last executing test programs: 11.909844323s ago: executing program 2 (id=5082): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0xbc44) syz_open_dev$tty1(0xc, 0x4, 0x3) unshare(0x62040200) 11.007228896s ago: executing program 2 (id=5093): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="f279e841523653effa7d1800000000000000f04910080004176df17200020000009504000000000000e3ffffff00000000007ff7e3fd80d82ffc7a6592b2432620d8dde4854551a8487755842ac0b41b46957e1b7244d3e72aeb61aa893c085d51b78546b4a703b4469a67bfe4abe27b94b0a73f8e72555185e7e562a589614226b6763233b033a8dfd223e7218050cb346d6b31a113e183ef9294c66ed1aef41a8393fa1cd9636ccb2c39593938baeb051db03220f515e531ad"], &(0x7f0000000200)='GPL\x00', 0x9, 0x1, &(0x7f00000001c0)=""/1, 0x0, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f00000002c0)=r0}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r4], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)=""/93, 0xae, 0x5d, 0x0, 0x1}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0xa8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x7}], &(0x7f00000004c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000740)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0x6, 0x140000, 0x4cd9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1], 0x0, 0x10, 0x10000}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r7 = dup(r6) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f00000008c0)={0xa0, 0x6, 0xf00, 0x7ff, 0x0, 0x5, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0xae, 0x202800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00'}, 0x10) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @thr={&(0x7f0000001280)="05b0a2fa668b72d10dd0fb01a82a6bc1720ab74fba8c04b1c239e63ac52cbf8d59b7b8e832772ff339339eb0dedf637e82ecf4efa9f403b815fe2fa6e9f77d289cd6a961d99e8777634bf22db2c402c67c4326ddcd3a2c1a74b3206a2f170462a1b971ff106e638ac9993b99c504854c6c1f3a74e371ae2eee0737cb2cc18d68dc5a24eb918243cf0582d7df8cf1240e2ac2881f6af044f2", &(0x7f0000000540)="2727666632e3c1c578653d9bf1314477a708927334df200eef738d14e658a60dc719f04512890a8ae235592ad5254c03d815"}}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x7, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61122800000000006113140000000000bf1000000000000025000600091b00003d030000000000008701000000000000bc26000000000000bf67000000000000340300000ee600f0670200001400000016030000ffffffffbf050000000000000f650000000000006507f4ff02000400070700006b3128fe1f75000000000000bf540000000000000705000003001500ae430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe70305863f970eac3590ac99b798f8125f1c322c2a154a8a8d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) write$P9_RWRITE(r9, &(0x7f0000000040)={0xb}, 0x11000) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0xc0109207, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r9, 0x84009422, &(0x7f0000000900)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) 7.886007456s ago: executing program 2 (id=5128): unshare(0x6a040080) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x16, 0x3, 'dh\x00', 0x0, 0x4, 0x76}, 0x2c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x88c0}, 0x2004c090) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)={0x30, r6, 0x1, 0x0, 0xfffffffc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r7 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x3501) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f00000004c0)={0x4b5a9da54893e123, 0x3, 0x17, 0x2}, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}) close_range(r7, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000000)={{0x84, @broadcast, 0x4e24, 0x3, 'lc\x00', 0xb, 0x323b, 0x3a}, {@rand_addr=0x64010102, 0x4e23, 0x0, 0xc3, 0x12d5c, 0x12d5c}}, 0x44) 6.97120263s ago: executing program 2 (id=5132): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYRESDEC=r1], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYRES64=r0, @ANYBLOB="d3b8", @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000140), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000080)={0x5, 0x802, 0x0, {0x0, 0x2710}, {0x0, 0xea60}, {0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x27, 0x0, 0x0, 0x0, "f33d8e7b847ec8b36f1107e036dd98fc469107485e371bcf5c6b77db54f3d984795c49eca9b92241dc9fc39f976ad52e581942d9fc2178681e6866aa6ef10d06"}}, 0x80}, 0x1, 0x0, 0x0, 0x40084}, 0x20000000) mount(0x0, &(0x7f0000003c40)='.\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r5, &(0x7f0000000000)=ANY=[@ANYRES32=r5], 0x200002e6) fcntl$setpipe(r5, 0x407, 0x7000000) fcntl$setpipe(r5, 0x407, 0x100000) r6 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r6) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r6, 0x40095505, 0x0) 6.019272506s ago: executing program 2 (id=5140): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r1}, &(0x7f00000006c0), &(0x7f0000000700)=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000007c0)}, 0x20) 5.926085274s ago: executing program 2 (id=5141): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) setresuid(0xee01, 0x0, 0xffffffffffffffff) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpgid(r2) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x5, &(0x7f0000000340)=""/145) r4 = socket$netlink(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x401, 0x28, 0xffffffffffffffff, 0xc}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r5) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000540)={0x0, 0xa1ff, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r7, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYRES32, @ANYRES32=r10, @ANYBLOB="dc1b1a7a84e17f94bd3add5789d48f8dc16f468afaa7c6446ae80a759a587eacae5cc8fcd5"], 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8040) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xc4, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0x4, 0x8}}}}, [@NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x3d, 0xbe, "ff41f494e367287d75c6f655c736f0a88a86c6bd7f065e6697afb9f64e5cfa30e53da1a80e0aa8224b16998bfbb1d81164d84367edc0071c32"}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_STA_FLAGS={0x1c, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}]}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x3}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x826}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x97, 0x8}}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x34d}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xb}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0xc4}, 0x1, 0x0, 0x0, 0x48001}, 0x50) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r5, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x7c, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0x7, 0x76}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_BSSID={0xa, 0xf5, @random="e93b8353be47"}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x3}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x69}, @NL80211_ATTR_BSSID={0xa, 0xf5, @random="2a1650f48855"}, @NL80211_ATTR_PMKID={0x14, 0x55, "ff83a2e90b4a5f3d06524409fe7fc4e8"}, @NL80211_ATTR_BSSID={0xa}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0xdb62bccda3c39f9e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x18) statx(0xffffffffffffffff, 0x0, 0x6000, 0x4, 0x0) kcmp(r8, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) symlinkat(0x0, 0xffffffffffffff9c, 0x0) 1.270503728s ago: executing program 0 (id=5205): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0xffffdffffffffffe}, 0x18) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, 0x0}, 0x30048880) 1.219687532s ago: executing program 0 (id=5207): syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 1.181880675s ago: executing program 0 (id=5210): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000780)=ANY=[@ANYRES8=r0, @ANYRES16=r0, @ANYRESDEC=r0], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x2000300, 0xe, 0x0, &(0x7f0000000000)="63eced8e46dc3f0adf3389f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xd83, &(0x7f0000001c00)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xd75, 0x2, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0xd61, 0x0, @wg=@data={0x4, 0x7407, 0xfffdfffffffffffd, "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"}}}}}}, 0x0) readv(r2, &(0x7f0000001780)=[{&(0x7f0000000380)=""/4090, 0xffa}], 0x1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0xa00, 0xb) r4 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) ioctl$LOOP_CONFIGURE(r4, 0x4c0a, &(0x7f0000000140)={r3, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "280991800000598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f000000155cc30cf11d0bc000", [0x4, 0x40000000000000]}}) lstat(&(0x7f0000000740)='./file0\x00', 0x0) syz_clone(0x40000000, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000013c0)={0x2, &(0x7f0000001380)=[{0x0, 0x6, 0x8}, {0xb880, 0xff, 0x0, 0x1}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$caif_stream(0x25, 0x1, 0x0) sendmmsg$inet(r5, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10, 0x0}}], 0x2, 0xc800) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111630000000000851000000200000085ea00000000000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40000) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f00000000c0)=ANY=[@ANYRES64=r7]) 421.795226ms ago: executing program 1 (id=5231): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200001f000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 386.004399ms ago: executing program 1 (id=5233): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000100)="140000001a004f7fb3e45f2024d2f1c9fb470000", 0x14) recvmmsg(r2, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000001580)=[{}, {&(0x7f0000000000)=""/53, 0x35}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001640)=""/206, 0xce}, {&(0x7f0000001240)=""/249, 0xf9}, {&(0x7f0000001340)=""/240, 0xf0}, {&(0x7f0000001440)=""/112, 0x70}, {&(0x7f00000014c0)=""/140, 0x8c}], 0x8, &(0x7f00000000c0)=""/46, 0x2e}, 0x8}], 0x32, 0x10122, 0x0) 385.187979ms ago: executing program 3 (id=5234): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r2, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000002300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x4) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0x0) accept4(r2, 0x0, 0x0, 0x400000000000000) 372.43518ms ago: executing program 1 (id=5235): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 343.888052ms ago: executing program 3 (id=5236): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)='+}[@\x00G5\v\x89\x89\xb2\x0e\xb7\xb4\x9a\xb3\xb9\xe1\xff@`\x87\xefy\xb7\xe0\xe6c\x91\x81ND\t3\xc4\xca\xf0\xd0Zpo\xd0\xc7\'CT') mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2704, &(0x7f00000004c0)={0x0, 0x6c0d, 0x40, 0x2, 0x13a}, &(0x7f0000ff0000), 0x0) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001cc0)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005a8bd1e99959505a018aff63e1bf39c8cd510c785411e883a7f2c8772ebc5fa3f42b9a57e55a7a721657b35d5640f051ed5c10d6696727cf28e3cbc225733650ebaab8db5175"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001240)=@newqdisc={0x44, 0x24, 0x1, 0x0, 0x4, {0x0, 0x0, 0x0, r6, {0x0, 0xd}, {0xffff, 0x5}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x9, 0xc1, 0x2}}}}]}, 0x44}}, 0x0) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendto$inet6(r7, &(0x7f0000001300)="92", 0x1, 0x10, &(0x7f0000000240)={0xa, 0x4e1c, 0xfffffffc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x4}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380)=0x8e8) setgroups(0x0, 0x0) getgroups(0x1, &(0x7f0000000080)=[0xee00]) setresgid(r8, r8, 0xffffffffffffffff) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000010000000000000004000100000000001000000000dd780000090000000000000000"], 0x24, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000010000018110000", @ANYRES32=r1, @ANYBLOB="00000000b7080000000200007ba200000000000007020000f8ffffffb703000008000000b70400000100000085000000030000009500000000000000e511c41914060b764cf19e3399abeb16b870eff4e8c73009c1dc3f41cb2f58610a50a6f4b6f36d7583177d383838be9484b5cffdc0bae12fc2d11882ad3d483a8b110ad92d44b5f4c46c15a0d60ffc284a0bc597e71cf07463474d0017372d577c225a5b188068abe3170ca5626f2608e9e940407df471ab2a5cbdd5766921e90ee8ba8ba4e1a8b281068e353a82d8a53c8da06b36bb99229f9f5765a9ce2afddaf9a5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000040)='.\x02\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="636865636b3d7374726963742c756e686964652c63727566742c696f636861727365743d63a08033322c636865636b3d72656c617865642c6e6f6a6f6c6965742c636865636b3d72656c617865642c6e6f6a6f6c6965742c00"], 0x1, 0x55d, &(0x7f0000000b00)="$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") 343.062092ms ago: executing program 4 (id=5237): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000000), &(0x7f00000000c0)=r0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x81}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = dup(r5) write$P9_RLERRORu(r6, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001c80)) 320.881314ms ago: executing program 1 (id=5238): r0 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) shmat(r0, &(0x7f0000ff1000/0x3000)=nil, 0x400c) mremap(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4008, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfd}, 0xe) shutdown(r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x18) r4 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="14000000530401"], 0x28}, 0x1, 0x0, 0x0, 0x28024040}, 0x40000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r5, 0x4}, &(0x7f0000000100)=0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="0000000000000000660800002b25f344e30fcbe60000000000000000000000009500000000000000362a0200fcffffff180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffefb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372000000001400010076657468315f766c616e"], 0xfc}}, 0x0) 320.276244ms ago: executing program 4 (id=5239): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) mount(&(0x7f0000000000), &(0x7f0000000280)='./cgroup\x00', 0x0, 0x75801, 0x0) 293.177636ms ago: executing program 0 (id=5240): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r2 = io_uring_setup(0x1694, &(0x7f0000000000)={0x0, 0x26d6, 0x40, 0x1, 0x161}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="620af8ffa1dc0021bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a48000000060a010400000000000000000a0000050900010073797a31000000001c0004801800018008000100647570000c00028008000140000000080900020073797a32"], 0x70}, 0x1, 0x0, 0x0, 0x8890}, 0x24000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) r4 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x40200, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/diskstats\x00', 0x0, 0x0) preadv2(r6, &(0x7f0000000180)=[{&(0x7f0000000000)=""/167, 0xa7}], 0x1, 0x0, 0x4, 0x1) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000100)={0x0, 0x204000, 0x1000}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f00000001c0)='%-010d \x00'}, 0x20) r9 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) close_range(r9, r6, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000cc0)=@newqdisc={0x50, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r10, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x20, 0x2, {{0x10, 0x3, 0x1, 0x3, 0x400, 0x8}, [@TCA_NETEM_DELAY_DIST={0x4}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x407, 0x510, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x5, 0x8, 0x7fff, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x52e, &(0x7f0000000640)="$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") sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e000000f7ffffffffff00000700000000000000", @ANYRES32=r8, @ANYBLOB="0100"/20, @ANYRES32=r10, @ANYRES32, @ANYBLOB="0200000003000003e100000f000000000002000000000000001000"], 0x50) mq_notify(r7, &(0x7f00000005c0)={0x0, 0x15, 0x2, @thr={&(0x7f0000000480)="6d130ab58b0d225a2f182d1a1860ce7b3bc4fa925db92b18a81d25078194f2354ae0a13fbb4fdb5a995683124940c2544ac35d1187506a6f91a7a577f1fd5329a187d2d43a5fcd8e044f243776292ae4d4070137831034ac251da83e4cefd1eefd2cf58b9b65c509d9a79443ac9dbfde96b0b4df9f1d23f59f933fd621043b18f4e22ea38348d253e9d21815fddf620a57d5be52c8a5653f6e916a643a2692808354401489adab3e70d78e30488c", &(0x7f0000000540)="dc2be9f4da5fb7e5be8e3399e594083e9d04ce3b1ca29fae19804dc4d53fdd585416ed4ff7044e065526256ef27a1ac6c2936ce91322f5bafa9d0cde4883e5d36344aca189abe530eabcaeac8b948510ea43517a2a9b311cb55e4b0c9ab3e2ca35"}}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r9, 0x894b, &(0x7f0000000600)) 292.412846ms ago: executing program 1 (id=5241): socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) preadv(r0, &(0x7f0000000d80)=[{&(0x7f0000000c40)=""/132, 0x84}, {0x0}], 0x2, 0x2, 0x1d) 291.645576ms ago: executing program 3 (id=5242): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000100)="140000001a004f7fb3e45f2024d2f1c9fb470000", 0x14) recvmmsg(r2, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000001580)=[{}, {&(0x7f0000000000)=""/53, 0x35}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001640)=""/206, 0xce}, {&(0x7f0000001240)=""/249, 0xf9}, {&(0x7f0000001340)=""/240, 0xf0}, {&(0x7f0000001440)=""/112, 0x70}, {&(0x7f00000014c0)=""/140, 0x8c}], 0x8, &(0x7f00000000c0)=""/46, 0x2e}, 0x8}], 0x32, 0x10122, 0x0) 275.429858ms ago: executing program 1 (id=5243): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="f279e841523653effa7d1800000000000000f04910080004176df17200020000009504000000000000e3ffffff00000000007ff7e3fd80d82ffc7a6592b2432620d8dde4854551a8487755842ac0b41b46957e1b7244d3e72aeb61aa893c085d51b78546b4a703b4469a67bfe4abe27b94b0a73f8e72555185e7e562a589614226b6763233b033a8dfd223e7218050cb346d6b31a113e183ef9294c66ed1aef41a8393fa1cd9636ccb2c39593938baeb051db03220f515e531ad"], &(0x7f0000000200)='GPL\x00', 0x9, 0x1, &(0x7f00000001c0)=""/1, 0x0, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f00000002c0)=r0}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r4], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)=""/93, 0xae, 0x5d, 0x0, 0x1}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0xa8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x7}], &(0x7f00000004c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000740)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0x6, 0x140000, 0x4cd9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x1], 0x0, 0x10, 0x10000}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r7 = dup(r6) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f00000008c0)={0xa0, 0x6, 0xf00, 0x7ff, 0x0, 0x5, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0xae, 0x202800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00'}, 0x10) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @thr={&(0x7f0000001280)="05b0a2fa668b72d10dd0fb01a82a6bc1720ab74fba8c04b1c239e63ac52cbf8d59b7b8e832772ff339339eb0dedf637e82ecf4efa9f403b815fe2fa6e9f77d289cd6a961d99e8777634bf22db2c402c67c4326ddcd3a2c1a74b3206a2f170462a1b971ff106e638ac9993b99c504854c6c1f3a74e371ae2eee0737cb2cc18d68dc5a24eb918243cf0582d7df8cf1240e2ac2881f6af044f26e09da6bbbabd09ac745c8", &(0x7f0000000540)="2727666632e3c1c578653d9bf1314477a708927334df200eef738d14e658a60dc719f04512890a8ae235592ad5254c03d815"}}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x7, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61122800000000006113140000000000bf1000000000000025000600091b00003d030000000000008701000000000000bc26000000000000bf67000000000000340300000ee600f0670200001400000016030000ffffffffbf050000000000000f650000000000006507f4ff02000400070700006b3128fe1f75000000000000bf540000000000000705000003001500ae430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe70305863f970eac3590ac99b798f8125f1c322c2a154a8a8d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) write$P9_RWRITE(r9, &(0x7f0000000040)={0xb}, 0x11000) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0xc0109207, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r9, 0x84009422, &(0x7f0000000900)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) 252.214169ms ago: executing program 4 (id=5244): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200001f000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 247.16365ms ago: executing program 3 (id=5245): r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000300)='5', 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c"], 0x30}], 0x1, 0x0) 215.317373ms ago: executing program 4 (id=5246): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r2, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000002300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x4) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0x0) accept4(r2, 0x0, 0x0, 0x400000000000000) 214.705752ms ago: executing program 3 (id=5247): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r2, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000002300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x4) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0x0) accept4(r2, 0x0, 0x0, 0x400000000000000) 194.716234ms ago: executing program 3 (id=5248): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a"], 0x44}}, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') lseek(r3, 0x2004, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001540)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002cbd70100400000005000000080009000200000008000c00a80a000008000b00000000000600010007000000050005"], 0x3c}}, 0x20) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000000)={&(0x7f0000000180)=""/106, 0x6a}) socket$key(0xf, 0x3, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100003020702500000000002020207b1af8ff00000000bfa1000000000000070100003affffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='kfree\x00', r6}, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x803}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r10, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) close(0x3) 137.888568ms ago: executing program 4 (id=5249): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) fsetxattr$security_selinux(r3, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 137.364969ms ago: executing program 4 (id=5250): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000780)=ANY=[@ANYRES8=r0, @ANYRES16=r0, @ANYRESDEC=r0], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x2000300, 0xe, 0x0, &(0x7f0000000000)="63eced8e46dc3f0adf3389f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xd83, &(0x7f0000001c00)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xd75, 0x2, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0xd61, 0x0, @wg=@data={0x4, 0x7407, 0xfffdfffffffffffd, "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"}}}}}}, 0x0) readv(r2, &(0x7f0000001780)=[{&(0x7f0000000380)=""/4090, 0xffa}], 0x1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0xa00, 0xb) r4 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) ioctl$LOOP_CONFIGURE(r4, 0x4c0a, &(0x7f0000000140)={r3, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "280991800000598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f000000155cc30cf11d0bc000", [0x4, 0x40000000000000]}}) lstat(&(0x7f0000000740)='./file0\x00', 0x0) syz_clone(0x40000000, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000013c0)={0x2, &(0x7f0000001380)=[{0x0, 0x6, 0x8}, {0xb880, 0xff, 0x0, 0x1}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$caif_stream(0x25, 0x1, 0x0) sendmmsg$inet(r5, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10, 0x0}}], 0x2, 0xc800) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111630000000000851000000200000085ea00000000000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40000) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f00000000c0)=ANY=[@ANYRES64=r7]) 27.970157ms ago: executing program 0 (id=5251): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000000), &(0x7f00000000c0)=r0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x81}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = dup(r5) write$P9_RLERRORu(r6, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001c80)) 0s ago: executing program 0 (id=5252): r0 = semget$private(0x0, 0x20000000102, 0x200) semop(r0, &(0x7f0000000240)=[{0x1, 0x20, 0x800}, {0x0, 0xe65b}], 0x2) (async) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000700)=""/236) (async) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000380)=""/87) (async) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0xff, 0x7ffc1ffd}]}) (async) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) (async) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) (async) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x101, 0x0, 0x0, 0x41100, 0x59, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) (async) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) (async) timerfd_create(0x1, 0x80800) close(0x3) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) (async) r5 = open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x102) write$bt_hci(r5, &(0x7f0000000380)=ANY=[], 0x20000) (async) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, &(0x7f0000000180)="0e5d17985fcc5670f901fd6dd5244bd5081a5bcd08712f71b8b75588d8e871410235acf6e399e7b9330a2aa4be8d16ee979af96214ba1198a2ebf6ea911e21c03fec426f5a72f51925e622ba618cdb7a10b7ff2d8d17f6a6dc1322a2db6b6754f61416da1d43c2f3edba8966d912e4a9d21a3f0d11d7a381d0846bb655802a463f82d903", 0x84, 0x1, &(0x7f0000000280)={0x2, 0x4e24, @multicast1}, 0x10) kernel console output (not intermixed with test programs): ssage: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16252 comm=syz.1.3983 [ 369.876271][T16259] siw: device registration error -23 [ 369.935243][T16266] program syz.1.3989 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 369.955591][T16258] netlink: 'syz.2.3985': attribute type 1 has an invalid length. [ 369.963534][T16258] netlink: 'syz.2.3985': attribute type 3 has an invalid length. [ 370.492632][T16293] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 370.555783][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 370.555801][ T29] audit: type=1400 audit(1755990513.638:21144): avc: denied { remount } for pid=16296 comm="syz.1.3997" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 370.607404][T16299] FAULT_INJECTION: forcing a failure. [ 370.607404][T16299] name failslab, interval 1, probability 0, space 0, times 0 [ 370.620086][T16299] CPU: 0 UID: 0 PID: 16299 Comm: syz.0.3998 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 370.620125][T16299] Tainted: [W]=WARN [ 370.620132][T16299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.620144][T16299] Call Trace: [ 370.620262][T16299] [ 370.620272][T16299] __dump_stack+0x1d/0x30 [ 370.620371][T16299] dump_stack_lvl+0xe8/0x140 [ 370.620390][T16299] dump_stack+0x15/0x1b [ 370.620406][T16299] should_fail_ex+0x265/0x280 [ 370.620426][T16299] should_failslab+0x8c/0xb0 [ 370.620503][T16299] __kmalloc_noprof+0xa5/0x3e0 [ 370.620562][T16299] ? __d_alloc+0x90/0x340 [ 370.620590][T16299] __d_alloc+0x90/0x340 [ 370.620616][T16299] ? lockref_put_return+0xf7/0x130 [ 370.620653][T16299] d_alloc_parallel+0x53/0xc60 [ 370.620702][T16299] ? selinux_inode_permission+0x62d/0x740 [ 370.620737][T16299] ? __rcu_read_unlock+0x4f/0x70 [ 370.620763][T16299] ? __d_lookup+0x316/0x340 [ 370.620798][T16299] ? security_inode_permission+0x4a/0xb0 [ 370.620860][T16299] __lookup_slow+0x8c/0x250 [ 370.620906][T16299] lookup_slow+0x3c/0x60 [ 370.620965][T16299] walk_component+0x1ec/0x220 [ 370.620992][T16299] path_lookupat+0xfe/0x2a0 [ 370.621062][T16299] filename_lookup+0x147/0x340 [ 370.621111][T16299] vfs_statx+0x9d/0x390 [ 370.621188][T16299] __se_sys_newlstat+0x69/0x280 [ 370.621230][T16299] ? fput+0x8f/0xc0 [ 370.621261][T16299] ? ksys_write+0x192/0x1a0 [ 370.621288][T16299] __x64_sys_newlstat+0x31/0x40 [ 370.621352][T16299] x64_sys_call+0x1b88/0x2ff0 [ 370.621382][T16299] do_syscall_64+0xd2/0x200 [ 370.621433][T16299] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 370.621460][T16299] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 370.621485][T16299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.621544][T16299] RIP: 0033:0x7f8bd5c3ebe9 [ 370.621563][T16299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.621585][T16299] RSP: 002b:00007f8bd46a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 [ 370.621694][T16299] RAX: ffffffffffffffda RBX: 00007f8bd5e65fa0 RCX: 00007f8bd5c3ebe9 [ 370.621709][T16299] RDX: 0000000000000000 RSI: 00002000000005c0 RDI: 0000200000002600 [ 370.621723][T16299] RBP: 00007f8bd46a7090 R08: 0000000000000000 R09: 0000000000000000 [ 370.621774][T16299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.621786][T16299] R13: 00007f8bd5e66038 R14: 00007f8bd5e65fa0 R15: 00007ffd477ccc88 [ 370.621810][T16299] [ 370.637038][ T29] audit: type=1326 audit(1755990513.718:21145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 370.893576][ T29] audit: type=1326 audit(1755990513.718:21146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 370.917363][ T29] audit: type=1326 audit(1755990513.718:21147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 370.941007][ T29] audit: type=1326 audit(1755990513.718:21148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 370.964665][ T29] audit: type=1326 audit(1755990513.718:21149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 370.988287][ T29] audit: type=1326 audit(1755990513.718:21150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 371.011969][ T29] audit: type=1326 audit(1755990513.718:21151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 371.035557][ T29] audit: type=1326 audit(1755990513.718:21152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=78 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 371.059315][ T29] audit: type=1326 audit(1755990513.718:21153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16296 comm="syz.1.3997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 371.187318][T16312] program syz.2.4003 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 371.204339][T16315] SELinux: security_context_str_to_sid () failed with errno=-22 [ 373.440375][T16372] __nla_validate_parse: 1 callbacks suppressed [ 373.440394][T16372] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4024'. [ 373.618319][T16384] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4028'. [ 373.816591][T16402] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4023'. [ 373.913573][T16403] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4033'. [ 374.279107][T16407] netlink: 32 bytes leftover after parsing attributes in process `syz.1.4035'. [ 374.524860][T16427] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4039'. [ 374.793104][T16438] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 374.860263][T16447] SELinux: security_context_str_to_sid () failed with errno=-22 [ 375.550409][T16468] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4052'. [ 375.840941][T16482] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4056'. [ 376.165401][T16494] SELinux: security_context_str_to_sid () failed with errno=-22 [ 376.663593][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 376.669990][ T29] audit: type=1326 audit(1755990519.738:21262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16500 comm="syz.0.4061" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x0 [ 376.775559][T16502] siw: device registration error -23 [ 377.394805][T16521] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4065'. [ 377.498147][T16528] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4069'. [ 377.509165][ T29] audit: type=1326 audit(1755990520.588:21263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.532989][ T29] audit: type=1326 audit(1755990520.588:21264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.556685][ T29] audit: type=1326 audit(1755990520.588:21265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.599054][ T29] audit: type=1326 audit(1755990520.638:21266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.622844][ T29] audit: type=1326 audit(1755990520.638:21267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.646998][ T29] audit: type=1326 audit(1755990520.638:21268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.670777][ T29] audit: type=1326 audit(1755990520.638:21269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.694425][ T29] audit: type=1326 audit(1755990520.638:21270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 377.718144][ T29] audit: type=1326 audit(1755990520.638:21271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16529 comm="syz.3.4070" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 378.261669][T16564] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 378.276689][T16558] IPVS: stopping master sync thread 16564 ... [ 378.479631][T16566] SELinux: security_context_str_to_sid () failed with errno=-22 [ 378.621506][T16568] __nla_validate_parse: 1 callbacks suppressed [ 378.621526][T16568] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4084'. [ 379.264699][T16581] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 379.276136][T16576] IPVS: stopping master sync thread 16581 ... [ 379.492514][T16599] bridge0: entered allmulticast mode [ 379.766150][T16613] SELinux: security_context_str_to_sid () failed with errno=-22 [ 381.136180][T16658] bond4: entered promiscuous mode [ 381.141274][T16658] bond4: entered allmulticast mode [ 381.183908][T16658] 8021q: adding VLAN 0 to HW filter on device bond4 [ 381.655879][T16671] FAULT_INJECTION: forcing a failure. [ 381.655879][T16671] name failslab, interval 1, probability 0, space 0, times 0 [ 381.668606][T16671] CPU: 1 UID: 0 PID: 16671 Comm: syz.4.4118 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 381.668644][T16671] Tainted: [W]=WARN [ 381.668651][T16671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 381.668667][T16671] Call Trace: [ 381.668674][T16671] [ 381.668681][T16671] __dump_stack+0x1d/0x30 [ 381.668770][T16671] dump_stack_lvl+0xe8/0x140 [ 381.668788][T16671] dump_stack+0x15/0x1b [ 381.668804][T16671] should_fail_ex+0x265/0x280 [ 381.668828][T16671] should_failslab+0x8c/0xb0 [ 381.668858][T16671] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 381.668919][T16671] ? sidtab_sid2str_get+0xa0/0x130 [ 381.668946][T16671] kmemdup_noprof+0x2b/0x70 [ 381.668977][T16671] sidtab_sid2str_get+0xa0/0x130 [ 381.669049][T16671] security_sid_to_context_core+0x1eb/0x2e0 [ 381.669075][T16671] security_sid_to_context+0x27/0x40 [ 381.669098][T16671] selinux_lsmprop_to_secctx+0x67/0xf0 [ 381.669123][T16671] security_lsmprop_to_secctx+0x43/0x80 [ 381.669150][T16671] audit_log_task_context+0x77/0x190 [ 381.669240][T16671] audit_log_task+0xf4/0x250 [ 381.669318][T16671] audit_seccomp+0x61/0x100 [ 381.669347][T16671] ? __seccomp_filter+0x68c/0x10d0 [ 381.669371][T16671] __seccomp_filter+0x69d/0x10d0 [ 381.669392][T16671] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 381.669424][T16671] ? vfs_write+0x7e8/0x960 [ 381.669449][T16671] ? __rcu_read_unlock+0x4f/0x70 [ 381.669474][T16671] ? __fget_files+0x184/0x1c0 [ 381.669505][T16671] __secure_computing+0x82/0x150 [ 381.669530][T16671] syscall_trace_enter+0xcf/0x1e0 [ 381.669557][T16671] do_syscall_64+0xac/0x200 [ 381.669691][T16671] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 381.669718][T16671] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 381.669749][T16671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 381.669805][T16671] RIP: 0033:0x7f39c182ebe9 [ 381.669821][T16671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.669897][T16671] RSP: 002b:00007f39c028f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 381.669920][T16671] RAX: ffffffffffffffda RBX: 00007f39c1a55fa0 RCX: 00007f39c182ebe9 [ 381.669934][T16671] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000004 [ 381.669946][T16671] RBP: 00007f39c028f090 R08: 0000000000000000 R09: 0000000000000000 [ 381.669957][T16671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.669968][T16671] R13: 00007f39c1a56038 R14: 00007f39c1a55fa0 R15: 00007fffe9acbca8 [ 381.670037][T16671] [ 381.670047][T16671] audit_panic: 87 callbacks suppressed [ 381.670059][T16671] audit: error in audit_log_task_context [ 381.724169][ T29] audit: type=1326 audit(1755990524.738:21359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 381.954838][ T29] audit: type=1326 audit(1755990524.738:21360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 381.978438][ T29] audit: type=1326 audit(1755990524.738:21361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 382.002076][ T29] audit: type=1326 audit(1755990524.738:21362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 382.025773][ T29] audit: type=1326 audit(1755990524.738:21363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 382.049472][ T29] audit: type=1326 audit(1755990524.738:21364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 382.072903][ T29] audit: type=1326 audit(1755990524.738:21365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 382.096510][ T29] audit: type=1326 audit(1755990524.738:21366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f39c182d550 code=0x7ffc0000 [ 382.120164][ T29] audit: type=1326 audit(1755990524.738:21367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16670 comm="syz.4.4118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f39c182d69f code=0x7ffc0000 [ 382.191484][T16676] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4120'. [ 382.201991][T16676] netlink: 'syz.0.4120': attribute type 1 has an invalid length. [ 382.209802][T16676] netlink: 224 bytes leftover after parsing attributes in process `syz.0.4120'. [ 382.272849][T16680] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4123'. [ 382.451940][T16709] siw: device registration error -23 [ 382.459523][T16701] SELinux: security_context_str_to_sid () failed with errno=-22 [ 382.596485][T16716] SELinux: security_context_str_to_sid () failed with errno=-22 [ 383.573315][T16713] SELinux: policydb version -299076691 does not match my version range 15-35 [ 383.582815][T16713] SELinux: failed to load policy [ 383.950239][T16748] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4141'. [ 384.073205][T16767] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 384.074134][T16765] IPVS: stopping master sync thread 16767 ... [ 384.307977][T16795] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 384.308039][T16794] IPVS: stopping master sync thread 16795 ... [ 384.438834][T16800] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.446045][T16800] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.453527][T16800] bridge0: entered allmulticast mode [ 384.462468][T16800] bridge_slave_1: left allmulticast mode [ 384.468249][T16800] bridge_slave_1: left promiscuous mode [ 384.473968][T16800] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.484153][T16800] bridge_slave_0: left allmulticast mode [ 384.489836][T16800] bridge_slave_0: left promiscuous mode [ 384.495718][T16800] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.932517][T16872] IPVS: stopping master sync thread 16876 ... [ 384.939055][T16876] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 385.200019][T16909] SELinux: security_context_str_to_sid () failed with errno=-22 [ 385.315412][T16911] program syz.2.4181 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 386.379722][T17001] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4192'. [ 386.829822][T17051] program syz.2.4194 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 387.024948][T17062] SELinux: security_context_str_to_sid () failed with errno=-22 [ 387.166826][T17069] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4202'. [ 387.175961][T17069] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4202'. [ 387.611826][T17078] bond3: entered promiscuous mode [ 387.617037][T17078] bond3: entered allmulticast mode [ 387.690684][T17078] 8021q: adding VLAN 0 to HW filter on device bond3 [ 388.653714][ T29] kauditd_printk_skb: 257 callbacks suppressed [ 388.653736][ T29] audit: type=1326 audit(1755990531.718:21621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.683762][ T29] audit: type=1326 audit(1755990531.718:21622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.707418][ T29] audit: type=1326 audit(1755990531.718:21623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.731019][ T29] audit: type=1326 audit(1755990531.728:21624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.754739][ T29] audit: type=1326 audit(1755990531.728:21625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.778381][ T29] audit: type=1326 audit(1755990531.728:21626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.806290][ T29] audit: type=1326 audit(1755990531.878:21627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.829932][ T29] audit: type=1326 audit(1755990531.878:21628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.853600][ T29] audit: type=1326 audit(1755990531.878:21629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 388.877400][ T29] audit: type=1326 audit(1755990531.878:21630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17106 comm="syz.3.4213" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 389.139580][T17125] SELinux: security_context_str_to_sid () failed with errno=-22 [ 389.944477][T17175] SELinux: Context Ü is not valid (left unmapped). [ 390.144866][T17195] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4224'. [ 390.179067][T17199] capability: warning: `syz.2.4225' uses deprecated v2 capabilities in a way that may be insecure [ 391.125650][T17231] program syz.0.4236 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 391.137768][T17241] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4237'. [ 391.329525][T17254] program syz.1.4240 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 392.051982][T17285] program syz.3.4251 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 392.137619][T17289] pimreg: entered allmulticast mode [ 392.176921][T17289] pimreg: left allmulticast mode [ 392.447068][T17309] netlink: 'syz.3.4256': attribute type 27 has an invalid length. [ 392.494699][T17313] netlink: 32 bytes leftover after parsing attributes in process `syz.1.4257'. [ 392.605725][T17322] netlink: 'syz.1.4257': attribute type 13 has an invalid length. [ 392.613607][T17322] netlink: 172 bytes leftover after parsing attributes in process `syz.1.4257'. [ 392.638657][T17324] IPVS: stopping master sync thread 17326 ... [ 392.648280][T17326] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 392.695542][T17322] erspan0: refused to change device tx_queue_len [ 392.978346][T17344] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 392.999633][T17341] IPVS: stopping master sync thread 17344 ... [ 393.122313][T17350] program syz.2.4266 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 393.196284][T17355] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4268'. [ 393.292180][ T36] kernel write not supported for file /881/attr/exec (pid: 36 comm: kworker/1:1) [ 393.425700][T17361] IPVS: stopping master sync thread 17362 ... [ 393.672953][T17372] SELinux: security_context_str_to_sid () failed with errno=-22 [ 394.506537][T17387] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4278'. [ 394.515643][T17387] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4278'. [ 394.631379][T17393] netlink: 32 bytes leftover after parsing attributes in process `syz.2.4281'. [ 394.652503][T17398] SELinux: security_context_str_to_sid () failed with errno=-22 [ 394.735309][T17401] netlink: 'syz.2.4281': attribute type 13 has an invalid length. [ 394.743196][T17401] netlink: 172 bytes leftover after parsing attributes in process `syz.2.4281'. [ 394.798816][T17400] IPVS: stopping master sync thread 17402 ... [ 394.806265][T17402] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 394.826182][T17401] erspan0: refused to change device tx_queue_len [ 395.603328][T17419] bond2: entered promiscuous mode [ 395.608523][T17419] bond2: entered allmulticast mode [ 395.619897][T17422] SELinux: security_context_str_to_sid () failed with errno=-22 [ 395.630518][T17419] 8021q: adding VLAN 0 to HW filter on device bond2 [ 395.696599][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 395.696615][ T29] audit: type=1326 audit(1755990538.778:21705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.803701][ T29] audit: type=1326 audit(1755990538.838:21706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.827584][ T29] audit: type=1326 audit(1755990538.838:21707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.851304][ T29] audit: type=1326 audit(1755990538.838:21708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=434 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.874985][ T29] audit: type=1326 audit(1755990538.838:21709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.898579][ T29] audit: type=1326 audit(1755990538.848:21710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.922172][ T29] audit: type=1326 audit(1755990538.848:21711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.945838][ T29] audit: type=1326 audit(1755990538.848:21712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.969423][ T29] audit: type=1326 audit(1755990538.848:21713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 395.998292][T17417] netlink: 'syz.0.4288': attribute type 13 has an invalid length. [ 396.063363][T17429] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 396.521414][ T29] audit: type=1326 audit(1755990539.598:21714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17416 comm="syz.0.4288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 396.697366][T17417] gretap0: refused to change device tx_queue_len [ 396.712809][T17417] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 396.753049][T17446] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 396.755275][T17440] IPVS: stopping master sync thread 17446 ... [ 397.142206][T17462] bond3: entered promiscuous mode [ 397.147382][T17462] bond3: entered allmulticast mode [ 397.164930][T17467] program syz.0.4297 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 397.215297][T17462] 8021q: adding VLAN 0 to HW filter on device bond3 [ 397.671453][T17482] vhci_hcd: invalid port number 255 [ 399.041502][T17509] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4313'. [ 399.524124][T17538] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4322'. [ 400.032132][T17551] netlink: 32 bytes leftover after parsing attributes in process `syz.0.4325'. [ 400.225768][T17570] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4329'. [ 400.359603][T17579] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4332'. [ 400.369468][T17581] FAULT_INJECTION: forcing a failure. [ 400.369468][T17581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.382635][T17581] CPU: 1 UID: 0 PID: 17581 Comm: syz.1.4331 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 400.382720][T17581] Tainted: [W]=WARN [ 400.382728][T17581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 400.382742][T17581] Call Trace: [ 400.382750][T17581] [ 400.382758][T17581] __dump_stack+0x1d/0x30 [ 400.382802][T17581] dump_stack_lvl+0xe8/0x140 [ 400.382826][T17581] dump_stack+0x15/0x1b [ 400.382847][T17581] should_fail_ex+0x265/0x280 [ 400.382873][T17581] should_fail+0xb/0x20 [ 400.382923][T17581] should_fail_usercopy+0x1a/0x20 [ 400.382966][T17581] _copy_from_user+0x1c/0xb0 [ 400.383001][T17581] kstrtouint_from_user+0x69/0xf0 [ 400.383036][T17581] ? 0xffffffff81000000 [ 400.383049][T17581] ? selinux_file_permission+0x1e4/0x320 [ 400.383071][T17581] proc_fail_nth_write+0x50/0x160 [ 400.383143][T17581] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 400.383176][T17581] vfs_write+0x269/0x960 [ 400.383263][T17581] ? vfs_read+0x4e6/0x770 [ 400.383284][T17581] ? __rcu_read_unlock+0x4f/0x70 [ 400.383358][T17581] ? __fget_files+0x184/0x1c0 [ 400.383387][T17581] ? finish_task_switch+0xad/0x2b0 [ 400.383423][T17581] ksys_write+0xda/0x1a0 [ 400.383451][T17581] __x64_sys_write+0x40/0x50 [ 400.383542][T17581] x64_sys_call+0x27fe/0x2ff0 [ 400.383564][T17581] do_syscall_64+0xd2/0x200 [ 400.383676][T17581] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 400.383707][T17581] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 400.383739][T17581] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 400.383766][T17581] RIP: 0033:0x7ff93dcad69f [ 400.383802][T17581] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 400.383824][T17581] RSP: 002b:00007ff93c6ee030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 400.383844][T17581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff93dcad69f [ 400.383857][T17581] RDX: 0000000000000001 RSI: 00007ff93c6ee0a0 RDI: 0000000000000003 [ 400.383868][T17581] RBP: 00007ff93c6ee090 R08: 0000000000000000 R09: 0000000000000000 [ 400.383881][T17581] R10: 0000200000000140 R11: 0000000000000293 R12: 0000000000000001 [ 400.383897][T17581] R13: 00007ff93ded6128 R14: 00007ff93ded6090 R15: 00007ffd4a48d668 [ 400.383959][T17581] [ 400.688421][T17595] netlink: 32 bytes leftover after parsing attributes in process `syz.3.4338'. [ 400.834571][T17603] IPVS: stopping master sync thread 17605 ... [ 400.840862][T17605] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 400.870061][T17610] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4340'. [ 400.882670][T17612] SELinux: security_context_str_to_sid () failed with errno=-22 [ 401.319446][T17621] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4345'. [ 401.608130][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 401.608198][ T29] audit: type=1326 audit(1755990544.688:21735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17631 comm="syz.0.4348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 401.649636][T17635] program syz.2.4347 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 401.696228][ T29] audit: type=1326 audit(1755990544.738:21736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17631 comm="syz.0.4348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 401.720031][ T29] audit: type=1326 audit(1755990544.738:21737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17631 comm="syz.0.4348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 401.743735][ T29] audit: type=1326 audit(1755990544.738:21738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17631 comm="syz.0.4348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 401.767344][ T29] audit: type=1326 audit(1755990544.738:21739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17631 comm="syz.0.4348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 401.790968][ T29] audit: type=1326 audit(1755990544.738:21740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17631 comm="syz.0.4348" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 401.870452][T17647] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 401.870457][T17644] IPVS: stopping master sync thread 17647 ... [ 401.876521][T17649] vhci_hcd: invalid port number 255 [ 401.911157][ T29] audit: type=1400 audit(1755990544.988:21741): avc: denied { setopt } for pid=17637 comm="syz.4.4351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 401.959830][ T29] audit: type=1326 audit(1755990545.038:21742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17654 comm="syz.4.4357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 401.997672][ T29] audit: type=1326 audit(1755990545.038:21743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17654 comm="syz.4.4357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 402.021446][ T29] audit: type=1326 audit(1755990545.068:21744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17654 comm="syz.4.4357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 402.080748][T17663] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 402.090772][T17663] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 402.100315][T17663] FAULT_INJECTION: forcing a failure. [ 402.100315][T17663] name failslab, interval 1, probability 0, space 0, times 0 [ 402.113261][T17663] CPU: 0 UID: 0 PID: 17663 Comm: syz.0.4359 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 402.113293][T17663] Tainted: [W]=WARN [ 402.113299][T17663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 402.113312][T17663] Call Trace: [ 402.113330][T17663] [ 402.113337][T17663] __dump_stack+0x1d/0x30 [ 402.113382][T17663] dump_stack_lvl+0xe8/0x140 [ 402.113405][T17663] dump_stack+0x15/0x1b [ 402.113426][T17663] should_fail_ex+0x265/0x280 [ 402.113452][T17663] should_failslab+0x8c/0xb0 [ 402.113504][T17663] kmem_cache_alloc_node_noprof+0x57/0x320 [ 402.113540][T17663] ? __alloc_skb+0x101/0x320 [ 402.113642][T17663] __alloc_skb+0x101/0x320 [ 402.113682][T17663] ? kthread_insert_work+0x104/0x1f0 [ 402.113709][T17663] ? __pfx_virtual_ncidev_close+0x10/0x10 [ 402.113786][T17663] nfc_genl_device_removed+0x39/0x1d0 [ 402.113817][T17663] nfc_unregister_device+0x1b/0x130 [ 402.113906][T17663] nci_unregister_device+0x146/0x160 [ 402.113972][T17663] ? __pfx_virtual_ncidev_close+0x10/0x10 [ 402.114009][T17663] virtual_ncidev_close+0x2a/0x50 [ 402.114042][T17663] __fput+0x298/0x650 [ 402.114107][T17663] ____fput+0x1c/0x30 [ 402.114134][T17663] task_work_run+0x131/0x1a0 [ 402.114162][T17663] exit_to_user_mode_loop+0xe4/0x100 [ 402.114189][T17663] do_syscall_64+0x1d6/0x200 [ 402.114225][T17663] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 402.114261][T17663] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 402.114291][T17663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.114354][T17663] RIP: 0033:0x7f8bd5c3ebe9 [ 402.114373][T17663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.114396][T17663] RSP: 002b:00007f8bd46a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 402.114420][T17663] RAX: 0000000000000000 RBX: 00007f8bd5e65fa0 RCX: 00007f8bd5c3ebe9 [ 402.114435][T17663] RDX: 0200000000000000 RSI: ffffffffffffffff RDI: 0000000000000006 [ 402.114448][T17663] RBP: 00007f8bd46a7090 R08: 0000000000000000 R09: 0000000000000000 [ 402.114461][T17663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.114472][T17663] R13: 00007f8bd5e66038 R14: 00007f8bd5e65fa0 R15: 00007ffd477ccc88 [ 402.114513][T17663] [ 402.346380][T17659] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 402.360011][T17659] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 402.369780][T17672] SELinux: security_context_str_to_sid () failed with errno=-22 [ 403.587121][T17722] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 403.587160][T17721] IPVS: stopping master sync thread 17722 ... [ 403.724035][T17727] pimreg: entered allmulticast mode [ 403.742130][T17727] pimreg: left allmulticast mode [ 403.845565][T17731] program syz.0.4380 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 403.900828][T17740] SELinux: security_context_str_to_sid () failed with errno=-22 [ 404.993515][T17747] pimreg: entered allmulticast mode [ 405.012210][T17752] program syz.3.4383 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 405.127885][T17751] bond7: entered promiscuous mode [ 405.133076][T17751] bond7: entered allmulticast mode [ 405.158729][T17751] 8021q: adding VLAN 0 to HW filter on device bond7 [ 405.293859][T17766] IPVS: stopping master sync thread 17767 ... [ 405.300051][T17767] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 405.506087][T17783] pimreg: entered allmulticast mode [ 405.558400][T17788] SELinux: security_context_str_to_sid () failed with errno=-22 [ 405.566133][T17783] pimreg: left allmulticast mode [ 406.827741][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 406.827759][ T29] audit: type=1326 audit(1755990549.908:21767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17836 comm="syz.3.4416" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x0 [ 407.449776][T17861] SELinux: security_context_str_to_sid () failed with errno=-22 [ 407.723414][ T29] audit: type=1400 audit(1755990550.718:21768): avc: denied { ioctl } for pid=17864 comm="syz.2.4424" path="socket:[58698]" dev="sockfs" ino=58698 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 408.187476][T17885] SELinux: security_context_str_to_sid () failed with errno=-22 [ 408.235254][T17890] FAULT_INJECTION: forcing a failure. [ 408.235254][T17890] name failslab, interval 1, probability 0, space 0, times 0 [ 408.248072][T17890] CPU: 0 UID: 0 PID: 17890 Comm: syz.0.4429 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 408.248111][T17890] Tainted: [W]=WARN [ 408.248120][T17890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 408.248194][T17890] Call Trace: [ 408.248203][T17890] [ 408.248275][T17890] __dump_stack+0x1d/0x30 [ 408.248299][T17890] dump_stack_lvl+0xe8/0x140 [ 408.248319][T17890] dump_stack+0x15/0x1b [ 408.248334][T17890] should_fail_ex+0x265/0x280 [ 408.248356][T17890] should_failslab+0x8c/0xb0 [ 408.248409][T17890] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 408.248517][T17890] ? sidtab_sid2str_get+0xa0/0x130 [ 408.248545][T17890] kmemdup_noprof+0x2b/0x70 [ 408.248570][T17890] sidtab_sid2str_get+0xa0/0x130 [ 408.248590][T17890] security_sid_to_context_core+0x1eb/0x2e0 [ 408.248652][T17890] security_sid_to_context+0x27/0x40 [ 408.248677][T17890] selinux_lsmprop_to_secctx+0x67/0xf0 [ 408.248709][T17890] security_lsmprop_to_secctx+0x43/0x80 [ 408.248736][T17890] audit_log_task_context+0x77/0x190 [ 408.248804][T17890] audit_log_task+0xf4/0x250 [ 408.248836][T17890] audit_seccomp+0x61/0x100 [ 408.248868][T17890] ? __seccomp_filter+0x68c/0x10d0 [ 408.248895][T17890] __seccomp_filter+0x69d/0x10d0 [ 408.248992][T17890] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 408.249027][T17890] ? vfs_write+0x7e8/0x960 [ 408.249074][T17890] ? __rcu_read_unlock+0x4f/0x70 [ 408.249094][T17890] ? __fget_files+0x184/0x1c0 [ 408.249120][T17890] __secure_computing+0x82/0x150 [ 408.249204][T17890] syscall_trace_enter+0xcf/0x1e0 [ 408.249271][T17890] do_syscall_64+0xac/0x200 [ 408.249334][T17890] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 408.249360][T17890] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 408.249464][T17890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 408.249489][T17890] RIP: 0033:0x7f8bd5c3ebe9 [ 408.249508][T17890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.249530][T17890] RSP: 002b:00007f8bd4686038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 408.249554][T17890] RAX: ffffffffffffffda RBX: 00007f8bd5e66090 RCX: 00007f8bd5c3ebe9 [ 408.249570][T17890] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 408.249585][T17890] RBP: 00007f8bd4686090 R08: 0000000000000000 R09: 0000000000000000 [ 408.249679][T17890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.249694][T17890] R13: 00007f8bd5e66128 R14: 00007f8bd5e66090 R15: 00007ffd477ccc88 [ 408.249716][T17890] [ 408.249725][T17890] audit: error in audit_log_task_context [ 408.313780][ T29] audit: type=1326 audit(1755990551.308:21769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.400733][T17882] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 408.401528][ T29] audit: type=1326 audit(1755990551.308:21770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.401624][ T29] audit: type=1326 audit(1755990551.308:21771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.401692][ T29] audit: type=1326 audit(1755990551.308:21772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=434 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.609301][ T29] audit: type=1326 audit(1755990551.308:21773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.632997][ T29] audit: type=1326 audit(1755990551.308:21774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.656526][ T29] audit: type=1326 audit(1755990551.308:21775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17881 comm="syz.0.4429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 408.968569][T17900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17900 comm=syz.1.4434 [ 409.967412][T17927] bond4: entered promiscuous mode [ 409.972617][T17927] bond4: entered allmulticast mode [ 409.991647][T17927] 8021q: adding VLAN 0 to HW filter on device bond4 [ 410.173816][T17932] SELinux: failed to load policy [ 410.280374][T17936] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 410.374069][T17936] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 410.387915][T17940] program syz.2.4444 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 410.626348][T17946] SELinux: security_context_str_to_sid () failed with errno=-22 [ 411.250946][T17963] SELinux: security_context_str_to_sid () failed with errno=-22 [ 411.831154][T17978] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4453'. [ 411.919473][T17981] bond4: entered promiscuous mode [ 411.924599][T17981] bond4: entered allmulticast mode [ 411.966970][T17981] 8021q: adding VLAN 0 to HW filter on device bond4 [ 412.067977][T17991] bond8: entered promiscuous mode [ 412.073068][T17991] bond8: entered allmulticast mode [ 412.081980][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 412.081994][ T29] audit: type=1400 audit(1755990555.158:21788): avc: denied { ioctl } for pid=17964 comm="syz.3.4451" path="/dev/input/event0" dev="devtmpfs" ino=242 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 412.176840][T17991] 8021q: adding VLAN 0 to HW filter on device bond8 [ 412.680473][T18006] program syz.1.4460 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 412.703322][T18008] SELinux: security_context_str_to_sid () failed with errno=-22 [ 414.414069][T18042] vhci_hcd: invalid port number 255 [ 414.467359][T18047] program syz.0.4472 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 414.493679][ T29] audit: type=1400 audit(1755990557.568:21789): avc: denied { mounton } for pid=18045 comm="syz.2.4473" path="/syzcgroup/unified/syz2" dev="cgroup2" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 414.549912][T18052] SELinux: security_context_str_to_sid () failed with errno=-22 [ 416.084298][T18078] pimreg: left allmulticast mode [ 417.369219][T18101] pimreg: entered allmulticast mode [ 417.416263][T18104] vhci_hcd: invalid port number 255 [ 417.425752][T18101] pimreg: left allmulticast mode [ 417.528713][T18109] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4494'. [ 417.643141][T18117] pimreg: entered allmulticast mode [ 417.658669][T18117] pimreg: left allmulticast mode [ 417.797082][T18127] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4502'. [ 417.853852][T18130] vhci_hcd: invalid port number 255 [ 418.642853][ T29] audit: type=1326 audit(1755990561.718:21790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.678425][ T29] audit: type=1326 audit(1755990561.718:21791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.702130][ T29] audit: type=1326 audit(1755990561.728:21792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.727672][ T29] audit: type=1326 audit(1755990561.728:21793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.751533][ T29] audit: type=1326 audit(1755990561.728:21794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.775356][ T29] audit: type=1326 audit(1755990561.728:21795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.799075][ T29] audit: type=1326 audit(1755990561.728:21796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.822868][ T29] audit: type=1326 audit(1755990561.728:21797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.823943][T18147] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4510'. [ 418.846762][ T29] audit: type=1326 audit(1755990561.748:21798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.879572][ T29] audit: type=1326 audit(1755990561.748:21799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18142 comm="syz.4.4507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 418.945229][T18159] SELinux: security_context_str_to_sid () failed with errno=-22 [ 419.013189][T18161] program syz.4.4515 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 420.039572][T18190] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4524'. [ 420.715011][T18216] program syz.3.4532 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 420.804972][T18223] pimreg: entered allmulticast mode [ 420.821087][T18223] pimreg: left allmulticast mode [ 420.826871][T18225] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4536'. [ 420.839420][T18227] program syz.4.4537 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 421.212188][T18266] netlink: 96 bytes leftover after parsing attributes in process `syz.4.4547'. [ 421.285756][T18274] SELinux: security_context_str_to_sid () failed with errno=-22 [ 421.421193][T18280] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4552'. [ 421.707507][T18284] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 421.862327][T18289] SELinux: security_context_str_to_sid () failed with errno=-22 [ 422.276138][T18301] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4557'. [ 422.385154][T18305] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4557'. [ 422.758167][T18323] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4564'. [ 422.817676][T18329] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4565'. [ 422.826739][T18329] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4565'. [ 422.933329][T18335] SELinux: security_context_str_to_sid () failed with errno=-22 [ 423.926468][T18347] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4572'. [ 424.179019][T18353] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4572'. [ 424.246433][T18350] program syz.4.4573 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 424.384603][T18360] SELinux: security_context_str_to_sid () failed with errno=-22 [ 424.576427][T18364] program syz.1.4576 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 425.150071][T18379] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4579'. [ 425.336603][T18391] pimreg: entered allmulticast mode [ 425.342553][T18391] pimreg: left allmulticast mode [ 425.498018][T18398] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4586'. [ 425.507108][T18398] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4586'. [ 425.927518][T18404] program syz.1.4588 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 426.100385][T18407] SELinux: security_context_str_to_sid () failed with errno=-22 [ 426.225102][T18412] SELinux: security_context_str_to_sid () failed with errno=-22 [ 426.919839][T18415] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4593'. [ 427.389490][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 427.389505][ T29] audit: type=1326 audit(1755990570.468:21856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.466623][T18431] program syz.0.4597 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 427.517416][T18437] SELinux: security_context_str_to_sid () failed with errno=-22 [ 427.622443][ T29] audit: type=1326 audit(1755990570.528:21857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.646073][ T29] audit: type=1326 audit(1755990570.588:21858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.669758][ T29] audit: type=1326 audit(1755990570.588:21859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.693438][ T29] audit: type=1326 audit(1755990570.588:21860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.717258][ T29] audit: type=1326 audit(1755990570.638:21861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.740899][ T29] audit: type=1326 audit(1755990570.638:21862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.740930][ T29] audit: type=1326 audit(1755990570.638:21863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.741021][ T29] audit: type=1326 audit(1755990570.638:21864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 427.741065][ T29] audit: type=1326 audit(1755990570.638:21865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18429 comm="syz.1.4598" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 428.179835][T18451] FAULT_INJECTION: forcing a failure. [ 428.179835][T18451] name failslab, interval 1, probability 0, space 0, times 0 [ 428.192676][T18451] CPU: 1 UID: 0 PID: 18451 Comm: syz.1.4605 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 428.192743][T18451] Tainted: [W]=WARN [ 428.192750][T18451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 428.192797][T18451] Call Trace: [ 428.192806][T18451] [ 428.192816][T18451] __dump_stack+0x1d/0x30 [ 428.192840][T18451] dump_stack_lvl+0xe8/0x140 [ 428.192863][T18451] dump_stack+0x15/0x1b [ 428.192878][T18451] should_fail_ex+0x265/0x280 [ 428.192900][T18451] should_failslab+0x8c/0xb0 [ 428.192961][T18451] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 428.192990][T18451] ? shmem_alloc_inode+0x34/0x50 [ 428.193013][T18451] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 428.193047][T18451] shmem_alloc_inode+0x34/0x50 [ 428.193072][T18451] alloc_inode+0x3d/0x170 [ 428.193099][T18451] new_inode+0x1d/0xe0 [ 428.193134][T18451] shmem_get_inode+0x244/0x750 [ 428.193165][T18451] __shmem_file_setup+0x113/0x210 [ 428.193201][T18451] shmem_kernel_file_setup+0x3e/0x50 [ 428.193274][T18451] newseg+0x2ce/0x670 [ 428.193307][T18451] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 428.193351][T18451] ipcget+0x33d/0x4f0 [ 428.193459][T18451] __x64_sys_shmget+0xa5/0xd0 [ 428.193496][T18451] x64_sys_call+0x2cef/0x2ff0 [ 428.193517][T18451] do_syscall_64+0xd2/0x200 [ 428.193632][T18451] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 428.193661][T18451] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 428.193705][T18451] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.193832][T18451] RIP: 0033:0x7ff93dcaebe9 [ 428.193847][T18451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 428.193938][T18451] RSP: 002b:00007ff93c70f038 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 428.193961][T18451] RAX: ffffffffffffffda RBX: 00007ff93ded5fa0 RCX: 00007ff93dcaebe9 [ 428.193982][T18451] RDX: 0000000000001000 RSI: 0000000000004000 RDI: 0000000000000000 [ 428.193995][T18451] RBP: 00007ff93c70f090 R08: 0000000000000000 R09: 0000000000000000 [ 428.194009][T18451] R10: 0000200000ffc000 R11: 0000000000000246 R12: 0000000000000001 [ 428.194023][T18451] R13: 00007ff93ded6038 R14: 00007ff93ded5fa0 R15: 00007ffd4a48d668 [ 428.194043][T18451] [ 428.464898][T18454] netlink: 'syz.2.4604': attribute type 4 has an invalid length. [ 429.291909][T18476] SELinux: security_context_str_to_sid () failed with errno=-22 [ 429.946634][T18489] pimreg: entered allmulticast mode [ 429.954926][T18489] pimreg: left allmulticast mode [ 430.186276][T18499] SELinux: security_context_str_to_sid () failed with errno=-22 [ 430.749078][T18510] pimreg: entered allmulticast mode [ 430.759107][T18510] pimreg: left allmulticast mode [ 430.905880][T18524] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 430.916983][T18526] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4628'. [ 431.038064][T18533] netlink: 'syz.1.4628': attribute type 5 has an invalid length. [ 431.066518][T18519] sock: sock_timestamping_bind_phc: sock not bind to device [ 431.802956][T18550] pimreg: entered allmulticast mode [ 431.812419][T18550] pimreg: left allmulticast mode [ 431.918671][T18559] SELinux: security_context_str_to_sid () failed with errno=-22 [ 433.146678][T18580] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4643'. [ 433.271918][T18592] pimreg: entered allmulticast mode [ 433.280466][T18592] pimreg: left allmulticast mode [ 433.321841][T18601] SELinux: security_context_str_to_sid () failed with errno=-22 [ 433.447011][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 433.447028][ T29] audit: type=1326 audit(1755990576.528:21949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18607 comm="syz.1.4654" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x0 [ 434.011345][T18621] program syz.3.4657 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 434.039121][ T29] audit: type=1400 audit(1755990577.118:21950): avc: denied { write } for pid=18623 comm="syz.3.4658" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 434.048537][T18624] FAULT_INJECTION: forcing a failure. [ 434.048537][T18624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.075685][T18624] CPU: 1 UID: 0 PID: 18624 Comm: syz.3.4658 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 434.075804][T18624] Tainted: [W]=WARN [ 434.075861][T18624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 434.075877][T18624] Call Trace: [ 434.075929][T18624] [ 434.075939][T18624] __dump_stack+0x1d/0x30 [ 434.075964][T18624] dump_stack_lvl+0xe8/0x140 [ 434.075983][T18624] dump_stack+0x15/0x1b [ 434.075999][T18624] should_fail_ex+0x265/0x280 [ 434.076019][T18624] should_fail+0xb/0x20 [ 434.076035][T18624] should_fail_usercopy+0x1a/0x20 [ 434.076119][T18624] copy_fpstate_to_sigframe+0x628/0x7d0 [ 434.076155][T18624] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 434.076268][T18624] ? x86_task_fpu+0x36/0x60 [ 434.076376][T18624] get_sigframe+0x34d/0x490 [ 434.076399][T18624] ? get_signal+0xdc8/0xf70 [ 434.076506][T18624] x64_setup_rt_frame+0xa8/0x580 [ 434.076533][T18624] arch_do_signal_or_restart+0x27c/0x480 [ 434.076694][T18624] exit_to_user_mode_loop+0x7a/0x100 [ 434.076724][T18624] do_syscall_64+0x1d6/0x200 [ 434.076756][T18624] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 434.076894][T18624] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 434.076924][T18624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 434.076952][T18624] RIP: 0033:0x7f3cc7c2ebe7 [ 434.076972][T18624] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 434.077022][T18624] RSP: 002b:00007f3cc668f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000147 [ 434.077047][T18624] RAX: 0000000000000147 RBX: 00007f3cc7e55fa0 RCX: 00007f3cc7c2ebe9 [ 434.077063][T18624] RDX: 0000000000000001 RSI: 0000200000000180 RDI: 0000000000000004 [ 434.077135][T18624] RBP: 00007f3cc668f090 R08: 0000000000000004 R09: 0000000000000001 [ 434.077147][T18624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.077161][T18624] R13: 00007f3cc7e56038 R14: 00007f3cc7e55fa0 R15: 00007ffd0a4ae298 [ 434.077256][T18624] [ 434.431103][T18636] pimreg: entered allmulticast mode [ 434.499013][ T29] audit: type=1400 audit(1755990577.578:21951): avc: denied { ioctl } for pid=18625 comm="syz.3.4659" path="socket:[61857]" dev="sockfs" ino=61857 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 435.210451][T18651] pimreg: entered allmulticast mode [ 435.240619][T18651] pimreg: left allmulticast mode [ 435.328450][ T29] audit: type=1326 audit(1755990578.408:21952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.352146][ T29] audit: type=1326 audit(1755990578.408:21953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.375848][ T29] audit: type=1326 audit(1755990578.408:21954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=40 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.399533][ T29] audit: type=1326 audit(1755990578.408:21955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.423145][ T29] audit: type=1326 audit(1755990578.408:21956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.446893][ T29] audit: type=1326 audit(1755990578.408:21957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.470511][ T29] audit: type=1326 audit(1755990578.408:21958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18655 comm="syz.0.4671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 435.546486][T18666] SELinux: security_context_str_to_sid () failed with errno=-22 [ 436.138622][T18688] SELinux: security_context_str_to_sid () failed with errno=-22 [ 436.882032][T18707] siw: device registration error -23 [ 437.130775][T18715] pimreg: left allmulticast mode [ 437.302396][T18724] SELinux: security_context_str_to_sid () failed with errno=-22 [ 437.691870][T18728] SELinux: security_context_str_to_sid () failed with errno=-22 [ 438.338053][T18741] SELinux: security_context_str_to_sid () failed with errno=-22 [ 438.652765][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 438.652781][ T29] audit: type=1326 audit(1755990581.728:22001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18764 comm="syz.1.4709" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x0 [ 438.722538][T18770] bond4: entered promiscuous mode [ 438.727855][T18770] bond4: entered allmulticast mode [ 438.733484][T18770] 8021q: adding VLAN 0 to HW filter on device bond4 [ 439.398071][T18792] pimreg: entered allmulticast mode [ 439.409872][T18792] pimreg: left allmulticast mode [ 439.461233][T18790] program syz.0.4715 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 439.534493][ T29] audit: type=1326 audit(1755990582.618:22002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.558216][ T29] audit: type=1326 audit(1755990582.618:22003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.581879][ T29] audit: type=1326 audit(1755990582.618:22004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=40 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.605596][ T29] audit: type=1326 audit(1755990582.618:22005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.629235][ T29] audit: type=1326 audit(1755990582.618:22006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.660939][ T29] audit: type=1326 audit(1755990582.638:22007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.684667][ T29] audit: type=1326 audit(1755990582.638:22008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.708351][ T29] audit: type=1326 audit(1755990582.638:22009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.732193][ T29] audit: type=1326 audit(1755990582.638:22010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18795 comm="syz.1.4717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7ff93dcaebe9 code=0x7ffc0000 [ 439.846886][T18814] siw: device registration error -23 [ 439.990050][T18833] SELinux: security_context_str_to_sid () failed with errno=-22 [ 440.481124][T18842] program syz.4.4729 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 440.698741][T18849] program syz.1.4730 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 440.738082][T18853] SELinux: security_context_str_to_sid () failed with errno=-22 [ 442.479043][T18885] program syz.2.4742 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 442.515633][T18895] SELinux: security_context_str_to_sid () failed with errno=-22 [ 442.563903][T18896] program syz.3.4744 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 442.583904][T18893] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4745'. [ 443.639590][T18920] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4751'. [ 444.165886][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 444.165902][ T29] audit: type=1326 audit(1755990587.248:22066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18937 comm="syz.0.4756" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x0 [ 444.238039][T18943] siw: device registration error -23 [ 444.349156][T18941] pimreg: entered allmulticast mode [ 444.391541][T18941] pimreg: left allmulticast mode [ 445.214035][ T29] audit: type=1326 audit(1755990588.278:22067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.237803][ T29] audit: type=1326 audit(1755990588.278:22068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.261522][ T29] audit: type=1326 audit(1755990588.278:22069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.285273][ T29] audit: type=1326 audit(1755990588.288:22070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.309105][ T29] audit: type=1326 audit(1755990588.288:22071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.332702][ T29] audit: type=1326 audit(1755990588.288:22072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.356321][ T29] audit: type=1326 audit(1755990588.288:22073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18963 comm="syz.3.4763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 445.429658][T18957] program syz.1.4758 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 445.483263][T18980] SELinux: security_context_str_to_sid () failed with errno=-22 [ 445.611106][ T29] audit: type=1400 audit(1755990588.678:22074): avc: denied { create } for pid=18986 comm="syz.4.4769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 445.882681][T18991] SELinux: security_context_str_to_sid () failed with errno=-22 [ 446.023430][ T29] audit: type=1400 audit(1755990588.958:22075): avc: denied { map_create } for pid=18990 comm="syz.0.4770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 447.460085][T19012] pimreg: entered allmulticast mode [ 447.497730][T19012] pimreg: left allmulticast mode [ 447.652951][T19017] pimreg: entered allmulticast mode [ 447.685211][T19018] pimreg: left allmulticast mode [ 447.795333][T19020] bond8: entered promiscuous mode [ 447.800499][T19020] bond8: entered allmulticast mode [ 447.926782][T19020] 8021q: adding VLAN 0 to HW filter on device bond8 [ 449.390475][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 449.390493][ T29] audit: type=1400 audit(1755990592.468:22144): avc: denied { mac_admin } for pid=19053 comm="syz.4.4790" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 449.462731][ T29] audit: type=1400 audit(1755990592.538:22145): avc: denied { relabelto } for pid=19053 comm="syz.4.4790" name="cgroup.procs" dev="cgroup" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 449.488578][ T29] audit: type=1400 audit(1755990592.538:22146): avc: denied { associate } for pid=19053 comm="syz.4.4790" name="cgroup.procs" dev="cgroup" ino=249 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object" [ 449.620585][ T29] audit: type=1326 audit(1755990592.698:22147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.631828][T19058] netlink: 14 bytes leftover after parsing attributes in process `+}[@'. [ 449.688150][T19058] hsr_slave_0: left promiscuous mode [ 449.693771][ T29] audit: type=1326 audit(1755990592.698:22148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.717451][ T29] audit: type=1326 audit(1755990592.698:22149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.741229][ T29] audit: type=1326 audit(1755990592.698:22150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.764913][ T29] audit: type=1326 audit(1755990592.698:22151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.788554][ T29] audit: type=1326 audit(1755990592.708:22152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.812193][ T29] audit: type=1326 audit(1755990592.708:22153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19057 comm="syz.4.4792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 449.836900][T19058] hsr_slave_1: left promiscuous mode [ 450.262763][T19097] netlink: 'syz.0.4809': attribute type 13 has an invalid length. [ 450.276964][T19097] gretap0: refused to change device tx_queue_len [ 450.284507][T19097] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 450.523658][T19117] program syz.1.4814 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 450.911708][T19132] SELinux: security_context_str_to_sid () failed with errno=-22 [ 451.228041][T19144] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4825'. [ 451.604018][T19163] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4832'. [ 451.942329][T19181] program syz.2.4837 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 451.991179][T19183] siw: device registration error -23 [ 453.447853][T19235] syzkaller0: entered promiscuous mode [ 453.453435][T19235] syzkaller0: entered allmulticast mode [ 453.472195][T19246] program syz.3.4857 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 453.534029][T19247] siw: device registration error -23 [ 453.751137][T19260] bridge0: entered allmulticast mode [ 453.821803][T19264] SELinux: security_context_str_to_sid () failed with errno=-22 [ 454.348432][T19285] FAULT_INJECTION: forcing a failure. [ 454.348432][T19285] name failslab, interval 1, probability 0, space 0, times 0 [ 454.361190][T19285] CPU: 1 UID: 0 PID: 19285 Comm: syz.3.4873 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 454.361223][T19285] Tainted: [W]=WARN [ 454.361236][T19285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 454.361250][T19285] Call Trace: [ 454.361258][T19285] [ 454.361267][T19285] __dump_stack+0x1d/0x30 [ 454.361294][T19285] dump_stack_lvl+0xe8/0x140 [ 454.361390][T19285] dump_stack+0x15/0x1b [ 454.361409][T19285] should_fail_ex+0x265/0x280 [ 454.361430][T19285] ? __se_sys_mount+0xef/0x2e0 [ 454.361506][T19285] should_failslab+0x8c/0xb0 [ 454.361529][T19285] __kmalloc_cache_noprof+0x4c/0x320 [ 454.361598][T19285] ? memdup_user+0x99/0xd0 [ 454.361623][T19285] __se_sys_mount+0xef/0x2e0 [ 454.361651][T19285] ? fput+0x8f/0xc0 [ 454.361687][T19285] ? ksys_write+0x192/0x1a0 [ 454.361716][T19285] __x64_sys_mount+0x67/0x80 [ 454.361842][T19285] x64_sys_call+0x2b4d/0x2ff0 [ 454.361866][T19285] do_syscall_64+0xd2/0x200 [ 454.361962][T19285] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 454.361989][T19285] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 454.362022][T19285] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 454.362049][T19285] RIP: 0033:0x7f3cc7c2ebe9 [ 454.362142][T19285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 454.362164][T19285] RSP: 002b:00007f3cc668f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 454.362189][T19285] RAX: ffffffffffffffda RBX: 00007f3cc7e55fa0 RCX: 00007f3cc7c2ebe9 [ 454.362205][T19285] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 454.362222][T19285] RBP: 00007f3cc668f090 R08: 0000200000000240 R09: 0000000000000000 [ 454.362243][T19285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 454.362259][T19285] R13: 00007f3cc7e56038 R14: 00007f3cc7e55fa0 R15: 00007ffd0a4ae298 [ 454.362310][T19285] [ 454.401490][T19290] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4876'. [ 454.539047][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 454.539066][ T29] audit: type=1326 audit(1755990597.618:22346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.639232][ T29] audit: type=1326 audit(1755990597.678:22347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.641642][T19302] cgroup: fork rejected by pids controller in /syz2 [ 454.733793][ T29] audit: type=1326 audit(1755990597.758:22348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.757503][ T29] audit: type=1326 audit(1755990597.758:22349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.779309][T19308] siw: device registration error -23 [ 454.781380][ T29] audit: type=1326 audit(1755990597.758:22350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.810682][ T29] audit: type=1326 audit(1755990597.768:22351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.834310][ T29] audit: type=1326 audit(1755990597.768:22352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19294 comm="syz.3.4878" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 454.857992][ T29] audit: type=1326 audit(1755990597.808:22353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19304 comm="syz.4.4883" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x0 [ 454.908939][ T29] audit: type=1326 audit(1755990597.838:22354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.0.4882" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 454.932676][ T29] audit: type=1326 audit(1755990597.838:22355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.0.4882" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd5c3ebe9 code=0x7ffc0000 [ 455.005828][T19316] netlink: 14 bytes leftover after parsing attributes in process `syz.3.4887'. [ 455.449179][T19330] bond5: entered promiscuous mode [ 455.454461][T19330] bond5: entered allmulticast mode [ 455.460155][T19330] 8021q: adding VLAN 0 to HW filter on device bond5 [ 455.479243][T19335] team0: Device veth1_vlan failed to register rx_handler [ 455.508033][T19337] FAULT_INJECTION: forcing a failure. [ 455.508033][T19337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 455.521438][T19337] CPU: 1 UID: 0 PID: 19337 Comm: syz.1.4896 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 455.521478][T19337] Tainted: [W]=WARN [ 455.521484][T19337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 455.521571][T19337] Call Trace: [ 455.521577][T19337] [ 455.521586][T19337] __dump_stack+0x1d/0x30 [ 455.521609][T19337] dump_stack_lvl+0xe8/0x140 [ 455.521629][T19337] dump_stack+0x15/0x1b [ 455.521646][T19337] should_fail_ex+0x265/0x280 [ 455.521669][T19337] should_fail+0xb/0x20 [ 455.521751][T19337] should_fail_usercopy+0x1a/0x20 [ 455.521845][T19337] _copy_from_user+0x1c/0xb0 [ 455.521904][T19337] __sys_connect+0xd0/0x2b0 [ 455.521988][T19337] __x64_sys_connect+0x3f/0x50 [ 455.522028][T19337] x64_sys_call+0x2c08/0x2ff0 [ 455.522051][T19337] do_syscall_64+0xd2/0x200 [ 455.522090][T19337] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 455.522148][T19337] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 455.522173][T19337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.522252][T19337] RIP: 0033:0x7ff93dcaebe9 [ 455.522270][T19337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 455.522287][T19337] RSP: 002b:00007ff93c70f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 455.522305][T19337] RAX: ffffffffffffffda RBX: 00007ff93ded5fa0 RCX: 00007ff93dcaebe9 [ 455.522317][T19337] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000003 [ 455.522336][T19337] RBP: 00007ff93c70f090 R08: 0000000000000000 R09: 0000000000000000 [ 455.522349][T19337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 455.522426][T19337] R13: 00007ff93ded6038 R14: 00007ff93ded5fa0 R15: 00007ffd4a48d668 [ 455.522483][T19337] [ 455.755086][T19348] 9pnet_virtio: no channels available for device [ 455.875766][T19363] FAULT_INJECTION: forcing a failure. [ 455.875766][T19363] name failslab, interval 1, probability 0, space 0, times 0 [ 455.888629][T19363] CPU: 1 UID: 0 PID: 19363 Comm: syz.0.4903 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 455.888661][T19363] Tainted: [W]=WARN [ 455.888667][T19363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 455.888679][T19363] Call Trace: [ 455.888688][T19363] [ 455.888697][T19363] __dump_stack+0x1d/0x30 [ 455.888746][T19363] dump_stack_lvl+0xe8/0x140 [ 455.888770][T19363] dump_stack+0x15/0x1b [ 455.888786][T19363] should_fail_ex+0x265/0x280 [ 455.888812][T19363] should_failslab+0x8c/0xb0 [ 455.888843][T19363] kmem_cache_alloc_noprof+0x50/0x310 [ 455.888941][T19363] ? dst_alloc+0xbd/0x100 [ 455.888960][T19363] ? __rcu_read_unlock+0x4f/0x70 [ 455.888981][T19363] dst_alloc+0xbd/0x100 [ 455.889000][T19363] ip_route_input_rcu+0x177d/0x1d00 [ 455.889047][T19363] ip_route_input_noref+0x5f/0x90 [ 455.889095][T19363] ip_rcv_finish_core+0x315/0xb40 [ 455.889124][T19363] ip_rcv_finish+0x100/0x1c0 [ 455.889144][T19363] ip_rcv+0x62/0x140 [ 455.889212][T19363] ? __pfx_ip_rcv_finish+0x10/0x10 [ 455.889240][T19363] ? __pfx_ip_rcv+0x10/0x10 [ 455.889261][T19363] __netif_receive_skb+0xff/0x270 [ 455.889287][T19363] ? tun_rx_batched+0xc7/0x430 [ 455.889397][T19363] netif_receive_skb+0x4b/0x2e0 [ 455.889427][T19363] ? tun_rx_batched+0xc7/0x430 [ 455.889539][T19363] tun_rx_batched+0xfc/0x430 [ 455.889646][T19363] tun_get_user+0x1eb6/0x2680 [ 455.889686][T19363] ? ref_tracker_alloc+0x1f2/0x2f0 [ 455.889717][T19363] tun_chr_write_iter+0x15e/0x210 [ 455.889776][T19363] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 455.889882][T19363] vfs_write+0x52a/0x960 [ 455.889908][T19363] ksys_write+0xda/0x1a0 [ 455.889970][T19363] __x64_sys_write+0x40/0x50 [ 455.890066][T19363] x64_sys_call+0x27fe/0x2ff0 [ 455.890100][T19363] do_syscall_64+0xd2/0x200 [ 455.890135][T19363] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 455.890160][T19363] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 455.890220][T19363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.890247][T19363] RIP: 0033:0x7f8bd5c3d69f [ 455.890266][T19363] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 455.890283][T19363] RSP: 002b:00007f8bd46a7000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 455.890381][T19363] RAX: ffffffffffffffda RBX: 00007f8bd5e65fa0 RCX: 00007f8bd5c3d69f [ 455.890397][T19363] RDX: 00000000000000be RSI: 00002000000014c0 RDI: 00000000000000c8 [ 455.890408][T19363] RBP: 00007f8bd46a7090 R08: 0000000000000000 R09: 0000000000000000 [ 455.890420][T19363] R10: 00000000000000be R11: 0000000000000293 R12: 0000000000000001 [ 455.890431][T19363] R13: 00007f8bd5e66038 R14: 00007f8bd5e65fa0 R15: 00007ffd477ccc88 [ 455.890449][T19363] [ 456.453883][T19339] chnl_net:caif_netlink_parms(): no params data found [ 456.471591][T19387] program syz.1.4910 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 456.485244][T19389] cgroup: fork rejected by pids controller in /syz0 [ 456.574713][T19339] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.581855][T19339] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.608887][T19339] bridge_slave_0: entered allmulticast mode [ 456.626348][T19339] bridge_slave_0: entered promiscuous mode [ 456.648934][T19339] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.656139][T19339] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.668296][T19339] bridge_slave_1: entered allmulticast mode [ 456.675020][T19339] bridge_slave_1: entered promiscuous mode [ 456.805405][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 456.814349][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 456.823293][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 456.925346][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 456.934446][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 456.953724][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 457.010060][T19339] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 457.025188][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 457.034168][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 457.055008][T19339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 457.068275][T19408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4915'. [ 457.129439][T19339] team0: Port device team_slave_0 added [ 457.156167][ T51] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.181347][T19339] team0: Port device team_slave_1 added [ 457.232336][T19339] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 457.239498][T19339] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 457.265424][T19339] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 457.444628][ T51] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.518978][T19427] bond7: entered promiscuous mode [ 457.524162][T19427] bond7: entered allmulticast mode [ 457.539785][T19427] 8021q: adding VLAN 0 to HW filter on device bond7 [ 457.555698][T19339] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 457.562792][T19339] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 457.588844][T19339] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 457.608813][ T51] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.653960][T19339] hsr_slave_0: entered promiscuous mode [ 457.660295][T19339] hsr_slave_1: entered promiscuous mode [ 457.673891][T19339] debugfs: 'hsr0' already exists in 'hsr' [ 457.679663][T19339] Cannot create hsr debugfs directory [ 457.690196][ T51] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.891606][ T51] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 457.904451][ T51] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 457.935412][T19446] FAULT_INJECTION: forcing a failure. [ 457.935412][T19446] name failslab, interval 1, probability 0, space 0, times 0 [ 457.948182][T19446] CPU: 0 UID: 0 PID: 19446 Comm: syz.4.4924 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 457.948226][T19446] Tainted: [W]=WARN [ 457.948232][T19446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 457.948244][T19446] Call Trace: [ 457.948251][T19446] [ 457.948259][T19446] __dump_stack+0x1d/0x30 [ 457.948293][T19446] dump_stack_lvl+0xe8/0x140 [ 457.948319][T19446] dump_stack+0x15/0x1b [ 457.948362][T19446] should_fail_ex+0x265/0x280 [ 457.948440][T19446] should_failslab+0x8c/0xb0 [ 457.948464][T19446] kmem_cache_alloc_node_noprof+0x57/0x320 [ 457.948497][T19446] ? __alloc_skb+0x101/0x320 [ 457.948539][T19446] __alloc_skb+0x101/0x320 [ 457.948771][T19446] netlink_ack+0xfd/0x500 [ 457.948801][T19446] netlink_rcv_skb+0x192/0x220 [ 457.948901][T19446] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 457.948947][T19446] nfnetlink_rcv+0x16b/0x1690 [ 457.949044][T19446] ? nlmon_xmit+0x4f/0x60 [ 457.949144][T19446] ? consume_skb+0x49/0x150 [ 457.949164][T19446] ? nlmon_xmit+0x4f/0x60 [ 457.949260][T19446] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 457.949287][T19446] ? __dev_queue_xmit+0x1200/0x2000 [ 457.949314][T19446] ? __dev_queue_xmit+0x182/0x2000 [ 457.949358][T19446] ? ref_tracker_free+0x37d/0x3e0 [ 457.949383][T19446] ? __netlink_deliver_tap+0x4dc/0x500 [ 457.949410][T19446] netlink_unicast+0x5bd/0x690 [ 457.949473][T19446] netlink_sendmsg+0x58b/0x6b0 [ 457.949503][T19446] ? __pfx_netlink_sendmsg+0x10/0x10 [ 457.949525][T19446] __sock_sendmsg+0x145/0x180 [ 457.949606][T19446] ____sys_sendmsg+0x31e/0x4e0 [ 457.949631][T19446] ___sys_sendmsg+0x17b/0x1d0 [ 457.949743][T19446] __x64_sys_sendmsg+0xd4/0x160 [ 457.949770][T19446] x64_sys_call+0x191e/0x2ff0 [ 457.949790][T19446] do_syscall_64+0xd2/0x200 [ 457.949849][T19446] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 457.949873][T19446] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 457.949897][T19446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.949921][T19446] RIP: 0033:0x7f39c182ebe9 [ 457.950007][T19446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.950025][T19446] RSP: 002b:00007f39c028f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 457.950043][T19446] RAX: ffffffffffffffda RBX: 00007f39c1a55fa0 RCX: 00007f39c182ebe9 [ 457.950055][T19446] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 457.950067][T19446] RBP: 00007f39c028f090 R08: 0000000000000000 R09: 0000000000000000 [ 457.950079][T19446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.950092][T19446] R13: 00007f39c1a56038 R14: 00007f39c1a55fa0 R15: 00007fffe9acbca8 [ 457.950116][T19446] [ 457.952221][ T51] bond0 (unregistering): Released all slaves [ 458.228159][ T51] bond1 (unregistering): Released all slaves [ 458.236878][ T51] bond2 (unregistering): Released all slaves [ 458.245863][ T51] bond3 (unregistering): Released all slaves [ 458.255069][ T51] bond4 (unregistering): Released all slaves [ 458.263882][ T51] bond5 (unregistering): Released all slaves [ 458.337754][ T51] hsr_slave_0: left promiscuous mode [ 458.346782][ T51] hsr_slave_1: left promiscuous mode [ 458.352626][ T51] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 458.360098][ T51] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 458.368526][ T51] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 458.375998][ T51] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 458.386411][ T51] veth1_macvtap: left promiscuous mode [ 458.391930][ T51] veth0_macvtap: left promiscuous mode [ 458.398025][ T51] veth1_vlan: left promiscuous mode [ 458.403414][ T51] veth0_vlan: left promiscuous mode [ 458.427953][T19462] program syz.3.4926 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 458.481988][ T51] team0 (unregistering): Port device team_slave_1 removed [ 458.492779][ T51] team0 (unregistering): Port device C removed [ 458.547998][T19421] chnl_net:caif_netlink_parms(): no params data found [ 458.794765][T19339] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 458.882238][T19468] FAULT_INJECTION: forcing a failure. [ 458.882238][T19468] name failslab, interval 1, probability 0, space 0, times 0 [ 458.895018][T19468] CPU: 0 UID: 0 PID: 19468 Comm: syz.1.4927 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 458.895131][T19468] Tainted: [W]=WARN [ 458.895146][T19468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 458.895161][T19468] Call Trace: [ 458.895168][T19468] [ 458.895175][T19468] __dump_stack+0x1d/0x30 [ 458.895196][T19468] dump_stack_lvl+0xe8/0x140 [ 458.895215][T19468] dump_stack+0x15/0x1b [ 458.895262][T19468] should_fail_ex+0x265/0x280 [ 458.895283][T19468] should_failslab+0x8c/0xb0 [ 458.895348][T19468] kmem_cache_alloc_node_noprof+0x57/0x320 [ 458.895377][T19468] ? __alloc_skb+0x101/0x320 [ 458.895493][T19468] __alloc_skb+0x101/0x320 [ 458.895536][T19468] netlink_ack+0xfd/0x500 [ 458.895629][T19468] netlink_rcv_skb+0x192/0x220 [ 458.895652][T19468] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 458.895717][T19468] nfnetlink_rcv+0x16b/0x1690 [ 458.895757][T19468] ? nlmon_xmit+0x4f/0x60 [ 458.895790][T19468] ? consume_skb+0x49/0x150 [ 458.895839][T19468] ? nlmon_xmit+0x4f/0x60 [ 458.895869][T19468] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 458.895898][T19468] ? __dev_queue_xmit+0x1200/0x2000 [ 458.895921][T19468] ? __dev_queue_xmit+0x182/0x2000 [ 458.896004][T19468] ? ref_tracker_free+0x37d/0x3e0 [ 458.896036][T19468] ? __netlink_deliver_tap+0x4dc/0x500 [ 458.896067][T19468] netlink_unicast+0x5bd/0x690 [ 458.896131][T19468] netlink_sendmsg+0x58b/0x6b0 [ 458.896158][T19468] ? __pfx_netlink_sendmsg+0x10/0x10 [ 458.896185][T19468] __sock_sendmsg+0x145/0x180 [ 458.896214][T19468] ____sys_sendmsg+0x31e/0x4e0 [ 458.896285][T19468] ___sys_sendmsg+0x17b/0x1d0 [ 458.896373][T19468] __x64_sys_sendmsg+0xd4/0x160 [ 458.896406][T19468] x64_sys_call+0x191e/0x2ff0 [ 458.896427][T19468] do_syscall_64+0xd2/0x200 [ 458.896539][T19468] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 458.896564][T19468] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 458.896597][T19468] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.896657][T19468] RIP: 0033:0x7ff93dcaebe9 [ 458.896684][T19468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.896707][T19468] RSP: 002b:00007ff93c70f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 458.896730][T19468] RAX: ffffffffffffffda RBX: 00007ff93ded5fa0 RCX: 00007ff93dcaebe9 [ 458.896814][T19468] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 458.896826][T19468] RBP: 00007ff93c70f090 R08: 0000000000000000 R09: 0000000000000000 [ 458.896837][T19468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.896862][T19468] R13: 00007ff93ded6038 R14: 00007ff93ded5fa0 R15: 00007ffd4a48d668 [ 458.896937][T19468] [ 458.901154][T19421] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.173243][T19421] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.180591][T19421] bridge_slave_0: entered allmulticast mode [ 459.187119][T19421] bridge_slave_0: entered promiscuous mode [ 459.193964][T19421] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.201061][T19421] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.208267][T19421] bridge_slave_1: entered allmulticast mode [ 459.245831][T19421] bridge_slave_1: entered promiscuous mode [ 459.279188][T19421] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 459.326929][T19339] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.353995][T19421] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 459.486270][T19421] team0: Port device team_slave_0 added [ 459.768431][T19339] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.853628][T19482] FAULT_INJECTION: forcing a failure. [ 459.853628][T19482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.866833][T19482] CPU: 1 UID: 0 PID: 19482 Comm: syz.4.4932 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 459.866933][T19482] Tainted: [W]=WARN [ 459.866941][T19482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 459.866957][T19482] Call Trace: [ 459.866965][T19482] [ 459.866972][T19482] __dump_stack+0x1d/0x30 [ 459.866992][T19482] dump_stack_lvl+0xe8/0x140 [ 459.867010][T19482] dump_stack+0x15/0x1b [ 459.867029][T19482] should_fail_ex+0x265/0x280 [ 459.867055][T19482] should_fail+0xb/0x20 [ 459.867076][T19482] should_fail_usercopy+0x1a/0x20 [ 459.867104][T19482] _copy_from_user+0x1c/0xb0 [ 459.867138][T19482] __sys_bpf+0x178/0x7b0 [ 459.867216][T19482] __x64_sys_bpf+0x41/0x50 [ 459.867245][T19482] x64_sys_call+0x2aea/0x2ff0 [ 459.867272][T19482] do_syscall_64+0xd2/0x200 [ 459.867305][T19482] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 459.867412][T19482] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 459.867505][T19482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.867531][T19482] RIP: 0033:0x7f39c182ebe9 [ 459.867547][T19482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 459.867626][T19482] RSP: 002b:00007f39c028f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 459.867697][T19482] RAX: ffffffffffffffda RBX: 00007f39c1a55fa0 RCX: 00007f39c182ebe9 [ 459.867712][T19482] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 459.867728][T19482] RBP: 00007f39c028f090 R08: 0000000000000000 R09: 0000000000000000 [ 459.867812][T19482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.867834][T19482] R13: 00007f39c1a56038 R14: 00007f39c1a55fa0 R15: 00007fffe9acbca8 [ 459.867898][T19482] [ 459.869055][T19421] team0: Port device team_slave_1 added [ 460.084734][T19421] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 460.091740][T19421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 460.117997][T19421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 460.138225][T19339] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 460.167165][T19421] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 460.174401][T19421] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 460.200428][T19421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 460.212758][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 460.212778][ T29] audit: type=1326 audit(1755990603.288:22462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19486 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.247528][ T29] audit: type=1326 audit(1755990603.288:22463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19486 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.271291][ T29] audit: type=1326 audit(1755990603.288:22464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19486 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.295020][ T29] audit: type=1326 audit(1755990603.288:22465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19486 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.318813][ T29] audit: type=1326 audit(1755990603.288:22466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19486 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.342664][ T29] audit: type=1326 audit(1755990603.288:22467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19486 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.393108][T19421] hsr_slave_0: entered promiscuous mode [ 460.404434][T19497] SELinux: security_context_str_to_sid () failed with errno=-22 [ 460.413996][T19421] hsr_slave_1: entered promiscuous mode [ 460.428335][T19421] debugfs: 'hsr0' already exists in 'hsr' [ 460.434146][T19421] Cannot create hsr debugfs directory [ 460.501423][ T29] audit: type=1326 audit(1755990603.328:22468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.3.4937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.525161][ T29] audit: type=1326 audit(1755990603.328:22469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.3.4937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.548953][ T29] audit: type=1326 audit(1755990603.328:22470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.3.4937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=40 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.572495][ T29] audit: type=1326 audit(1755990603.328:22471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.3.4937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cc7c2ebe9 code=0x7ffc0000 [ 460.811837][T19339] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 461.041029][T19339] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 461.056646][T19516] netem: change failed [ 461.225690][T19339] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 461.239612][T19339] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 461.321618][T19339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 461.336989][T19339] 8021q: adding VLAN 0 to HW filter on device team0 [ 461.358218][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.365413][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.376959][T19524] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4942'. [ 461.388906][T16954] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.396107][T16954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.426988][T19339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 461.473564][T19421] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 461.485162][T19421] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 461.496504][T19421] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 461.507925][T19421] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 461.525618][T19339] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 461.560413][T19421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 461.576233][T19421] 8021q: adding VLAN 0 to HW filter on device team0 [ 461.586618][T16954] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.593778][T16954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.605377][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.612577][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.633516][T19421] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 461.643953][T19421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 461.691158][T19339] veth0_vlan: entered promiscuous mode [ 461.713262][T19339] veth1_vlan: entered promiscuous mode [ 461.738804][T19421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 461.755902][T19339] veth0_macvtap: entered promiscuous mode [ 461.765097][T19339] veth1_macvtap: entered promiscuous mode [ 461.783243][T19339] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 461.794760][T19339] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 461.821335][ T51] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 461.831335][ T51] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 461.851637][ T51] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 461.871816][ T51] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 461.901662][T19421] veth0_vlan: entered promiscuous mode [ 461.920523][T19421] veth1_vlan: entered promiscuous mode [ 461.942096][T19421] veth0_macvtap: entered promiscuous mode [ 461.956353][T19421] veth1_macvtap: entered promiscuous mode [ 461.981502][T19421] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 461.991607][T19421] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 462.014169][T16946] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 462.031272][T16946] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 462.045804][T16946] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 462.058625][T16946] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 462.568230][T19590] netlink: 136 bytes leftover after parsing attributes in process `syz.0.4955'. [ 462.970769][T19608] SELinux: security_context_str_to_sid () failed with errno=-22 [ 463.135472][T19618] netlink: 32 bytes leftover after parsing attributes in process `syz.0.4967'. [ 463.624738][T19629] program syz.1.4972 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 463.932198][T19657] bond9: entered promiscuous mode [ 463.937351][T19657] bond9: entered allmulticast mode [ 463.985167][T19657] 8021q: adding VLAN 0 to HW filter on device bond9 [ 464.657970][T19676] SELinux: security_context_str_to_sid () failed with errno=-22 [ 464.849966][T19684] netem: change failed [ 465.101193][T19708] SELinux: security_context_str_to_sid () failed with errno=-22 [ 465.385845][T19709] 9pnet_fd: Insufficient options for proto=fd [ 465.498703][T19714] netlink: 32 bytes leftover after parsing attributes in process `syz.4.5001'. [ 465.508611][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 465.508629][ T29] audit: type=1400 audit(1755990608.558:22698): avc: denied { create } for pid=19713 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 465.534590][ T29] audit: type=1400 audit(1755990608.568:22699): avc: denied { ioctl } for pid=19713 comm="syz.4.5001" path="socket:[68650]" dev="sockfs" ino=68650 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 465.559425][ T29] audit: type=1400 audit(1755990608.568:22700): avc: denied { create } for pid=19713 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 465.580150][ T29] audit: type=1400 audit(1755990608.568:22701): avc: denied { write } for pid=19713 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 465.600893][ T29] audit: type=1400 audit(1755990608.568:22702): avc: denied { read } for pid=19713 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 465.782302][ T29] audit: type=1400 audit(1755990608.798:22703): avc: denied { create } for pid=19713 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 465.802094][ T29] audit: type=1400 audit(1755990608.798:22704): avc: denied { module_request } for pid=19713 comm="syz.4.5001" kmod="net-pf-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 465.823804][ T29] audit: type=1400 audit(1755990608.798:22705): avc: denied { tracepoint } for pid=19713 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 465.843740][ T29] audit: type=1326 audit(1755990608.838:22706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19713 comm="syz.4.5001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 465.867505][ T29] audit: type=1326 audit(1755990608.838:22707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19713 comm="syz.4.5001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=84 compat=0 ip=0x7f39c182ebe9 code=0x7ffc0000 [ 465.897839][T19721] bond6: entered promiscuous mode [ 465.902955][T19721] bond6: entered allmulticast mode [ 465.908857][T19721] 8021q: adding VLAN 0 to HW filter on device bond6 [ 466.413279][T19743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5009'. [ 466.445660][T19749] netlink: 136 bytes leftover after parsing attributes in process `syz.2.5014'. [ 466.730463][T19772] program syz.2.5020 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 466.824501][T19753] syz.0.5016 (19753) used greatest stack depth: 8944 bytes left [ 467.722632][T19813] SELinux: security_context_str_to_sid () failed with errno=-22 [ 468.472658][T19828] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.479937][T19828] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.513462][T19828] bridge0: entered allmulticast mode [ 468.580950][T19835] bridge_slave_1: left allmulticast mode [ 468.587066][T19835] bridge_slave_1: left promiscuous mode [ 468.592970][T19835] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.763170][T19835] bridge_slave_0: left allmulticast mode [ 468.769054][T19835] bridge_slave_0: left promiscuous mode [ 468.774952][T19835] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.905320][T19851] bond10: entered promiscuous mode [ 468.910509][T19851] bond10: entered allmulticast mode [ 468.915981][T19851] 8021q: adding VLAN 0 to HW filter on device bond10 [ 468.929370][T19851] bond10 (unregistering): Released all slaves [ 468.975103][T19865] vhci_hcd: invalid port number 255 [ 470.941928][ T29] kauditd_printk_skb: 178 callbacks suppressed [ 470.941946][ T29] audit: type=1400 audit(1755990614.018:22886): avc: denied { name_bind } for pid=19892 comm="syz.1.5067" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 470.948757][ T29] audit: type=1400 audit(1755990614.028:22887): avc: denied { create } for pid=19892 comm="syz.1.5067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 470.990854][ T29] audit: type=1400 audit(1755990614.068:22888): avc: denied { read write } for pid=19890 comm="syz.2.5066" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 471.014599][ T29] audit: type=1400 audit(1755990614.068:22889): avc: denied { open } for pid=19890 comm="syz.2.5066" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 471.050182][ T29] audit: type=1400 audit(1755990614.128:22890): avc: denied { setopt } for pid=19890 comm="syz.2.5066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 471.070673][T19894] netem: change failed [ 471.098535][ T29] audit: type=1400 audit(1755990614.158:22891): avc: denied { create } for pid=19890 comm="syz.2.5066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 471.118554][ T29] audit: type=1400 audit(1755990614.158:22892): avc: denied { tracepoint } for pid=19890 comm="syz.2.5066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 471.138542][ T29] audit: type=1400 audit(1755990614.168:22893): avc: denied { write } for pid=19890 comm="syz.2.5066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 471.316555][ T29] audit: type=1400 audit(1755990614.398:22894): avc: denied { create } for pid=19908 comm="syz.1.5073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 471.371097][ T23] IPVS: starting estimator thread 0... [ 471.371232][T19909] IPVS: dh: UDP 224.0.0.2:0 - no destination available [ 471.377115][ T29] audit: type=1400 audit(1755990614.458:22895): avc: denied { write } for pid=19908 comm="syz.1.5073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 471.493891][T19911] IPVS: using max 1872 ests per chain, 93600 per kthread [ 471.596989][T19918] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5076'. [ 471.637839][T19923] bond9: entered promiscuous mode [ 471.642934][T19923] bond9: entered allmulticast mode [ 471.648461][T19923] 8021q: adding VLAN 0 to HW filter on device bond9 [ 472.602187][T19957] IPVS: stopping master sync thread 19958 ... [ 472.602131][T19958] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 472.780710][T19971] vhci_hcd: invalid port number 255 [ 473.459950][T19991] netlink: 'syz.1.5101': attribute type 3 has an invalid length. [ 473.737163][T20000] program syz.1.5104 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 474.425004][T20020] bond10: entered promiscuous mode [ 474.430208][T20020] bond10: entered allmulticast mode [ 474.436118][T20020] 8021q: adding VLAN 0 to HW filter on device bond10 [ 474.796278][T20044] program syz.4.5117 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 475.027491][T20056] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5121'. [ 475.047637][T20058] bond1: entered promiscuous mode [ 475.052713][T20058] bond1: entered allmulticast mode [ 475.085763][T20058] 8021q: adding VLAN 0 to HW filter on device bond1 [ 475.932803][ T3389] IPVS: starting estimator thread 0... [ 475.980598][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 475.980690][ T29] audit: type=1400 audit(1755990619.058:23047): avc: denied { append } for pid=20075 comm="syz.2.5128" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 476.030529][T20078] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 476.163821][T20079] IPVS: using max 2400 ests per chain, 120000 per kthread [ 476.348715][ T29] audit: type=1326 audit(1755990619.418:23048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.372413][ T29] audit: type=1326 audit(1755990619.418:23049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.396186][ T29] audit: type=1326 audit(1755990619.418:23050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=40 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.419732][ T29] audit: type=1326 audit(1755990619.418:23051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.443395][ T29] audit: type=1326 audit(1755990619.418:23052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.467254][ T29] audit: type=1326 audit(1755990619.418:23053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.490878][ T29] audit: type=1326 audit(1755990619.418:23054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.514521][ T29] audit: type=1326 audit(1755990619.418:23055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.538192][ T29] audit: type=1326 audit(1755990619.418:23056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20082 comm="syz.0.5129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7fd4fbadebe9 code=0x7ffc0000 [ 476.853519][T20103] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.860836][T20103] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.869904][T20103] bridge0: entered allmulticast mode [ 476.964695][T20113] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5136'. [ 477.225551][T20120] program syz.4.5138 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 477.961629][T20131] bond2: entered promiscuous mode [ 477.966802][T20131] bond2: entered allmulticast mode [ 478.177642][T20131] 8021q: adding VLAN 0 to HW filter on device bond2 [ 478.294699][T20129] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 478.399814][T20129] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 478.529316][T20129] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 478.611194][T20129] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 478.719408][T16954] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 478.731838][T16954] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 478.759430][ T52] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 478.772380][T20162] netem: change failed [ 478.782344][T20167] SELinux: security_context_str_to_sid () failed with errno=-22 [ 479.329161][T20184] IPVS: dh: UDP 224.0.0.2:0 - no destination available [ 479.336536][ T23] IPVS: starting estimator thread 0... [ 479.423654][T20187] IPVS: using max 2400 ests per chain, 120000 per kthread [ 479.565895][T20194] bond3: entered promiscuous mode [ 479.571179][T20194] bond3: entered allmulticast mode [ 479.577139][T20194] 8021q: adding VLAN 0 to HW filter on device bond3 [ 480.326804][T20215] vhci_hcd: invalid port number 255 [ 480.418715][T20222] netlink: 'syz.0.5175': attribute type 3 has an invalid length. [ 480.514440][T20136] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 480.585266][T20136] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 480.796051][T20136] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 480.852820][T20239] 9pnet_fd: Insufficient options for proto=fd [ 481.026653][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 481.026672][ T29] audit: type=1400 audit(1755990623.838:23120): avc: denied { relabelfrom } for pid=20233 comm="syz.4.5180" name="NETLINK" dev="sockfs" ino=70814 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 481.057402][ T29] audit: type=1400 audit(1755990623.838:23121): avc: denied { relabelto } for pid=20233 comm="syz.4.5180" name="NETLINK" dev="sockfs" ino=70814 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 481.082677][ T29] audit: type=1400 audit(1755990623.888:23122): avc: denied { create } for pid=20236 comm="syz.1.5181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 481.102477][ T29] audit: type=1400 audit(1755990623.898:23123): avc: denied { connect } for pid=20236 comm="syz.1.5181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 481.122185][ T29] audit: type=1400 audit(1755990623.898:23124): avc: denied { write } for pid=20236 comm="syz.1.5181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 481.141767][ T29] audit: type=1400 audit(1755990623.898:23125): avc: denied { mounton } for pid=20236 comm="syz.1.5181" path="/463" dev="tmpfs" ino=2454 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 481.164155][ T29] audit: type=1400 audit(1755990623.928:23126): avc: denied { create } for pid=20238 comm="syz.4.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 481.183923][ T29] audit: type=1400 audit(1755990623.928:23127): avc: denied { write } for pid=20238 comm="syz.4.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 481.204733][ T29] audit: type=1400 audit(1755990623.928:23128): avc: denied { mounton } for pid=20238 comm="syz.4.5182" path="/383/file0" dev="tmpfs" ino=2055 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 481.227716][ T29] audit: type=1400 audit(1755990623.998:23129): avc: denied { read } for pid=20236 comm="syz.1.5181" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 481.932277][T20281] netlink: 'syz.1.5199': attribute type 3 has an invalid length. [ 482.452167][T20296] netlink: 136 bytes leftover after parsing attributes in process `syz.4.5204'. [ 482.556693][T20306] netlink: 'syz.1.5211': attribute type 3 has an invalid length. [ 482.778541][T20324] bond11: entered promiscuous mode [ 482.785399][T20324] bond11: entered allmulticast mode [ 482.791122][T20324] 8021q: adding VLAN 0 to HW filter on device bond11 [ 482.828159][T20330] netlink: 136 bytes leftover after parsing attributes in process `syz.1.5219'. [ 483.102250][T20345] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5226'. [ 483.111312][T20345] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5226'. [ 483.130327][T20345] wireguard0: entered promiscuous mode [ 483.135962][T20345] wireguard0: entered allmulticast mode [ 483.532385][T20389] bond7: entered promiscuous mode [ 483.537690][T20389] bond7: entered allmulticast mode [ 483.555108][T20389] 8021q: adding VLAN 0 to HW filter on device bond7 [ 483.712324][T20406] ================================================================== [ 483.720481][T20406] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 483.727801][T20406] [ 483.730147][T20406] write to 0xffff888103f0a300 of 8 bytes by task 20404 on cpu 1: [ 483.737875][T20406] mas_wmb_replace+0x20d/0x14a0 [ 483.742779][T20406] mas_wr_store_entry+0x1773/0x2b50 [ 483.748005][T20406] mas_store_prealloc+0x74d/0x9e0 [ 483.753061][T20406] vma_iter_store_new+0x1c5/0x200 [ 483.758119][T20406] vma_complete+0x125/0x580 [ 483.762648][T20406] __split_vma+0x5d9/0x650 [ 483.767097][T20406] vma_modify+0x3f2/0xc80 [ 483.771455][T20406] vma_modify_flags+0x101/0x130 [ 483.776338][T20406] mprotect_fixup+0x2cc/0x570 [ 483.781046][T20406] do_mprotect_pkey+0x6d6/0x980 [ 483.785936][T20406] __x64_sys_mprotect+0x48/0x60 [ 483.790813][T20406] x64_sys_call+0x274e/0x2ff0 [ 483.795522][T20406] do_syscall_64+0xd2/0x200 [ 483.800067][T20406] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 483.805991][T20406] [ 483.808332][T20406] read to 0xffff888103f0a300 of 8 bytes by task 20406 on cpu 0: [ 483.816151][T20406] mas_state_walk+0x119/0x650 [ 483.820863][T20406] mas_walk+0x60/0x150 [ 483.824967][T20406] lock_vma_under_rcu+0x8d/0x160 [ 483.829946][T20406] do_user_addr_fault+0x233/0x1090 [ 483.835104][T20406] exc_page_fault+0x62/0xa0 [ 483.839632][T20406] asm_exc_page_fault+0x26/0x30 [ 483.844523][T20406] [ 483.846859][T20406] value changed: 0xffff8881042b5c41 -> 0xffff888103f0a300 [ 483.853978][T20406] [ 483.856324][T20406] Reported by Kernel Concurrency Sanitizer on: [ 483.862499][T20406] CPU: 0 UID: 0 PID: 20406 Comm: syz.0.5252 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 483.873907][T20406] Tainted: [W]=WARN [ 483.877721][T20406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 483.887797][T20406] ================================================================== [ 484.649778][T16954] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 484.660381][T16954] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 484.672186][ T3430] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 484.684803][T16946] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0