last executing test programs: 2m32.040878874s ago: executing program 0 (id=3594): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x2) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) epoll_create1(0x80000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0xffffffffffffffff}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) syz_open_dev$hiddev(0x0, 0x2, 0x440) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 2m30.805697833s ago: executing program 0 (id=3599): ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getpgid(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) close(r1) 2m30.736790704s ago: executing program 0 (id=3600): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101042, 0x174) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x20, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newtfilter={0xb4, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r4, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x88, 0x2, [@TCA_U32_SEL={0x84, 0x5, {0x3, 0x8, 0xd, 0x4, 0x7ff, 0x365, 0x2, 0x6, [{0x1, 0xffff, 0x7706, 0x8}, {0x7fffffff, 0x8, 0xd7, 0x3}, {0x3, 0x2, 0xea9a, 0x6}, {0xf, 0x3a3, 0x8, 0x401}, {0x43, 0x5, 0x5, 0x4}, {0x5, 0x6, 0x80, 0x715e}, {0x6, 0xc25a0, 0x8, 0x1000}]}}]}}]}, 0xb4}}, 0x24040084) 2m30.456090538s ago: executing program 0 (id=3605): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000003680)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000036c0)=@newtaction={0x14, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x14) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000b7e3e44c87191954955900becddbbf4b651758f6d3150ef1c59037c4e889b465b72ce1367c113ed2f5d34ad47a2f2dc0b2d298a0c95ac6127be06296448ed84e9af6168495367a8e4dd2bc274e2789cbcd276bb08843aa2e0448d127a62b46f15dfc6015e7e2041eafe1c2ec085d01ff3324370685961b699f5cda9526eeb2f260fbd89cec96539532dca8035eb8ad19331b7680c6220c537356399c23a5ca5b"], 0x50) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') writev(r3, &(0x7f0000000240)=[{&(0x7f00000004c0)='\n', 0x1}, {&(0x7f0000000080)='=', 0x1}], 0x2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r6 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, &(0x7f00000000c0)) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5}, 0xc) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000080)=@assoc_value, &(0x7f00000010c0)=0x98e2b7c58a9caf00) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0xe9, 0x0, 0x0, 0x7, 0x510, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x5}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r3, 0x2) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000880)=ANY=[@ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r8]) io_uring_enter(0xffffffffffffffff, 0x567, 0xa1ff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x7c8) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) 2m30.298150381s ago: executing program 0 (id=3610): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010300000000fefbdf2505000000080003"], 0x1c}, 0x1, 0x0, 0x0, 0x4004015}, 0x20000000) 2m30.272740461s ago: executing program 0 (id=3612): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) close(0xffffffffffffffff) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0163013110ff"}) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x13, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000900000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000000000bf090000000000005509010000000000852000000300000095"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x62, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 2m15.877759011s ago: executing program 32 (id=3612): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) close(0xffffffffffffffff) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0163013110ff"}) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x13, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000900000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000000000bf090000000000005509010000000000852000000300000095"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x62, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 1.386617959s ago: executing program 3 (id=6618): syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x401, 0x0, 0x0, {0x0, 0x0, 0x10}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x2b}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='veth1_virt_wifi\x00', 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4000, @broadcast}, 0x10, &(0x7f0000000100)=[{&(0x7f00000001c0)="08001efb3e6f0000", 0x8}], 0x1, 0x0, 0x0, 0xe0000000}, 0x810) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x18) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000340)="b0e4d17f02c2571ee996fe3e4b3fe9f7af0943a6731db2869171e03beb78adee7fb3d72821aeca2259425e1fc75724cac6ea534ee688ba6e15f1a41ad5fa15dbca8a5f4e7d9883a681d55b8c6933cb6de9c2e21f77c692eba96ede83a398f68b23f1edf2a7caa6b4d4d514cbbbc587753b09c3f94391d891632a81ec31fa0f02ba9ee3a024a571a85ba1759fea7f9da2fef0b533382671b6e3327e24bc8ec1eb4a68907321fe2d08ec22e61444e2aeb2d0e268b3b263df18c2e0b0c9da7ee259a7522134520e", &(0x7f00000004c0)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000400"], 0x48) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) fcntl$setlease(r4, 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = mq_open(&(0x7f0000000480)='!sel\x00\x00\x00\x10\x00\x00\x00\x00\xd7\\P\xc1\xde.O\xcb]0y\x00\x00\x00\x00\x00\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x196, &(0x7f0000000440)={0x2000000000002000, 0x1, 0x56, 0x3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) mq_timedreceive(r5, &(0x7f0000000880)=""/202, 0xca, 0x100000000000000, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x17, &(0x7f0000000380)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000000}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10001}], &(0x7f0000000180)='syzkaller\x00', 0xfffffff8, 0x0, 0x0, 0x41000, 0x70, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000200)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000240)=[r6], &(0x7f0000000440)=[{0x3, 0x3, 0x2, 0x8}, {0x0, 0x3, 0xc, 0xc}, {0x3, 0x3, 0xd, 0x2}, {0x1, 0x4, 0x3, 0x9}, {0x2, 0x5, 0x1, 0x1}], 0x10, 0x4, @void, @value}, 0x94) 1.214004252s ago: executing program 5 (id=6621): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x2) readv(r1, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/156, 0x9c}], 0x1) 1.213642162s ago: executing program 1 (id=6622): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) add_key$keyring(&(0x7f0000000000), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000d00)=ANY=[@ANYBLOB="60583075c08dc3448db1d074b38a18fa415f49143e369b2d04229723fcde6aa122c03fd7694748d3a2b805b0da1738032ea90fc841d4559be4b53fd0e4d638ec5edfc0069695b5e4cd2e311fbe880332ed47ec5b8a689ce0b952cc6328db2b643794338eef965b81c9d8b42e469b7f289ec0c9cbcef189f26f455299cae18db6219b05ed9452faba3b6cb2258abf79e2809ec3b2f4a397e4e33d81febea9998d1b6e6cd53aa0e9f06cb8d63a7964712943f1e32db0720e18a09c9ffd2cf9144b8c84d28d", @ANYRES64=r3, @ANYRES32=r4], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000001440)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70400000800000002000000950000009500000000000000bc3f892195195876bd656070fe6cbe9358af966bce924c46469371cc50bfc07b973ae8f94768"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r8, 0x80047453, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 1.154088453s ago: executing program 2 (id=6624): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x7fff}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) 1.117207813s ago: executing program 2 (id=6626): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xff, 0x0, 0x0, 0x0, 0x1888d07e92b1e73e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$qrtrtun(r2, &(0x7f0000000900)="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", 0x45c) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x1}}, 0x40) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r4, 0x0, 0x0}, 0x10) 1.063446924s ago: executing program 2 (id=6627): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) connect$inet6(r1, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_256={{0x304}, "0000004a650600", "af193cff4810ba5ac120d096eb00000052095b4285514ca312c52e3a08756735", '8\x00', "bc3a20b10f4ad11e"}, 0x38) close(r1) 1.062984584s ago: executing program 2 (id=6628): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) 996.946955ms ago: executing program 2 (id=6629): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000580)={[{@jqfmt_vfsv1}, {@resgid}, {@nodioread_nolock}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resgid}, {@errors_remount}, {@grpid}, {@orlov}]}, 0xfc, 0x572, &(0x7f0000003780)="$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") r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r1 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f0000000040)={'fscrypt:', @auto=[0x30, 0x61, 0x35, 0x30, 0x31, 0x57, 0x64, 0x63, 0x0, 0x0, 0x62, 0x66, 0x34, 0x36, 0x39, 0x61]}, &(0x7f0000000080)={0x0, "86813e41324a755164f63a5714d38d0db7ee5d0bd384fb669a7782b697224032450e782a7212052b28e6d5c1c47e3ecd3a85dbe6882ea55f16f0ec31667e568b", 0x25}, 0x48, 0xfffffffffffffffe) keyctl$read(0xb, r1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r2}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x10, &(0x7f0000002e00), 0x0, 0x0, 0xa0, 0x8, 0x0, 0x0}}, 0x10) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r7, 0x0, 0x2}, 0x18) syz_read_part_table(0x5df, &(0x7f0000000000)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r9, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, &(0x7f00000006c0)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}]}, 0x40002080) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xff04, 0x0) fdatasync(r5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x30, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb4}}, 0x0) ftruncate(r5, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x1}, 0x8164, 0x10000, 0x2, 0x1, 0x8, 0x200, 0x4b, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 976.191676ms ago: executing program 1 (id=6630): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xff, 0x0, 0x0, 0x0, 0x1888d07e92b1e73e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$qrtrtun(r2, &(0x7f0000000900)="9d8d645e53b6183d874f9e93a18dd009a09560ff682bd07dc3d28385a8f3f9e18418950d4dfe49f13a19e24320444a7d6c121741ba3dc510dba4f980bbd9a315544fa0a1622d949faba79788908354e467989e8458e6f5f76e0e4e781bfca4c928c956321dd514877569805db6602f1584a8bd051f13bad882bea021ffb5ce918a1f87f1d439ec93772d6ecaaf8891f7678f2037ccced78ea5c1aa805f1b9f5a2c3974c5124cac5e163d9b6f5b998c1c7263fa2331d1241523986dccbd4e1f32b2f521380a2ea4732132264de6d26ce40177a780df98cbf94b96d900a2dfc5c877db675ebb1d7cbc398ca422ddbadc24ee6f3bf036f62cdb056502a6b657ff95930ea668649ad0003afe9a912179ce61631b3dab94642d2768f1f22299deb9eddb917fc0076b74406149024514d07417c6007e8cd4dc4e2295be71f412044b52b1ce32aac048cad9c413a8c19528dc1b432fe7f9fda7182a47243af427a76ede78aa5c6ef75ea1f48e2e9e9d203d4760a1ff6a0119b39a2458a050f9519d4bbd821684ef8356985e8f5b8d86346f428788fc374e7eaa0c2a2ef8478a13b4a56d0821201c37a0066fb9f5cc583005b9f71b67daa300311066bacbf43630a8388aff734a568a123a48ba1344a5500e5c6f8cef539617cd3970ffb873579a3b76bd529f1626d1f90543b2a0190df38bb1e8b6fc9bfc5c42693814665679e78ed8adce4d23b8725416101ae4113fee000cb92b32c6a74851a6c4af4625f28810ec16834a1589063af1bf0b29aa57e06dddc0fddf408fab63c536d5afd9ba5a71f9e534f99e5ea9c1eaaaad710ef30a37df0f87978894333850f4feac3740a3b010da7c250d060c8046cab40d0527234d4b4b28366bc7d5899948ddbfac66c848ef0f842eab95248e9d064c0ec4247483f0aa0cad7ca970365e474fe73cf79cf8c70fc7a015caa273ce41723453632cf5b809584d227f7e98e8ec41494518b0b8a8adbaf5ead6529451b116fab06529b653bffdd6d98f8322265305bdc0ff69f4a70dea414fcc63d149c564c834f24b8f7495cd9ccafa1e3f652cd3270935800ee0d5598afcaa41c150dac263408d77a61b5c77e2c3644dda1b8c333a36c30ce893140ce133827dde34d896d35c498bf6dda965a27cc77e2872fcedaf9dcb89614c758cf62ad769ac05a4fb9e27b421b82c1761f1322b03cc9ea586d15f7d2ffb6ed63c639cee97d9eea8f3934045e60b15eca5c13ebe002467c09815712165cee2af784f9e5db9f7227701ca9a3de588503c84c490f4986aa26e7b63d4c5a30157cdf82e433a1b64496392a1990b2a46b910d9a16429736308f71d8e78824a26f25f21829546b973c0905b20c2ef751eb0064eaf831874f0b58ef8779cafd02bcf075a212e79e07c73c49fc240d6845877fda649d1ab59ea06b907ec5031299a0e1fa2f8cbc241a8531ad241302b569d4581dcc944f27799f25593b97ea7681ba74d6cde9c8f58840ac4c4be3aa90e6273a64e549c47c7232f423406604c9c210eabe3d6a2343bd6c2ae72ab01", 0x44b) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1}}, 0x40) 959.304265ms ago: executing program 1 (id=6631): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0, 0x0, 0x7}, 0x18) r1 = inotify_init() r2 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r3 = inotify_add_watch(r1, &(0x7f00000004c0)='./file0\x00', 0x8c7) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYRES64=r3], 0x69) close(r2) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 927.880216ms ago: executing program 1 (id=6632): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r2 = memfd_secret(0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r3, r2, 0x2e, 0x4608, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r4, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x7fff}, 0x1c) shutdown(r7, 0x1) 832.034218ms ago: executing program 1 (id=6635): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x5d8, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@inet=@ecn={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000d00)=ANY=[@ANYBLOB="60583075c08dc3448db1d074b38a18fa415f49143e369b2d04229723fcde6aa122c03fd7694748d3a2b805b0da1738032ea90fc841d4559be4b53fd0e4d638ec5edfc0069695b5e4cd2e311fbe880332ed47ec5b8a689ce0b952cc6328db2b643794338eef965b81c9d8b42e469b7f289ec0c9cbcef189f26f455299cae18db6219b05ed9452faba3b6cb2258abf79e2809ec3b2f4a397e4e33d81febea9998d1b6e6cd53aa0e9f06cb8d63a7964712943f1e32db0720e18a09c9ffd2cf9144b8c84d28d", @ANYRES64=r3, @ANYRES32], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000001440)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70400000800000002000000950000009500000000000000bc3f892195195876bd656070fe6cbe9358af966bce924c46469371cc50bfc07b973ae8f947683d21cf4abf66c413b2f9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 797.409718ms ago: executing program 1 (id=6636): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) socket$inet6(0xa, 0x200000000003, 0x87) prctl$PR_SET_NAME(0xf, &(0x7f0000001800)='gtp\x00\xe4\xaa\xae\xe2~2\xa6X\x14\x92\xdazV@\x00\xf7\xa2\xc3l\x1b@\xaf\xf9\xc9\xa9#\xf0S\xd9=q\xd6\x14\xedO\xc8!W\f%u\xdb~\tB0EY\x9d\xca\xf4\x1b\xa7\xfc\x9a\x1f\xf2\xfb\x19\xda\v\x18\xc5F\x1c~\x8c\xe1\x97\xdc\x01k\f\xde0\x06\x00\x00\x00\x00\x00\x00\x00!\'\x00R7\xea\xa5%\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c\x9e-\xec\x97>\f\xe2\xfc\x83\xe1/\x00\x00\x00\x00\x00L\x8e\xa19\xbb\xc3\xae\xde6x\xfe\xd8\xf3)\xd61\xd6hT\xe48[\xc2\x1c\xfe74c\xbd\x9a\x89LgL\xc8@%m\xb6\x88\xa3-\x81\x90o\x11\x17\xb8?\xa1\xcd\xa5@\xd6\x88k8}N\x0077\xe0\xe4\xae\x87\xbd7\xa8>CH&\xd5\xa6\xdb\x1a\xd6\xf5\x8e{\x18b%L\v%\xd3M2E\xe1\xc1\x87MOr$\xe1\xfdh\xf9*\xaf\xc2\x95\xe6\xf0\x1f\xef\x81k\x06v\x88\xb6') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYRESOCT=r3], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f00000000c0)=""/80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7}, &(0x7f0000000040), &(0x7f0000000200)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYRES16=r7, @ANYRES16=r5, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000009000000000000000020000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000580)='sched_switch\x00', r13}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1, 0x0, 0x0, 0x300}, 0x0) fspick(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 714.431389ms ago: executing program 2 (id=6637): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x800008ec0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f00)='kfree\x00', r5, 0x0, 0x4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) 682.97272ms ago: executing program 4 (id=6638): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) 650.20234ms ago: executing program 4 (id=6639): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xac14140c}, 0xff000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="070004000000000000000000010000e0ff000000547bdc6530138b614310a949bb8cc9cfcdba4ab498cf2e087649490219871ed33507123f06b1b78d5aaa7cfed9b669adb0415e44719a9a44c514095219d67f2d8b232c759e5df6096767d657a52525c629507ddfa3614416f5e8eb454f5c5d42f9e6402eaef3e704d890bbb5a7c4446843ecbd7283d2804831affdb78dbddf5dfc98bb5d33e59927dce7b2c0b1f9dd4759c9e8bd4d5580c1302d0c25b7000000000000000000000000000000000000f56e6fcc1062c03e770416483b648779968db75ce7517a7349c53e96d6a240aaa08fc758498636a7e9f24dceccabdc7ac721fff2e5ef443406b851e1bae32efef9c8b0751a32", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) renameat2(r3, &(0x7f0000000140)='./file1\x00', r3, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095", @ANYRES32, @ANYRES8=r2, @ANYRESOCT=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r5}, 0x18) sysinfo(0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) msync(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) 649.85836ms ago: executing program 4 (id=6640): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sysinfo(0x0) 635.780551ms ago: executing program 4 (id=6641): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) add_key$keyring(&(0x7f0000000000), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000d00)=ANY=[@ANYBLOB="60583075c08dc3448db1d074b38a18fa415f49143e369b2d04229723fcde6aa122c03fd7694748d3a2b805b0da1738032ea90fc841d4559be4b53fd0e4d638ec5edfc0069695b5e4cd2e311fbe880332ed47ec5b8a689ce0b952cc6328db2b643794338eef965b81c9d8b42e469b7f289ec0c9cbcef189f26f455299cae18db6219b05ed9452faba3b6cb2258abf79e2809ec3b2f4a397e4e33d81febea9998d1b6e6cd53aa0e9f06cb8d63a7964712943f1e32db0720e18a09c9ffd2cf9144b8c84d28d", @ANYRES64=r3, @ANYRES32=r4], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000001440)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70400000800000002000000950000009500000000000000bc3f892195195876bd656070fe6cbe9358af966bce924c46469371cc50bfc07b973ae8f94768"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r8, 0x80047453, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 503.848202ms ago: executing program 3 (id=6642): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000d00)=ANY=[@ANYBLOB="60583075c08dc3448db1d074b38a18fa415f49143e369b2d04229723fcde6aa122c03fd7694748d3a2b805b0da1738032ea90fc841d4559be4b53fd0e4d638ec5edfc0069695b5e4cd2e311fbe880332ed47ec5b8a689ce0b952cc6328db2b643794338eef965b81c9d8b42e469b7f289ec0c9cbcef189f26f455299cae18db6219b05ed9452faba3b6cb2258abf79e2809ec3b2f4a397e4e33d81febea9998d1b6e6cd53aa0e9f06cb8d63a7964712943f1e32db0720e18a09c9ffd2cf9144b8c84d28d", @ANYRES64=r3, @ANYRES32=r4], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000001440)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70400000800000002000000950000009500000000000000bc3f892195195876bd656070fe6cbe9358af966bce924c46469371cc50bfc07b973ae8f947683d21cf4abf66c413b2f9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r8, 0x80047453, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 502.792782ms ago: executing program 4 (id=6643): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0, 0x0, 0x7}, 0x18) r1 = inotify_init() r2 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r3 = inotify_add_watch(r1, &(0x7f00000004c0)='./file0\x00', 0x8c7) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[@ANYRES64=r3], 0x69) close(r2) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 490.784362ms ago: executing program 4 (id=6644): prctl$PR_SET_NAME(0xf, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() (async) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sched_switch\x00', r3, 0x0, 0x415}, 0x18) pipe2(&(0x7f0000000000), 0x4000) (async) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) tee(r6, r7, 0xfffffffffffffc01, 0x0) tee(r6, r7, 0x60000000000, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x2, 0x2, 0x4, @remote, @private2, 0x40, 0x7, 0x60, 0x1}}) sendmsg$nl_route(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=@getstats={0x1c, 0x5e, 0x4, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, r8, 0x5}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4041800}, 0x0) unshare(0x64000600) (async) unshare(0x64000600) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf2503"], 0x114}], 0x1, 0x0, 0x0, 0x5}, 0x40) bind$unix(r4, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 444.142243ms ago: executing program 5 (id=6645): r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) (async) close(r0) (async, rerun: 64) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400900, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000002180)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x26, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) creat(&(0x7f00000000c0)='./file0\x00', 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYRES8=0x0, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) (async) pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r6 = dup(0xffffffffffffffff) write$P9_RLERRORu(r6, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000740), &(0x7f0000000780)=r3}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0x5, &(0x7f00000003c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x6, 0x1, 0x0, r2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x481}], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x7e, &(0x7f0000000600)=""/126, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x7, 0xffff, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000800)=[r7], &(0x7f0000000840)=[{0x5, 0x3, 0x7, 0xa}, {0x2, 0x5, 0xe, 0x1}, {0x3, 0x5, 0x8, 0x6}], 0x10, 0x2, @void, @value}, 0x94) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000940)=0x4, 0x4) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) (async) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0xa}]}, {0x0, [0x0, 0x61, 0x5f, 0x2e, 0x61]}}, 0x0, 0x2b, 0x0, 0x0, 0x80, 0x0, @void, @value}, 0x28) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) write$binfmt_elf64(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) (async) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) (async) creat(&(0x7f0000000380)='./file0\x00', 0x0) (async) socket$unix(0x1, 0x5, 0x0) 357.844285ms ago: executing program 5 (id=6646): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x5d8, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@inet=@ecn={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000d00)=ANY=[@ANYBLOB="60583075c08dc3448db1d074b38a18fa415f49143e369b2d04229723fcde6aa122c03fd7694748d3a2b805b0da1738032ea90fc841d4559be4b53fd0e4d638ec5edfc0069695b5e4cd2e311fbe880332ed47ec5b8a689ce0b952cc6328db2b643794338eef965b81c9d8b42e469b7f289ec0c9cbcef189f26f455299cae18db6219b05ed9452faba3b6cb2258abf79e2809ec3b2f4a397e4e33d81febea9998d1b6e6cd53aa0e9f06cb8d63a7964712943f1e32db0720e18a09c9ffd2cf9144b8c84d28d", @ANYRES64=r3, @ANYRES32], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000001440)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70400000800000002000000950000009500000000000000bc3f892195195876bd656070fe6cbe9358af966bce924c46469371cc50bfc07b973ae8f947683d21cf4abf66c413b2f9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 356.745465ms ago: executing program 3 (id=6647): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000580)={[{@jqfmt_vfsv1}, {@resgid}, {@nodioread_nolock}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resgid}, {@errors_remount}, {@grpid}, {@orlov}]}, 0xfc, 0x572, &(0x7f0000003780)="$eJzs3d9rW1UcAPDvTdPup66DMdQHGezByVy6tv6YIDgfRYcDfZ+hvSuj6TKadKx14PbgXnyRIYg4EP8A330c/gP+FQMdDBlFH0So3PSmy9qkv5aZbPl84Lbn5N7bc78593t7Tm5CAhhYx7IfhYiXI+KbJOJQy7pi5CuPrW63/PD6VLYksbLy6Z9JJPljze2T/PeBvPJSRPz6VcTJwsZ2a4tLs+VKJZ3P62P1uStjtcWlU5fmyjPpTHp5YnLyzFuTE+++83bXYn39/N/ff3L3wzNfH1/+7uf7h28ncTYO5uta43gCN1orx8r/5qXhOLtuw/EuNNZPkl4fALsylOf5cGTXgEMxlGc98Pz7MiJWgAGVyH8YUM1xQHNu36V58DPjwQerE6BG7COt8RdXXxuJvY250f7l5LGZUTbfHe1C+1kbv/xx53a2xOavQ+zbog6wIzduRsTpYnHj9T/Jr3+7d7rx4vHm1rcxaP9/oJfuZuOfN9qN/wpr459oM/450CZ3d2Pr/C/c70IzHWXjv/fajn/XLl2jQ3nthcaYbzi5eKmSno6IFyPiRAzvyeqb3c85s3xvpdO61vFftmTtN8eC+XHcL+55fJ/pcr0cESNPEnfTg5sRrxTbxZ+s9X/Spv+z5+P8Nts4mt55tdO6reN/ulZ+initbf8/uqOVbH5/cqxxPow1z4qN/rp19LdO7fc6/qz/928e/2jSer+2tvM2ftz7T9pp3W7P/5Hks0a5mQTXyvX6/HjESPLxxscnHu3brDe3z+I/cXzz61+78z+bfH2+zfhvHbnVcdN+6P/pHfX/zgv3Pvrih07tb6//32yUTuSP5Ne/9vJzZbsH+KTPHwAAAAAAAPSTQkQcjKRQWisXCqXS6vs7jsT+QqVaq5+8WF24PB2Nz8qOxnCheaf7UMv7Icbz98M26xPr6pMRcTgivh3a16iXpqqV6V4HDwAAAAAAAAAAAAAAAAAAAH3iQIfP/2d+H+r10QFPXeOLDfb0+iiAXtjyK/+78U1PQF/aMv+B55b8h8El/2FwyX8YXPIfBpf8h8El/2FwyX8AAAAAAAAAAAAAAAAAAAAAAAAAAADoqvPnzmXLyvLD61NZffrq4sJs9eqp6bQ2W5pbmCpNVeevlGaq1ZlKWpqqzm319yrV6pXxiVi4NlZPa/Wx2uLShbnqwuX6hUtz5Zn0Qjr8v0QFAAAAAAAAAAAAAAAAAAAAz5ba4tJsuVJJ5xU6Ft6PvjiMpxngql3tXuyXKBQ6FG7m3buzvXp4UQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAdf4LAAD//++4Mnc=") r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r1 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f0000000040)={'fscrypt:', @auto=[0x30, 0x61, 0x35, 0x30, 0x31, 0x57, 0x64, 0x63, 0x0, 0x0, 0x62, 0x66, 0x34, 0x36, 0x39, 0x61]}, &(0x7f0000000080)={0x0, "86813e41324a755164f63a5714d38d0db7ee5d0bd384fb669a7782b697224032450e782a7212052b28e6d5c1c47e3ecd3a85dbe6882ea55f16f0ec31667e568b", 0x25}, 0x48, 0xfffffffffffffffe) keyctl$read(0xb, r1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r2}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x10, &(0x7f0000002e00), 0x0, 0x0, 0xa0, 0x8, 0x0, 0x0}}, 0x10) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r7, 0x0, 0x2}, 0x18) syz_read_part_table(0x5df, &(0x7f0000000000)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r9, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, &(0x7f00000006c0)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}]}, 0x40002080) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xff04, 0x0) fdatasync(r5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x30, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb4}}, 0x0) ftruncate(r5, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x1}, 0x8164, 0x10000, 0x2, 0x1, 0x8, 0x200, 0x4b, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 311.482075ms ago: executing program 5 (id=6648): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 287.807236ms ago: executing program 5 (id=6649): r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32=r2, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x4) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x74a1, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) 195.547487ms ago: executing program 5 (id=6650): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x0, 0x0, 0x1d0, 0x0, 0x1d0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'vcan0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x7a00000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x9}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'syzkaller1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private0}}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'veth1_to_batadv\x00', 'vlan1\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@ipv6header={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty}}}, {{@ipv6={@private0, @mcast2, [], [], 'veth1_to_team\x00', 'veth0_macvtap\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@local}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) add_key$keyring(&(0x7f0000000000), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00'}, 0x18) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x880) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000d00)=ANY=[@ANYBLOB="60583075c08dc3448db1d074b38a18fa415f49143e369b2d04229723fcde6aa122c03fd7694748d3a2b805b0da1738032ea90fc841d4559be4b53fd0e4d638ec5edfc0069695b5e4cd2e311fbe880332ed47ec5b8a689ce0b952cc6328db2b643794338eef965b81c9d8b42e469b7f289ec0c9cbcef189f26f455299cae18db6219b05ed9452faba3b6cb2258abf79e2809ec3b2f4a397e4e33d81febea9998d1b6e6cd53aa0e9f06cb8d63a7964712943f1e32db0720e18a09c9ffd2cf9144b8c84d28d", @ANYRES64=r4, @ANYRES32=r5], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000001440)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70400000800000002000000950000009500000000000000bc3f892195195876bd656070fe6cbe9358af966bce924c46469371cc50bfc07b973ae8f947683d21cf4abf66c413b2f9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r9, 0x80047453, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010000304fcffffff3f00000000000000", @ANYRES32=0x0, @ANYBLOB="a5fdad8800000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r11 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r11, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000003140700000000000000df250900020073797a310000000008004100736977001400330076657468305f746f5f62726964676500"], 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 64.563839ms ago: executing program 3 (id=6651): bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) rmdir(&(0x7f0000000140)='./cgroup/../file0\x00') 21.61186ms ago: executing program 3 (id=6652): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xff, 0x0, 0x0, 0x0, 0x1888d07e92b1e73e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$qrtrtun(r2, &(0x7f0000000900)="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", 0x44b) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1}}, 0x40) 0s ago: executing program 3 (id=6653): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 313.080342][T19651] FAULT_INJECTION: forcing a failure. [ 313.080342][T19651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.082497][T19639] lo speed is unknown, defaulting to 1000 [ 313.093493][T19651] CPU: 1 UID: 0 PID: 19651 Comm: syz.2.5575 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 313.093529][T19651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 313.093543][T19651] Call Trace: [ 313.093550][T19651] [ 313.093560][T19651] __dump_stack+0x1d/0x30 [ 313.093585][T19651] dump_stack_lvl+0xe8/0x140 [ 313.093620][T19651] dump_stack+0x15/0x1b [ 313.093636][T19651] should_fail_ex+0x265/0x280 [ 313.093773][T19651] should_fail+0xb/0x20 [ 313.093799][T19651] should_fail_usercopy+0x1a/0x20 [ 313.093839][T19651] _copy_from_user+0x1c/0xb0 [ 313.093859][T19651] memdup_sockptr_noprof+0x70/0xd0 [ 313.093880][T19651] raw_setsockopt+0x34e/0xbf0 [ 313.093910][T19651] ? __pfx_raw_setsockopt+0x10/0x10 [ 313.093997][T19651] __sys_setsockopt+0x181/0x200 [ 313.094034][T19651] __x64_sys_setsockopt+0x64/0x80 [ 313.094064][T19651] x64_sys_call+0x2bd5/0x2fb0 [ 313.094121][T19651] do_syscall_64+0xd2/0x200 [ 313.094140][T19651] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 313.094165][T19651] ? clear_bhb_loop+0x40/0x90 [ 313.094220][T19651] ? clear_bhb_loop+0x40/0x90 [ 313.094241][T19651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.094262][T19651] RIP: 0033:0x7fe34c4fe929 [ 313.094279][T19651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.094313][T19651] RSP: 002b:00007fe34ab67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 313.094334][T19651] RAX: ffffffffffffffda RBX: 00007fe34c725fa0 RCX: 00007fe34c4fe929 [ 313.094347][T19651] RDX: 0000000000000001 RSI: 0000000000000065 RDI: 0000000000000005 [ 313.094360][T19651] RBP: 00007fe34ab67090 R08: 0000000000000f00 R09: 0000000000000000 [ 313.094373][T19651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.094386][T19651] R13: 0000000000000000 R14: 00007fe34c725fa0 R15: 00007ffd1bc3feb8 [ 313.094468][T19651] [ 314.722051][T19692] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5591'. [ 315.025207][T19723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=19723 comm=syz.3.5603 [ 315.038055][T19723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=19723 comm=syz.3.5603 [ 315.143186][T19739] xt_CT: You must specify a L4 protocol and not use inversions on it [ 315.359306][T19751] tmpfs: Bad value for 'mpol' [ 315.372745][T19749] lo speed is unknown, defaulting to 1000 [ 315.540630][T19760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=19760 comm=syz.2.5617 [ 315.575958][T19760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=19760 comm=syz.2.5617 [ 315.725721][T19776] xt_TPROXY: Can be used only with -p tcp or -p udp [ 315.807809][T19776] wireguard0: entered promiscuous mode [ 315.833799][T19769] lo speed is unknown, defaulting to 1000 [ 315.872284][T19787] siw: device registration error -23 [ 315.891855][T12227] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.956591][T12227] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.972921][T19795] lo speed is unknown, defaulting to 1000 [ 315.990577][T19769] chnl_net:caif_netlink_parms(): no params data found [ 316.007067][T12227] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.014670][T19803] siw: device registration error -23 [ 316.028336][T19800] lo speed is unknown, defaulting to 1000 [ 316.131777][T12227] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.167613][T19769] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.174998][T19769] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.189050][T19769] bridge_slave_0: entered allmulticast mode [ 316.211698][T19769] bridge_slave_0: entered promiscuous mode [ 316.258015][T19769] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.265269][T19769] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.280961][T19769] bridge_slave_1: entered allmulticast mode [ 316.287490][T19769] bridge_slave_1: entered promiscuous mode [ 316.313701][T12227] bridge_slave_1: left allmulticast mode [ 316.319449][T12227] bridge_slave_1: left promiscuous mode [ 316.325210][T12227] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.347543][T12227] bridge_slave_0: left promiscuous mode [ 316.353337][T12227] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.445102][T12227] team0: Port device geneve1 removed [ 316.465222][T19836] FAULT_INJECTION: forcing a failure. [ 316.465222][T19836] name failslab, interval 1, probability 0, space 0, times 0 [ 316.477970][T19836] CPU: 1 UID: 0 PID: 19836 Comm: syz.3.5645 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 316.477998][T19836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 316.478068][T19836] Call Trace: [ 316.478076][T19836] [ 316.478085][T19836] __dump_stack+0x1d/0x30 [ 316.478110][T19836] dump_stack_lvl+0xe8/0x140 [ 316.478132][T19836] dump_stack+0x15/0x1b [ 316.478155][T19836] should_fail_ex+0x265/0x280 [ 316.478189][T19836] should_failslab+0x8c/0xb0 [ 316.478216][T19836] kmem_cache_alloc_noprof+0x50/0x310 [ 316.478248][T19836] ? audit_log_start+0x365/0x6c0 [ 316.478276][T19836] audit_log_start+0x365/0x6c0 [ 316.478307][T19836] audit_seccomp+0x48/0x100 [ 316.478375][T19836] ? __seccomp_filter+0x68c/0x10d0 [ 316.478461][T19836] __seccomp_filter+0x69d/0x10d0 [ 316.478517][T19836] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 316.478602][T19836] ? vfs_write+0x75e/0x8e0 [ 316.478637][T19836] __secure_computing+0x82/0x150 [ 316.478769][T19836] syscall_trace_enter+0xcf/0x1e0 [ 316.478796][T19836] do_syscall_64+0xac/0x200 [ 316.478817][T19836] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 316.478879][T19836] ? clear_bhb_loop+0x40/0x90 [ 316.478899][T19836] ? clear_bhb_loop+0x40/0x90 [ 316.478923][T19836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 316.478948][T19836] RIP: 0033:0x7f8ac8c6e929 [ 316.478967][T19836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.479038][T19836] RSP: 002b:00007f8ac72d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ac [ 316.479057][T19836] RAX: ffffffffffffffda RBX: 00007f8ac8e95fa0 RCX: 00007f8ac8c6e929 [ 316.479070][T19836] RDX: 0000000000089901 RSI: 0000200000000640 RDI: ffffffffffffff9c [ 316.479084][T19836] RBP: 00007f8ac72d7090 R08: 0000000000000000 R09: 0000000000000000 [ 316.479110][T19836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.479122][T19836] R13: 0000000000000000 R14: 00007f8ac8e95fa0 R15: 00007ffd8df80368 [ 316.479140][T19836] [ 316.549744][T19834] tmpfs: Bad value for 'mpol' [ 316.739773][T12227] bond0 (unregistering): (slave c1˙): Releasing backup interface [ 316.749186][T19848] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5648'. [ 316.760352][T12227] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.763682][T19848] netlink: 'syz.4.5648': attribute type 5 has an invalid length. [ 316.776771][T19848] netlink: 44 bytes leftover after parsing attributes in process `syz.4.5648'. [ 316.794608][T12227] bond0 (unregistering): Released all slaves [ 316.826604][T19852] xt_CT: You must specify a L4 protocol and not use inversions on it [ 316.838258][T19769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.849112][T19852] can0: slcan on ttyS3. [ 316.850061][T19769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.873673][T19769] team0: Port device team_slave_0 added [ 316.880650][T19769] team0: Port device team_slave_1 added [ 316.900829][T12227] tipc: Left network mode [ 316.917038][T19851] can0 (unregistered): slcan off ttyS3. [ 316.929161][T19769] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 316.936210][T19769] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 316.962433][T19769] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 317.055060][T12227] hsr_slave_0: left promiscuous mode [ 317.060968][T12227] hsr_slave_1: left promiscuous mode [ 317.076703][T12227] veth1_macvtap: left promiscuous mode [ 317.083226][T12227] veth0_macvtap: left promiscuous mode [ 317.090679][T12227] veth1_vlan: left promiscuous mode [ 317.096147][T12227] veth0_vlan: left promiscuous mode [ 317.252104][T12227] team0 (unregistering): Port device team_slave_1 removed [ 317.272090][T12227] team0 (unregistering): Port device team_slave_0 removed [ 317.311270][T19769] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.318288][T19769] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.344515][T19769] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 317.393185][T19769] hsr_slave_0: entered promiscuous mode [ 317.399372][T19769] hsr_slave_1: entered promiscuous mode [ 317.421804][T19769] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 317.436014][T19769] Cannot create hsr debugfs directory [ 317.492312][T19888] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5665'. [ 317.567405][T19897] xt_TPROXY: Can be used only with -p tcp or -p udp [ 317.617599][T19900] xt_TPROXY: Can be used only with -p tcp or -p udp [ 317.650609][T19897] wireguard0: entered promiscuous mode [ 317.679038][T19900] wireguard0: entered promiscuous mode [ 317.688875][T19909] siw: device registration error -23 [ 317.720941][ T29] kauditd_printk_skb: 280 callbacks suppressed [ 317.720970][ T29] audit: type=1326 audit(1750199412.398:26257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.758256][ T29] audit: type=1326 audit(1750199412.398:26258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.782045][ T29] audit: type=1326 audit(1750199412.398:26259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.805778][ T29] audit: type=1326 audit(1750199412.398:26260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=271 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.840024][ T29] audit: type=1326 audit(1750199412.524:26261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.863753][ T29] audit: type=1326 audit(1750199412.524:26262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.887558][ T29] audit: type=1326 audit(1750199412.524:26263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.911047][ T29] audit: type=1326 audit(1750199412.524:26264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.935198][ T29] audit: type=1326 audit(1750199412.524:26265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 317.958701][ T29] audit: type=1326 audit(1750199412.524:26266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19911 comm="syz.3.5672" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ac8c6e929 code=0x7ffc0000 [ 318.020205][T19769] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 318.068802][T19921] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5676'. [ 318.080655][T19769] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 318.102174][T19769] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 318.117216][T19769] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 318.130275][T19925] xt_TPROXY: Can be used only with -p tcp or -p udp [ 318.147960][T19927] netdevsim netdevsim3: Direct firmware load for ČöníņÆgkNšÄq>ä*x(Oˆ@ failed with error -2 [ 318.161076][T19927] hub 6-0:1.0: USB hub found [ 318.170011][T19927] hub 6-0:1.0: 8 ports detected [ 318.190838][T19935] xt_TPROXY: Can be used only with -p tcp or -p udp [ 318.204732][T19925] wireguard0: entered promiscuous mode [ 318.231813][T19939] siw: device registration error -23 [ 318.236871][T19769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.251914][T19769] 8021q: adding VLAN 0 to HW filter on device team0 [ 318.265898][T19935] wireguard0: entered promiscuous mode [ 318.276711][T12227] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.283841][T12227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.293114][T12227] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.300245][T12227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.312959][T19943] siw: device registration error -23 [ 318.326242][T19769] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 318.336727][T19769] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 318.437600][T19769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 318.553254][T19963] xt_TPROXY: Can be used only with -p tcp or -p udp [ 318.645659][T19769] veth0_vlan: entered promiscuous mode [ 318.660983][T19964] wireguard0: entered promiscuous mode [ 318.685222][T19769] veth1_vlan: entered promiscuous mode [ 318.707316][T19963] siw: device registration error -23 [ 318.730049][T19969] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5687'. [ 318.757866][T19769] veth0_macvtap: entered promiscuous mode [ 318.796229][T19769] veth1_macvtap: entered promiscuous mode [ 318.805866][T19970] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5687'. [ 318.846784][T19769] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 318.910820][T19769] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 318.928186][T19769] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.937026][T19769] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.945792][T19769] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.954544][T19769] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.981479][T19979] siw: device registration error -23 [ 319.091889][T19987] tmpfs: Bad value for 'mpol' [ 319.172232][T19993] xt_TPROXY: Can be used only with -p tcp or -p udp [ 319.220535][T19993] wireguard0: entered promiscuous mode [ 319.240550][T19996] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5696'. [ 319.266340][T19997] siw: device registration error -23 [ 319.325486][T20001] xt_TPROXY: Can be used only with -p tcp or -p udp [ 319.354606][T20005] xt_TPROXY: Can be used only with -p tcp or -p udp [ 319.369680][T20001] wireguard0: entered promiscuous mode [ 319.399814][T20005] wireguard0: entered promiscuous mode [ 319.416814][T20010] siw: device registration error -23 [ 319.446149][T20013] siw: device registration error -23 [ 319.531512][T20015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20015 comm=syz.3.5703 [ 319.544788][T20015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20015 comm=syz.3.5703 [ 319.603575][T20024] ALSA: seq fatal error: cannot create timer (-19) [ 319.833202][T20038] xt_TPROXY: Can be used only with -p tcp or -p udp [ 319.886531][T20042] FAULT_INJECTION: forcing a failure. [ 319.886531][T20042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.900415][T20042] CPU: 0 UID: 0 PID: 20042 Comm: syz.3.5712 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 319.900514][T20042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 319.900533][T20042] Call Trace: [ 319.900538][T20042] [ 319.900547][T20042] __dump_stack+0x1d/0x30 [ 319.900568][T20042] dump_stack_lvl+0xe8/0x140 [ 319.900589][T20042] dump_stack+0x15/0x1b [ 319.900608][T20042] should_fail_ex+0x265/0x280 [ 319.900657][T20042] should_fail+0xb/0x20 [ 319.900686][T20042] should_fail_usercopy+0x1a/0x20 [ 319.900719][T20042] _copy_from_user+0x1c/0xb0 [ 319.900739][T20042] kstrtouint_from_user+0x69/0xf0 [ 319.900847][T20042] ? 0xffffffff81000000 [ 319.900923][T20042] ? selinux_file_permission+0x1e4/0x320 [ 319.900947][T20042] proc_fail_nth_write+0x50/0x160 [ 319.900965][T20042] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 319.900984][T20042] vfs_write+0x269/0x8e0 [ 319.901016][T20042] ? vfs_read+0x47f/0x6f0 [ 319.901157][T20042] ? __rcu_read_unlock+0x4f/0x70 [ 319.901182][T20042] ? __fget_files+0x184/0x1c0 [ 319.901231][T20042] ksys_write+0xda/0x1a0 [ 319.901253][T20042] __x64_sys_write+0x40/0x50 [ 319.901270][T20042] x64_sys_call+0x2cdd/0x2fb0 [ 319.901289][T20042] do_syscall_64+0xd2/0x200 [ 319.901308][T20042] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 319.901374][T20042] ? clear_bhb_loop+0x40/0x90 [ 319.901398][T20042] ? clear_bhb_loop+0x40/0x90 [ 319.901422][T20042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.901445][T20042] RIP: 0033:0x7f8ac8c6d3df [ 319.901459][T20042] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 319.901496][T20042] RSP: 002b:00007f8ac72d7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 319.901520][T20042] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ac8c6d3df [ 319.901536][T20042] RDX: 0000000000000001 RSI: 00007f8ac72d70a0 RDI: 0000000000000005 [ 319.901550][T20042] RBP: 00007f8ac72d7090 R08: 0000000000000000 R09: 0000000000000000 [ 319.901564][T20042] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 319.901626][T20042] R13: 0000000000000000 R14: 00007f8ac8e95fa0 R15: 00007ffd8df80368 [ 319.901647][T20042] [ 320.137640][T20038] siw: device registration error -23 [ 320.143187][T20045] wireguard0: entered promiscuous mode [ 320.199557][T20049] xt_TPROXY: Can be used only with -p tcp or -p udp [ 320.244102][T20051] wireguard0: entered promiscuous mode [ 320.344714][T20055] siw: device registration error -23 [ 320.381029][T20056] siw: device registration error -23 [ 320.393079][T20049] wireguard0: entered promiscuous mode [ 320.428928][T20058] wireguard0: entered promiscuous mode [ 320.440207][T20062] 9pnet_fd: Insufficient options for proto=fd [ 320.462607][T20063] siw: device registration error -23 [ 320.513444][T20067] 9pnet_fd: Insufficient options for proto=fd [ 320.626848][T20079] veth0_virt_wifi: mtu less than device minimum [ 320.628971][T20077] tmpfs: Bad value for 'mpol' [ 320.670141][T20081] tmpfs: Bad value for 'mpol' [ 320.704298][T20079] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.739638][T20079] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.789317][T20086] netlink: 160 bytes leftover after parsing attributes in process `syz.4.5722'. [ 320.798480][T20086] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 320.845292][T20079] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.913614][T20079] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.966142][T20095] 9pnet_fd: Insufficient options for proto=fd [ 321.011161][T20079] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.041791][T20099] wireguard0: entered promiscuous mode [ 321.065134][T20079] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.075853][T20103] siw: device registration error -23 [ 321.096931][T20079] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.149187][T20079] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.239628][T20109] wireguard0: entered promiscuous mode [ 321.283879][T20113] siw: device registration error -23 [ 321.381554][T20118] pimreg: entered allmulticast mode [ 321.418480][T20118] pimreg: left allmulticast mode [ 321.478053][T20118] lo speed is unknown, defaulting to 1000 [ 321.850283][T20124] wireguard0: entered promiscuous mode [ 321.891625][T20128] siw: device registration error -23 [ 321.967655][T20130] wireguard0: entered promiscuous mode [ 322.002266][T20134] 9pnet_fd: Insufficient options for proto=fd [ 322.010155][T20135] siw: device registration error -23 [ 322.181066][T20147] wireguard0: entered promiscuous mode [ 322.232951][T20154] siw: device registration error -23 [ 322.374302][T20169] netdevsim netdevsim3: Direct firmware load for ČöníņÆgkNšÄq>ä*x(Oˆ@ failed with error -2 [ 322.385496][T20163] 9pnet_fd: Insufficient options for proto=fd [ 322.407269][T20171] tproxy_tg6_check: 7 callbacks suppressed [ 322.407284][T20171] xt_TPROXY: Can be used only with -p tcp or -p udp [ 322.439909][T20171] wireguard0: entered promiscuous mode [ 322.454282][T20174] xt_TPROXY: Can be used only with -p tcp or -p udp [ 322.468543][T20159] lo speed is unknown, defaulting to 1000 [ 322.521754][T20175] siw: device registration error -23 [ 322.541304][T20174] siw: device registration error -23 [ 322.566009][ T29] kauditd_printk_skb: 208 callbacks suppressed [ 322.566027][ T29] audit: type=1326 audit(1750199417.490:26475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.734601][T20188] xt_TPROXY: Can be used only with -p tcp or -p udp [ 322.815882][T20188] siw: device registration error -23 [ 322.828171][ T29] audit: type=1326 audit(1750199417.637:26476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.851874][ T29] audit: type=1326 audit(1750199417.637:26477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.875493][ T29] audit: type=1326 audit(1750199417.637:26478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=271 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.899514][ T29] audit: type=1326 audit(1750199417.689:26479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.923269][ T29] audit: type=1326 audit(1750199417.689:26480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.947057][ T29] audit: type=1326 audit(1750199417.689:26481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.970749][ T29] audit: type=1326 audit(1750199417.689:26482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 322.994459][ T29] audit: type=1326 audit(1750199417.689:26483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 323.018314][ T29] audit: type=1326 audit(1750199417.689:26484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20181 comm="syz.4.5759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f57eaade929 code=0x7ffc0000 [ 323.174062][T20198] pimreg: entered allmulticast mode [ 323.181267][T20198] pimreg: left allmulticast mode [ 323.190071][T20200] xt_TPROXY: Can be used only with -p tcp or -p udp [ 323.205186][T20202] 9pnet_fd: Insufficient options for proto=fd [ 323.230425][T20198] lo speed is unknown, defaulting to 1000 [ 323.378284][T20200] wireguard0: entered promiscuous mode [ 323.414577][T20209] siw: device registration error -23 [ 323.478938][T20216] lo speed is unknown, defaulting to 1000 [ 324.094009][T20233] xt_TPROXY: Can be used only with -p tcp or -p udp [ 324.169527][T20239] wireguard0: entered promiscuous mode [ 324.216051][T20233] siw: device registration error -23 [ 324.296803][T20251] pimreg: entered allmulticast mode [ 324.307175][T20251] pimreg: left allmulticast mode [ 324.379844][T20255] lo speed is unknown, defaulting to 1000 [ 325.466486][T20284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20284 comm=syz.5.5792 [ 325.682650][T20299] 9pnet_fd: Insufficient options for proto=fd [ 325.896273][T20309] xt_TPROXY: Can be used only with -p tcp or -p udp [ 326.070141][T20309] wireguard0: entered promiscuous mode [ 326.211695][T20310] siw: device registration error -23 [ 327.010980][T20332] tmpfs: Bad value for 'mpol' [ 327.248479][T12262] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.348176][T12262] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.410239][T20345] lo speed is unknown, defaulting to 1000 [ 327.429022][T12262] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.513386][T12262] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.594157][T20367] ALSA: seq fatal error: cannot create timer (-19) [ 327.785230][T20372] ALSA: seq fatal error: cannot create timer (-19) [ 327.785991][T12262] bridge_slave_1: left allmulticast mode [ 327.786010][T12262] bridge_slave_1: left promiscuous mode [ 327.786216][T12262] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.787244][T12262] bridge_slave_0: left promiscuous mode [ 327.787325][T12262] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.898520][T12262] bond0 (unregistering): left promiscuous mode [ 327.898542][T12262] ˙: left promiscuous mode [ 327.898617][T12262] bond_slave_1: left promiscuous mode [ 327.899797][T12262] bond0 (unregistering): (slave c1˙): Releasing backup interface [ 327.902104][T12262] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 327.903773][T12262] bond0 (unregistering): Released all slaves [ 327.910506][T20345] chnl_net:caif_netlink_parms(): no params data found [ 328.023004][ T29] kauditd_printk_skb: 322 callbacks suppressed [ 328.023023][ T29] audit: type=1326 audit(1750199423.211:26807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.053344][ T29] audit: type=1326 audit(1750199423.211:26808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.159587][T20395] xt_TPROXY: Can be used only with -p tcp or -p udp [ 328.185050][T20399] xt_TPROXY: Can be used only with -p tcp or -p udp [ 328.226390][ T29] audit: type=1326 audit(1750199423.295:26809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.250078][ T29] audit: type=1326 audit(1750199423.295:26810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.273880][ T29] audit: type=1326 audit(1750199423.295:26811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.297646][ T29] audit: type=1326 audit(1750199423.295:26812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.300702][T20403] siw: device registration error -23 [ 328.321384][ T29] audit: type=1326 audit(1750199423.295:26813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.327104][T20399] siw: device registration error -23 [ 328.350251][ T29] audit: type=1326 audit(1750199423.295:26814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.379274][ T29] audit: type=1326 audit(1750199423.295:26815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.403410][ T29] audit: type=1326 audit(1750199423.295:26816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20385 comm="syz.1.5821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 328.428355][T20345] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.435658][T20345] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.445716][T20345] bridge_slave_0: entered allmulticast mode [ 328.453455][T20345] bridge_slave_0: entered promiscuous mode [ 328.460519][T12262] team0: left promiscuous mode [ 328.469920][T12262] team_slave_0: left promiscuous mode [ 328.475500][T12262] team_slave_1: left promiscuous mode [ 328.502901][T12262] hsr_slave_0: left promiscuous mode [ 328.508650][T12262] hsr_slave_1: left promiscuous mode [ 328.516385][T12262] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 328.523840][T12262] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 328.535347][T12262] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 328.543020][T12262] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 328.562509][T12262] veth1_macvtap: left promiscuous mode [ 328.573436][T12262] veth0_macvtap: left promiscuous mode [ 328.579314][T12262] veth1_vlan: left promiscuous mode [ 328.584646][T12262] veth0_vlan: left promiscuous mode [ 328.672400][T12262] team0 (unregistering): Port device team_slave_1 removed [ 328.684506][T12262] team0 (unregistering): Port device team_slave_0 removed [ 328.711590][T12262] team0 (unregistering): Port device dummy0 removed [ 328.727061][T20401] wireguard0: entered promiscuous mode [ 328.738412][T20402] wireguard0: entered promiscuous mode [ 328.753070][T20345] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.755585][T20416] hub 6-0:1.0: USB hub found [ 328.760180][T20345] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.764897][T20416] hub 6-0:1.0: 8 ports detected [ 328.773935][T20345] bridge_slave_1: entered allmulticast mode [ 328.783463][T20345] bridge_slave_1: entered promiscuous mode [ 328.789771][ T3355] lo speed is unknown, defaulting to 1000 [ 328.795637][ T3355] infiniband syz0: ib_query_port failed (-19) [ 328.812939][T20414] netdevsim netdevsim2: Direct firmware load for ČöníņÆgkNšÄq>ä*x(Oˆ@ failed with error -2 [ 328.828766][T20345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 328.844792][T20345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.886730][T20345] team0: Port device team_slave_0 added [ 328.917487][T20345] team0: Port device team_slave_1 added [ 328.949945][T20345] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 328.956985][T20345] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.983086][T20345] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 329.000989][T20345] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 329.008142][T20345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 329.034553][T20345] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 329.066292][T20345] hsr_slave_0: entered promiscuous mode [ 329.073801][T20345] hsr_slave_1: entered promiscuous mode [ 329.088300][T20345] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 329.098927][T20345] Cannot create hsr debugfs directory [ 329.114340][T20438] pimreg: entered allmulticast mode [ 329.141518][T20438] pimreg: left allmulticast mode [ 329.174896][T20444] ALSA: seq fatal error: cannot create timer (-19) [ 329.614277][T20456] xt_TPROXY: Can be used only with -p tcp or -p udp [ 329.650656][T20456] wireguard0: entered promiscuous mode [ 329.697659][T20463] siw: device registration error -23 [ 329.723991][T20466] xt_TPROXY: Can be used only with -p tcp or -p udp [ 329.805616][T20466] wireguard0: entered promiscuous mode [ 329.813590][T20469] netlink: 'syz.2.5851': attribute type 99 has an invalid length. [ 329.846999][T20473] siw: device registration error -23 [ 329.918245][T20481] serio: Serial port ttyS3 [ 329.964954][T20485] sctp: [Deprecated]: syz.1.5858 (pid 20485) Use of int in max_burst socket option. [ 329.964954][T20485] Use struct sctp_assoc_value instead [ 329.993010][T20345] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 330.009285][T20345] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 330.019342][T20345] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 330.028978][T20345] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 330.058535][T20489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20489 comm=syz.1.5859 [ 330.100815][T20489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20489 comm=syz.1.5859 [ 330.124226][T20345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.162870][T20345] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.189546][T12239] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.196695][T12239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.206317][T12239] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.213403][T12239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.336148][T20345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.448654][T20345] veth0_vlan: entered promiscuous mode [ 330.457854][T20345] veth1_vlan: entered promiscuous mode [ 330.483442][T20345] veth0_macvtap: entered promiscuous mode [ 330.512218][T20345] veth1_macvtap: entered promiscuous mode [ 330.534661][T20345] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 330.551491][T20345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 330.570777][T20345] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.579740][T20345] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.588623][T20345] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.597664][T20345] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.698932][T20532] pimreg: entered allmulticast mode [ 330.776184][T20532] pimreg: left allmulticast mode [ 330.783237][T20539] xt_TPROXY: Can be used only with -p tcp or -p udp [ 330.877017][T20537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20537 comm=syz.4.5871 [ 330.914267][T20539] wireguard0: entered promiscuous mode [ 330.929275][T20537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20537 comm=syz.4.5871 [ 330.960630][T20547] siw: device registration error -23 [ 331.168000][T20566] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5882'. [ 331.178055][T20568] FAULT_INJECTION: forcing a failure. [ 331.178055][T20568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.191220][T20568] CPU: 0 UID: 0 PID: 20568 Comm: syz.5.5883 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 331.191253][T20568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 331.191339][T20568] Call Trace: [ 331.191346][T20568] [ 331.191354][T20568] __dump_stack+0x1d/0x30 [ 331.191459][T20568] dump_stack_lvl+0xe8/0x140 [ 331.191480][T20568] dump_stack+0x15/0x1b [ 331.191565][T20568] should_fail_ex+0x265/0x280 [ 331.191600][T20568] should_fail+0xb/0x20 [ 331.191641][T20568] should_fail_usercopy+0x1a/0x20 [ 331.191691][T20568] _copy_from_user+0x1c/0xb0 [ 331.191711][T20568] ___sys_recvmsg+0xaa/0x370 [ 331.191729][T20568] ? 0xffffffff81000000 [ 331.191742][T20568] ? __rcu_read_unlock+0x4f/0x70 [ 331.191775][T20568] __x64_sys_recvmsg+0xd1/0x160 [ 331.191802][T20568] x64_sys_call+0xf19/0x2fb0 [ 331.191849][T20568] do_syscall_64+0xd2/0x200 [ 331.191945][T20568] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 331.191973][T20568] ? clear_bhb_loop+0x40/0x90 [ 331.191997][T20568] ? clear_bhb_loop+0x40/0x90 [ 331.192085][T20568] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.192105][T20568] RIP: 0033:0x7f45bbb4e929 [ 331.192123][T20568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 331.192145][T20568] RSP: 002b:00007f45ba1b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 331.192178][T20568] RAX: ffffffffffffffda RBX: 00007f45bbd75fa0 RCX: 00007f45bbb4e929 [ 331.192193][T20568] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000003 [ 331.192207][T20568] RBP: 00007f45ba1b7090 R08: 0000000000000000 R09: 0000000000000000 [ 331.192219][T20568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.192231][T20568] R13: 0000000000000000 R14: 00007f45bbd75fa0 R15: 00007ffcb549beb8 [ 331.192248][T20568] [ 331.397114][T20566] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5882'. [ 331.571763][T20582] xt_TPROXY: Can be used only with -p tcp or -p udp [ 331.617051][T20576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20576 comm=syz.3.5886 [ 331.630048][T20576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20576 comm=syz.3.5886 [ 331.648766][T20582] wireguard0: entered promiscuous mode [ 331.695264][T20588] siw: device registration error -23 [ 331.893466][T12273] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 331.959997][T12273] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 331.970873][T20603] xt_TPROXY: Can be used only with -p tcp or -p udp [ 332.011086][T20605] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5894'. [ 332.043403][T12273] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.065625][T20603] wireguard0: entered promiscuous mode [ 332.071923][T20606] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5894'. [ 332.089219][T20608] siw: device registration error -23 [ 332.116317][T12273] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.513296][T12273] bond0 (unregistering): (slave c1˙): Releasing backup interface [ 332.523267][T12273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 332.535461][T12273] bond0 (unregistering): Released all slaves [ 332.564492][T20575] chnl_net:caif_netlink_parms(): no params data found [ 332.597581][T12273] tipc: Left network mode [ 332.624861][ T3401] syz2: Port: 1 Link DOWN [ 332.654503][T20632] xt_TPROXY: Can be used only with -p tcp or -p udp [ 332.685443][T20575] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.692984][T20575] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.711288][T20575] bridge_slave_0: entered allmulticast mode [ 332.733217][T20575] bridge_slave_0: entered promiscuous mode [ 332.743763][T20636] siw: device registration error -23 [ 332.770419][T20575] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.777627][T20575] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.793792][ T29] kauditd_printk_skb: 365 callbacks suppressed [ 332.793806][ T29] audit: type=1326 audit(1750199428.219:27182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 332.814846][T20575] bridge_slave_1: entered allmulticast mode [ 332.856191][ T29] audit: type=1326 audit(1750199428.261:27183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 332.879849][ T29] audit: type=1326 audit(1750199428.261:27184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 332.881344][T20640] xt_TPROXY: Can be used only with -p tcp or -p udp [ 332.903544][ T29] audit: type=1326 audit(1750199428.261:27185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 332.910363][T20575] bridge_slave_1: entered promiscuous mode [ 332.933734][ T29] audit: type=1326 audit(1750199428.261:27186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 332.963314][ T29] audit: type=1326 audit(1750199428.261:27187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 332.987015][ T29] audit: type=1326 audit(1750199428.261:27188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 333.009877][T20648] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5906'. [ 333.010688][ T29] audit: type=1326 audit(1750199428.261:27189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 333.043465][ T29] audit: type=1326 audit(1750199428.261:27190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.1.5902" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 333.071519][T12273] hsr_slave_0: left promiscuous mode [ 333.077735][T12273] hsr_slave_1: left promiscuous mode [ 333.083575][T12273] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 333.091038][T12273] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 333.092394][T20651] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5906'. [ 333.109877][T12273] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 333.117426][T12273] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 333.130663][T12273] veth1_macvtap: left promiscuous mode [ 333.136496][T12273] veth0_macvtap: left promiscuous mode [ 333.143837][T12273] veth1_vlan: left promiscuous mode [ 333.149482][T12273] veth0_vlan: left promiscuous mode [ 333.154798][ T29] audit: type=1326 audit(1750199428.607:27191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20654 comm="syz.2.5908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 333.173920][T20640] siw: device registration error -23 [ 333.235734][T12273] team0 (unregistering): Port device team_slave_1 removed [ 333.246859][T12273] team0 (unregistering): Port device team_slave_0 removed [ 333.259764][T12226] smc: removing ib device syz2 [ 333.285265][T20643] wireguard0: entered promiscuous mode [ 333.304970][T20575] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.320581][T20575] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.351594][T20575] team0: Port device team_slave_0 added [ 333.360642][T20575] team0: Port device team_slave_1 added [ 333.412965][T20575] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 333.420298][T20575] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.447786][T20575] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 333.504893][T20575] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 333.511938][T20575] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.538127][T20575] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 333.631283][T20575] hsr_slave_0: entered promiscuous mode [ 333.638036][T20575] hsr_slave_1: entered promiscuous mode [ 333.643979][T20575] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 333.653843][T20575] Cannot create hsr debugfs directory [ 333.958034][T20679] pimreg: entered allmulticast mode [ 333.967182][T20679] pimreg: left allmulticast mode [ 333.989919][T20681] hub 6-0:1.0: USB hub found [ 333.994662][T20681] hub 6-0:1.0: 8 ports detected [ 334.078196][T20688] ALSA: seq fatal error: cannot create timer (-19) [ 334.110380][T20575] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 334.110558][T20692] xt_TPROXY: Can be used only with -p tcp or -p udp [ 334.129788][T20575] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 334.160898][T20575] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 334.166379][T20575] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 334.204192][T20575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 334.210948][T20575] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.213579][T12226] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.213654][T12226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.221049][T12226] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.221089][T12226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.239907][T20701] siw: device registration error -23 [ 334.382101][T20575] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 334.516669][T20721] hub 6-0:1.0: USB hub found [ 334.526240][T20721] hub 6-0:1.0: 8 ports detected [ 334.607647][T20575] veth0_vlan: entered promiscuous mode [ 334.618666][T20575] veth1_vlan: entered promiscuous mode [ 334.633659][T20743] xt_TPROXY: Can be used only with -p tcp or -p udp [ 334.637779][T20575] veth0_macvtap: entered promiscuous mode [ 334.647073][T20741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20741 comm=syz.1.5932 [ 334.649600][T20575] veth1_macvtap: entered promiscuous mode [ 334.676214][T20575] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 334.685467][T20575] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.695788][T20575] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.704613][T20575] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.713392][T20575] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.722184][T20575] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.744358][T20743] siw: device registration error -23 [ 334.860994][T20762] pimreg: entered allmulticast mode [ 334.874603][T20762] pimreg: left allmulticast mode [ 334.960600][T20768] tmpfs: Bad value for 'mpol' [ 335.430079][T20784] xt_TPROXY: Can be used only with -p tcp or -p udp [ 335.495219][T20784] siw: device registration error -23 [ 335.586889][T20797] 9pnet_fd: Insufficient options for proto=fd [ 335.625205][T20804] pimreg: entered allmulticast mode [ 335.651189][T20804] pimreg: left allmulticast mode [ 335.791745][T20812] ALSA: seq fatal error: cannot create timer (-19) [ 336.365367][T20832] xt_TPROXY: Can be used only with -p tcp or -p udp [ 336.375920][T20835] 9pnet_fd: Insufficient options for proto=fd [ 336.417696][T20832] wireguard0: entered promiscuous mode [ 336.424676][T20842] xt_TPROXY: Can be used only with -p tcp or -p udp [ 336.462947][T20850] siw: device registration error -23 [ 336.508088][T20842] wireguard0: entered promiscuous mode [ 336.555845][T20858] siw: device registration error -23 [ 336.574622][T20860] 9pnet_fd: Insufficient options for proto=fd [ 336.755918][T20872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20872 comm=syz.1.5976 [ 336.769652][T20872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20872 comm=syz.1.5976 [ 336.867585][T20879] xt_TPROXY: Can be used only with -p tcp or -p udp [ 336.931744][T20879] wireguard0: entered promiscuous mode [ 336.976753][T20884] xt_TPROXY: Can be used only with -p tcp or -p udp [ 336.986600][T20887] siw: device registration error -23 [ 337.040764][T20884] siw: device registration error -23 [ 337.080415][T20890] FAULT_INJECTION: forcing a failure. [ 337.080415][T20890] name failslab, interval 1, probability 0, space 0, times 0 [ 337.093148][T20890] CPU: 1 UID: 0 PID: 20890 Comm: syz.2.5983 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 337.093196][T20890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.093209][T20890] Call Trace: [ 337.093216][T20890] [ 337.093280][T20890] __dump_stack+0x1d/0x30 [ 337.093305][T20890] dump_stack_lvl+0xe8/0x140 [ 337.093324][T20890] dump_stack+0x15/0x1b [ 337.093416][T20890] should_fail_ex+0x265/0x280 [ 337.093450][T20890] should_failslab+0x8c/0xb0 [ 337.093475][T20890] kmem_cache_alloc_noprof+0x50/0x310 [ 337.093503][T20890] ? alloc_empty_file+0x76/0x200 [ 337.093550][T20890] alloc_empty_file+0x76/0x200 [ 337.093575][T20890] path_openat+0x68/0x2170 [ 337.093600][T20890] ? mntput+0x4b/0x80 [ 337.093621][T20890] ? terminate_walk+0x27f/0x2a0 [ 337.093717][T20890] ? path_openat+0x1bf8/0x2170 [ 337.093742][T20890] ? _parse_integer_limit+0x170/0x190 [ 337.093771][T20890] do_filp_open+0x109/0x230 [ 337.093821][T20890] do_open_execat+0xd8/0x260 [ 337.093851][T20890] alloc_bprm+0x25/0x350 [ 337.093953][T20890] do_execveat_common+0x12e/0x750 [ 337.093987][T20890] ? getname_flags+0x154/0x3b0 [ 337.094082][T20890] __x64_sys_execveat+0x73/0x90 [ 337.094110][T20890] x64_sys_call+0x2dae/0x2fb0 [ 337.094132][T20890] do_syscall_64+0xd2/0x200 [ 337.094226][T20890] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 337.094266][T20890] ? clear_bhb_loop+0x40/0x90 [ 337.094286][T20890] ? clear_bhb_loop+0x40/0x90 [ 337.094353][T20890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.094373][T20890] RIP: 0033:0x7fe34c4fe929 [ 337.094387][T20890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.094457][T20890] RSP: 002b:00007fe34ab67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 337.094479][T20890] RAX: ffffffffffffffda RBX: 00007fe34c725fa0 RCX: 00007fe34c4fe929 [ 337.094494][T20890] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 337.094508][T20890] RBP: 00007fe34ab67090 R08: 0000000000001000 R09: 0000000000000000 [ 337.094522][T20890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.094535][T20890] R13: 0000000000000000 R14: 00007fe34c725fa0 R15: 00007ffd1bc3feb8 [ 337.094581][T20890] [ 337.329168][T20891] 9pnet_fd: Insufficient options for proto=fd [ 337.349416][T20899] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5988'. [ 337.364256][T20899] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5988'. [ 337.549020][T20920] xt_TPROXY: Can be used only with -p tcp or -p udp [ 337.621759][T20920] siw: device registration error -23 [ 337.717821][ T29] kauditd_printk_skb: 389 callbacks suppressed [ 337.717896][ T29] audit: type=1326 audit(1750199433.394:27581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.748096][ T29] audit: type=1326 audit(1750199433.394:27582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.772614][ T29] audit: type=1326 audit(1750199433.394:27583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.796778][ T29] audit: type=1326 audit(1750199433.394:27584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.867094][ T29] audit: type=1326 audit(1750199433.394:27585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.890963][ T29] audit: type=1326 audit(1750199433.394:27586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.914596][ T29] audit: type=1326 audit(1750199433.394:27587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.938300][ T29] audit: type=1326 audit(1750199433.394:27588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.962062][ T29] audit: type=1326 audit(1750199433.394:27589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 337.985811][ T29] audit: type=1326 audit(1750199433.394:27590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20930 comm="syz.2.6000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe34c4fe929 code=0x7ffc0000 [ 338.309318][T20953] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6006'. [ 338.329540][T20953] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6006'. [ 338.510400][T20956] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6007'. [ 338.548721][T20956] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6007'. [ 338.609958][T20959] xt_TPROXY: Can be used only with -p tcp or -p udp [ 338.661859][T20959] wireguard0: entered promiscuous mode [ 338.708289][T20961] siw: device registration error -23 [ 339.529203][T20984] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6016'. [ 339.612751][T20984] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6016'. [ 339.803937][T20992] pimreg: entered allmulticast mode [ 339.863914][T20998] 9pnet_fd: Insufficient options for proto=fd [ 339.961064][T21003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21003 comm=syz.4.6024 [ 339.973455][T21015] xt_TPROXY: Can be used only with -p tcp or -p udp [ 339.974106][T21003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21003 comm=syz.4.6024 [ 340.058113][T21023] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6033'. [ 340.060233][T21015] siw: device registration error -23 [ 340.077709][T21001] pimreg: left allmulticast mode [ 340.111070][T21023] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6033'. [ 340.129476][T21023] bond0: (slave bond_slave_1): Releasing backup interface [ 340.292550][T21042] serio: Serial port ttyS3 [ 340.384930][T21046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21046 comm=syz.2.6042 [ 340.414530][T21046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21046 comm=syz.2.6042 [ 340.613573][T21064] wireguard0: entered promiscuous mode [ 340.650820][T21073] xt_TPROXY: Can be used only with -p tcp or -p udp [ 340.660414][T21074] siw: device registration error -23 [ 340.825075][T21073] siw: device registration error -23 [ 341.271836][T21110] pimreg: entered allmulticast mode [ 341.529590][T21112] pimreg: left allmulticast mode [ 341.541060][T21126] ALSA: seq fatal error: cannot create timer (-19) [ 341.661413][T21132] FAULT_INJECTION: forcing a failure. [ 341.661413][T21132] name failslab, interval 1, probability 0, space 0, times 0 [ 341.674262][T21132] CPU: 0 UID: 0 PID: 21132 Comm: syz.3.6072 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 341.674301][T21132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 341.674315][T21132] Call Trace: [ 341.674321][T21132] [ 341.674333][T21132] __dump_stack+0x1d/0x30 [ 341.674358][T21132] dump_stack_lvl+0xe8/0x140 [ 341.674380][T21132] dump_stack+0x15/0x1b [ 341.674398][T21132] should_fail_ex+0x265/0x280 [ 341.674471][T21132] should_failslab+0x8c/0xb0 [ 341.674543][T21132] kmem_cache_alloc_noprof+0x50/0x310 [ 341.674590][T21132] ? getname_kernel+0x3c/0x1f0 [ 341.674613][T21132] ? should_fail_ex+0xdb/0x280 [ 341.674645][T21132] getname_kernel+0x3c/0x1f0 [ 341.674669][T21132] kern_path+0x23/0x130 [ 341.674707][T21132] bpf_uprobe_multi_link_attach+0x232/0x8f0 [ 341.674738][T21132] ? kstrtouint+0x76/0xc0 [ 341.674798][T21132] ? __rcu_read_unlock+0x4f/0x70 [ 341.674818][T21132] ? __fget_files+0x184/0x1c0 [ 341.674882][T21132] link_create+0x666/0x6c0 [ 341.674902][T21132] __sys_bpf+0x4c7/0x790 [ 341.674976][T21132] __x64_sys_bpf+0x41/0x50 [ 341.675006][T21132] x64_sys_call+0x2478/0x2fb0 [ 341.675028][T21132] do_syscall_64+0xd2/0x200 [ 341.675047][T21132] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 341.675140][T21132] ? clear_bhb_loop+0x40/0x90 [ 341.675162][T21132] ? clear_bhb_loop+0x40/0x90 [ 341.675185][T21132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.675207][T21132] RIP: 0033:0x7fdb514ae929 [ 341.675281][T21132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.675301][T21132] RSP: 002b:00007fdb4fb17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.675323][T21132] RAX: ffffffffffffffda RBX: 00007fdb516d5fa0 RCX: 00007fdb514ae929 [ 341.675368][T21132] RDX: 000000000000003c RSI: 00002000000005c0 RDI: 000000000000001c [ 341.675382][T21132] RBP: 00007fdb4fb17090 R08: 0000000000000000 R09: 0000000000000000 [ 341.675394][T21132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.675406][T21132] R13: 0000000000000000 R14: 00007fdb516d5fa0 R15: 00007ffca2dc4a78 [ 341.675425][T21132] [ 342.288130][T21152] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6079'. [ 342.303573][T21152] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6079'. [ 342.814078][T21169] pimreg: entered allmulticast mode [ 342.940418][ T29] kauditd_printk_skb: 293 callbacks suppressed [ 342.940437][ T29] audit: type=1326 audit(1750199438.874:27884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 342.975550][ T29] audit: type=1326 audit(1750199438.884:27885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 342.999348][ T29] audit: type=1326 audit(1750199438.884:27886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023065][ T29] audit: type=1326 audit(1750199438.884:27887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023096][ T29] audit: type=1326 audit(1750199438.884:27888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023119][ T29] audit: type=1326 audit(1750199438.884:27889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023206][ T29] audit: type=1326 audit(1750199438.884:27890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023261][ T29] audit: type=1326 audit(1750199438.884:27891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023313][ T29] audit: type=1326 audit(1750199438.916:27892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.023346][ T29] audit: type=1326 audit(1750199438.916:27893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.5.6088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 343.132106][T21188] xt_TPROXY: Can be used only with -p tcp or -p udp [ 343.133561][T21173] pimreg: left allmulticast mode [ 343.145381][T21186] tmpfs: Bad value for 'mpol' [ 343.225269][T21191] wireguard0: entered promiscuous mode [ 343.279508][T21188] siw: device registration error -23 [ 343.391531][T21198] xt_TPROXY: Can be used only with -p tcp or -p udp [ 343.489177][T21198] wireguard0: entered promiscuous mode [ 343.534474][T21207] siw: device registration error -23 [ 343.762685][T21218] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6101'. [ 343.800917][T21219] ALSA: seq fatal error: cannot create timer (-19) [ 344.685833][T21255] wireguard0: entered promiscuous mode [ 344.709989][T21248] siw: device registration error -23 [ 344.769999][T21261] tmpfs: Bad value for 'mpol' [ 344.816646][T21267] xt_TPROXY: Can be used only with -p tcp or -p udp [ 344.892163][T21267] wireguard0: entered promiscuous mode [ 344.940969][T21273] siw: device registration error -23 [ 345.116079][T21276] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6120'. [ 345.624128][T21297] wireguard0: entered promiscuous mode [ 345.670063][T21304] siw: device registration error -23 [ 345.794195][T21306] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6132'. [ 346.139532][T21329] xt_TPROXY: Can be used only with -p tcp or -p udp [ 346.181758][T21326] ALSA: seq fatal error: cannot create timer (-19) [ 346.206410][T21329] wireguard0: entered promiscuous mode [ 346.263663][T21333] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6144'. [ 346.276327][T21335] siw: device registration error -23 [ 346.490949][T21355] xt_TPROXY: Can be used only with -p tcp or -p udp [ 346.545289][T21355] siw: device registration error -23 [ 346.625934][T21363] netlink: 12 bytes leftover after parsing attributes in process `syz.5.6155'. [ 346.721507][T21369] ALSA: seq fatal error: cannot create timer (-19) [ 346.938360][T21379] FAULT_INJECTION: forcing a failure. [ 346.938360][T21379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.951532][T21379] CPU: 0 UID: 0 PID: 21379 Comm: syz.2.6160 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 346.951560][T21379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 346.951569][T21379] Call Trace: [ 346.951575][T21379] [ 346.951582][T21379] __dump_stack+0x1d/0x30 [ 346.951599][T21379] dump_stack_lvl+0xe8/0x140 [ 346.951615][T21379] dump_stack+0x15/0x1b [ 346.951628][T21379] should_fail_ex+0x265/0x280 [ 346.951704][T21379] should_fail+0xb/0x20 [ 346.951727][T21379] should_fail_usercopy+0x1a/0x20 [ 346.951754][T21379] _copy_from_user+0x1c/0xb0 [ 346.951770][T21379] vt_do_kdsk_ioctl+0x54/0x720 [ 346.951836][T21379] ? security_capable+0x83/0x90 [ 346.951864][T21379] vt_ioctl+0x8e8/0x1880 [ 346.951954][T21379] ? tty_jobctrl_ioctl+0x29e/0x810 [ 346.952024][T21379] tty_ioctl+0x7db/0xb80 [ 346.952056][T21379] ? __pfx_tty_ioctl+0x10/0x10 [ 346.952086][T21379] __se_sys_ioctl+0xce/0x140 [ 346.952152][T21379] __x64_sys_ioctl+0x43/0x50 [ 346.952182][T21379] x64_sys_call+0x19a8/0x2fb0 [ 346.952205][T21379] do_syscall_64+0xd2/0x200 [ 346.952224][T21379] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 346.952275][T21379] ? clear_bhb_loop+0x40/0x90 [ 346.952440][T21379] ? clear_bhb_loop+0x40/0x90 [ 346.952463][T21379] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.952504][T21379] RIP: 0033:0x7fe34c4fe929 [ 346.952520][T21379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.952557][T21379] RSP: 002b:00007fe34ab67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.952578][T21379] RAX: ffffffffffffffda RBX: 00007fe34c725fa0 RCX: 00007fe34c4fe929 [ 346.952591][T21379] RDX: 0000200000002040 RSI: 0000000000004b47 RDI: 0000000000000003 [ 346.952685][T21379] RBP: 00007fe34ab67090 R08: 0000000000000000 R09: 0000000000000000 [ 346.952698][T21379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.952711][T21379] R13: 0000000000000000 R14: 00007fe34c725fa0 R15: 00007ffd1bc3feb8 [ 346.952731][T21379] [ 347.312578][T21398] xt_TPROXY: Can be used only with -p tcp or -p udp [ 347.323038][T21393] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6167'. [ 347.350907][T21398] wireguard0: entered promiscuous mode [ 347.394559][T21406] siw: device registration error -23 [ 347.530175][T21405] ALSA: seq fatal error: cannot create timer (-19) [ 348.115275][T21427] wireguard0: entered promiscuous mode [ 348.149853][T21435] siw: device registration error -23 [ 348.162287][T21429] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6180'. [ 348.269213][T21439] hub 6-0:1.0: USB hub found [ 348.276523][T21439] hub 6-0:1.0: 8 ports detected [ 348.368526][T21456] 9pnet: Could not find request transport: fd0x0000000000000006 [ 348.395217][T21452] wireguard0: entered promiscuous mode [ 348.438610][T21464] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6195'. [ 348.449593][T21469] siw: device registration error -23 [ 348.486686][T21466] vhci_hcd: default hub control req: 0000 v0000 i0000 l65535 [ 348.508615][T21466] netlink: 14 bytes leftover after parsing attributes in process `syz.5.6196'. [ 348.524544][T21466] hsr_slave_0: left promiscuous mode [ 348.531245][T21466] hsr_slave_1: left promiscuous mode [ 348.563366][ T29] kauditd_printk_skb: 432 callbacks suppressed [ 348.563386][ T29] audit: type=1326 audit(1750199444.773:28326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21470 comm="syz.3.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 348.593743][ T29] audit: type=1326 audit(1750199444.773:28327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21470 comm="syz.3.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=274 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 348.593849][ T29] audit: type=1326 audit(1750199444.773:28328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21470 comm="syz.3.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 348.617670][ T29] audit: type=1326 audit(1750199444.784:28329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21470 comm="syz.3.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 348.769069][T21491] 9pnet: Could not find request transport: fd0x0000000000000006 [ 348.883521][T21496] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6208'. [ 348.924757][T21504] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6211'. [ 348.975296][T21504] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6211'. [ 348.988618][T21508] ALSA: seq fatal error: cannot create timer (-19) [ 349.178480][T21522] 9pnet_fd: Insufficient options for proto=fd [ 349.361589][T21531] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6222'. [ 349.380940][T21537] tipc: Started in network mode [ 349.385892][T21537] tipc: Node identity 72a4ffaf330e, cluster identity 4711 [ 349.393130][T21537] tipc: Enabled bearer , priority 0 [ 349.425436][T21537] syzkaller0: mtu less than device minimum [ 349.491326][T21534] tipc: Disabling bearer [ 349.534635][T21542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21542 comm=syz.1.6226 [ 349.564200][T21542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21542 comm=syz.1.6226 [ 349.629980][T21554] 9pnet_fd: Insufficient options for proto=fd [ 349.684855][ T29] audit: type=1400 audit(1750199445.949:28330): avc: denied { create } for pid=21555 comm="syz.1.6230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 349.746450][T21556] bridge_slave_0: left allmulticast mode [ 349.752150][T21556] bridge_slave_0: left promiscuous mode [ 349.758145][T21556] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.802586][T21556] bridge_slave_1: left allmulticast mode [ 349.808461][T21556] bridge_slave_1: left promiscuous mode [ 349.814208][T21556] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.883822][T21556] bond0: (slave bond_slave_0): Releasing backup interface [ 349.934962][T21556] bond0: (slave bond_slave_1): Releasing backup interface [ 349.963955][T21556] team0: Port device team_slave_0 removed [ 349.985254][T21564] FAULT_INJECTION: forcing a failure. [ 349.985254][T21564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.985402][T21556] team0: Port device team_slave_1 removed [ 349.998457][T21564] CPU: 0 UID: 0 PID: 21564 Comm: syz.3.6233 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 349.998486][T21564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 349.998507][T21564] Call Trace: [ 349.998514][T21564] [ 349.998522][T21564] __dump_stack+0x1d/0x30 [ 349.998545][T21564] dump_stack_lvl+0xe8/0x140 [ 349.998565][T21564] dump_stack+0x15/0x1b [ 349.998581][T21564] should_fail_ex+0x265/0x280 [ 349.998675][T21564] should_fail+0xb/0x20 [ 349.998701][T21564] should_fail_usercopy+0x1a/0x20 [ 349.998730][T21564] _copy_from_user+0x1c/0xb0 [ 349.998751][T21564] ___sys_sendmsg+0xc1/0x1d0 [ 349.998847][T21564] __x64_sys_sendmsg+0xd4/0x160 [ 349.998881][T21564] x64_sys_call+0x2999/0x2fb0 [ 349.998902][T21564] do_syscall_64+0xd2/0x200 [ 349.998921][T21564] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 349.999017][T21564] ? clear_bhb_loop+0x40/0x90 [ 349.999038][T21564] ? clear_bhb_loop+0x40/0x90 [ 349.999137][T21564] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.999159][T21564] RIP: 0033:0x7fdb514ae929 [ 349.999175][T21564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.999192][T21564] RSP: 002b:00007fdb4fb17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 349.999213][T21564] RAX: ffffffffffffffda RBX: 00007fdb516d5fa0 RCX: 00007fdb514ae929 [ 349.999294][T21564] RDX: 0000000000000004 RSI: 0000200000000140 RDI: 0000000000000003 [ 349.999348][T21564] RBP: 00007fdb4fb17090 R08: 0000000000000000 R09: 0000000000000000 [ 349.999360][T21564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.999373][T21564] R13: 0000000000000000 R14: 00007fdb516d5fa0 R15: 00007ffca2dc4a78 [ 349.999391][T21564] [ 350.194092][T21556] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 350.201657][T21556] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 350.268610][T21556] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 350.276160][T21556] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 350.357380][T21566] bridge_slave_0: left allmulticast mode [ 350.363128][T21566] bridge_slave_0: left promiscuous mode [ 350.368810][T21566] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.493444][T21573] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6236'. [ 350.520069][T21566] bridge_slave_1: left allmulticast mode [ 350.526017][T21566] bridge_slave_1: left promiscuous mode [ 350.531729][T21566] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.608328][T21566] bond0: (slave bond_slave_0): Releasing backup interface [ 350.649525][T21566] bond0: (slave bond_slave_1): Releasing backup interface [ 350.683588][T21566] team0: Port device team_slave_0 removed [ 350.712637][T21566] team0: Port device team_slave_1 removed [ 350.736808][T21566] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 350.744447][T21566] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 350.787076][T21566] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 350.794601][T21566] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 351.063590][T21593] 9pnet_fd: Insufficient options for proto=fd [ 351.168423][T21605] tmpfs: Unknown parameter 'nž' [ 351.181062][ T29] audit: type=1400 audit(1750199447.523:28331): avc: denied { append } for pid=21604 comm="syz.4.6248" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 351.211785][T21605] netlink: 'syz.4.6248': attribute type 1 has an invalid length. [ 351.223710][T21605] vhci_hcd: invalid port number 65 [ 351.228921][T21605] vhci_hcd: SetHubDepth req not supported for USB 2.0 roothub [ 351.238309][ T29] audit: type=1400 audit(1750199447.565:28332): avc: denied { getopt } for pid=21604 comm="syz.4.6248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 351.263502][ T29] audit: type=1326 audit(1750199447.618:28333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21604 comm="syz.4.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb15ca1e929 code=0x7ffc0000 [ 351.287414][ T29] audit: type=1326 audit(1750199447.618:28334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21604 comm="syz.4.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fb15ca1e929 code=0x7ffc0000 [ 351.313094][ T29] audit: type=1326 audit(1750199447.660:28335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21604 comm="syz.4.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb15ca1e929 code=0x7ffc0000 [ 351.529555][T21609] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6249'. [ 351.662235][T21619] wireguard0: entered promiscuous mode [ 351.872983][T21628] siw: device registration error -23 [ 351.897568][T21637] 9pnet_fd: Insufficient options for proto=fd [ 351.951986][T21643] xt_TPROXY: Can be used only with -p tcp or -p udp [ 352.013376][T21647] FAULT_INJECTION: forcing a failure. [ 352.013376][T21647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.026507][T21647] CPU: 0 UID: 0 PID: 21647 Comm: syz.1.6261 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 352.026619][T21647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 352.026632][T21647] Call Trace: [ 352.026694][T21647] [ 352.026714][T21647] __dump_stack+0x1d/0x30 [ 352.026735][T21647] dump_stack_lvl+0xe8/0x140 [ 352.026752][T21647] dump_stack+0x15/0x1b [ 352.026769][T21647] should_fail_ex+0x265/0x280 [ 352.026799][T21647] should_fail+0xb/0x20 [ 352.026826][T21647] should_fail_usercopy+0x1a/0x20 [ 352.026856][T21647] _copy_to_user+0x20/0xa0 [ 352.026952][T21647] simple_read_from_buffer+0xb5/0x130 [ 352.026982][T21647] proc_fail_nth_read+0x100/0x140 [ 352.027000][T21647] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 352.027030][T21647] vfs_read+0x1a0/0x6f0 [ 352.027133][T21647] ? __rcu_read_unlock+0x4f/0x70 [ 352.027152][T21647] ? __fget_files+0x184/0x1c0 [ 352.027172][T21647] ksys_read+0xda/0x1a0 [ 352.027250][T21647] __x64_sys_read+0x40/0x50 [ 352.027301][T21647] x64_sys_call+0x2d77/0x2fb0 [ 352.027340][T21647] do_syscall_64+0xd2/0x200 [ 352.027356][T21647] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 352.027379][T21647] ? clear_bhb_loop+0x40/0x90 [ 352.027397][T21647] ? clear_bhb_loop+0x40/0x90 [ 352.027442][T21647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 352.027461][T21647] RIP: 0033:0x7efc5d0bd33c [ 352.027475][T21647] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 352.027491][T21647] RSP: 002b:00007efc5b727030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 352.027510][T21647] RAX: ffffffffffffffda RBX: 00007efc5d2e5fa0 RCX: 00007efc5d0bd33c [ 352.027521][T21647] RDX: 000000000000000f RSI: 00007efc5b7270a0 RDI: 0000000000000005 [ 352.027565][T21647] RBP: 00007efc5b727090 R08: 0000000000000000 R09: 0000000000000000 [ 352.027576][T21647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.027587][T21647] R13: 0000000000000000 R14: 00007efc5d2e5fa0 R15: 00007ffed555f198 [ 352.027655][T21647] [ 352.027712][T21643] wireguard0: entered promiscuous mode [ 352.092336][T21650] siw: device registration error -23 [ 352.304721][T21656] __nla_validate_parse: 2 callbacks suppressed [ 352.304738][T21656] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6263'. [ 352.506481][T21663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21663 comm=syz.2.6266 [ 352.530646][T21663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21663 comm=syz.2.6266 [ 352.562325][T21666] xt_TPROXY: Can be used only with -p tcp or -p udp [ 352.627759][T21666] wireguard0: entered promiscuous mode [ 352.669068][T21673] 9pnet_fd: Insufficient options for proto=fd [ 352.676251][T21674] siw: device registration error -23 [ 352.774520][T21680] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6272'. [ 352.810829][T21680] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6272'. [ 352.828471][T21683] xt_TPROXY: Can be used only with -p tcp or -p udp [ 352.923907][T21684] wireguard0: entered promiscuous mode [ 352.969245][T21683] siw: device registration error -23 [ 352.976031][T21689] xt_TPROXY: Can be used only with -p tcp or -p udp [ 353.137916][T21689] wireguard0: entered promiscuous mode [ 353.156311][T21692] siw: device registration error -23 [ 353.174222][T21694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21694 comm=syz.1.6277 [ 353.217271][T21694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21694 comm=syz.1.6277 [ 353.372065][T21706] 9pnet_fd: Insufficient options for proto=fd [ 353.393385][T21708] xt_TPROXY: Can be used only with -p tcp or -p udp [ 353.475553][T21708] wireguard0: entered promiscuous mode [ 353.518805][T21714] siw: device registration error -23 [ 354.183385][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 354.183471][ T29] audit: type=1326 audit(1750199450.620:28343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.213376][ T29] audit: type=1326 audit(1750199450.620:28344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.237097][ T29] audit: type=1326 audit(1750199450.620:28345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.260757][ T29] audit: type=1326 audit(1750199450.620:28346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.284368][ T29] audit: type=1326 audit(1750199450.620:28347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.308102][ T29] audit: type=1326 audit(1750199450.620:28348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.331847][ T29] audit: type=1326 audit(1750199450.620:28349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.355525][ T29] audit: type=1326 audit(1750199450.620:28350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.379093][ T29] audit: type=1326 audit(1750199450.620:28351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.402662][ T29] audit: type=1326 audit(1750199450.620:28352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21740 comm="syz.5.6292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45bbb4e929 code=0x7ffc0000 [ 354.882929][T21771] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6302'. [ 354.901595][T21771] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6302'. [ 355.180357][T21781] xt_TPROXY: Can be used only with -p tcp or -p udp [ 355.229217][T21779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21779 comm=syz.5.6306 [ 355.255999][T21781] wireguard0: entered promiscuous mode [ 355.300289][T21786] siw: device registration error -23 [ 355.595150][T21811] FAULT_INJECTION: forcing a failure. [ 355.595150][T21811] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.608312][T21811] CPU: 0 UID: 0 PID: 21811 Comm: syz.5.6316 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 355.608357][T21811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 355.608371][T21811] Call Trace: [ 355.608380][T21811] [ 355.608388][T21811] __dump_stack+0x1d/0x30 [ 355.608472][T21811] dump_stack_lvl+0xe8/0x140 [ 355.608538][T21811] dump_stack+0x15/0x1b [ 355.608565][T21811] should_fail_ex+0x265/0x280 [ 355.608593][T21811] should_fail+0xb/0x20 [ 355.608623][T21811] should_fail_usercopy+0x1a/0x20 [ 355.608651][T21811] _copy_from_iter+0xcf/0xe40 [ 355.608719][T21811] hci_sock_sendmsg+0x36d/0x910 [ 355.608749][T21811] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 355.608773][T21811] __sock_sendmsg+0x142/0x180 [ 355.608938][T21811] sock_write_iter+0x165/0x1b0 [ 355.608962][T21811] ? __pfx_sock_write_iter+0x10/0x10 [ 355.608980][T21811] vfs_write+0x4a0/0x8e0 [ 355.609012][T21811] ksys_write+0xda/0x1a0 [ 355.609034][T21811] __x64_sys_write+0x40/0x50 [ 355.609130][T21811] x64_sys_call+0x2cdd/0x2fb0 [ 355.609149][T21811] do_syscall_64+0xd2/0x200 [ 355.609199][T21811] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 355.609228][T21811] ? clear_bhb_loop+0x40/0x90 [ 355.609253][T21811] ? clear_bhb_loop+0x40/0x90 [ 355.609334][T21811] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 355.609354][T21811] RIP: 0033:0x7f45bbb4e929 [ 355.609370][T21811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.609387][T21811] RSP: 002b:00007f45ba1b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 355.609411][T21811] RAX: ffffffffffffffda RBX: 00007f45bbd75fa0 RCX: 00007f45bbb4e929 [ 355.609499][T21811] RDX: 0000000000000006 RSI: 0000200000000300 RDI: 0000000000000004 [ 355.609581][T21811] RBP: 00007f45ba1b7090 R08: 0000000000000000 R09: 0000000000000000 [ 355.609594][T21811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.609609][T21811] R13: 0000000000000000 R14: 00007f45bbd75fa0 R15: 00007ffcb549beb8 [ 355.609699][T21811] [ 355.910364][T21820] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6317'. [ 355.940836][T21823] xt_TPROXY: Can be used only with -p tcp or -p udp [ 355.976871][T21827] vhci_hcd: invalid port number 65 [ 355.982069][T21827] vhci_hcd: SetHubDepth req not supported for USB 2.0 roothub [ 356.039316][T21823] wireguard0: entered promiscuous mode [ 356.048624][T21831] tmpfs: Unknown parameter 'nž' [ 356.080356][T21831] netlink: 'syz.5.6323': attribute type 1 has an invalid length. [ 356.085194][T21832] siw: device registration error -23 [ 356.088602][T21831] vhci_hcd: invalid port number 65 [ 356.098757][T21831] vhci_hcd: SetHubDepth req not supported for USB 2.0 roothub [ 356.177108][T21837] ALSA: seq fatal error: cannot create timer (-19) [ 356.311177][T21841] ALSA: seq fatal error: cannot create timer (-19) [ 356.435111][T21851] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6330'. [ 356.558487][T21865] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6336'. [ 356.614752][T21867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=21867 comm=syz.1.6337 [ 356.628390][T21865] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6336'. [ 356.646036][T21875] xt_TPROXY: Can be used only with -p tcp or -p udp [ 356.664682][T21873] ALSA: seq fatal error: cannot create timer (-19) [ 356.758244][T21881] netlink: 12 bytes leftover after parsing attributes in process `syz.5.6342'. [ 356.786931][T21882] wireguard0: entered promiscuous mode [ 356.791268][T21885] siw: device registration error -23 [ 356.899813][T21890] hub 6-0:1.0: USB hub found [ 356.909000][T21890] hub 6-0:1.0: 8 ports detected [ 356.965719][T21906] xt_TPROXY: Can be used only with -p tcp or -p udp [ 356.987947][T21906] siw: device registration error -23 [ 357.114672][T21913] netlink: 12 bytes leftover after parsing attributes in process `syz.5.6354'. [ 357.851184][T21914] tmpfs: Bad value for 'mpol' [ 358.051813][T21940] hub 6-0:1.0: USB hub found [ 358.056608][T21940] hub 6-0:1.0: 8 ports detected [ 358.125999][T21948] serio: Serial port ttyS3 [ 358.174898][T21950] netlink: 12 bytes leftover after parsing attributes in process `syz.5.6367'. [ 358.203846][T21956] xt_TPROXY: Can be used only with -p tcp or -p udp [ 358.262836][T21956] siw: device registration error -23 [ 358.387271][T21968] xt_TPROXY: Can be used only with -p tcp or -p udp [ 358.905503][T21968] wireguard0: entered promiscuous mode [ 358.947145][T21972] siw: device registration error -23 [ 359.092620][T21987] ALSA: seq fatal error: cannot create timer (-19) [ 359.118063][T21991] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6381'. [ 359.236394][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 359.236411][ T29] audit: type=1326 audit(1750199455.984:28545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22002 comm="syz.5.6385" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f45bbb4e929 code=0x0 [ 359.264117][ T29] audit: type=1326 audit(1750199456.016:28546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264171][ T29] audit: type=1326 audit(1750199456.016:28547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=274 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264240][ T29] audit: type=1326 audit(1750199456.016:28548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264267][ T29] audit: type=1326 audit(1750199456.016:28549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264294][ T29] audit: type=1326 audit(1750199456.016:28550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264367][ T29] audit: type=1326 audit(1750199456.016:28551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264393][ T29] audit: type=1326 audit(1750199456.016:28552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.264455][ T29] audit: type=1326 audit(1750199456.016:28553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.265577][ T29] audit: type=1326 audit(1750199456.016:28554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21994 comm="syz.3.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 359.424405][T22013] FAULT_INJECTION: forcing a failure. [ 359.424405][T22013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.424456][T22013] CPU: 1 UID: 0 PID: 22013 Comm: syz.3.6387 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 359.424486][T22013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 359.424543][T22013] Call Trace: [ 359.424550][T22013] [ 359.424558][T22013] __dump_stack+0x1d/0x30 [ 359.424582][T22013] dump_stack_lvl+0xe8/0x140 [ 359.424634][T22013] dump_stack+0x15/0x1b [ 359.424654][T22013] should_fail_ex+0x265/0x280 [ 359.424688][T22013] should_fail+0xb/0x20 [ 359.424736][T22013] should_fail_usercopy+0x1a/0x20 [ 359.424764][T22013] _copy_from_user+0x1c/0xb0 [ 359.424794][T22013] ___sys_sendmsg+0xc1/0x1d0 [ 359.424953][T22013] __x64_sys_sendmsg+0xd4/0x160 [ 359.425094][T22013] x64_sys_call+0x2999/0x2fb0 [ 359.425115][T22013] do_syscall_64+0xd2/0x200 [ 359.425202][T22013] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 359.425226][T22013] ? clear_bhb_loop+0x40/0x90 [ 359.425244][T22013] ? clear_bhb_loop+0x40/0x90 [ 359.425265][T22013] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.425347][T22013] RIP: 0033:0x7fdb514ae929 [ 359.425365][T22013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.425384][T22013] RSP: 002b:00007fdb4fb17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.425407][T22013] RAX: ffffffffffffffda RBX: 00007fdb516d5fa0 RCX: 00007fdb514ae929 [ 359.425422][T22013] RDX: 0000000000000004 RSI: 0000200000000140 RDI: 0000000000000003 [ 359.425436][T22013] RBP: 00007fdb4fb17090 R08: 0000000000000000 R09: 0000000000000000 [ 359.425449][T22013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.425461][T22013] R13: 0000000000000000 R14: 00007fdb516d5fa0 R15: 00007ffca2dc4a78 [ 359.425511][T22013] [ 359.924509][T22021] xt_TPROXY: Can be used only with -p tcp or -p udp [ 360.004579][T22021] wireguard0: entered promiscuous mode [ 360.055775][T22022] siw: device registration error -23 [ 360.140711][T22027] xt_TPROXY: Can be used only with -p tcp or -p udp [ 360.183354][T22027] wireguard0: entered promiscuous mode [ 360.183623][T22029] xt_TPROXY: Can be used only with -p tcp or -p udp [ 360.244101][T22035] siw: device registration error -23 [ 360.400198][T22029] wireguard0: entered promiscuous mode [ 360.435925][T22036] siw: device registration error -23 [ 360.455118][T22043] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6396'. [ 360.603648][T22061] ALSA: seq fatal error: cannot create timer (-19) [ 360.872778][T22040] chnl_net:caif_netlink_parms(): no params data found [ 360.978014][T22040] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.985318][T22040] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.995346][T22040] bridge_slave_0: entered allmulticast mode [ 361.002077][T22040] bridge_slave_0: entered promiscuous mode [ 361.009288][T22040] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.016457][T22040] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.023980][T22040] bridge_slave_1: entered allmulticast mode [ 361.030816][T22040] bridge_slave_1: entered promiscuous mode [ 361.053695][T22040] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 361.071709][T22040] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.121228][T22040] team0: Port device team_slave_0 added [ 361.132954][T22040] team0: Port device team_slave_1 added [ 361.180177][T22040] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 361.187228][T22040] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 361.189989][T22080] xt_TPROXY: Can be used only with -p tcp or -p udp [ 361.213506][T22040] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 361.273377][T12273] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 361.318314][T22040] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 361.325302][T22040] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 361.351510][T22040] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 361.432853][T12273] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 361.446504][T22082] siw: device registration error -23 [ 361.453959][T22080] wireguard0: entered promiscuous mode [ 361.603747][T12273] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 361.655422][T22040] hsr_slave_0: entered promiscuous mode [ 361.675391][T22040] hsr_slave_1: entered promiscuous mode [ 361.699817][T22040] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 361.707431][T22040] Cannot create hsr debugfs directory [ 361.724470][T12273] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 361.736823][T22092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=22092 comm=syz.5.6408 [ 361.830898][T22092] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6408'. [ 361.982412][T12273] bridge_slave_1: left allmulticast mode [ 361.988192][T12273] bridge_slave_1: left promiscuous mode [ 361.993858][T12273] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.003975][T12273] bridge_slave_0: left promiscuous mode [ 362.009713][T12273] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.740706][T22126] ALSA: seq fatal error: cannot create timer (-19) [ 362.883307][T12273] bond0 (unregistering): (slave c1˙): Releasing backup interface [ 362.893889][T12273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 362.903781][T12273] bond0 (unregistering): Released all slaves [ 362.913589][T12273] bond1 (unregistering): Released all slaves [ 362.965102][T12273] tipc: Left network mode [ 362.997450][T12273] hsr_slave_0: left promiscuous mode [ 363.010450][T12273] hsr_slave_1: left promiscuous mode [ 363.023321][T12273] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 363.030810][T12273] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 363.042241][T12273] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 363.049990][T12273] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 363.077857][T12273] veth1_macvtap: left promiscuous mode [ 363.084847][T12273] veth0_macvtap: left promiscuous mode [ 363.090634][T12273] veth1_vlan: left promiscuous mode [ 363.096044][T12273] veth0_vlan: left promiscuous mode [ 363.205972][T12273] team0 (unregistering): Port device team_slave_1 removed [ 363.217055][T12273] team0 (unregistering): Port device team_slave_0 removed [ 363.599084][T22164] xt_TPROXY: Can be used only with -p tcp or -p udp [ 363.787011][T22164] wireguard0: entered promiscuous mode [ 363.873267][T22166] siw: device registration error -23 [ 364.012471][T22181] xt_TPROXY: Can be used only with -p tcp or -p udp [ 364.064371][T22181] wireguard0: entered promiscuous mode [ 364.090970][T22179] bridge2: entered promiscuous mode [ 364.096422][T22179] bridge2: entered allmulticast mode [ 364.103286][T22179] team0: Port device bridge2 added [ 364.111644][ T29] kauditd_printk_skb: 272 callbacks suppressed [ 364.111661][ T29] audit: type=1400 audit(1750199461.107:28827): avc: denied { mounton } for pid=22184 comm="syz.5.6440" path="/498/bus" dev="tmpfs" ino=2687 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 364.157631][T22040] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 364.166729][T22188] siw: device registration error -23 [ 364.175537][T22040] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 364.185980][T22040] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 364.203314][T22040] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 364.203392][T22194] 9pnet_fd: Insufficient options for proto=fd [ 364.241188][T22199] FAULT_INJECTION: forcing a failure. [ 364.241188][T22199] name failslab, interval 1, probability 0, space 0, times 0 [ 364.253922][T22199] CPU: 0 UID: 0 PID: 22199 Comm: syz.3.6446 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 364.254033][T22199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 364.254083][T22199] Call Trace: [ 364.254090][T22199] [ 364.254099][T22199] __dump_stack+0x1d/0x30 [ 364.254120][T22199] dump_stack_lvl+0xe8/0x140 [ 364.254137][T22199] dump_stack+0x15/0x1b [ 364.254259][T22199] should_fail_ex+0x265/0x280 [ 364.254294][T22199] should_failslab+0x8c/0xb0 [ 364.254316][T22199] kmem_cache_alloc_node_noprof+0x57/0x320 [ 364.254396][T22199] ? __alloc_skb+0x101/0x320 [ 364.254430][T22199] __alloc_skb+0x101/0x320 [ 364.254460][T22199] ? ip_generic_getfrag+0x135/0x1b0 [ 364.254490][T22199] __ip_append_data+0x1a1d/0x24b0 [ 364.254594][T22199] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 364.254630][T22199] ip_append_data+0xd6/0x130 [ 364.254690][T22199] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 364.254720][T22199] udp_sendmsg+0x36e/0x13b0 [ 364.254796][T22199] ? mntput+0x4b/0x80 [ 364.254868][T22199] ? __rcu_read_unlock+0x4f/0x70 [ 364.254895][T22199] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 364.254939][T22199] ? avc_has_perm+0xd3/0x150 [ 364.255047][T22199] ? __pfx_udp_sendmsg+0x10/0x10 [ 364.255072][T22199] inet_sendmsg+0xac/0xd0 [ 364.255093][T22199] __sock_sendmsg+0x102/0x180 [ 364.255135][T22199] __sys_sendto+0x268/0x330 [ 364.255200][T22199] __x64_sys_sendto+0x76/0x90 [ 364.255273][T22199] x64_sys_call+0x2eb6/0x2fb0 [ 364.255293][T22199] do_syscall_64+0xd2/0x200 [ 364.255312][T22199] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 364.255389][T22199] ? clear_bhb_loop+0x40/0x90 [ 364.255414][T22199] ? clear_bhb_loop+0x40/0x90 [ 364.255436][T22199] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.255468][T22199] RIP: 0033:0x7fdb514ae929 [ 364.255488][T22199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.255509][T22199] RSP: 002b:00007fdb4fb17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 364.255533][T22199] RAX: ffffffffffffffda RBX: 00007fdb516d5fa0 RCX: 00007fdb514ae929 [ 364.255549][T22199] RDX: 0000000000006200 RSI: 0000200000000c80 RDI: 0000000000000007 [ 364.255562][T22199] RBP: 00007fdb4fb17090 R08: 0000000000000000 R09: 0000000000000000 [ 364.255574][T22199] R10: 0000000012000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.255666][T22199] R13: 0000000000000000 R14: 00007fdb516d5fa0 R15: 00007ffca2dc4a78 [ 364.255687][T22199] [ 364.330351][T22197] syzkaller0: entered promiscuous mode [ 364.513805][T22197] syzkaller0: entered allmulticast mode [ 364.650632][ T29] audit: type=1326 audit(1750199461.663:28828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.674438][ T29] audit: type=1326 audit(1750199461.663:28829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.698318][ T29] audit: type=1326 audit(1750199461.663:28830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=274 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.722257][ T29] audit: type=1326 audit(1750199461.663:28831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.746091][ T29] audit: type=1326 audit(1750199461.663:28832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.769816][ T29] audit: type=1326 audit(1750199461.663:28833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.793497][ T29] audit: type=1326 audit(1750199461.663:28834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.817007][ T29] audit: type=1326 audit(1750199461.663:28835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.840756][ T29] audit: type=1326 audit(1750199461.663:28836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22211 comm="syz.1.6448" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7efc5d0be929 code=0x7ffc0000 [ 364.908647][T22040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.943002][T22040] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.963640][T12261] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.970790][T12261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.978910][T22229] 9pnet_fd: Insufficient options for proto=fd [ 364.990595][T22228] 9pnet_fd: Insufficient options for proto=fd [ 365.024874][T12261] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.032117][T12261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.112602][T22040] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 365.207732][T22040] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.358194][T22270] 9pnet_fd: Insufficient options for proto=fd [ 365.369518][T22040] veth0_vlan: entered promiscuous mode [ 365.391141][T22040] veth1_vlan: entered promiscuous mode [ 365.413643][T22272] 9pnet_fd: Insufficient options for proto=fd [ 365.419262][T22040] veth0_macvtap: entered promiscuous mode [ 365.441150][T22040] veth1_macvtap: entered promiscuous mode [ 365.461572][T22040] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 365.471007][T22040] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 365.479484][T22040] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.488348][T22040] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.497133][T22040] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.506386][T22040] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.533326][T22278] FAULT_INJECTION: forcing a failure. [ 365.533326][T22278] name failslab, interval 1, probability 0, space 0, times 0 [ 365.546271][T22278] CPU: 1 UID: 0 PID: 22278 Comm: syz.1.6469 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 365.546302][T22278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 365.546315][T22278] Call Trace: [ 365.546321][T22278] [ 365.546330][T22278] __dump_stack+0x1d/0x30 [ 365.546353][T22278] dump_stack_lvl+0xe8/0x140 [ 365.546374][T22278] dump_stack+0x15/0x1b [ 365.546405][T22278] should_fail_ex+0x265/0x280 [ 365.546436][T22278] should_failslab+0x8c/0xb0 [ 365.546460][T22278] kmem_cache_alloc_noprof+0x50/0x310 [ 365.546586][T22278] ? security_file_alloc+0x32/0x100 [ 365.546663][T22278] security_file_alloc+0x32/0x100 [ 365.546703][T22278] init_file+0x5c/0x1d0 [ 365.546735][T22278] alloc_empty_file+0x8b/0x200 [ 365.546761][T22278] path_openat+0x68/0x2170 [ 365.546790][T22278] ? _parse_integer_limit+0x170/0x190 [ 365.546825][T22278] ? kstrtoull+0x111/0x140 [ 365.546853][T22278] ? kstrtouint+0x76/0xc0 [ 365.546882][T22278] do_filp_open+0x109/0x230 [ 365.546919][T22278] do_sys_openat2+0xa6/0x110 [ 365.546979][T22278] __x64_sys_openat+0xf2/0x120 [ 365.547055][T22278] x64_sys_call+0x1af/0x2fb0 [ 365.547153][T22278] do_syscall_64+0xd2/0x200 [ 365.547174][T22278] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 365.547200][T22278] ? clear_bhb_loop+0x40/0x90 [ 365.547264][T22278] ? clear_bhb_loop+0x40/0x90 [ 365.547286][T22278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.547310][T22278] RIP: 0033:0x7efc5d0be929 [ 365.547358][T22278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.547377][T22278] RSP: 002b:00007efc5b727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 365.547399][T22278] RAX: ffffffffffffffda RBX: 00007efc5d2e5fa0 RCX: 00007efc5d0be929 [ 365.547467][T22278] RDX: 0000000000002040 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 365.547481][T22278] RBP: 00007efc5b727090 R08: 0000000000000000 R09: 0000000000000000 [ 365.547494][T22278] R10: 0000000000000041 R11: 0000000000000246 R12: 0000000000000001 [ 365.547508][T22278] R13: 0000000000000000 R14: 00007efc5d2e5fa0 R15: 00007ffed555f198 [ 365.547528][T22278] [ 365.831315][T22289] xt_TPROXY: Can be used only with -p tcp or -p udp [ 365.866903][T22293] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6475'. [ 365.884498][T22293] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6475'. [ 365.930821][T22297] 9pnet_fd: Insufficient options for proto=fd [ 365.937573][T22289] wireguard0: entered promiscuous mode [ 365.948947][T22295] siw: device registration error -23 [ 365.982663][T22302] 9pnet_fd: Insufficient options for proto=fd [ 366.029639][T22306] serio: Serial port ttyS3 [ 366.173173][T22327] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6489'. [ 366.185593][T22321] 9pnet_fd: Insufficient options for proto=fd [ 366.206725][T22327] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6489'. [ 366.224711][T22332] 9pnet_fd: Insufficient options for proto=fd [ 366.320710][T22340] xt_TPROXY: Can be used only with -p tcp or -p udp [ 366.382378][T22340] wireguard0: entered promiscuous mode [ 366.422663][T22344] siw: device registration error -23 [ 366.550995][T22352] xt_TPROXY: Can be used only with -p tcp or -p udp [ 366.601890][T22352] wireguard0: entered promiscuous mode [ 366.648203][T22355] siw: device registration error -23 [ 366.817450][T22341] serio: Serial port ttyS3 [ 366.837496][T22360] 9pnet_fd: Insufficient options for proto=fd [ 366.880937][T22362] 9pnet_fd: Insufficient options for proto=fd [ 366.962110][T22366] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6504'. [ 367.028664][T22366] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6504'. [ 367.586640][T22382] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 367.749807][T22387] xt_TPROXY: Can be used only with -p tcp or -p udp [ 367.762812][T22388] 9pnet_fd: Insufficient options for proto=fd [ 367.921819][T22389] siw: device registration error -23 [ 367.955587][T22396] serio: Serial port ttyS3 [ 367.961703][T22387] wireguard0: entered promiscuous mode [ 367.977076][T22400] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6518'. [ 367.986992][T22398] xt_TPROXY: Can be used only with -p tcp or -p udp [ 367.999551][T22400] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6518'. [ 368.041653][T22406] ALSA: seq fatal error: cannot create timer (-19) [ 368.062407][T22398] wireguard0: entered promiscuous mode [ 368.107866][T22411] siw: device registration error -23 [ 368.772843][T22429] syz_tun: entered allmulticast mode [ 368.825686][T22435] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6531'. [ 368.845662][T22439] xt_TPROXY: Can be used only with -p tcp or -p udp [ 368.864114][T22435] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6531'. [ 368.886630][T22428] syz_tun: left allmulticast mode [ 368.903954][T22439] wireguard0: entered promiscuous mode [ 368.912360][T22445] xt_TPROXY: Can be used only with -p tcp or -p udp [ 368.920130][T22447] xt_TPROXY: Can be used only with -p tcp or -p udp [ 368.945077][T22451] siw: device registration error -23 [ 368.968865][T22447] wireguard0: entered promiscuous mode [ 368.999011][T22445] wireguard0: entered promiscuous mode [ 369.013063][T22458] siw: device registration error -23 [ 369.032536][T22455] siw: device registration error -23 [ 369.115761][ T29] kauditd_printk_skb: 270 callbacks suppressed [ 369.115778][ T29] audit: type=1326 audit(1750199466.355:29107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.145968][ T29] audit: type=1326 audit(1750199466.355:29108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.198472][ T29] audit: type=1326 audit(1750199466.366:29109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.1.6539" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7efc5d0be929 code=0x0 [ 369.221619][ T29] audit: type=1326 audit(1750199466.418:29110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.245229][ T29] audit: type=1326 audit(1750199466.418:29111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.245263][ T29] audit: type=1326 audit(1750199466.418:29112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.245345][ T29] audit: type=1326 audit(1750199466.418:29113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.245373][ T29] audit: type=1326 audit(1750199466.418:29114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.245443][ T29] audit: type=1326 audit(1750199466.418:29115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.245471][ T29] audit: type=1326 audit(1750199466.418:29116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22461 comm="syz.3.6540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb514ae929 code=0x7ffc0000 [ 369.525346][T22478] siw: device registration error -23 [ 369.564032][T22486] xt_TPROXY: Can be used only with -p tcp or -p udp [ 369.648093][T22486] wireguard0: entered promiscuous mode [ 369.656582][T22491] xt_TPROXY: Can be used only with -p tcp or -p udp [ 369.691562][T22492] siw: device registration error -23 [ 369.710591][T22491] wireguard0: entered promiscuous mode [ 369.751482][T22495] xt_TPROXY: Can be used only with -p tcp or -p udp [ 369.758727][T22496] siw: device registration error -23 [ 369.858525][T22495] wireguard0: entered promiscuous mode [ 369.865582][T22507] serio: Serial port ttyS3 [ 369.894191][T22509] siw: device registration error -23 [ 370.105235][T22514] siw: device registration error -23 [ 370.151414][T22518] ALSA: seq fatal error: cannot create timer (-19) [ 370.184930][T22529] 9pnet_fd: Insufficient options for proto=fd [ 370.253239][T22539] xt_TPROXY: Can be used only with -p tcp or -p udp [ 370.377260][T22542] wireguard0: entered promiscuous mode [ 370.390097][T22539] siw: device registration error -23 [ 370.411540][T22545] xt_TPROXY: Can be used only with -p tcp or -p udp [ 370.486498][T22545] wireguard0: entered promiscuous mode [ 370.534924][T22548] siw: device registration error -23 [ 370.772751][T22569] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6582'. [ 370.795249][T22569] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6582'. [ 370.806038][T22574] ALSA: seq fatal error: cannot create timer (-19) [ 370.973467][T22585] serio: Serial port ttyS3 [ 371.058946][T22589] xt_TPROXY: Can be used only with -p tcp or -p udp [ 371.115543][T22589] wireguard0: entered promiscuous mode [ 371.159962][T22601] siw: device registration error -23 [ 371.215583][T22604] FAULT_INJECTION: forcing a failure. [ 371.215583][T22604] name failslab, interval 1, probability 0, space 0, times 0 [ 371.228419][T22604] CPU: 0 UID: 0 PID: 22604 Comm: syz.4.6596 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 371.228453][T22604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 371.228466][T22604] Call Trace: [ 371.228536][T22604] [ 371.228545][T22604] __dump_stack+0x1d/0x30 [ 371.228570][T22604] dump_stack_lvl+0xe8/0x140 [ 371.228589][T22604] dump_stack+0x15/0x1b [ 371.228604][T22604] should_fail_ex+0x265/0x280 [ 371.228637][T22604] should_failslab+0x8c/0xb0 [ 371.228698][T22604] kmem_cache_alloc_noprof+0x50/0x310 [ 371.228800][T22604] ? audit_log_start+0x365/0x6c0 [ 371.228828][T22604] audit_log_start+0x365/0x6c0 [ 371.228916][T22604] audit_seccomp+0x48/0x100 [ 371.228940][T22604] ? __seccomp_filter+0x68c/0x10d0 [ 371.228965][T22604] __seccomp_filter+0x69d/0x10d0 [ 371.229039][T22604] ? vfs_write+0x75e/0x8e0 [ 371.229137][T22604] __secure_computing+0x82/0x150 [ 371.229159][T22604] syscall_trace_enter+0xcf/0x1e0 [ 371.229181][T22604] do_syscall_64+0xac/0x200 [ 371.229229][T22604] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 371.229313][T22604] ? clear_bhb_loop+0x40/0x90 [ 371.229338][T22604] ? clear_bhb_loop+0x40/0x90 [ 371.229384][T22604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.229404][T22604] RIP: 0033:0x7fb15ca1e929 [ 371.229418][T22604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.229436][T22604] RSP: 002b:00007fb15b087038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f3 [ 371.229455][T22604] RAX: ffffffffffffffda RBX: 00007fb15cc45fa0 RCX: 00007fb15ca1e929 [ 371.229470][T22604] RDX: 00000000fffffceb RSI: 0000200000004600 RDI: 0000000000000003 [ 371.229486][T22604] RBP: 00007fb15b087090 R08: 0000000000000000 R09: 0000000000000000 [ 371.229553][T22604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.229565][T22604] R13: 0000000000000000 R14: 00007fb15cc45fa0 R15: 00007ffe204d4e28 [ 371.229586][T22604] [ 371.454056][T22606] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6597'. [ 371.477485][T22606] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6597'. [ 371.497404][T22610] xt_TPROXY: Can be used only with -p tcp or -p udp [ 371.520195][T22612] ALSA: seq fatal error: cannot create timer (-19) [ 371.557160][T22610] wireguard0: entered promiscuous mode [ 371.628945][T22618] siw: device registration error -23 [ 371.866078][T22646] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6611'. [ 371.885813][T22646] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6611'. [ 371.944381][T22651] FAULT_INJECTION: forcing a failure. [ 371.944381][T22651] name failslab, interval 1, probability 0, space 0, times 0 [ 371.957269][T22651] CPU: 0 UID: 0 PID: 22651 Comm: syz.2.6613 Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 371.957298][T22651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 371.957312][T22651] Call Trace: [ 371.957319][T22651] [ 371.957328][T22651] __dump_stack+0x1d/0x30 [ 371.957354][T22651] dump_stack_lvl+0xe8/0x140 [ 371.957377][T22651] dump_stack+0x15/0x1b [ 371.957431][T22651] should_fail_ex+0x265/0x280 [ 371.957477][T22651] ? security_load_policy+0x66/0x890 [ 371.957534][T22651] should_failslab+0x8c/0xb0 [ 371.957562][T22651] __kmalloc_cache_noprof+0x4c/0x320 [ 371.957593][T22651] ? exc_page_fault+0x62/0xa0 [ 371.957618][T22651] security_load_policy+0x66/0x890 [ 371.957706][T22651] ? rep_movs_alternative+0x4a/0x90 [ 371.957775][T22651] sel_write_load+0x1d4/0x380 [ 371.957830][T22651] ? __pfx_sel_write_load+0x10/0x10 [ 371.957855][T22651] vfs_write+0x269/0x8e0 [ 371.957884][T22651] ? __rcu_read_unlock+0x4f/0x70 [ 371.957978][T22651] ? __fget_files+0x184/0x1c0 [ 371.958000][T22651] ksys_write+0xda/0x1a0 [ 371.958021][T22651] __x64_sys_write+0x40/0x50 [ 371.958038][T22651] x64_sys_call+0x2cdd/0x2fb0 [ 371.958057][T22651] do_syscall_64+0xd2/0x200 [ 371.958110][T22651] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 371.958138][T22651] ? clear_bhb_loop+0x40/0x90 [ 371.958161][T22651] ? clear_bhb_loop+0x40/0x90 [ 371.958182][T22651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.958268][T22651] RIP: 0033:0x7f16371ae929 [ 371.958286][T22651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.958306][T22651] RSP: 002b:00007f1635817038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.958328][T22651] RAX: ffffffffffffffda RBX: 00007f16373d5fa0 RCX: 00007f16371ae929 [ 371.958422][T22651] RDX: 000000000000ffa8 RSI: 0000200000000000 RDI: 0000000000000004 [ 371.958437][T22651] RBP: 00007f1635817090 R08: 0000000000000000 R09: 0000000000000000 [ 371.958450][T22651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.958462][T22651] R13: 0000000000000000 R14: 00007f16373d5fa0 R15: 00007fff27a8f698 [ 371.958479][T22651] [ 371.958486][T22651] SELinux: failed to load policy [ 372.283379][T22660] ALSA: seq fatal error: cannot create timer (-19) [ 372.320485][T22672] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=35 sclass=netlink_tcpdiag_socket pid=22672 comm=syz.5.6620 [ 372.447845][T22675] serio: Serial port ttyS3 [ 372.501406][T22679] siw: device registration error -23 [ 372.514916][T22677] wireguard0: entered promiscuous mode [ 372.563026][T22687] siw: device registration error -23 [ 372.839027][T22709] siw: device registration error -23 [ 372.844762][T22706] wireguard0: entered promiscuous mode [ 372.884313][T22713] siw: device registration error -23 [ 373.058906][T22726] wireguard0: entered promiscuous mode [ 373.105413][T22728] siw: device registration error -23 [ 373.185277][T22730] wireguard0: entered promiscuous mode [ 373.231018][T22741] siw: device registration error -23 [ 373.263155][T22739] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 373.337166][T22744] siw: device registration error -23 [ 373.390632][T22751] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6649'. [ 373.419581][T22751] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6649'. [ 373.539240][T22755] wireguard0: entered promiscuous mode [ 373.584694][T22754] siw: device registration error -23 [ 373.684858][T15098] ================================================================== [ 373.693176][T15098] BUG: KCSAN: data-race in pollwake / pollwake [ 373.699356][T15098] [ 373.701698][T15098] write to 0xffffc900015df9e0 of 4 bytes by task 20345 on cpu 1: [ 373.709442][T15098] pollwake+0xb6/0x100 [ 373.713530][T15098] __wake_up_sync_key+0x4f/0x80 [ 373.718395][T15098] anon_pipe_write+0x8ba/0xaa0 [ 373.723152][T15098] vfs_write+0x4a0/0x8e0 [ 373.727392][T15098] ksys_write+0xda/0x1a0 [ 373.731620][T15098] __x64_sys_write+0x40/0x50 [ 373.736195][T15098] x64_sys_call+0x2cdd/0x2fb0 [ 373.740881][T15098] do_syscall_64+0xd2/0x200 [ 373.745453][T15098] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 373.751332][T15098] [ 373.753640][T15098] write to 0xffffc900015df9e0 of 4 bytes by task 15098 on cpu 0: [ 373.761339][T15098] pollwake+0xb6/0x100 [ 373.765388][T15098] __wake_up_sync_key+0x4f/0x80 [ 373.770329][T15098] anon_pipe_write+0x8ba/0xaa0 [ 373.775091][T15098] vfs_write+0x4a0/0x8e0 [ 373.779493][T15098] ksys_write+0xda/0x1a0 [ 373.783717][T15098] __x64_sys_write+0x40/0x50 [ 373.788374][T15098] x64_sys_call+0x2cdd/0x2fb0 [ 373.793040][T15098] do_syscall_64+0xd2/0x200 [ 373.797527][T15098] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 373.803401][T15098] [ 373.805723][T15098] value changed: 0x00000000 -> 0x00000001 [ 373.811427][T15098] [ 373.813746][T15098] Reported by Kernel Concurrency Sanitizer on: [ 373.819878][T15098] CPU: 0 UID: 0 PID: 15098 Comm: syz-executor Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 373.832530][T15098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 373.842678][T15098] ================================================================== [ 373.887187][T22766] serio: Serial port ttyS3 [ 373.938503][T22767] wireguard0: entered promiscuous mode [ 373.983636][T22769] siw: device registration error -23