893.378:108047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.688618][ T29] audit: type=1326 audit(1767499893.378:108048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1973 comm="syz.3.11496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 704.714057][ T1974] lo speed is unknown, defaulting to 1000 [ 704.782215][ T1982] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 704.786445][ T1982] __nla_validate_parse: 17 callbacks suppressed [ 704.786463][ T1982] netlink: 176 bytes leftover after parsing attributes in process `syz.1.11497'. [ 704.878495][ T1993] netlink: 40 bytes leftover after parsing attributes in process `syz.1.11504'. [ 704.911024][ T1996] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11505'. [ 704.960891][ T2005] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11510'. [ 705.086350][ T2012] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 705.213330][ T2018] lo speed is unknown, defaulting to 1000 [ 705.450998][ T2039] lo speed is unknown, defaulting to 1000 [ 705.761445][ T2045] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 705.853946][ T2058] random: crng reseeded on system resumption [ 705.991207][ T2071] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 705.991599][ T2069] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11537'. [ 706.191365][ T2087] lo speed is unknown, defaulting to 1000 [ 706.508447][ T2105] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 706.662048][ T2112] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 706.672992][ T2114] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11554'. [ 706.812440][ T2122] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11556'. [ 706.850274][ T2124] lo speed is unknown, defaulting to 1000 [ 706.900734][ T2128] random: crng reseeded on system resumption [ 707.017246][ T2136] netlink: 'syz.0.11562': attribute type 13 has an invalid length. [ 707.241260][ T2146] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 707.364588][ T2153] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11567'. [ 707.432175][ T2154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2154 comm=syz.0.11567 [ 707.742177][ T2150] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.762390][ T2153] bond1: option ad_user_port_key: invalid value (1136) [ 707.769413][ T2153] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 707.777746][ T2153] bond1 (unregistering): Released all slaves [ 707.810373][ T2150] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.963258][ T2150] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 708.010494][ T2150] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 708.066028][ T2176] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11577'. [ 708.156482][ T1717] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.169886][ T1717] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.178454][ T1717] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.186973][ T1717] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 708.217938][ T2180] tipc: Enabling of bearer rejected, already enabled [ 708.302470][ T2191] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11584'. [ 708.402336][ T2199] lo speed is unknown, defaulting to 1000 [ 708.487951][ T2205] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 708.588967][ T2211] FAULT_INJECTION: forcing a failure. [ 708.588967][ T2211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.609999][ T2211] CPU: 0 UID: 0 PID: 2211 Comm: syz.4.11593 Not tainted syzkaller #0 PREEMPT(voluntary) [ 708.610032][ T2211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 708.610048][ T2211] Call Trace: [ 708.610058][ T2211] [ 708.610092][ T2211] __dump_stack+0x1d/0x30 [ 708.610137][ T2211] dump_stack_lvl+0x95/0xd0 [ 708.610165][ T2211] dump_stack+0x15/0x1b [ 708.610192][ T2211] should_fail_ex+0x265/0x280 [ 708.610222][ T2211] should_fail+0xb/0x20 [ 708.610298][ T2211] should_fail_usercopy+0x1a/0x20 [ 708.610403][ T2211] _copy_from_user+0x1c/0xb0 [ 708.610441][ T2211] __sys_sendto+0x19e/0x330 [ 708.610487][ T2211] __x64_sys_sendto+0x76/0x90 [ 708.610569][ T2211] x64_sys_call+0x29a7/0x3000 [ 708.610601][ T2211] do_syscall_64+0xca/0x2b0 [ 708.610674][ T2211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 708.610703][ T2211] RIP: 0033:0x7fa48323f749 [ 708.610722][ T2211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 708.610749][ T2211] RSP: 002b:00007fa481ca7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 708.610834][ T2211] RAX: ffffffffffffffda RBX: 00007fa483495fa0 RCX: 00007fa48323f749 [ 708.610865][ T2211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 708.610905][ T2211] RBP: 00007fa481ca7090 R08: 0000200000000300 R09: 000000000000001c [ 708.610920][ T2211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.610997][ T2211] R13: 00007fa483496038 R14: 00007fa483495fa0 R15: 00007ffff56cd758 [ 708.611019][ T2211] [ 708.855415][ T2218] tipc: Enabling of bearer rejected, already enabled [ 709.068523][ T2238] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -107 0 [ 709.171385][ T2245] random: crng reseeded on system resumption [ 709.378553][ T2259] tipc: Enabling of bearer rejected, already enabled [ 709.486763][ T29] kauditd_printk_skb: 1644 callbacks suppressed [ 709.486779][ T29] audit: type=1326 audit(1767499898.398:109693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2252 comm="syz.3.11611" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a6957f749 code=0x7ffc0000 [ 709.601298][ T29] audit: type=1400 audit(1767499898.508:109694): avc: denied { map_create } for pid=2262 comm="syz.2.11615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 709.620830][ T29] audit: type=1400 audit(1767499898.508:109695): avc: denied { map_read map_write } for pid=2262 comm="syz.2.11615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 709.641006][ T29] audit: type=1400 audit(1767499898.518:109696): avc: denied { prog_load } for pid=2262 comm="syz.2.11615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 709.660539][ T29] audit: type=1400 audit(1767499898.518:109697): avc: denied { bpf } for pid=2262 comm="syz.2.11615" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 709.681421][ T29] audit: type=1400 audit(1767499898.518:109698): avc: denied { perfmon } for pid=2262 comm="syz.2.11615" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 709.702695][ T29] audit: type=1400 audit(1767499898.518:109699): avc: denied { prog_run } for pid=2262 comm="syz.2.11615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 709.731180][ T29] audit: type=1400 audit(1767499898.538:109700): avc: denied { read } for pid=2270 comm="syz.0.11619" dev="nsfs" ino=4026532373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 709.752720][ T29] audit: type=1400 audit(1767499898.538:109701): avc: denied { open } for pid=2270 comm="syz.0.11619" path="net:[4026532373]" dev="nsfs" ino=4026532373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 709.776560][ T29] audit: type=1400 audit(1767499898.538:109702): avc: denied { create } for pid=2270 comm="syz.0.11619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 709.999303][ T2291] tipc: Enabling of bearer rejected, already enabled [ 710.081115][ T2295] __nla_validate_parse: 3 callbacks suppressed [ 710.081132][ T2295] netlink: 40 bytes leftover after parsing attributes in process `syz.4.11628'. [ 710.120116][ T2297] FAULT_INJECTION: forcing a failure. [ 710.120116][ T2297] name failslab, interval 1, probability 0, space 0, times 0 [ 710.132884][ T2297] CPU: 0 UID: 0 PID: 2297 Comm: syz.4.11629 Not tainted syzkaller #0 PREEMPT(voluntary) [ 710.132917][ T2297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 710.132985][ T2297] Call Trace: [ 710.132993][ T2297] [ 710.133011][ T2297] __dump_stack+0x1d/0x30 [ 710.133045][ T2297] dump_stack_lvl+0x95/0xd0 [ 710.133074][ T2297] dump_stack+0x15/0x1b [ 710.133101][ T2297] should_fail_ex+0x265/0x280 [ 710.133142][ T2297] should_failslab+0x8c/0xb0 [ 710.133170][ T2297] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 710.133198][ T2297] ? __alloc_skb+0x2ff/0x4b0 [ 710.133231][ T2297] __alloc_skb+0x2ff/0x4b0 [ 710.133296][ T2297] ? __alloc_skb+0x228/0x4b0 [ 710.133401][ T2297] netlink_ack+0xfd/0x500 [ 710.133433][ T2297] ? __pfx_ctrl_getfamily+0x10/0x10 [ 710.133458][ T2297] netlink_rcv_skb+0x192/0x220 [ 710.133494][ T2297] ? __pfx_genl_rcv_msg+0x10/0x10 [ 710.133531][ T2297] genl_rcv+0x28/0x40 [ 710.133557][ T2297] netlink_unicast+0x5c0/0x690 [ 710.133625][ T2297] netlink_sendmsg+0x58b/0x6b0 [ 710.133669][ T2297] ? __pfx_netlink_sendmsg+0x10/0x10 [ 710.133711][ T2297] __sock_sendmsg+0x145/0x180 [ 710.133737][ T2297] __sys_sendto+0x268/0x330 [ 710.133793][ T2297] __x64_sys_sendto+0x76/0x90 [ 710.133820][ T2297] x64_sys_call+0x29a7/0x3000 [ 710.133880][ T2297] do_syscall_64+0xca/0x2b0 [ 710.133917][ T2297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.133939][ T2297] RIP: 0033:0x7fa4832415dc [ 710.133955][ T2297] Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b [ 710.134022][ T2297] RSP: 002b:00007fa481ca5ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 710.134044][ T2297] RAX: ffffffffffffffda RBX: 00007fa481ca5fc0 RCX: 00007fa4832415dc [ 710.134060][ T2297] RDX: 0000000000000024 RSI: 00007fa481ca6010 RDI: 0000000000000004 [ 710.134098][ T2297] RBP: 0000000000000000 R08: 00007fa481ca5f14 R09: 000000000000000c [ 710.134114][ T2297] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 710.134130][ T2297] R13: 00007fa481ca5f68 R14: 00007fa481ca6010 R15: 0000000000000000 [ 710.134196][ T2297] [ 710.379530][ T2300] xt_limit: Overflow, try lower: 268435456/134217728 [ 710.412061][ T2302] 9p: Invalid gid '0x00000000ffffffff' [ 710.538792][ T2314] x_tables: duplicate underflow at hook 2 [ 710.738373][ T2324] tipc: Enabling of bearer rejected, already enabled [ 710.789791][ T2332] FAULT_INJECTION: forcing a failure. [ 710.789791][ T2332] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 710.803062][ T2332] CPU: 1 UID: 0 PID: 2332 Comm: syz.4.11643 Not tainted syzkaller #0 PREEMPT(voluntary) [ 710.803099][ T2332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 710.803126][ T2332] Call Trace: [ 710.803134][ T2332] [ 710.803142][ T2332] __dump_stack+0x1d/0x30 [ 710.803169][ T2332] dump_stack_lvl+0x95/0xd0 [ 710.803239][ T2332] dump_stack+0x15/0x1b [ 710.803290][ T2332] should_fail_ex+0x265/0x280 [ 710.803318][ T2332] should_fail+0xb/0x20 [ 710.803343][ T2332] should_fail_usercopy+0x1a/0x20 [ 710.803410][ T2332] _copy_from_user+0x1c/0xb0 [ 710.803441][ T2332] ____sys_sendmsg+0x1c5/0x4a0 [ 710.803482][ T2332] ___sys_sendmsg+0x17b/0x1d0 [ 710.803604][ T2332] __x64_sys_sendmsg+0xd4/0x160 [ 710.803642][ T2332] x64_sys_call+0x17ba/0x3000 [ 710.803673][ T2332] do_syscall_64+0xca/0x2b0 [ 710.803747][ T2332] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.803775][ T2332] RIP: 0033:0x7fa48323f749 [ 710.803795][ T2332] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.803846][ T2332] RSP: 002b:00007fa481ca7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 710.803867][ T2332] RAX: ffffffffffffffda RBX: 00007fa483495fa0 RCX: 00007fa48323f749 [ 710.803883][ T2332] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000005 [ 710.803941][ T2332] RBP: 00007fa481ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 710.803953][ T2332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 710.803967][ T2332] R13: 00007fa483496038 R14: 00007fa483495fa0 R15: 00007ffff56cd758 [ 710.803993][ T2332] [ 711.060832][ T2342] FAULT_INJECTION: forcing a failure. [ 711.060832][ T2342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 711.074005][ T2342] CPU: 0 UID: 0 PID: 2342 Comm: syz.0.11644 Not tainted syzkaller #0 PREEMPT(voluntary) [ 711.074035][ T2342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 711.074053][ T2342] Call Trace: [ 711.074062][ T2342] [ 711.074073][ T2342] __dump_stack+0x1d/0x30 [ 711.074178][ T2342] dump_stack_lvl+0x95/0xd0 [ 711.074210][ T2342] dump_stack+0x15/0x1b [ 711.074236][ T2342] should_fail_ex+0x265/0x280 [ 711.074260][ T2342] should_fail+0xb/0x20 [ 711.074282][ T2342] should_fail_usercopy+0x1a/0x20 [ 711.074313][ T2342] _copy_to_user+0x20/0xa0 [ 711.074365][ T2342] simple_read_from_buffer+0xb5/0x130 [ 711.074424][ T2342] proc_fail_nth_read+0x10e/0x150 [ 711.074462][ T2342] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 711.074547][ T2342] vfs_read+0x1a8/0x770 [ 711.074566][ T2342] ? __rcu_read_unlock+0x4f/0x70 [ 711.074587][ T2342] ? __fget_files+0x184/0x1c0 [ 711.074616][ T2342] ? mutex_lock+0x58/0x90 [ 711.074647][ T2342] ksys_read+0xda/0x1a0 [ 711.074715][ T2342] __x64_sys_read+0x40/0x50 [ 711.074744][ T2342] x64_sys_call+0x2889/0x3000 [ 711.074769][ T2342] do_syscall_64+0xca/0x2b0 [ 711.074807][ T2342] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 711.074874][ T2342] RIP: 0033:0x7fbc59d7e15c [ 711.074893][ T2342] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 711.074965][ T2342] RSP: 002b:00007fbc587e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 711.074985][ T2342] RAX: ffffffffffffffda RBX: 00007fbc59fd5fa0 RCX: 00007fbc59d7e15c [ 711.075000][ T2342] RDX: 000000000000000f RSI: 00007fbc587e70a0 RDI: 0000000000000005 [ 711.075016][ T2342] RBP: 00007fbc587e7090 R08: 0000000000000000 R09: 0000000000000000 [ 711.075065][ T2342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 711.075077][ T2342] R13: 00007fbc59fd6038 R14: 00007fbc59fd5fa0 R15: 00007ffd7903ec48 [ 711.075149][ T2342] [ 711.288028][ T2344] lo speed is unknown, defaulting to 1000 [ 711.298362][ T2347] netlink: 48 bytes leftover after parsing attributes in process `syz.0.11648'. [ 711.479368][ T2357] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11653'. [ 711.657355][ T2361] tipc: Enabling of bearer rejected, already enabled [ 711.764899][ T2363] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11656'. [ 711.774032][ T2363] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11656'. [ 711.854868][ T2370] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11658'. [ 711.865505][ T2367] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=104 sclass=netlink_audit_socket pid=2367 comm=syz.2.11657 [ 711.919602][ T2372] xt_limit: Overflow, try lower: 268435456/134217728 [ 712.154308][ T2381] lo speed is unknown, defaulting to 1000 [ 712.944508][ T2414] netlink: 48 bytes leftover after parsing attributes in process `syz.1.11672'. [ 713.139529][ T1244] ================================================================== [ 713.147709][ T1244] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 713.154446][ T1244] [ 713.156795][ T1244] write to 0xffff888107e46790 of 8 bytes by task 26822 on cpu 0: [ 713.164540][ T1244] __dentry_kill+0x142/0x4b0 [ 713.169182][ T1244] finish_dput+0x2b/0x200 [ 713.173561][ T1244] dput+0x52/0x60 [ 713.177243][ T1244] __fput+0x444/0x650 [ 713.181273][ T1244] fput_close_sync+0xad/0x190 [ 713.186018][ T1244] __x64_sys_close+0x56/0xf0 [ 713.190665][ T1244] x64_sys_call+0x2c25/0x3000 [ 713.195425][ T1244] do_syscall_64+0xca/0x2b0 [ 713.199997][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 713.205955][ T1244] [ 713.208325][ T1244] read to 0xffff888107e46790 of 8 bytes by task 1244 on cpu 1: [ 713.215898][ T1244] fast_dput+0x5f/0x2c0 [ 713.220106][ T1244] dput+0x24/0x60 [ 713.223784][ T1244] __fput+0x444/0x650 [ 713.227814][ T1244] fput_close_sync+0xad/0x190 [ 713.232528][ T1244] __x64_sys_close+0x56/0xf0 [ 713.237159][ T1244] x64_sys_call+0x2c25/0x3000 [ 713.241886][ T1244] do_syscall_64+0xca/0x2b0 [ 713.246443][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 713.252374][ T1244] [ 713.254724][ T1244] value changed: 0xffff888237909690 -> 0x0000000000000000 [ 713.261855][ T1244] [ 713.264208][ T1244] Reported by Kernel Concurrency Sanitizer on: [ 713.270392][ T1244] CPU: 1 UID: 0 PID: 1244 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 713.280327][ T1244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 713.290432][ T1244] ================================================================== [ 714.463890][ T1244] ================================================================== [ 714.472037][ T1244] BUG: KCSAN: data-race in __dentry_kill / lookup_fast [ 714.479032][ T1244] [ 714.481381][ T1244] read-write to 0xffff88811a448600 of 4 bytes by task 26822 on cpu 1: [ 714.489744][ T1244] __dentry_kill+0x230/0x4b0 [ 714.494389][ T1244] finish_dput+0x2b/0x200 [ 714.498844][ T1244] dput+0x52/0x60 [ 714.502511][ T1244] __fput+0x444/0x650 [ 714.506631][ T1244] fput_close_sync+0xad/0x190 [ 714.511525][ T1244] __x64_sys_close+0x56/0xf0 [ 714.516149][ T1244] x64_sys_call+0x2c25/0x3000 [ 714.520893][ T1244] do_syscall_64+0xca/0x2b0 [ 714.525448][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 714.531559][ T1244] [ 714.533911][ T1244] read to 0xffff88811a448600 of 4 bytes by task 1244 on cpu 0: [ 714.541504][ T1244] lookup_fast+0xf0/0x320 [ 714.545876][ T1244] path_openat+0x416/0x23b0 [ 714.550431][ T1244] do_filp_open+0x109/0x230 [ 714.554989][ T1244] do_sys_openat2+0xa6/0x150 [ 714.559628][ T1244] __x64_sys_openat+0xf2/0x120 [ 714.564439][ T1244] x64_sys_call+0x2b07/0x3000 [ 714.569150][ T1244] do_syscall_64+0xca/0x2b0 [ 714.573707][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 714.579656][ T1244] [ 714.582001][ T1244] value changed: 0x00200080 -> 0x00004080 [ 714.587768][ T1244] [ 714.590113][ T1244] Reported by Kernel Concurrency Sanitizer on: [ 714.596322][ T1244] CPU: 0 UID: 0 PID: 1244 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 714.606247][ T1244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 714.616340][ T1244] ================================================================== [ 716.330669][T26822] ================================================================== [ 716.338917][T26822] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 716.345650][T26822] [ 716.348099][T26822] write to 0xffff888107d77cd0 of 8 bytes by task 1244 on cpu 0: [ 716.355938][T26822] __dentry_kill+0x142/0x4b0 [ 716.360590][T26822] finish_dput+0x2b/0x200 [ 716.364969][T26822] dput+0x52/0x60 [ 716.368630][T26822] do_unlinkat+0x202/0x4b0 [ 716.373075][T26822] __x64_sys_unlink+0x2e/0x40 [ 716.377785][T26822] x64_sys_call+0x2f48/0x3000 [ 716.382510][T26822] do_syscall_64+0xca/0x2b0 [ 716.387064][T26822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.393083][T26822] [ 716.395431][T26822] read to 0xffff888107d77cd0 of 8 bytes by task 26822 on cpu 1: [ 716.403080][T26822] fast_dput+0x5f/0x2c0 [ 716.407272][T26822] dput+0x24/0x60 [ 716.410935][T26822] do_unlinkat+0x202/0x4b0 [ 716.415494][T26822] __x64_sys_unlink+0x2e/0x40 [ 716.420203][T26822] x64_sys_call+0x2f48/0x3000 [ 716.424912][T26822] do_syscall_64+0xca/0x2b0 [ 716.429471][T26822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.435392][T26822] [ 716.437740][T26822] value changed: 0xffff888237909690 -> 0x0000000000000000 [ 716.444880][T26822] [ 716.447236][T26822] Reported by Kernel Concurrency Sanitizer on: [ 716.453503][T26822] CPU: 1 UID: 0 PID: 26822 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 716.463515][T26822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 716.473721][T26822] ================================================================== [ 716.580649][ T1244] ================================================================== [ 716.588796][ T1244] BUG: KCSAN: data-race in __dentry_kill / path_openat [ 716.595716][ T1244] [ 716.598086][ T1244] read-write to 0xffff888107e71780 of 4 bytes by task 26822 on cpu 1: [ 716.606354][ T1244] __dentry_kill+0x230/0x4b0 [ 716.611005][ T1244] finish_dput+0x2b/0x200 [ 716.615393][ T1244] dput+0x52/0x60 [ 716.619077][ T1244] __fput+0x444/0x650 [ 716.623094][ T1244] fput_close_sync+0xad/0x190 [ 716.627818][ T1244] __x64_sys_close+0x56/0xf0 [ 716.632544][ T1244] x64_sys_call+0x2c25/0x3000 [ 716.637375][ T1244] do_syscall_64+0xca/0x2b0 [ 716.641948][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.647872][ T1244] [ 716.650234][ T1244] read to 0xffff888107e71780 of 4 bytes by task 1244 on cpu 0: [ 716.657982][ T1244] path_openat+0x62d/0x23b0 [ 716.662549][ T1244] do_filp_open+0x109/0x230 [ 716.667627][ T1244] do_sys_openat2+0xa6/0x150 [ 716.672257][ T1244] __x64_sys_openat+0xf2/0x120 [ 716.677074][ T1244] x64_sys_call+0x2b07/0x3000 [ 716.681798][ T1244] do_syscall_64+0xca/0x2b0 [ 716.686526][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.692460][ T1244] [ 716.694891][ T1244] value changed: 0x00200080 -> 0x00004080 [ 716.700658][ T1244] [ 716.703018][ T1244] Reported by Kernel Concurrency Sanitizer on: [ 716.709202][ T1244] CPU: 0 UID: 0 PID: 1244 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 716.719118][ T1244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 716.729194][ T1244] ================================================================== [ 717.880297][ T1244] ================================================================== [ 717.888444][ T1244] BUG: KCSAN: data-race in __dentry_kill / lookup_fast [ 717.895346][ T1244] [ 717.897691][ T1244] read-write to 0xffff888107d9eb40 of 4 bytes by task 26822 on cpu 1: [ 717.905885][ T1244] __dentry_kill+0x230/0x4b0 [ 717.910535][ T1244] finish_dput+0x2b/0x200 [ 717.914907][ T1244] dput+0x52/0x60 [ 717.918596][ T1244] __fput+0x444/0x650 [ 717.922621][ T1244] fput_close_sync+0xad/0x190 [ 717.927433][ T1244] __x64_sys_close+0x56/0xf0 [ 717.932069][ T1244] x64_sys_call+0x2c25/0x3000 [ 717.936795][ T1244] do_syscall_64+0xca/0x2b0 [ 717.941343][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 717.947270][ T1244] [ 717.949626][ T1244] read to 0xffff888107d9eb40 of 4 bytes by task 1244 on cpu 0: [ 717.957198][ T1244] lookup_fast+0xf0/0x320 [ 717.961579][ T1244] path_openat+0x416/0x23b0 [ 717.966124][ T1244] do_filp_open+0x109/0x230 [ 717.970670][ T1244] do_sys_openat2+0xa6/0x150 [ 717.975314][ T1244] __x64_sys_openat+0xf2/0x120 [ 717.980127][ T1244] x64_sys_call+0x2b07/0x3000 [ 717.984851][ T1244] do_syscall_64+0xca/0x2b0 [ 717.989491][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 717.995427][ T1244] [ 717.997782][ T1244] value changed: 0x00200080 -> 0x00004080 [ 718.003562][ T1244] [ 718.005916][ T1244] Reported by Kernel Concurrency Sanitizer on: [ 718.012102][ T1244] CPU: 0 UID: 0 PID: 1244 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 718.022109][ T1244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 718.032200][ T1244] ================================================================== [ 719.461320][ T1244] ================================================================== [ 719.469470][ T1244] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 719.476219][ T1244] [ 719.478569][ T1244] write to 0xffff888100450b50 of 8 bytes by task 26822 on cpu 0: [ 719.486445][ T1244] __dentry_kill+0x142/0x4b0 [ 719.491095][ T1244] finish_dput+0x2b/0x200 [ 719.495473][ T1244] dput+0x52/0x60 [ 719.499157][ T1244] do_unlinkat+0x202/0x4b0 [ 719.503607][ T1244] __x64_sys_unlink+0x2e/0x40 [ 719.508335][ T1244] x64_sys_call+0x2f48/0x3000 [ 719.513051][ T1244] do_syscall_64+0xca/0x2b0 [ 719.517602][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 719.523528][ T1244] [ 719.525879][ T1244] read to 0xffff888100450b50 of 8 bytes by task 1244 on cpu 1: [ 719.533462][ T1244] fast_dput+0x5f/0x2c0 [ 719.537662][ T1244] dput+0x24/0x60 [ 719.541330][ T1244] do_unlinkat+0x202/0x4b0 [ 719.545839][ T1244] __x64_sys_unlink+0x2e/0x40 [ 719.550611][ T1244] x64_sys_call+0x2f48/0x3000 [ 719.555420][ T1244] do_syscall_64+0xca/0x2b0 [ 719.559977][ T1244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 719.565900][ T1244] [ 719.568257][ T1244] value changed: 0xffff888237909690 -> 0x0000000000000000 [ 719.575392][ T1244] [ 719.577751][ T1244] Reported by Kernel Concurrency Sanitizer on: [ 719.583929][ T1244] CPU: 1 UID: 0 PID: 1244 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 719.593859][ T1244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 719.603959][ T1244] ================================================================== [ 721.306406][T26822] ================================================================== [ 721.314547][T26822] BUG: KCSAN: data-race in __dentry_kill / lookup_fast [ 721.321543][T26822] [ 721.323899][T26822] read-write to 0xffff888107e82000 of 4 bytes by task 1244 on cpu 1: [ 721.331995][T26822] __dentry_kill+0x230/0x4b0 [ 721.336656][T26822] finish_dput+0x2b/0x200 [ 721.341032][T26822] dput+0x52/0x60 [ 721.344788][T26822] __fput+0x444/0x650 [ 721.348816][T26822] fput_close_sync+0xad/0x190 [ 721.353540][T26822] __x64_sys_close+0x56/0xf0 [ 721.358182][T26822] x64_sys_call+0x2c25/0x3000 [ 721.362905][T26822] do_syscall_64+0xca/0x2b0 [ 721.367482][T26822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 721.373516][T26822] [ 721.375861][T26822] read to 0xffff888107e82000 of 4 bytes by task 26822 on cpu 0: [ 721.383519][T26822] lookup_fast+0xf0/0x320 [ 721.387899][T26822] path_openat+0x416/0x23b0 [ 721.392462][T26822] do_filp_open+0x109/0x230 [ 721.396999][T26822] do_sys_openat2+0xa6/0x150 [ 721.401644][T26822] __x64_sys_openat+0xf2/0x120 [ 721.406454][T26822] x64_sys_call+0x2b07/0x3000 [ 721.411182][T26822] do_syscall_64+0xca/0x2b0 [ 721.415737][T26822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 721.421664][T26822] [ 721.424008][T26822] value changed: 0x00200080 -> 0x00004080 [ 721.429810][T26822] [ 721.432169][T26822] Reported by Kernel Concurrency Sanitizer on: [ 721.438347][T26822] CPU: 0 UID: 0 PID: 26822 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 721.448368][T26822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 721.458459][T26822] ================================================================== [ 722.510836][T26822] ================================================================== [ 722.518986][T26822] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 722.526855][T26822] [ 722.529223][T26822] write to 0xffff888107e46790 of 8 bytes by task 1244 on cpu 0: [ 722.536995][T26822] __dentry_kill+0x142/0x4b0 [ 722.541656][T26822] finish_dput+0x2b/0x200 [ 722.546035][T26822] dput+0x52/0x60 [ 722.549711][T26822] do_unlinkat+0x202/0x4b0 [ 722.554242][T26822] __x64_sys_unlink+0x2e/0x40 [ 722.558953][T26822] x64_sys_call+0x2f48/0x3000 [ 722.563677][T26822] do_syscall_64+0xca/0x2b0 [ 722.568278][T26822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 722.574385][T26822] [ 722.576752][T26822] read to 0xffff888107e46790 of 8 bytes by task 26822 on cpu 1: [ 722.584421][T26822] fast_dput+0x5f/0x2c0 [ 722.588667][T26822] dput+0x24/0x60 [ 722.592341][T26822] __fput+0x444/0x650 [ 722.596377][T26822] fput_close_sync+0xad/0x190 [ 722.601096][T26822] __x64_sys_close+0x56/0xf0 [ 722.605733][T26822] x64_sys_call+0x2c25/0x3000 [ 722.610547][T26822] do_syscall_64+0xca/0x2b0 [ 722.615545][T26822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 722.621572][T26822] [ 722.623966][T26822] value changed: 0xffff888237909690 -> 0x0000000000000000 [ 722.631550][T26822] [ 722.633987][T26822] Reported by Kernel Concurrency Sanitizer on: [ 722.640252][T26822] CPU: 1 UID: 0 PID: 26822 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 722.650487][T26822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 722.660592][T26822] ==================================================================