last executing test programs: 1m41.605563852s ago: executing program 4 (id=1716): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r1, 0x10, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x6, 0x39}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x3}]}}}, {0x20, 0x1, 0x0, 0x1, @quota={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x400000000000fff}]}}}]}, @NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xf4}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f6b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m41.520358007s ago: executing program 4 (id=1717): socket$inet_udp(0x2, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e36fd8270ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cd0aa7b73340cc2160a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea09c346dfebd31a08b32808b80200000000009dd27080e71113610e10d859e8327ef03fb6c86adac12233f9a1fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563112f4b391aafe2348754000000000000007642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc5a788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ff010000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a30280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a013709003f509e6e540c9ba9c2a589ac5d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d54aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa0500e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5f7d895de17a10b0a0ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5175d879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2e5a00d2f953a86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c56d0886eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366a9660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef310e10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e15a00adb976064a93e8d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeadc5cf218a6eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041814f60fbbcafa487ee96b368e8769da90b44190e569fe8b1d155d0765baaca5c5548b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bf"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x3091c0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x10001, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xf, 0x3, &(0x7f0000000300)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x5, @empty, 0xa098}, {0xa, 0x4ea5, 0xb, @mcast1, 0x8}, r3}}, 0x48) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 1m41.48353887s ago: executing program 4 (id=1718): r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) (fail_nth: 1) 1m41.404844964s ago: executing program 4 (id=1721): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYRES32=r0, @ANYRES8=r0, @ANYBLOB="feffffff00"/20, @ANYRES8=r0, @ANYRESOCT=r0, @ANYBLOB="000000000000000000000000001600000000000000000000000000008720adb8a2bc6c62fb281378640c681c43362371d9c53c37f7e109f1ae1a4da250c0c56fb2fb016b02101e80029e9a097225d7b739a74a8ae2b98b3734828ab84cfe11bc05c467af84e3e8b3754efc03700dd0c034e18cef9b9dfa0a8d1b35efdcb68a7985ce83d3d2a7d8ebe069bf9df800000000d8cb3e18de9e62fa26cbc87c2d8315a6c8414b977e45de5a945ca841c1ee"], 0x50) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200010, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES16], 0x21, 0x286, &(0x7f0000000640)="$eJzs2s9rHGUYB/BnYkw3LelG/EUL4ose1MvQ5OyhRSKIAUWNUAXp1GzsmnE3ZJbAipic9Oqf4Fk8ehOkRy+5+Bd48JZLjj2IK7O7iZsSaqxtUsrnc0geZua7M/O+sy/PwO69/t0X62tVvlb0YirLYupq7MSdLOZjKg7sxGuvXP/1hfevf/T2teXlxnjrYkrp4ou/fPzVjy/d7l348KeLP5+L3flP9vYX/9h9bvfS3l8f3GpXqV2lTrdXf1a32ytulq202q7W85TeLVtF1UrtTtXa7KUi3TzYv1Z2Nzb6qeiszp3f2GxVVSo6/bTe6qdeN/U2+6n4rGh3Up7nae58MHTr/mIrP9wZDGJ/8OSNGAwGs9/Hhdsx93s0I3sqZU9fzZ69kT2/k13aHwyad0dnH8BVc+buNf/nxsccO/88FsaL+tJ7KTUiym+3VrZWRv/rvY24thbtKKMVV2I2/oz6MRkb1W++tbx0JQ3Nxzfl9ji/vbXyREQMn6BRfiGaMX98fmGUTwf5OlX/rVf3w/MvRjOeOT6/eDQ/Mzp/I159eSKfRzN++zS6UcZq1NnYHg/B0tcLKb3xznI6ev2Xh8cBADxu8nSo7t/qpm2if4vI8yP7J/qjUX6iP2xO9Iczx/SHd/VX03F5+mzvnYiq/+V6UZatzfoFb1gcbjlBcfCG+N9SD7+Y+T/x2clhuWcRkU2O5cO7r6kjc3bKgzl9wtFQjIrskfs63FcR8flpLkSciX8m/V8PbZzKBQEAAAAAAAAAAHAip/FzwrO+RwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4NH2dwAAAP//NLm0Nw==") syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0), 0x84000) r1 = creat(0x0, 0x109) close(r1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x3, [@datasec={0xa, 0x4, 0x0, 0xf, 0x1, [{0x4, 0x0, 0x1ff}, {0x3, 0x0, 0xdf1}, {0x4, 0x5, 0x6}, {0x3, 0x1ff, 0x8001}], "aa"}]}, {0x0, [0x30]}}, &(0x7f0000000500)=""/142, 0x5b, 0x8e, 0x0, 0x200}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x8000000, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2}, 0x50) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80210, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xd, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0x970, 0x1f280, 0x0, 0x399}) 1m41.230756964s ago: executing program 4 (id=1727): r0 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7734, 0x100, 0x0, 0x359}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0xf56) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2e, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x15523ea56aa22b9a, 0x0, 0x0, 0x0, 0x12345}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) 1m41.065228094s ago: executing program 4 (id=1733): listen(0xffffffffffffffff, 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000001600), 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22, 0x0, @empty, 0x80002}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001500add427323b472545b45602117fffffff81000e22d991000005000000a80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000deff0000000200000000", 0x58}], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000003c0)={@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xc, 0x1, 0x0, 0xe0, 0x0, 0xe000, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, @local, @dev, {[@lsrr={0x83, 0x3}, @lsrr={0x83, 0x7, 0x90, [@remote]}, @timestamp_prespec={0x44, 0x34, 0x0, 0x3, 0x0, [{@private=0xa01012f}, {@local}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote, 0x2}, {@loopback}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x800}]}]}}}}}}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000003000000b704000000000400850000003300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xe, 0x0, &(0x7f00000003c0)="7993ff01190000e5ffa53b00008f", 0x0, 0x400, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x4}, 0x50) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r3, 0x400455c8, 0x0) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000080)) 1m41.024036697s ago: executing program 32 (id=1733): listen(0xffffffffffffffff, 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000001600), 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22, 0x0, @empty, 0x80002}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001500add427323b472545b45602117fffffff81000e22d991000005000000a80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000deff0000000200000000", 0x58}], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000003c0)={@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xc, 0x1, 0x0, 0xe0, 0x0, 0xe000, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, @local, @dev, {[@lsrr={0x83, 0x3}, @lsrr={0x83, 0x7, 0x90, [@remote]}, @timestamp_prespec={0x44, 0x34, 0x0, 0x3, 0x0, [{@private=0xa01012f}, {@local}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote, 0x2}, {@loopback}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x800}]}]}}}}}}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000003000000b704000000000400850000003300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xe, 0x0, &(0x7f00000003c0)="7993ff01190000e5ffa53b00008f", 0x0, 0x400, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x4}, 0x50) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r3, 0x400455c8, 0x0) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000080)) 8.901959162s ago: executing program 0 (id=2787): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[], 0x78}, 0x1, 0xffffffff00000003}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r3 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000180)='./file1\x00', 0x4) renameat2(r3, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000002c0)='./file1\x00', 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000500)=[{&(0x7f0000000700)=""/255, 0xff}, {&(0x7f00000005c0)=""/29, 0x1d}, {&(0x7f0000000400)=""/115, 0x73}, {&(0x7f0000000480)=""/101, 0x65}], 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000180)={0x80000020, 0x0, 0x40000000}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001a00010000000000000000001c00"/28, @ANYRES32=r6], 0x30}}, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r7, 0x421, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc35d4f6d52288271}, 0x200048c4) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r4, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000c00)={0x360, r7, 0x100, 0x70bd2b, 0x4, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "0001561efaeaa0fa"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="bb0ae5e86539f98cdcdad06d24abb64a12064057e1436e67"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="bb0518b7d7e1ed5788e1836cc85737e05999791ea8da6140"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3c05}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cbdb0c34fcd8bf8"}]}, @NL80211_ATTR_REKEY_DATA={0x44, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="65877ad52a38ebc476cf3ea4076c42d3037c663070821311f3e4fa9ddfebcac4"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="6c24b8f4561710b28b5c1ac1dd978c5d8359101751962caa"}]}, @NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="47c2829c56cce415a720458345fbaf9685fba8b67bb2469fc875f196f380cd7d"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="d765969b804a3070235be00cb3785feff61a7962c6e87989"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="5af5b9a9fcff58463af1506bc2d35d281399c55ac3ef23af"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "a2b7a2542d133c28"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="7262393454f09e0ddf649ab49ab66375"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="98eca4101305a19fd08aa39e594bf94d"}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x28, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="640bef851eee8e73ab53aca01dee6ac334acbbb72f6936a1d55846aaa53ed4c3"}]}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x7}]}, @NL80211_ATTR_REKEY_DATA={0x98, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e7de6a09c3c3e763"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="7635ef2284498c9aa4fbce9c31d9a117520eb6babbf4335e6641f46c8bb8a1ec"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="4f9b20d739df8eb399c28e51cc6bdff9bc5935987f55a69db3388c805535601c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="84736ad3f76fb4931b442d975338c39c"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="b1238723e3717a51699bd632a825ff143f2ea6174ad64bdc"}]}, @NL80211_ATTR_REKEY_DATA={0x50, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x7a16}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="5b8bb77e1fa25e938ce5a5874341e5c0f2439944bebe5aec"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65d1557afb905e5e617d20c21b2d580e"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0b6a56c56f09839ffc2ddb4f54e3d06d"}]}, @NL80211_ATTR_REKEY_DATA={0x6c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "65f74bab7a911f91"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="66f3caade6e1082a36f5707ab25553f5cba0ac98dfc83911"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="ce02f4d266ad60e1d0b19ef647edc2ce854e2ad3f430ee8b"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x401}, @NL80211_REKEY_DATA_AKM={0x8}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eaffffffffffffff"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="2426ff6e0843ef9d721855463431c96725b1f5ebf673b46a"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x80000001}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="d6040f528fdcf18d1d39a2956e1a415fb5d6a8735734f2b7"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="baa5174698e8206e046cfa6cb545b32ae8fd49c13fc81f45"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c4dd5de173865483"}]}]}, 0x360}, 0x1, 0x0, 0x0, 0xc000}, 0x40810) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000540)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x41, 0x7fff0000}]}) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r3, 0x84, 0x85, &(0x7f0000000800)="1a00000002000000b1a9314185e9df06dc8b92c27ad30bd1f5305b5187263ac4677da8da94deddd49c85055d0b2d39a3a6d090a94dd3fa647f5619fff665a9359ecbcf7a1306acad7fd8c62152919411df12", 0x52) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x401, @loopback, 0x2}], 0x1c) sendto$inet6(r9, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r9, 0x84, 0x17, &(0x7f0000000000)=ANY=[], 0xffc9) ioctl$RTC_UIE_ON(r2, 0x7003) 8.598480319s ago: executing program 0 (id=2789): pipe(&(0x7f0000019480)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="dc", 0x1}], 0x1, 0x3) r2 = socket(0x2, 0x80805, 0x0) setsockopt(r2, 0x84, 0x80, &(0x7f0000000080)="1a00000002000000", 0x8) close(r1) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x1, @empty, 'ip6tnl0\x00'}}, 0x1e) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000006, 0x10, r1, 0x0) syz_io_uring_setup(0x561a, &(0x7f0000000000)={0x0, 0xbe8f, 0x8000, 0x1, 0x14e}, &(0x7f0000000080), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x73}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x85) 8.578185891s ago: executing program 0 (id=2790): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000500)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00}, 0x94) 8.558511872s ago: executing program 0 (id=2792): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_INC_SCI={0x5, 0x9, 0x1}, @IFLA_MACSEC_REPLAY_PROTECT={0x5, 0xc, 0x1}]}}}]}, 0x44}}, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0)="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", 0xfc) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) socket$packet(0x11, 0x3, 0x300) r2 = socket(0x10, 0x803, 0x2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000000)={0x7, 'vlan0\x00', {0x2}, 0x4}) 8.496050716s ago: executing program 0 (id=2796): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r4, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x4, 0x8001, 0x0, 0xb49, 0x200000000002, 0x5, 0x8, 0x3}, 0x0) write$binfmt_aout(r4, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x6, 0x1, "42341f9b1000007e4f00"}) r5 = syz_open_pts(r4, 0x40000) dup3(r5, r4, 0x0) splice(r4, 0x0, r3, 0x0, 0x7ffff000, 0x0) openat2(r0, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)={0x1ce081, 0x8, 0x69}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r6, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='-', 0x1}], 0x1, 0x0, 0x40}, 0x20008024) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r7 = io_uring_setup(0x1b7f, &(0x7f00000003c0)={0x0, 0x400004d0, 0x1f480, 0xa0000006, 0x79a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x20}}, 0x0) io_uring_enter(r7, 0x8ae, 0x6933, 0x17, 0x0, 0xeffd) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000380)={r6, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={r6, 0x1, 0x6, @multicast}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendto$packet(r1, &(0x7f0000000180)="14042bfdd3fc03fc01004788031c09100628", 0x12, 0x4, &(0x7f0000000140)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) 4.828244769s ago: executing program 0 (id=2880): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r1 = accept4$bt_l2cap(r0, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x800) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0x878, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.191419883s ago: executing program 3 (id=2908): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) write$tun(r0, &(0x7f0000000480)={@void, @void, @eth={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @val, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x65, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010100, @broadcast}, {0x0, 0x17c1, 0x10, 0x0, @gue={{0x1, 0x0, 0x2, 0x8, 0x0, @void}, "7885e593"}}}}}}}, 0x3a) 2.087079879s ago: executing program 3 (id=2910): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r1, 0x0, &(0x7f0000001780)=""/4096, 0x1000000}, 0x20) 2.031285322s ago: executing program 3 (id=2912): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x9, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0200001900010000000000000000000a0101000000000000000000000000000a01010100000000000000000000000000000003000000000a00000008000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x23c}}, 0x8000000) syz_clone3(&(0x7f00000008c0)={0x15b42180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) syz_usbip_server_init(0x3) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000080)='./file1\x00', 0x1010000, &(0x7f0000000180)={[{@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@utf8no}, {@shortname_lower}, {@shortname_lower}, {@uni_xlateno}, {}, {@shortname_lower}, {@shortname_mixed}, {@shortname_win95}, {@shortname_lower}, {@shortname_lower}, {@shortname_mixed}, {@fat=@check_strict}, {@shortname_win95}]}, 0x1, 0x369, &(0x7f0000000700)="$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") quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 1.916788689s ago: executing program 2 (id=2917): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42901, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="034888a809003000030030000000"], 0xfdef) 1.899888129s ago: executing program 5 (id=2918): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x10, 0x0, 0x7fff7ffc}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)=ANY=[], 0x0) socket(0x80000000000000a, 0x2, 0x0) syz_io_uring_setup(0x5ce, &(0x7f0000000480)={0x0, 0x9cd6, 0x80, 0x0, 0x34f}, &(0x7f0000000000)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x100000000005, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) 1.768261937s ago: executing program 2 (id=2920): r0 = socket$inet(0x2, 0x1, 0x0) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) dup(r1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x28) 1.648035244s ago: executing program 2 (id=2922): munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r0, 0x0) mmap(&(0x7f000088b000/0x4000)=nil, 0x4000, 0x2, 0x11, r0, 0x3bf47000) mmap(&(0x7f00002ad000/0xc00000)=nil, 0xc00000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20081, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mremap(&(0x7f00003fd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000769000/0x1000)=nil) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) 1.590861368s ago: executing program 1 (id=2924): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x56) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4000000010003904000000000000000080040000", @ANYRES32=r2, @ANYBLOB="01980000000000002000128008000100736974001400028006000e000600000008000100", @ANYRES64=r1], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendto$packet(r0, &(0x7f0000000600)="05d936277c6f54220002097844ffcf8bd1846f7f83477ca1b278e3e4018a34844b9d62cbd7cd2a6264", 0x29, 0x8c1, &(0x7f00000000c0)={0x11, 0x86dd, r2, 0x1, 0x4, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) 1.566964109s ago: executing program 1 (id=2925): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) bpf$MAP_CREATE(0x0, 0x0, 0x50) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x8440, &(0x7f00000007c0)=ANY=[@ANYBLOB]) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) keyctl$link(0x8, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, 0x0, 0x101001, 0x0) setresuid(0x0, 0xee00, 0x0) r1 = io_uring_setup(0xaae, &(0x7f0000000300)={0x0, 0xbfffeffb, 0x800, 0x7, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x2300000000000000, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 1.38239411s ago: executing program 1 (id=2926): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r1, 0x0, &(0x7f0000001780)=""/4096}, 0x20) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="b8ea7b94e0af37f679307378ebe6bc4d0f219a6df991e9f72e28fbe283b17ced238a67a61d9e05055e68e41a63e4c2a43f28028df21c2682e8e286ae48d732ddd9874c3e97243f7e415747b9d6a53f466f458313762f5c1bd8e6aca0f7017da412", 0x61}], 0x1) 1.302811935s ago: executing program 1 (id=2927): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x51, 0x8, 0xf9, 0x4}, {0xbdd1, 0xb, 0x4, 0x7}, {0x81, 0x9, 0x9, 0x3}]}, 0x10) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000500)=""/212, 0xd4}], 0x1, 0x1a, 0xf5) 1.302301734s ago: executing program 1 (id=2928): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3b9rM3UYAPDnkjQJOiSCkwge6OD0Yru6pEhfKGZSMqiDFtuCNEFooeAPjJ1cXRxdXZzc/Cdc/A8EV8HNgoWTy901SU1jUk2rvp/P0qd3z/O953u9Ujrck/eeH50cpnF88elP0W7Xo9aLXlwm0Y1aVD6POb0vAwD4L7vMsvg1K6xTl0REe3NtAQAbtPbf/+823hIAsGFvvvX267v9/t4badqOx6Mvzgf5f/b51+L87nF8EMM4ileiE1cR2bUifpxl2biR5rrx0mh8PsgrR+/+UK6/+0vEpH47OtGdHJqv3+/vbaeFmfpx3sdT5fV7ef1OdOLZBdff7+/tLKiPQTNefnGm/0fRiR/fjw9jGIeTJor6qEV8tp2mr2Vf/fbJO3l7eX0yPh+0JnlTWf2efzQAAAAAAAAAAAAAAAAAAAAAAPyPPSpn57RiMr8nP1TO36lf5d9sRVrpzs/nKeqTaqEb84HGWXxdzOfZiYg0zcrEaX0jnmtE42F2DQAAAAAAAAAAAAAAAAAAAP8uZx99fHIwHB6d/iNBNQ2geq3/ruv0Zo68EMuTW9Nr1cpwycpRr3KSiKVt5JtYueffy7EHd7t1z9zW87e9WHWdb/5672WwtULO3wyqp+vkIFl8D1vX+2pXD8n3sznNWPFazdtOZWs9fs2Fpzpr77359CQYL8mJZFljr/5c3LnySHJzF83JXV1YvlUGM+XzOe3Vn+f8N+VPEtM6AAAAAAAAAAAAAAAAAABgo6Yv/S44ebG0tJa1NtYWAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANyr6ef/rxGMy+IVkptxevbAWwQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAJ8EcAAAD//yeNYXk=") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)={&(0x7f0000002a40)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x20000900}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x1, &(0x7f0000006680)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x1, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x1, 0x8}, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) socket$inet(0x2, 0x1, 0x7) r3 = open(&(0x7f00000000c0)='./file1\x00', 0x66842, 0x21) pwritev2(r3, &(0x7f00000004c0)=[{&(0x7f0000000140)="a4", 0x1}], 0x1, 0xa001, 0x7f, 0x0) pwrite64(r2, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 1.277882966s ago: executing program 5 (id=2929): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000004c0)={'pimreg0\x00', {0x2, 0x0, @empty}}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, @perf_bp={&(0x7f0000000100), 0x5}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="3400000012000d1c26bd7000fbdbdf4aac1414bb0000e5ffffffffffff56c1f6ac1e90f8e0ff0000000004d60a0032000c0015005a07350000000000"], 0x34}}, 0x844) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timerfd_create(0x5, 0x80000) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000003c000000090a010400000000000000180100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000008740000000c0a95c900000000000000000100000008000440000000000900010073797a300000000038000380340000800400018004000680140007800c000100636f756e7465720004000280140001800c0001"], 0xe4}}, 0x0) 1.168458052s ago: executing program 5 (id=2930): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42901, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="034888a809003000030030000000"], 0xfdef) 1.156547823s ago: executing program 3 (id=2931): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000002c0)="a6", 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000380)='veno', 0x4) shutdown(r1, 0x1) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@newqdisc={0x15c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xa, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x12c, 0x2, {{0x3, 0x3, 0x6361, 0x7, 0xffffffff, 0x4}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x7}, @TCA_NETEM_LOSS={0xd0, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x3, 0x0, 0xfffffffa, 0x9}}, @NETEM_LOSS_GE={0x14, 0x2, {0xff, 0x4, 0x7, 0x6}}, @NETEM_LOSS_GI={0x18, 0x1, {0x8, 0x0, 0x8000, 0x0, 0xa}}, @NETEM_LOSS_GI={0x18, 0x1, {0xffffffff, 0xffffffff, 0x8, 0x7, 0xc}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x4, 0x80000000, 0x8, 0x100}}, @NETEM_LOSS_GE={0x14, 0x2, {0xfffffff7, 0x9, 0x1, 0x6}}, @NETEM_LOSS_GI={0x18, 0x1, {0x1000, 0xe, 0x8001, 0x4b7, 0x9}}, @NETEM_LOSS_GE={0x14, 0x2, {0xb1e, 0xec9f, 0xbcb, 0x7}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x8, 0x3, 0x0, 0x10001}}]}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0x100000001}, @TCA_NETEM_CORRUPT={0xc, 0x4, {0x3b35}}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0xb29d}, @TCA_NETEM_CORR={0x10, 0x1, {0x5, 0x5, 0x1e4}}]}}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x4000) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdc01, {0x0, 0x0, 0x0, r3, {0x0, 0x9}, {0xffff, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14}, {0x8, 0x2, 0x7}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044060}, 0x4010) r4 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r4, &(0x7f00000005c0)="bad330fbc9b55400040000ea0756", 0xe, 0x40, &(0x7f00000001c0)={0x11, 0x88a8, r3, 0x1, 0xd8, 0x6, @multicast}, 0x14) 1.008850541s ago: executing program 5 (id=2932): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000780)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x06\x00\x00\x00\x97A\xc2\xd8\xf0Uq!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19\xe5\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\x16\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xf1k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9k\x83\xfc\xa4\xad4\x03\xa2X\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xdfY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96?\x00\x00\x00\x00\x00\x00\x00\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKl\xcc\xa4:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcb\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93>m\xd7q\'\xdf\xfajo\xd8n\xa7\xecJi\xde\xdf\x7f\xe3\xc4*Z 4\xe8S$\xa1H=\xdf\x05\xf3\xc3T\xd1\xdd\xc6f\xa4\xb4\x96\\\xa0\xf9\x0f\x17\x11{\xb6\x9d\xd21\xc1\x90Vj\x13r\x00\x00\xde\x03\xab\xff\x8as0\xc6E\xca\"\xd9*\x9a\x15\xb95r\x8f\xaaj\x82\xd6\xd2%\xed\xa2WQ\xec2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xccX\xfdRB\xffU\xe9\xfa\x1f\xf6\xce\b\xde@\x061\xc6z\xe4\xe0\xc9?\xa7\x94>\x9c\xd1\xa5o\x04\xaaim\xae\xfe\xc7f\xa3\x96\xd7\xb4c)r{\r#\xddI&\n\xf2\xec\xd4\xff\x9f\x136zZ-2\x80\xfbH+\x9b8\xf3\xed\xdf\xa2my\xb28c[\xc3\xfe\xb5M\x84\x97\xa5\'s\xe9\xdc=)I\xabLt2\x9c\v\xd9S', 0x6) fallocate(r1, 0x0, 0x9, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000a, 0x12, r1, 0x0) read(r1, &(0x7f0000000080)=""/221, 0xdd) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10, 0x800000, @vifc_lcl_addr=@empty, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000005fdb"], 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x7}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x2) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x25, &(0x7f0000000d40)="01", 0x1) 928.283316ms ago: executing program 3 (id=2933): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000780)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x06\x00\x00\x00\x97A\xc2\xd8\xf0Uq!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19\xe5\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\x16\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xf1k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9k\x83\xfc\xa4\xad4\x03\xa2X\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xdfY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96?\x00\x00\x00\x00\x00\x00\x00\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKl\xcc\xa4:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcb\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93>m\xd7q\'\xdf\xfajo\xd8n\xa7\xecJi\xde\xdf\x7f\xe3\xc4*Z 4\xe8S$\xa1H=\xdf\x05\xf3\xc3T\xd1\xdd\xc6f\xa4\xb4\x96\\\xa0\xf9\x0f\x17\x11{\xb6\x9d\xd21\xc1\x90Vj\x13r\x00\x00\xde\x03\xab\xff\x8as0\xc6E\xca\"\xd9*\x9a\x15\xb95r\x8f\xaaj\x82\xd6\xd2%\xed\xa2WQ\xec2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xccX\xfdRB\xffU\xe9\xfa\x1f\xf6\xce\b\xde@\x061\xc6z\xe4\xe0\xc9?\xa7\x94>\x9c\xd1\xa5o\x04\xaaim\xae\xfe\xc7f\xa3\x96\xd7\xb4c)r{\r#\xddI&\n\xf2\xec\xd4\xff\x9f\x136zZ-2\x80\xfbH+\x9b8\xf3\xed\xdf\xa2my\xb28c[\xc3\xfe\xb5M\x84\x97\xa5\'s\xe9\xdc=)I\xabLt2\x9c\v\xd9S', 0x6) fallocate(r1, 0x0, 0x9, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000a, 0x12, r1, 0x0) read(r1, &(0x7f0000000080)=""/221, 0xdd) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10, 0x800000, @vifc_lcl_addr=@empty, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000005fdb"], 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x7}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x25, &(0x7f0000000d40)="01", 0x1) 926.670796ms ago: executing program 1 (id=2934): r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000780), 0xa2401, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xe7be8c183b220fb2}, 0x106200, 0x800, 0x2, 0x6, 0x9, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd75, 0x5, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c000000020601030000000000000000000000000900020073797a300000000005000100060000000500050000000000050004000000000014000780080011400000000005001500090000000d000300686173683a6d6163"], 0x5c}, 0x1, 0x0, 0x0, 0x4004090}, 0x24000010) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x72) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @local}], 0x10) write$cgroup_subtree(r0, &(0x7f00000003c0)={[{0x2b, 'cpuacct'}, {0x2d, 'blkio'}, {0x2b, 'rlimit'}, {0x2d, 'net'}, {0x2d, 'rlimit'}]}, 0x25) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x502, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8805}, 0x20000000) sendmsg$inet_sctp(r4, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000000)='N', 0x1}], 0x1, 0x0, 0x0, 0x2c04c048}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) link(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') sendmsg$inet_sctp(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="05", 0x1}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="30000000000000008400000001000000ff07000045"], 0x30, 0x24008084}, 0x0) 886.238358ms ago: executing program 5 (id=2935): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x880, 0x0) sendto$l2tp6(r1, &(0x7f00000000c0)="e92dfb20217b164c047a9b0ca3ebaee3689a90cd6ce8c11f9718b27cf5bd21cd71e30ca9bfe4fd574da846115a10d19faccecf9c3934bcedbf273087ff8b912ee1a435c34e7b5a1c35838756709c261593a7d0f0ee2697408611ea12879580c5b00c8c55996e6c7be3df4c71fe8541afe578ef012a44d0a4446df35644550ab63142278b", 0x84, 0x4000, &(0x7f0000000180)={0xa, 0x0, 0xe1b, @remote, 0x7, 0x2}, 0x20) r2 = socket(0x5, 0x4, 0x5) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18, r1}, 0x18) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, r3, 0xe3662000) syz_usb_connect(0x2, 0x37e, &(0x7f0000000240)={{0x12, 0x1, 0x310, 0x42, 0xec, 0xbf, 0x8, 0x46d, 0x8a2, 0x74e7, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x36c, 0x2, 0x6, 0x7f, 0x10, 0x70, [{{0x9, 0x4, 0x78, 0x0, 0xa, 0xc9, 0x94, 0x57, 0x71, [@generic={0x54, 0x2, "3467883565d132bed97155b697f8d902b9b0f521a00ec3e801b104e4561c9d2683bfd80a882d3db6006df94b6735099bf93f283dfa7e46aa9c62486b1d345c655b428f88d3125d1072027b9cf413422c7641"}], [{{0x9, 0x5, 0x5, 0x0, 0x40, 0x2, 0x3, 0xf}}, {{0x9, 0x5, 0x6, 0x3, 0x8, 0x4, 0x10, 0x5}}, {{0x9, 0x5, 0x1, 0x0, 0x20, 0x7, 0x7f, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xd, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x85, 0x2, 0x5}]}}, {{0x9, 0x5, 0x9, 0x0, 0x8, 0x2, 0x1, 0xff, [@generic={0x82, 0xa, "712eb58022ea5a849a00cd60e5ea1f36b32ddb645eb0e1250c93330fc8a2526e465ed3733a3be99bf46b89b120e8feb9c3499e6af48d05fdd8388a1d1e85f35a4104c9cf7edde3e68846b3f83f83c3e986caf76b403df91ac708ce98d9dd4ae2d01efea555a6c367b52c9468406ab2d2a85dfe9ebc618dc0278ab11786a5ab89"}]}}, {{0x9, 0x5, 0x3, 0x3, 0x10, 0x8, 0x1, 0x81}}, {{0x9, 0x5, 0x6, 0x1, 0x8, 0x0, 0x77, 0x7, [@generic={0x10, 0x30, "00211d2577862011a05be4fe5fde"}]}}, {{0x9, 0x5, 0xe, 0x0, 0x200, 0x81, 0x3a, 0x81}}, {{0x9, 0x5, 0x1, 0x2, 0x3ff, 0x80, 0x80, 0x14, [@generic={0x7, 0x25, '\\_e;E'}]}}, {{0x9, 0x5, 0xf, 0x0, 0x400, 0x51, 0x9, 0x14, [@generic={0xe6, 0x21, "7d8020b6b2ef79e58a958ee06df141de70e4a5f51b99b6556afd5cb5a5c39f0fcfeb352f628092efcd27a4a83b1fa9f8dd5be61673c934335d049d397625803248c67e8baf42a542805e47b956391654846df220c3a4e12cc7df7ebb20d9ed580fac519e6d7a18e60a801fb47360cefd7bf2b7abab87491d6182a361026d9d6ce5db35458a021645f11b1a44e0204027005ab52a1ecd33fbec6bac9dd0f43515436a8b67da33e54d9566aaeff7168e440fc6d3a8dc310eb1c9c27fcba828b97d23e4bfa3a9ae0e77f3eb20a5960a8cf71310a6c5165c36c1e1cb766c945d5b023dfadbca"}, @generic={0x48, 0x21, "7cc37fa577e4507a0e9f5f6cef4c626e24bbcb6714a30ac67ae6bc7e5875935a730374ce9a4be106a0d2262c1266f9ec904e164d71a4f46e976e07fdb43e7096f18e5f937a58"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x3ff, 0x9, 0xb6, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x0, 0x101}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xf, 0x81}]}}]}}, {{0x9, 0x4, 0xca, 0x0, 0x9, 0xff, 0xff, 0xff, 0x0, [@uac_as={[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0xe, 0x3, 0x3b, 0x7f}, @format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0x7, 0xb7e8, 0x4, "5bb6"}, @format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0xe, 0x4, 0xb, 0x9, "1e"}, @format_type_ii_discrete={0x12, 0x24, 0x2, 0x2, 0x7, 0x47, 0x1, "1a26af49b862c8dee4"}, @format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x80, 0x1, 0x4, 0x5, "9fd93a0c6d53"}]}, @hid_hid={0x9, 0x21, 0x2, 0x15, 0x1, {0x22, 0x424}}], [{{0x9, 0x5, 0x80, 0x3, 0x10, 0xff, 0xb, 0xb2}}, {{0x9, 0x5, 0xc, 0xc, 0x3f7, 0x4, 0x7, 0x2}}, {{0x9, 0x5, 0xe, 0x15, 0x10, 0x4, 0x10, 0x7}}, {{0x9, 0x5, 0x5, 0x3ab16b6571b0d756, 0x10, 0x3, 0x9, 0xb6, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x10, 0x9e}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x6, 0x7}]}}, {{0x9, 0x5, 0x0, 0x10, 0x40, 0x8, 0x1, 0xc8, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4, 0x2}, @uac_iso={0x7, 0x25, 0x1, 0x1cdc5fb991cc77a5, 0x0, 0x4}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x38, 0xc, 0x9}}, {{0x9, 0x5, 0xf, 0x4, 0x8, 0xf, 0x7, 0xf9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0xd}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x9, 0x66}]}}, {{0x9, 0x5, 0xc, 0x0, 0x200, 0x1, 0x40, 0x2}}, {{0x9, 0x5, 0x5, 0x0, 0x40, 0x2, 0x8, 0x8}}]}}]}}]}}, &(0x7f0000000940)={0xa, &(0x7f00000005c0)={0xa, 0x6, 0x200, 0x0, 0x9, 0x40, 0x8, 0x40}, 0x4b, &(0x7f0000000600)={0x5, 0xf, 0x4b, 0x4, [@ext_cap={0x7, 0x10, 0x2, 0x10, 0x6, 0xb, 0x400}, @ss_container_id={0x14, 0x10, 0x4, 0x8d, "706f973561e1729de5bd525a30ba4135"}, @ssp_cap={0x24, 0x10, 0xa, 0x0, 0x6, 0x7fffff6, 0xf00, 0x4, [0xc0c0, 0xc0c0, 0xff0030, 0x0, 0xff00, 0xff0000]}, @ext_cap={0x7, 0x10, 0x2, 0x8, 0x1, 0xe, 0xfff8}]}, 0x7, [{0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "58d242e0d25a44c2945ea4579e1093cde2e438318f6dca14c41394fd86750f8433459123274a827adcba4594658f5c3dfd377965f7f7591a7a2fde2204c9bdb0d29f88a14fa3ee2a5a432e76d5f9991fcc765fce894e727d4fba0b0ad7dbe8b041a228089b46e0446c428004bebc0dab514b604ae78d8f0bfd89372c848edb2d95529a6e688964d732133ccf5c5d0d3f276d948863ee5b3746faa2bf4808300e37a06071fae0f3ae73545354cc5bed672d7e00628643"}}, {0x4, &(0x7f0000000740)=@lang_id={0x4, 0x3, 0x455}}, {0x4, &(0x7f0000000780)=@lang_id={0x4, 0x3, 0x480a}}, {0x4, &(0x7f00000007c0)=@lang_id={0x4, 0x3, 0x180c}}, {0x4, &(0x7f0000000800)=@lang_id={0x4, 0x3, 0x340a}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x1801}}, {0xa5, &(0x7f0000000880)=@string={0xa5, 0x3, "c2fd2422b4201c130c180dc4087809fba2b9184c390b7b609f558a2e0c49491158a156e903fe807fa951fa25ab01794d26e08087aa4b30d725f02703dd7375413561bbfdbe39280cea66b1ad9e5221f0233a4444ad5d69a2fd6811a440d957e57b0d88691afb78f88420fff47d97c2d2ea0f6f90b5e2eed00f0c4298e41158576b2f06c2c64121994c5efce6cb7ada47c198ef36d29e7ec5597f7e018c89e7185220b8"}}]}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000009c0), 0x13f, 0x3}}, 0x20) read$nci(r1, &(0x7f0000000a40)=""/55, 0x37) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) syz_usb_connect$printer(0x5, 0x36, &(0x7f0000000a80)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x6, 0x60, 0xfd, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x7, 0x1, 0x2, 0x8, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0x10, 0x40, 0x7}}, [{{0x9, 0x5, 0x82, 0x2, 0x400, 0x9, 0x1, 0x3}}]}}}]}}]}}, &(0x7f0000000d00)={0xa, &(0x7f0000000ac0)={0xa, 0x6, 0x310, 0x1, 0xa, 0x2, 0x20, 0x5}, 0xa0, &(0x7f0000000b00)={0x5, 0xf, 0xa0, 0x5, [@generic={0x6b, 0x10, 0x1, "64242c6824fcf9142cdd2dc2b3b50b3ac013f0df9cdda7a5b6fbc3ce1756942405d17eee69b1e03eeddbbe1f654657d1c3567ca6c9830666a15de7854806771b2367a30121395981a6a6dcdd66b3348aa0143fefed3a2e8118bd0d241ee7b20d49a3c9c1376f0d1e"}, @wireless={0xb, 0x10, 0x1, 0x2, 0x8f, 0xf7, 0xb5, 0x7, 0x8}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x8, 0x4, 0x2}, @ss_container_id={0x14, 0x10, 0x4, 0x5, "e322a27f5893fbd33ba0cb15526230d9"}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x5, 0x0, 0x6}]}, 0x2, [{0x4, &(0x7f0000000bc0)=@lang_id={0x4, 0x3, 0x404}}, {0xe7, &(0x7f0000000c00)=@string={0xe7, 0x3, "3398949a2b7b44ac38769188bfe78e2cbe68b4abc2edcbfce111b54b9242a8ee8edab7ae7879b61e52142576463b0d5eb56cffe5e35fb03af3bc1053e8db17b7c18c507fa00e6c832b8dbbd3d062282003cdc2aff9ce2b6820e6a2daece1afe5509f437f6f9f4466987fb8fb2b6bb5156d9248a1059aac56d8d4fe9286ed48c3cfeb60084c5aa79faf8cb24955e025c08bf76da02eea30e15d7bab0e86e4c9a3adbc94f597d7c6d762140664b008636e5b97bb2bd5e17c5236db6a2ebc3c67156159fa128e2cb55f8dc1db2b39d55b4c70d87441d4236ad52a4a632ee59b2018de21e9f0a5"}}]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d40), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000dc0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000d80), 0x2, 0x8}}, 0x20) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000e00)={0x1, "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"}) r5 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000010c0)={'ip6tnl0\x00', &(0x7f0000001040)={'syztnl2\x00', 0x0, 0x8edd4bdbfb0f10, 0xf8, 0xa9, 0x2, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x7800, 0xd49, 0x4}}) setsockopt$MRT6_DEL_MIF(r5, 0x29, 0xcb, &(0x7f0000001100)={0x0, 0x0, 0x8, r6, 0x5}, 0xc) ioctl$HIDIOCGFIELDINFO(r1, 0xc038480a, &(0x7f0000001140)={0x2, 0x3, 0x4, 0x9, 0xff, 0x6ff, 0x6, 0x4, 0x8, 0x9, 0x6, 0x3, 0x1a26, 0x1}) socket(0x698129e38874ba8e, 0x5, 0xfffffffc) syz_open_dev$usbfs(&(0x7f0000001180), 0x101, 0x10600) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000001240)={'syztnl1\x00', &(0x7f00000011c0)={'ip6gre0\x00', r6, 0x2f, 0x44, 0x2, 0x1, 0x10, @dev={0xfe, 0x80, '\x00', 0x36}, @remote, 0x700, 0x20, 0x22, 0x2}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001340)={'gretap0\x00', &(0x7f0000001280)={'syztnl2\x00', r8, 0x10, 0x1, 0x23, 0x10001, {{0x1a, 0x4, 0x2, 0x28, 0x68, 0x66, 0x0, 0x0, 0x50, 0x0, @rand_addr=0x64010101, @multicast2, {[@generic={0x7, 0xe, "688f47bec997ceb1eb3ccba0"}, @lsrr={0x83, 0x1b, 0x8c, [@broadcast, @private=0xa010100, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x42}, @local]}, @lsrr={0x83, 0xf, 0x2a, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101, @multicast1]}, @lsrr={0x83, 0x13, 0x21, [@multicast2, @remote, @multicast2, @rand_addr=0x64010100]}, @generic={0x83, 0x3, 'x'}, @noop, @ra={0x94, 0x4, 0x1}, @noop]}}}}}) socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$nl_route_sched(r1, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f00000013c0)=@delqdisc={0xb8, 0x25, 0x20, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xc, 0x5}, {0xc, 0xa}, {0xffe0, 0x6}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1c4bb51e}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x1, 0x1, 0x40, 0x8, 0x0, 0x2, 0x6287, 0x2}}, {0x8, 0x2, [0x6, 0x9065]}}, {{0x1c, 0x1, {0x5, 0x3, 0xcc4, 0x4, 0x1, 0x100, 0x0, 0x3}}, {0xa, 0x2, [0x4, 0x1, 0x800]}}]}, @qdisc_kind_options=@q_fq={{0x7}, {0x2c, 0x2, [@TCA_FQ_CE_THRESHOLD={0x8, 0xc, 0x8001}, @TCA_FQ_INITIAL_QUANTUM={0x8, 0x4, 0x6}, @TCA_FQ_PLIMIT={0x8, 0x1, 0xfffffffe}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0x8}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0x1}]}}, @TCA_EGRESS_BLOCK={0x8}]}, 0xb8}}, 0x20040881) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_SCRNMAP(r9, 0x4b41, &(0x7f0000001500)="8cca8a53349d75f073da7897589a56c718f993c41ecb59429bd8299f6517f3dc182b5a1a1d93cee2570bfe4c316557a4a2ca71bf332811366c55f602f6d5a179d3cf799f436acbc2f85c765da11349f320bd21ab3fd87b4e39eb89f58e4c8ebce4e6929b1f17edd9ec1be584e7b954e1cfc3a1111e31b45e693aab59f6d337aa5174c58fd8c1d1b7152806700d56a3a6ca48d958e8f2a0fc923e26b09e1226fea0fe597b295741c6e195872c080f9e7e3d58328d0c5eded18d4fa918a6ff6c8cd9a3fdaca4f7814ecbd47b77e3971705644f") r10 = perf_event_open(&(0x7f0000001640)={0x2, 0x80, 0xff, 0xfe, 0x7, 0xa, 0x0, 0x5, 0x1400, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xc0a, 0x0, @perf_bp={&(0x7f0000001600), 0x7}, 0x100000, 0x9, 0x0, 0x7, 0x2, 0x6, 0x0, 0x0, 0x5, 0x0, 0x2338}, 0x0, 0xb, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r1) 770.751955ms ago: executing program 3 (id=2936): r0 = open(&(0x7f0000000480)='.\x00', 0x68800, 0x101) getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRES32], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008051) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f0000000840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0xb, 0x0, 0x0, 0x41100, 0xd}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) socket(0x10, 0x803, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x4d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xe723, 0x0, 0x2, 0x80000003, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r4, 0x0, 0x48040) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x240480e1) r5 = socket$inet6(0xa, 0x3, 0x5) sendmmsg(r5, &(0x7f0000001500), 0x0, 0xc040) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1f0519, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x9, 0x7}, 0xec25, 0x4085, 0xb, 0x4, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x5, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0xffff7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x7}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) 488.420702ms ago: executing program 2 (id=2937): socket$can_raw(0x1d, 0x3, 0x1) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x2d, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x10ca818605d678ab}, 0xbda356262e4385b7) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) io_uring_setup(0x177f, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum64={0x4, 0x0, 0x0, 0x13, 0x1, 0x1}]}}, &(0x7f0000002080)=""/4090, 0x26, 0xffa, 0x9, 0x0, 0x10000}, 0x28) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1c}}, 0x0) 272.018535ms ago: executing program 2 (id=2938): socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0x4d, 0x1, 0xff, 0x2, 0x8, 0x6b, 0x0, 0x3, 0xa3, 0x4, [0x2, 0xfffffffe, 0x86, 0x66, 0x5, 0x40800, 0x4, 0x8]}}) socket(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x14) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket$kcm(0x2, 0xa, 0x2) write$tun(r0, &(0x7f0000000480)={@void, @void, @eth={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @val, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x65, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010100, @broadcast}, {0x0, 0x17c1, 0x10, 0x0, @gue={{0x1, 0x0, 0x2, 0x8, 0x0, @void}, "7885e593"}}}}}}}, 0x3a) 188.803859ms ago: executing program 5 (id=2939): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x10, 0x0, 0x7fff7ffc}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)=ANY=[], 0x0) socket(0x80000000000000a, 0x2, 0x0) syz_io_uring_setup(0x5ce, &(0x7f0000000480)={0x0, 0x9cd6, 0x80, 0x0, 0x34f}, &(0x7f0000000000)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) 0s ago: executing program 2 (id=2940): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) write(r0, &(0x7f00000006c0)="2cd8", 0x2) r2 = getpid() bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x20, &(0x7f0000000240)={&(0x7f00000003c0)=""/221, 0xdd, 0x0, &(0x7f0000000700)=""/196, 0xc4}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180800000300000000001900feffbf10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={r4, 0x0, 0x30, 0x0, @void}, 0x10) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000005c0)='fd', 0x0, r6) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(0xffffffffffffffff, 0x0, 0x2) r8 = syz_clone(0x20100, 0x0, 0xff66, 0x0, 0x0, 0x0) setpgid(r2, r8) setpgid(0x0, r8) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) fchdir(r7) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') kernel console output (not intermixed with test programs): T10216] __x64_sys_read+0x40/0x50 [ 238.471504][T10216] x64_sys_call+0x2886/0x3020 [ 238.471543][T10216] do_syscall_64+0x12c/0x370 [ 238.471597][T10216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 238.471626][T10216] RIP: 0033:0x7f3cd70fc84e [ 238.471644][T10216] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 238.471665][T10216] RSP: 002b:00007f3cd5b96fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 238.471684][T10216] RAX: ffffffffffffffda RBX: 00007f3cd5b976c0 RCX: 00007f3cd70fc84e [ 238.471698][T10216] RDX: 000000000000000f RSI: 00007f3cd5b970a0 RDI: 0000000000000005 [ 238.471755][T10216] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 238.471770][T10216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.471785][T10216] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 238.471874][T10216] [ 238.680616][T10218] loop5: detected capacity change from 0 to 1024 [ 238.723289][T10218] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 238.754007][T10228] FAULT_INJECTION: forcing a failure. [ 238.754007][T10228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.788004][T10228] CPU: 0 UID: 0 PID: 10228 Comm: syz.1.2278 Not tainted syzkaller #0 PREEMPT(full) [ 238.788119][T10228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 238.788135][T10228] Call Trace: [ 238.788143][T10228] [ 238.788152][T10228] __dump_stack+0x1d/0x30 [ 238.788185][T10228] dump_stack_lvl+0x95/0xd0 [ 238.788207][T10228] dump_stack+0x15/0x1b [ 238.788227][T10228] should_fail_ex+0x263/0x280 [ 238.788323][T10228] should_fail+0xb/0x20 [ 238.788344][T10228] should_fail_usercopy+0x1a/0x20 [ 238.788434][T10228] _copy_to_user+0x20/0xa0 [ 238.788522][T10228] simple_read_from_buffer+0xb5/0x130 [ 238.788565][T10228] proc_fail_nth_read+0x10e/0x150 [ 238.788652][T10228] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 238.788679][T10228] vfs_read+0x1ab/0x7f0 [ 238.788714][T10228] ? __rcu_read_unlock+0x4e/0x70 [ 238.788739][T10228] ? __fget_files+0x184/0x1c0 [ 238.788844][T10228] ? mutex_lock+0x57/0x90 [ 238.788878][T10228] ksys_read+0xdc/0x1a0 [ 238.788952][T10228] __x64_sys_read+0x40/0x50 [ 238.788987][T10228] x64_sys_call+0x2886/0x3020 [ 238.789019][T10228] do_syscall_64+0x12c/0x370 [ 238.789068][T10228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 238.789097][T10228] RIP: 0033:0x7fdf5aebc84e [ 238.789117][T10228] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 238.789141][T10228] RSP: 002b:00007fdf5994efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 238.789246][T10228] RAX: ffffffffffffffda RBX: 00007fdf5994f6c0 RCX: 00007fdf5aebc84e [ 238.789265][T10228] RDX: 000000000000000f RSI: 00007fdf5994f0a0 RDI: 0000000000000004 [ 238.789281][T10228] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 238.789298][T10228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.789314][T10228] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 238.789378][T10228] [ 239.007897][ T8662] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 239.096685][ T28] audit: type=1400 audit(2000000033.420:1562): avc: denied { create } for pid=10247 comm="syz.0.2286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 239.131584][ T28] audit: type=1400 audit(2000000033.460:1563): avc: denied { append } for pid=10247 comm="syz.0.2286" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 239.166096][T10252] netlink: 'syz.5.2282': attribute type 1 has an invalid length. [ 239.177318][ T28] audit: type=1400 audit(2000000033.510:1564): avc: denied { read } for pid=10251 comm="syz.5.2282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 239.738506][T10269] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2292'. [ 239.769585][T10268] FAULT_INJECTION: forcing a failure. [ 239.769585][T10268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.783169][T10268] CPU: 0 UID: 0 PID: 10268 Comm: syz.0.2293 Not tainted syzkaller #0 PREEMPT(full) [ 239.783233][T10268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 239.783248][T10268] Call Trace: [ 239.783255][T10268] [ 239.783262][T10268] __dump_stack+0x1d/0x30 [ 239.783346][T10268] dump_stack_lvl+0x95/0xd0 [ 239.783368][T10268] dump_stack+0x15/0x1b [ 239.783433][T10268] should_fail_ex+0x263/0x280 [ 239.783465][T10268] should_fail+0xb/0x20 [ 239.783520][T10268] should_fail_usercopy+0x1a/0x20 [ 239.783559][T10268] _copy_to_user+0x20/0xa0 [ 239.783604][T10268] simple_read_from_buffer+0xb5/0x130 [ 239.783638][T10268] proc_fail_nth_read+0x10e/0x150 [ 239.783664][T10268] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 239.783750][T10268] vfs_read+0x1ab/0x7f0 [ 239.783783][T10268] ? __rcu_read_unlock+0x4e/0x70 [ 239.783807][T10268] ? __fget_files+0x184/0x1c0 [ 239.783884][T10268] ? mutex_lock+0x57/0x90 [ 239.783918][T10268] ksys_read+0xdc/0x1a0 [ 239.783965][T10268] __x64_sys_read+0x40/0x50 [ 239.784069][T10268] x64_sys_call+0x2886/0x3020 [ 239.784162][T10268] do_syscall_64+0x12c/0x370 [ 239.784206][T10268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 239.784233][T10268] RIP: 0033:0x7fc65e4cc84e [ 239.784253][T10268] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 239.784293][T10268] RSP: 002b:00007fc65cf5efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 239.784315][T10268] RAX: ffffffffffffffda RBX: 00007fc65cf5f6c0 RCX: 00007fc65e4cc84e [ 239.784329][T10268] RDX: 000000000000000f RSI: 00007fc65cf5f0a0 RDI: 0000000000000004 [ 239.784342][T10268] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 239.784358][T10268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.784374][T10268] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 239.784407][T10268] [ 240.427831][T10290] FAULT_INJECTION: forcing a failure. [ 240.427831][T10290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.535714][T10290] CPU: 1 UID: 0 PID: 10290 Comm: syz.0.2300 Not tainted syzkaller #0 PREEMPT(full) [ 240.535775][T10290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 240.535790][T10290] Call Trace: [ 240.535797][T10290] [ 240.535804][T10290] __dump_stack+0x1d/0x30 [ 240.535838][T10290] dump_stack_lvl+0x95/0xd0 [ 240.535867][T10290] dump_stack+0x15/0x1b [ 240.535936][T10290] should_fail_ex+0x263/0x280 [ 240.535968][T10290] should_fail+0xb/0x20 [ 240.536045][T10290] should_fail_usercopy+0x1a/0x20 [ 240.536071][T10290] _copy_to_user+0x20/0xa0 [ 240.536100][T10290] simple_read_from_buffer+0xb5/0x130 [ 240.536184][T10290] proc_fail_nth_read+0x10e/0x150 [ 240.536216][T10290] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 240.536247][T10290] vfs_read+0x1ab/0x7f0 [ 240.536283][T10290] ? __rcu_read_unlock+0x4e/0x70 [ 240.536304][T10290] ? __fget_files+0x184/0x1c0 [ 240.536332][T10290] ? mutex_lock+0x57/0x90 [ 240.536358][T10290] ksys_read+0xdc/0x1a0 [ 240.536397][T10290] __x64_sys_read+0x40/0x50 [ 240.536511][T10290] x64_sys_call+0x2886/0x3020 [ 240.536537][T10290] do_syscall_64+0x12c/0x370 [ 240.536577][T10290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 240.536669][T10290] RIP: 0033:0x7fc65e4cc84e [ 240.536689][T10290] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 240.536768][T10290] RSP: 002b:00007fc65cf5efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 240.536788][T10290] RAX: ffffffffffffffda RBX: 00007fc65cf5f6c0 RCX: 00007fc65e4cc84e [ 240.536802][T10290] RDX: 000000000000000f RSI: 00007fc65cf5f0a0 RDI: 0000000000000004 [ 240.536815][T10290] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 240.536891][T10290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.536906][T10290] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 240.537001][T10290] [ 240.841439][T10295] ip6_vti0 speed is unknown, defaulting to 1000 [ 240.935680][T10307] netlink: 'syz.3.2306': attribute type 4 has an invalid length. [ 240.981741][T10307] netlink: 'syz.3.2306': attribute type 4 has an invalid length. [ 241.164645][T10318] loop5: detected capacity change from 0 to 1024 [ 241.178354][T10323] 9p: Bad value for 'rfdno' [ 241.285007][T10318] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 241.319417][T10329] loop0: detected capacity change from 0 to 128 [ 241.367742][ T8662] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 242.465410][ T28] audit: type=1400 audit(2000000036.790:1565): avc: denied { bind } for pid=10351 comm="syz.2.2321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 242.612746][T10364] loop5: detected capacity change from 0 to 1024 [ 242.692321][T10364] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 243.670794][ T8662] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 243.776904][T10391] FAULT_INJECTION: forcing a failure. [ 243.776904][T10391] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.808811][T10391] CPU: 1 UID: 0 PID: 10391 Comm: syz.1.2335 Not tainted syzkaller #0 PREEMPT(full) [ 243.808867][T10391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 243.808889][T10391] Call Trace: [ 243.808896][T10391] [ 243.808904][T10391] __dump_stack+0x1d/0x30 [ 243.808961][T10391] dump_stack_lvl+0x95/0xd0 [ 243.808990][T10391] dump_stack+0x15/0x1b [ 243.809012][T10391] should_fail_ex+0x263/0x280 [ 243.809047][T10391] should_fail+0xb/0x20 [ 243.809074][T10391] should_fail_usercopy+0x1a/0x20 [ 243.809181][T10391] _copy_from_user+0x1c/0xb0 [ 243.809216][T10391] kstrtouint_from_user+0x69/0xf0 [ 243.809269][T10391] proc_fail_nth_write+0x50/0x160 [ 243.809373][T10391] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 243.809405][T10391] vfs_write+0x269/0x9f0 [ 243.809435][T10391] ? __rcu_read_unlock+0x4e/0x70 [ 243.809459][T10391] ? __fget_files+0x184/0x1c0 [ 243.809484][T10391] ? mutex_lock+0x57/0x90 [ 243.809567][T10391] ksys_write+0xdc/0x1a0 [ 243.809605][T10391] __x64_sys_write+0x40/0x50 [ 243.809641][T10391] x64_sys_call+0x27e1/0x3020 [ 243.810243][T10391] do_syscall_64+0x12c/0x370 [ 243.810281][T10391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 243.810319][T10391] RIP: 0033:0x7fdf5aebc84e [ 243.810416][T10391] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 243.810437][T10391] RSP: 002b:00007fdf5994efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.810511][T10391] RAX: ffffffffffffffda RBX: 00007fdf5994f6c0 RCX: 00007fdf5aebc84e [ 243.810533][T10391] RDX: 0000000000000001 RSI: 00007fdf5994f0a0 RDI: 0000000000000004 [ 243.810547][T10391] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 243.810562][T10391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.810610][T10391] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 243.810654][T10391] [ 244.260781][T10396] FAULT_INJECTION: forcing a failure. [ 244.260781][T10396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.274356][T10396] CPU: 0 UID: 0 PID: 10396 Comm: syz.1.2336 Not tainted syzkaller #0 PREEMPT(full) [ 244.274390][T10396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 244.274461][T10396] Call Trace: [ 244.274469][T10396] [ 244.274478][T10396] __dump_stack+0x1d/0x30 [ 244.274509][T10396] dump_stack_lvl+0x95/0xd0 [ 244.274537][T10396] dump_stack+0x15/0x1b [ 244.274564][T10396] should_fail_ex+0x263/0x280 [ 244.274625][T10396] should_fail+0xb/0x20 [ 244.274654][T10396] should_fail_usercopy+0x1a/0x20 [ 244.274757][T10396] _copy_to_user+0x20/0xa0 [ 244.274887][T10396] simple_read_from_buffer+0xb5/0x130 [ 244.274923][T10396] proc_fail_nth_read+0x10e/0x150 [ 244.274955][T10396] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 244.275020][T10396] vfs_read+0x1ab/0x7f0 [ 244.275139][T10396] ? __rcu_read_unlock+0x4e/0x70 [ 244.275161][T10396] ? __fget_files+0x184/0x1c0 [ 244.275181][T10396] ? mutex_lock+0x57/0x90 [ 244.275247][T10396] ksys_read+0xdc/0x1a0 [ 244.275318][T10396] __x64_sys_read+0x40/0x50 [ 244.275349][T10396] x64_sys_call+0x2886/0x3020 [ 244.275384][T10396] do_syscall_64+0x12c/0x370 [ 244.275428][T10396] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 244.275482][T10396] RIP: 0033:0x7fdf5aebc84e [ 244.275502][T10396] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 244.275524][T10396] RSP: 002b:00007fdf5992dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 244.275543][T10396] RAX: ffffffffffffffda RBX: 00007fdf5992e6c0 RCX: 00007fdf5aebc84e [ 244.275613][T10396] RDX: 000000000000000f RSI: 00007fdf5992e0a0 RDI: 0000000000000004 [ 244.275628][T10396] RBP: 00007fdf5992e090 R08: 0000000000000000 R09: 0000000000000000 [ 244.275644][T10396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.275657][T10396] R13: 00007fdf5b176128 R14: 00007fdf5b176090 R15: 00007fffadf0ec88 [ 244.275707][T10396] [ 244.549895][T10414] FAULT_INJECTION: forcing a failure. [ 244.549895][T10414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.563673][T10414] CPU: 0 UID: 0 PID: 10414 Comm: syz.1.2342 Not tainted syzkaller #0 PREEMPT(full) [ 244.563706][T10414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 244.563718][T10414] Call Trace: [ 244.563724][T10414] [ 244.563760][T10414] __dump_stack+0x1d/0x30 [ 244.563785][T10414] dump_stack_lvl+0x95/0xd0 [ 244.563817][T10414] dump_stack+0x15/0x1b [ 244.563838][T10414] should_fail_ex+0x263/0x280 [ 244.563869][T10414] should_fail+0xb/0x20 [ 244.563896][T10414] should_fail_usercopy+0x1a/0x20 [ 244.563984][T10414] _copy_from_user+0x1c/0xb0 [ 244.564022][T10414] __sys_bpf+0x183/0x7e0 [ 244.564072][T10414] __x64_sys_bpf+0x41/0x50 [ 244.564102][T10414] x64_sys_call+0x10cb/0x3020 [ 244.564149][T10414] do_syscall_64+0x12c/0x370 [ 244.564202][T10414] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 244.564224][T10414] RIP: 0033:0x7fdf5aefbf79 [ 244.564240][T10414] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 244.564275][T10414] RSP: 002b:00007fdf5994f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.564296][T10414] RAX: ffffffffffffffda RBX: 00007fdf5b175fa0 RCX: 00007fdf5aefbf79 [ 244.564310][T10414] RDX: 0000000000000004 RSI: 0000200000000100 RDI: 0000000000000022 [ 244.564323][T10414] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 244.564336][T10414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.564379][T10414] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 244.564581][T10414] [ 244.588743][T10409] syzkaller1: entered promiscuous mode [ 244.730969][T10409] syzkaller1: entered allmulticast mode [ 244.961779][ T28] audit: type=1400 audit(2000000039.290:1566): avc: denied { read write } for pid=10432 comm="syz.1.2352" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 244.985694][ T28] audit: type=1400 audit(2000000039.310:1567): avc: denied { open } for pid=10432 comm="syz.1.2352" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 245.252888][T10441] FAULT_INJECTION: forcing a failure. [ 245.252888][T10441] name failslab, interval 1, probability 0, space 0, times 0 [ 245.363652][T10441] CPU: 0 UID: 0 PID: 10441 Comm: syz.5.2354 Not tainted syzkaller #0 PREEMPT(full) [ 245.363682][T10441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 245.363698][T10441] Call Trace: [ 245.363710][T10441] [ 245.363719][T10441] __dump_stack+0x1d/0x30 [ 245.363863][T10441] dump_stack_lvl+0x95/0xd0 [ 245.363889][T10441] dump_stack+0x15/0x1b [ 245.363915][T10441] should_fail_ex+0x263/0x280 [ 245.363939][T10441] should_failslab+0x8c/0xb0 [ 245.364032][T10441] kmem_cache_alloc_noprof+0x66/0x400 [ 245.364065][T10441] ? dst_alloc+0xbd/0x100 [ 245.364092][T10441] dst_alloc+0xbd/0x100 [ 245.364190][T10441] ip_route_output_key_hash_rcu+0xf29/0x1380 [ 245.364242][T10441] ip_route_output_flow+0x65/0x110 [ 245.364284][T10441] ping_v4_sendmsg+0xb86/0xf70 [ 245.364388][T10441] ? __pfx_ping_v4_sendmsg+0x10/0x10 [ 245.364422][T10441] inet_sendmsg+0xc5/0xd0 [ 245.364451][T10441] ____sys_sendmsg+0x53a/0x600 [ 245.364511][T10441] ___sys_sendmsg+0x195/0x1e0 [ 245.364544][T10441] ? __schedule+0x85a/0xd40 [ 245.364648][T10441] __x64_sys_sendmsg+0xd4/0x160 [ 245.364727][T10441] x64_sys_call+0x194c/0x3020 [ 245.364755][T10441] do_syscall_64+0x12c/0x370 [ 245.364798][T10441] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 245.364877][T10441] RIP: 0033:0x7f1e6563bf79 [ 245.364892][T10441] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 245.364910][T10441] RSP: 002b:00007f1e6408f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.364936][T10441] RAX: ffffffffffffffda RBX: 00007f1e658b5fa0 RCX: 00007f1e6563bf79 [ 245.365020][T10441] RDX: 0000000010000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 245.365036][T10441] RBP: 00007f1e6408f090 R08: 0000000000000000 R09: 0000000000000000 [ 245.365073][T10441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.365085][T10441] R13: 00007f1e658b6038 R14: 00007f1e658b5fa0 R15: 00007fffb7b88f08 [ 245.365104][T10441] [ 245.647601][T10449] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2356'. [ 245.667257][T10449] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2356'. [ 245.701276][T10449] netlink: 180 bytes leftover after parsing attributes in process `syz.0.2356'. [ 245.729491][T10449] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2356'. [ 245.811391][T10454] FAULT_INJECTION: forcing a failure. [ 245.811391][T10454] name failslab, interval 1, probability 0, space 0, times 0 [ 245.857164][T10454] CPU: 1 UID: 0 PID: 10454 Comm: syz.3.2360 Not tainted syzkaller #0 PREEMPT(full) [ 245.857206][T10454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 245.857220][T10454] Call Trace: [ 245.857229][T10454] [ 245.857239][T10454] __dump_stack+0x1d/0x30 [ 245.857272][T10454] dump_stack_lvl+0x95/0xd0 [ 245.857368][T10454] dump_stack+0x15/0x1b [ 245.857392][T10454] should_fail_ex+0x263/0x280 [ 245.857415][T10454] should_failslab+0x8c/0xb0 [ 245.857446][T10454] kmem_cache_alloc_noprof+0x66/0x400 [ 245.857559][T10454] ? skb_clone+0x151/0x1f0 [ 245.857585][T10454] skb_clone+0x151/0x1f0 [ 245.857616][T10454] __netlink_deliver_tap+0x2c9/0x500 [ 245.857737][T10454] netlink_unicast+0x66b/0x690 [ 245.857802][T10454] netlink_sendmsg+0x5c8/0x6f0 [ 245.857841][T10454] ? __pfx_netlink_sendmsg+0x10/0x10 [ 245.857877][T10454] ____sys_sendmsg+0x5af/0x600 [ 245.857943][T10454] ___sys_sendmsg+0x195/0x1e0 [ 245.858053][T10454] __x64_sys_sendmsg+0xd4/0x160 [ 245.858083][T10454] x64_sys_call+0x194c/0x3020 [ 245.858113][T10454] do_syscall_64+0x12c/0x370 [ 245.858190][T10454] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 245.858218][T10454] RIP: 0033:0x7f3cd713bf79 [ 245.858238][T10454] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 245.858262][T10454] RSP: 002b:00007f3cd5b97028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.858315][T10454] RAX: ffffffffffffffda RBX: 00007f3cd73b5fa0 RCX: 00007f3cd713bf79 [ 245.858329][T10454] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 245.858363][T10454] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 245.858380][T10454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.858396][T10454] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 245.858415][T10454] [ 246.924576][T10474] netlink: 'syz.5.2367': attribute type 4 has an invalid length. [ 247.111484][T10477] 0: reclassify loop, rule prio 0, protocol 700 [ 247.359179][ T28] audit: type=1400 audit(2000000041.580:1568): avc: denied { write } for pid=10480 comm="syz.5.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 247.530195][T10485] lo speed is unknown, defaulting to 1000 [ 247.536062][T10485] lo speed is unknown, defaulting to 1000 [ 247.542211][T10485] lo speed is unknown, defaulting to 1000 [ 247.548375][T10485] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 247.556029][T10485] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 247.628928][ T28] audit: type=1400 audit(2000000041.580:1569): avc: denied { read } for pid=10480 comm="syz.5.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 247.651698][T10485] lo speed is unknown, defaulting to 1000 [ 247.658544][T10485] lo speed is unknown, defaulting to 1000 [ 247.665054][T10485] lo speed is unknown, defaulting to 1000 [ 247.671849][T10485] lo speed is unknown, defaulting to 1000 [ 247.678714][T10485] lo speed is unknown, defaulting to 1000 [ 247.685431][T10485] lo speed is unknown, defaulting to 1000 [ 247.946242][ T28] audit: type=1326 audit(2000000042.270:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10490 comm="syz.1.2373" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 248.036157][ T28] audit: type=1326 audit(2000000042.270:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10490 comm="syz.1.2373" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 248.060072][ T28] audit: type=1326 audit(2000000042.300:1572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10490 comm="syz.1.2373" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 248.083830][ T28] audit: type=1326 audit(2000000042.300:1573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10490 comm="syz.1.2373" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 248.120531][T10491] SELinux: Context system_u:object_r:v4l_device_t:s0 is not valid (left unmapped). [ 248.188505][T10497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 248.197142][ T28] audit: type=1326 audit(2000000042.300:1574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10490 comm="syz.1.2373" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 248.260223][T10497] loop5: detected capacity change from 0 to 1764 [ 248.280476][T10497] syzkaller1: entered promiscuous mode [ 248.286081][T10497] syzkaller1: entered allmulticast mode [ 248.300295][T10503] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2378'. [ 248.383995][T10507] FAULT_INJECTION: forcing a failure. [ 248.383995][T10507] name failslab, interval 1, probability 0, space 0, times 0 [ 248.413268][T10507] CPU: 0 UID: 0 PID: 10507 Comm: syz.1.2379 Not tainted syzkaller #0 PREEMPT(full) [ 248.413303][T10507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 248.413318][T10507] Call Trace: [ 248.413327][T10507] [ 248.413337][T10507] __dump_stack+0x1d/0x30 [ 248.413370][T10507] dump_stack_lvl+0x95/0xd0 [ 248.413454][T10507] dump_stack+0x15/0x1b [ 248.413476][T10507] should_fail_ex+0x263/0x280 [ 248.413572][T10507] should_failslab+0x8c/0xb0 [ 248.413610][T10507] kmem_cache_alloc_noprof+0x66/0x400 [ 248.413644][T10507] ? skb_clone+0x151/0x1f0 [ 248.413739][T10507] skb_clone+0x151/0x1f0 [ 248.413767][T10507] nfnetlink_rcv+0x316/0x1720 [ 248.413791][T10507] ? xas_load+0x413/0x430 [ 248.413821][T10507] ? xas_load+0x413/0x430 [ 248.413883][T10507] ? __rcu_read_unlock+0x4e/0x70 [ 248.413903][T10507] ? xa_load+0xb1/0xe0 [ 248.413938][T10507] ? obj_cgroup_charge_account+0x122/0x1a0 [ 248.414027][T10507] ? should_fail_ex+0x30/0x280 [ 248.414050][T10507] ? __rcu_read_unlock+0x4e/0x70 [ 248.414069][T10507] ? avc_has_perm_noaudit+0xab/0x130 [ 248.414113][T10507] netlink_unicast+0x5c0/0x690 [ 248.414140][T10507] netlink_sendmsg+0x5c8/0x6f0 [ 248.414182][T10507] ? __pfx_netlink_sendmsg+0x10/0x10 [ 248.414224][T10507] ____sys_sendmsg+0x5af/0x600 [ 248.414256][T10507] ___sys_sendmsg+0x195/0x1e0 [ 248.414296][T10507] __x64_sys_sendmsg+0xd4/0x160 [ 248.414328][T10507] x64_sys_call+0x194c/0x3020 [ 248.414375][T10507] do_syscall_64+0x12c/0x370 [ 248.414410][T10507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 248.414432][T10507] RIP: 0033:0x7fdf5aefbf79 [ 248.414498][T10507] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 248.414518][T10507] RSP: 002b:00007fdf5994f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 248.414539][T10507] RAX: ffffffffffffffda RBX: 00007fdf5b175fa0 RCX: 00007fdf5aefbf79 [ 248.414554][T10507] RDX: 0000000000000000 RSI: 0000200000009b40 RDI: 0000000000000003 [ 248.414600][T10507] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 248.414613][T10507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.414625][T10507] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 248.414676][T10507] [ 248.662809][T10510] FAULT_INJECTION: forcing a failure. [ 248.662809][T10510] name failslab, interval 1, probability 0, space 0, times 0 [ 248.697285][T10510] CPU: 0 UID: 0 PID: 10510 Comm: syz.1.2380 Not tainted syzkaller #0 PREEMPT(full) [ 248.697321][T10510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 248.697405][T10510] Call Trace: [ 248.697414][T10510] [ 248.697422][T10510] __dump_stack+0x1d/0x30 [ 248.697455][T10510] dump_stack_lvl+0x95/0xd0 [ 248.697484][T10510] dump_stack+0x15/0x1b [ 248.697511][T10510] should_fail_ex+0x263/0x280 [ 248.697578][T10510] ? ip_set_create+0x1ec/0x970 [ 248.697614][T10510] should_failslab+0x8c/0xb0 [ 248.697654][T10510] __kmalloc_cache_noprof+0x5f/0x410 [ 248.697684][T10510] ip_set_create+0x1ec/0x970 [ 248.697857][T10510] ? __nla_parse+0x40/0x60 [ 248.697898][T10510] nfnetlink_rcv_msg+0x509/0x5d0 [ 248.697948][T10510] netlink_rcv_skb+0x123/0x220 [ 248.698033][T10510] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 248.698078][T10510] nfnetlink_rcv+0x167/0x1720 [ 248.698105][T10510] ? xas_load+0x413/0x430 [ 248.698220][T10510] ? xas_load+0x413/0x430 [ 248.698257][T10510] ? __rcu_read_unlock+0x4e/0x70 [ 248.698282][T10510] ? xa_load+0xb1/0xe0 [ 248.698413][T10510] ? __account_obj_stock+0x211/0x350 [ 248.698506][T10510] ? obj_cgroup_charge_account+0x122/0x1a0 [ 248.698573][T10510] ? should_fail_ex+0x30/0x280 [ 248.698607][T10510] ? __rcu_read_unlock+0x4e/0x70 [ 248.698674][T10510] ? avc_has_perm_noaudit+0xab/0x130 [ 248.698699][T10510] ? _raw_spin_lock_bh+0x56/0xb0 [ 248.698722][T10510] ? _raw_spin_unlock_bh+0x18/0x20 [ 248.698750][T10510] ? selinux_nlmsg_lookup+0x99/0x890 [ 248.698783][T10510] ? __rcu_read_unlock+0x33/0x70 [ 248.698913][T10510] ? __netlink_lookup+0x276/0x2b0 [ 248.699005][T10510] netlink_unicast+0x5c0/0x690 [ 248.699038][T10510] netlink_sendmsg+0x5c8/0x6f0 [ 248.699074][T10510] ? __pfx_netlink_sendmsg+0x10/0x10 [ 248.699106][T10510] ____sys_sendmsg+0x5af/0x600 [ 248.699177][T10510] ___sys_sendmsg+0x195/0x1e0 [ 248.699273][T10510] __x64_sys_sendmsg+0xd4/0x160 [ 248.699309][T10510] x64_sys_call+0x194c/0x3020 [ 248.699391][T10510] do_syscall_64+0x12c/0x370 [ 248.699435][T10510] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 248.699538][T10510] RIP: 0033:0x7fdf5aefbf79 [ 248.699559][T10510] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 248.699642][T10510] RSP: 002b:00007fdf5994f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 248.699698][T10510] RAX: ffffffffffffffda RBX: 00007fdf5b175fa0 RCX: 00007fdf5aefbf79 [ 248.699717][T10510] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 248.699735][T10510] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 248.699748][T10510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.699760][T10510] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 248.699858][T10510] [ 249.314060][T10537] FAULT_INJECTION: forcing a failure. [ 249.314060][T10537] name failslab, interval 1, probability 0, space 0, times 0 [ 249.376851][T10537] CPU: 0 UID: 0 PID: 10537 Comm: syz.3.2388 Not tainted syzkaller #0 PREEMPT(full) [ 249.376939][T10537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 249.376954][T10537] Call Trace: [ 249.376962][T10537] [ 249.376971][T10537] __dump_stack+0x1d/0x30 [ 249.377005][T10537] dump_stack_lvl+0x95/0xd0 [ 249.377033][T10537] dump_stack+0x15/0x1b [ 249.377127][T10537] should_fail_ex+0x263/0x280 [ 249.377157][T10537] should_failslab+0x8c/0xb0 [ 249.377243][T10537] __kmalloc_noprof+0xb8/0x4e0 [ 249.377278][T10537] ? genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 249.377333][T10537] genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 249.377360][T10537] genl_family_rcv_msg_doit+0x4b/0x1f0 [ 249.377446][T10537] ? selinux_capable+0x31/0x40 [ 249.377476][T10537] ? security_capable+0x7b/0x90 [ 249.377500][T10537] ? ns_capable+0x7c/0xb0 [ 249.377543][T10537] genl_rcv_msg+0x432/0x470 [ 249.377626][T10537] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 249.377661][T10537] ? __pfx_nl802154_add_llsec_devkey+0x10/0x10 [ 249.377695][T10537] ? __pfx_nl802154_post_doit+0x10/0x10 [ 249.377733][T10537] netlink_rcv_skb+0x123/0x220 [ 249.377767][T10537] ? __pfx_genl_rcv_msg+0x10/0x10 [ 249.377816][T10537] genl_rcv+0x28/0x40 [ 249.377869][T10537] netlink_unicast+0x5c0/0x690 [ 249.377980][T10537] netlink_sendmsg+0x5c8/0x6f0 [ 249.378031][T10537] ? __pfx_netlink_sendmsg+0x10/0x10 [ 249.378058][T10537] ____sys_sendmsg+0x5af/0x600 [ 249.378133][T10537] ___sys_sendmsg+0x195/0x1e0 [ 249.378184][T10537] __x64_sys_sendmsg+0xd4/0x160 [ 249.378223][T10537] x64_sys_call+0x194c/0x3020 [ 249.378323][T10537] do_syscall_64+0x12c/0x370 [ 249.378356][T10537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 249.378380][T10537] RIP: 0033:0x7f3cd713bf79 [ 249.378453][T10537] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 249.378474][T10537] RSP: 002b:00007f3cd5b97028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 249.378492][T10537] RAX: ffffffffffffffda RBX: 00007f3cd73b5fa0 RCX: 00007f3cd713bf79 [ 249.378505][T10537] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000004 [ 249.378625][T10537] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 249.378639][T10537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.378655][T10537] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 249.378743][T10537] [ 249.647289][T10541] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2389'. [ 250.304181][T10553] FAULT_INJECTION: forcing a failure. [ 250.304181][T10553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 250.356089][T10553] CPU: 1 UID: 0 PID: 10553 Comm: syz.0.2393 Not tainted syzkaller #0 PREEMPT(full) [ 250.356168][T10553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 250.356180][T10553] Call Trace: [ 250.356186][T10553] [ 250.356193][T10553] __dump_stack+0x1d/0x30 [ 250.356223][T10553] dump_stack_lvl+0x95/0xd0 [ 250.356251][T10553] dump_stack+0x15/0x1b [ 250.356328][T10553] should_fail_ex+0x263/0x280 [ 250.356414][T10553] should_fail+0xb/0x20 [ 250.356499][T10553] should_fail_usercopy+0x1a/0x20 [ 250.356567][T10553] _copy_to_user+0x20/0xa0 [ 250.356598][T10553] simple_read_from_buffer+0xb5/0x130 [ 250.356714][T10553] proc_fail_nth_read+0x10e/0x150 [ 250.356741][T10553] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 250.356903][T10553] vfs_read+0x1ab/0x7f0 [ 250.356938][T10553] ? __rcu_read_unlock+0x4e/0x70 [ 250.356959][T10553] ? __fget_files+0x184/0x1c0 [ 250.356985][T10553] ? mutex_lock+0x57/0x90 [ 250.357047][T10553] ksys_read+0xdc/0x1a0 [ 250.357083][T10553] __x64_sys_read+0x40/0x50 [ 250.357187][T10553] x64_sys_call+0x2886/0x3020 [ 250.357223][T10553] do_syscall_64+0x12c/0x370 [ 250.357267][T10553] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 250.357355][T10553] RIP: 0033:0x7fc65e4cc84e [ 250.357376][T10553] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 250.357403][T10553] RSP: 002b:00007fc65cf5efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 250.357432][T10553] RAX: ffffffffffffffda RBX: 00007fc65cf5f6c0 RCX: 00007fc65e4cc84e [ 250.357450][T10553] RDX: 000000000000000f RSI: 00007fc65cf5f0a0 RDI: 0000000000000004 [ 250.357467][T10553] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 250.357483][T10553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.357499][T10553] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 250.357524][T10553] [ 250.676901][T10565] FAULT_INJECTION: forcing a failure. [ 250.676901][T10565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 250.704177][T10565] CPU: 0 UID: 0 PID: 10565 Comm: syz.1.2398 Not tainted syzkaller #0 PREEMPT(full) [ 250.704210][T10565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 250.704305][T10565] Call Trace: [ 250.704313][T10565] [ 250.704324][T10565] __dump_stack+0x1d/0x30 [ 250.704389][T10565] dump_stack_lvl+0x95/0xd0 [ 250.704416][T10565] dump_stack+0x15/0x1b [ 250.704518][T10565] should_fail_ex+0x263/0x280 [ 250.704599][T10565] should_fail+0xb/0x20 [ 250.704620][T10565] should_fail_usercopy+0x1a/0x20 [ 250.704649][T10565] _copy_to_user+0x20/0xa0 [ 250.704736][T10565] bpf_test_finish+0x1a2/0x510 [ 250.704773][T10565] bpf_prog_test_run_xdp+0x663/0xa10 [ 250.704832][T10565] ? __rcu_read_unlock+0x4e/0x70 [ 250.704861][T10565] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 250.704894][T10565] bpf_prog_test_run+0x204/0x340 [ 250.704919][T10565] __sys_bpf+0x52e/0x7e0 [ 250.705054][T10565] __x64_sys_bpf+0x41/0x50 [ 250.705082][T10565] x64_sys_call+0x10cb/0x3020 [ 250.705154][T10565] do_syscall_64+0x12c/0x370 [ 250.705256][T10565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 250.705278][T10565] RIP: 0033:0x7fdf5aefbf79 [ 250.705338][T10565] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 250.705361][T10565] RSP: 002b:00007fdf5994f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 250.705381][T10565] RAX: ffffffffffffffda RBX: 00007fdf5b175fa0 RCX: 00007fdf5aefbf79 [ 250.705396][T10565] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 250.705408][T10565] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 250.705419][T10565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.705467][T10565] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 250.705492][T10565] [ 250.994971][T10531] Process accounting resumed [ 251.018933][T10579] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2402'. [ 251.176025][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 251.176043][ T28] audit: type=1400 audit(2000000045.500:1717): avc: denied { accept } for pid=10585 comm="syz.3.2405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 251.226986][T10592] syzkaller1: entered promiscuous mode [ 251.232830][T10592] syzkaller1: entered allmulticast mode [ 251.243122][T10592] af_packet: tpacket_rcv: packet too big, clamped from 64989 to 3944. macoff=96 [ 251.365210][T10601] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2410'. [ 251.548373][T10613] FAULT_INJECTION: forcing a failure. [ 251.548373][T10613] name failslab, interval 1, probability 0, space 0, times 0 [ 251.585010][T10616] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2414'. [ 251.611197][T10613] CPU: 1 UID: 0 PID: 10613 Comm: syz.0.2412 Not tainted syzkaller #0 PREEMPT(full) [ 251.611232][T10613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 251.611245][T10613] Call Trace: [ 251.611253][T10613] [ 251.611261][T10613] __dump_stack+0x1d/0x30 [ 251.611290][T10613] dump_stack_lvl+0x95/0xd0 [ 251.611316][T10613] dump_stack+0x15/0x1b [ 251.611355][T10613] should_fail_ex+0x263/0x280 [ 251.611481][T10613] should_failslab+0x8c/0xb0 [ 251.611528][T10613] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 251.611566][T10613] ? __alloc_skb+0x2d6/0x690 [ 251.611600][T10613] __alloc_skb+0x2d6/0x690 [ 251.611623][T10613] ? __alloc_skb+0x200/0x690 [ 251.611646][T10613] netlink_ack+0xfd/0x500 [ 251.611677][T10613] netlink_rcv_skb+0x192/0x220 [ 251.611763][T10613] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 251.611799][T10613] nfnetlink_rcv+0x167/0x1720 [ 251.611826][T10613] ? xas_load+0x413/0x430 [ 251.611866][T10613] ? xas_load+0x413/0x430 [ 251.611902][T10613] ? __rcu_read_unlock+0x4e/0x70 [ 251.611977][T10613] ? xa_load+0xb1/0xe0 [ 251.612015][T10613] ? __account_obj_stock+0x211/0x350 [ 251.612056][T10613] ? obj_cgroup_charge_account+0x122/0x1a0 [ 251.612120][T10613] ? should_fail_ex+0x30/0x280 [ 251.612148][T10613] ? __rcu_read_unlock+0x4e/0x70 [ 251.612171][T10613] ? avc_has_perm_noaudit+0xab/0x130 [ 251.612212][T10613] ? _raw_spin_lock_bh+0x56/0xb0 [ 251.612243][T10613] ? _raw_spin_unlock_bh+0x18/0x20 [ 251.612271][T10613] ? selinux_nlmsg_lookup+0x99/0x890 [ 251.612381][T10613] ? __rcu_read_unlock+0x33/0x70 [ 251.612406][T10613] ? __netlink_lookup+0x276/0x2b0 [ 251.612448][T10613] netlink_unicast+0x5c0/0x690 [ 251.612535][T10613] netlink_sendmsg+0x5c8/0x6f0 [ 251.612567][T10613] ? __pfx_netlink_sendmsg+0x10/0x10 [ 251.612598][T10613] ____sys_sendmsg+0x5af/0x600 [ 251.612655][T10613] ___sys_sendmsg+0x195/0x1e0 [ 251.612699][T10613] __x64_sys_sendmsg+0xd4/0x160 [ 251.612793][T10613] x64_sys_call+0x194c/0x3020 [ 251.612827][T10613] do_syscall_64+0x12c/0x370 [ 251.612889][T10613] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 251.612917][T10613] RIP: 0033:0x7fc65e50bf79 [ 251.612936][T10613] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 251.612959][T10613] RSP: 002b:00007fc65cf5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 251.613002][T10613] RAX: ffffffffffffffda RBX: 00007fc65e785fa0 RCX: 00007fc65e50bf79 [ 251.613020][T10613] RDX: 0000000000000014 RSI: 0000200000000080 RDI: 0000000000000003 [ 251.613036][T10613] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 251.613179][T10613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 251.613195][T10613] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 251.613220][T10613] [ 252.279626][T10644] siw: device registration error -23 [ 252.563782][T10648] FAULT_INJECTION: forcing a failure. [ 252.563782][T10648] name failslab, interval 1, probability 0, space 0, times 0 [ 252.610181][T10648] CPU: 1 UID: 0 PID: 10648 Comm: syz.5.2425 Not tainted syzkaller #0 PREEMPT(full) [ 252.610208][T10648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 252.610258][T10648] Call Trace: [ 252.610283][T10648] [ 252.610294][T10648] __dump_stack+0x1d/0x30 [ 252.610325][T10648] dump_stack_lvl+0x95/0xd0 [ 252.610347][T10648] dump_stack+0x15/0x1b [ 252.610372][T10648] should_fail_ex+0x263/0x280 [ 252.610404][T10648] should_failslab+0x8c/0xb0 [ 252.610515][T10648] kmem_cache_alloc_noprof+0x66/0x400 [ 252.610589][T10648] ? skb_clone+0x151/0x1f0 [ 252.610697][T10648] skb_clone+0x151/0x1f0 [ 252.610731][T10648] __netlink_deliver_tap+0x2c9/0x500 [ 252.610764][T10648] netlink_unicast+0x66b/0x690 [ 252.610848][T10648] netlink_sendmsg+0x5c8/0x6f0 [ 252.610888][T10648] ? __pfx_netlink_sendmsg+0x10/0x10 [ 252.610919][T10648] ____sys_sendmsg+0x5af/0x600 [ 252.610948][T10648] ___sys_sendmsg+0x195/0x1e0 [ 252.611034][T10648] __x64_sys_sendmsg+0xd4/0x160 [ 252.611119][T10648] x64_sys_call+0x194c/0x3020 [ 252.611145][T10648] do_syscall_64+0x12c/0x370 [ 252.611255][T10648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 252.611280][T10648] RIP: 0033:0x7f1e6563bf79 [ 252.611300][T10648] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 252.611323][T10648] RSP: 002b:00007f1e6408f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 252.611349][T10648] RAX: ffffffffffffffda RBX: 00007f1e658b5fa0 RCX: 00007f1e6563bf79 [ 252.611367][T10648] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 252.611455][T10648] RBP: 00007f1e6408f090 R08: 0000000000000000 R09: 0000000000000000 [ 252.611467][T10648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.611479][T10648] R13: 00007f1e658b6038 R14: 00007f1e658b5fa0 R15: 00007fffb7b88f08 [ 252.611498][T10648] [ 252.840048][T10651] netlink: 'syz.0.2426': attribute type 5 has an invalid length. [ 252.849640][T10651] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2426'. [ 252.968282][ T28] audit: type=1400 audit(2000000047.290:1718): avc: denied { read write } for pid=10656 comm="syz.0.2428" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 253.017003][ T28] audit: type=1400 audit(2000000047.290:1719): avc: denied { open } for pid=10656 comm="syz.0.2428" path="/dev/ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 253.040800][ T28] audit: type=1400 audit(2000000047.330:1720): avc: denied { ioctl } for pid=10656 comm="syz.0.2428" path="/dev/ptp0" dev="devtmpfs" ino=247 ioctlcmd=0x3d0c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 253.464954][T10672] FAULT_INJECTION: forcing a failure. [ 253.464954][T10672] name failslab, interval 1, probability 0, space 0, times 0 [ 253.670072][T10672] CPU: 0 UID: 0 PID: 10672 Comm: syz.0.2435 Not tainted syzkaller #0 PREEMPT(full) [ 253.670155][T10672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 253.670207][T10672] Call Trace: [ 253.670215][T10672] [ 253.670225][T10672] __dump_stack+0x1d/0x30 [ 253.670257][T10672] dump_stack_lvl+0x95/0xd0 [ 253.670279][T10672] dump_stack+0x15/0x1b [ 253.670299][T10672] should_fail_ex+0x263/0x280 [ 253.670343][T10672] should_failslab+0x8c/0xb0 [ 253.670385][T10672] kmem_cache_alloc_noprof+0x66/0x400 [ 253.670428][T10672] ? skb_clone+0x151/0x1f0 [ 253.670474][T10672] skb_clone+0x151/0x1f0 [ 253.670588][T10672] nfnetlink_rcv+0x316/0x1720 [ 253.670609][T10672] ? __rcu_read_unlock+0x4e/0x70 [ 253.670635][T10672] ? __perf_event_task_sched_in+0xa65/0xad0 [ 253.670726][T10672] ? __perf_event_task_sched_out+0x192/0x710 [ 253.670770][T10672] ? _raw_spin_unlock+0x9/0x30 [ 253.670791][T10672] ? finish_task_switch+0x7d/0x280 [ 253.670824][T10672] ? preempt_schedule_irq+0x2d/0x50 [ 253.670908][T10672] ? raw_irqentry_exit_cond_resched+0x4b/0x60 [ 253.670930][T10672] ? _raw_spin_lock_bh+0x56/0xb0 [ 253.670979][T10672] ? _raw_spin_unlock_bh+0x18/0x20 [ 253.671007][T10672] netlink_unicast+0x5c0/0x690 [ 253.671038][T10672] netlink_sendmsg+0x5c8/0x6f0 [ 253.671144][T10672] ? __pfx_netlink_sendmsg+0x10/0x10 [ 253.671180][T10672] ____sys_sendmsg+0x5af/0x600 [ 253.671215][T10672] ___sys_sendmsg+0x195/0x1e0 [ 253.671292][T10672] __x64_sys_sendmsg+0xd4/0x160 [ 253.671360][T10672] x64_sys_call+0x194c/0x3020 [ 253.671386][T10672] do_syscall_64+0x12c/0x370 [ 253.671442][T10672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 253.671470][T10672] RIP: 0033:0x7fc65e50bf79 [ 253.671490][T10672] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.671586][T10672] RSP: 002b:00007fc65cf5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 253.671612][T10672] RAX: ffffffffffffffda RBX: 00007fc65e785fa0 RCX: 00007fc65e50bf79 [ 253.671629][T10672] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 253.671667][T10672] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 253.671752][T10672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.671767][T10672] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 253.671791][T10672] [ 254.092682][T10680] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10680 comm=syz.3.2440 [ 254.170925][T10686] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2440'. [ 254.228178][T10689] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2441'. [ 254.292872][T10689] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 254.300968][T10689] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 254.418868][T10686] ip6_vti0 speed is unknown, defaulting to 1000 [ 254.483328][T10686] lo speed is unknown, defaulting to 1000 [ 254.904215][T10619] Process accounting resumed [ 255.197899][T10712] loop5: detected capacity change from 0 to 512 [ 255.247449][T10712] EXT4-fs (loop5): revision level too high, forcing read-only mode [ 255.294337][T10712] EXT4-fs (loop5): orphan cleanup on readonly fs [ 255.308536][T10721] siw: device registration error -23 [ 255.468072][T10712] Quota error (device loop5): v2_read_file_info: Block with free entry 1 out of range (1, 6). [ 256.133461][T10712] EXT4-fs warning (device loop5): ext4_enable_quotas:7238: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 256.167680][T10712] EXT4-fs (loop5): Cannot turn on quotas: error -117 [ 256.318308][T10712] EXT4-fs error (device loop5): ext4_orphan_get:1391: inode #16: comm syz.5.2448: inode has both inline data and extents flags [ 256.367190][T10712] loop5: lost file I/O error report for ino 16 type 5 pos 0x0 len 0x0 error -117 [ 256.367464][T10712] EXT4-fs error (device loop5): ext4_orphan_get:1396: comm syz.5.2448: couldn't read orphan inode 16 (err -117) [ 256.388632][ C1] EXT4-fs (loop5): error count since last fsck: 1 [ 256.388658][ C1] EXT4-fs (loop5): initial error at time 2000000050: ext4_orphan_get:1391: inode 16 [ 256.388690][ C1] EXT4-fs (loop5): last error at time 2000000050: ext4_orphan_get:1391: inode 16 [ 256.436223][T10712] loop5: lost filesystem error report for type 5 error -117 [ 256.443495][T10712] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 256.543914][ T28] audit: type=1400 audit(2000000050.870:1721): avc: denied { accept } for pid=10729 comm="syz.2.2452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 256.751761][T10744] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10744 comm=syz.2.2458 [ 256.807972][T10745] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2458'. [ 257.040397][ T8662] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 257.249321][T10755] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2474'. [ 257.351211][T10764] netlink: 'syz.1.2465': attribute type 12 has an invalid length. [ 257.390469][T10761] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2462'. [ 257.403695][ T28] audit: type=1326 audit(2000000051.730:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 257.444333][ T28] audit: type=1326 audit(2000000051.730:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 257.468827][ T28] audit: type=1326 audit(2000000051.730:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 257.576280][ T28] audit: type=1326 audit(2000000051.730:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 257.623412][T10768] cgroup: noprefix used incorrectly [ 257.751761][T10768] loop5: detected capacity change from 0 to 736 [ 257.782796][T10768] iso9660: Unknown parameter '' [ 257.792487][ T28] audit: type=1326 audit(2000000051.730:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 257.876734][T10768] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2462'. [ 257.974069][T10768] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2462'. [ 257.996581][ T28] audit: type=1326 audit(2000000051.730:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 258.020263][ T28] audit: type=1326 audit(2000000051.730:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 258.043828][ T28] audit: type=1326 audit(2000000051.730:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 258.067371][ T28] audit: type=1326 audit(2000000051.730:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10758 comm="syz.5.2462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e6563bf79 code=0x7ffc0000 [ 258.109054][T10770] loop0: detected capacity change from 0 to 128 [ 258.141933][T10770] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 258.184390][T10770] ext4 filesystem being mounted at /480/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 258.299361][T10782] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2475'. [ 258.527017][T10750] Process accounting resumed [ 258.583064][ T3314] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 258.695645][T10796] netlink: 'syz.5.2479': attribute type 12 has an invalid length. [ 258.731330][T10799] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2481'. [ 259.102508][T10810] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2477'. [ 259.123711][T10792] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2477'. [ 259.920115][T10820] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2495'. [ 260.250371][T10823] cgroup: noprefix used incorrectly [ 260.269200][T10823] loop5: detected capacity change from 0 to 736 [ 260.360261][T10823] iso9660: Unknown parameter '' [ 260.730564][T10847] xt_hashlimit: size too large, truncated to 1048576 [ 260.764782][T10847] xt_hashlimit: max too large, truncated to 1048576 [ 261.293719][T10863] netlink: 'syz.1.2501': attribute type 1 has an invalid length. [ 261.619732][T10886] FAULT_INJECTION: forcing a failure. [ 261.619732][T10886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 261.637369][T10886] CPU: 0 UID: 0 PID: 10886 Comm: syz.3.2512 Not tainted syzkaller #0 PREEMPT(full) [ 261.637404][T10886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 261.637420][T10886] Call Trace: [ 261.637429][T10886] [ 261.637438][T10886] __dump_stack+0x1d/0x30 [ 261.637524][T10886] dump_stack_lvl+0x95/0xd0 [ 261.637549][T10886] dump_stack+0x15/0x1b [ 261.637573][T10886] should_fail_ex+0x263/0x280 [ 261.637600][T10886] should_fail_alloc_page+0xf2/0x100 [ 261.637649][T10886] __alloc_frozen_pages_noprof+0x108/0x360 [ 261.637684][T10886] alloc_pages_mpol+0xb3/0x260 [ 261.637715][T10886] ? _raw_spin_lock_irqsave+0x57/0xb0 [ 261.637807][T10886] alloc_pages_noprof+0x8f/0x130 [ 261.637844][T10886] get_free_pages_noprof+0xc/0x40 [ 261.637873][T10886] __pollwait+0xc2/0x240 [ 261.637917][T10886] ? __pfx___pollwait+0x10/0x10 [ 261.637957][T10886] pipe_poll+0x101/0x250 [ 261.637998][T10886] ? __pfx_pipe_poll+0x10/0x10 [ 261.638046][T10886] do_sys_poll+0x698/0xc10 [ 261.638087][T10886] ? __pfx___pollwait+0x10/0x10 [ 261.638128][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638153][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638209][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638234][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638258][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638372][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638394][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638416][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638438][T10886] ? __pfx_pollwake+0x10/0x10 [ 261.638459][T10886] ? timespec64_add_safe+0x106/0x150 [ 261.638550][T10886] __x64_sys_poll+0x12c/0x230 [ 261.638575][T10886] x64_sys_call+0x2891/0x3020 [ 261.638609][T10886] do_syscall_64+0x12c/0x370 [ 261.638720][T10886] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 261.638751][T10886] RIP: 0033:0x7f3cd713bf79 [ 261.638769][T10886] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 261.638790][T10886] RSP: 002b:00007f3cd5b97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 261.638812][T10886] RAX: ffffffffffffffda RBX: 00007f3cd73b5fa0 RCX: 00007f3cd713bf79 [ 261.638942][T10886] RDX: 0000000000000009 RSI: 20000000000000b5 RDI: 0000200000000000 [ 261.638959][T10886] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 261.638975][T10886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 261.638990][T10886] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 261.639016][T10886] [ 262.494498][T10899] ip6_vti0 speed is unknown, defaulting to 1000 [ 262.596120][T10899] lo speed is unknown, defaulting to 1000 [ 262.607450][T10920] xt_hashlimit: size too large, truncated to 1048576 [ 262.614179][T10920] xt_hashlimit: max too large, truncated to 1048576 [ 262.687552][ T28] kauditd_printk_skb: 249 callbacks suppressed [ 262.687569][ T28] audit: type=1326 audit(2000000057.020:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10919 comm="syz.0.2519" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc65e50bf79 code=0x0 [ 263.025242][T10950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.925975][T10950] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.939076][ T28] audit: type=1400 audit(2000000058.240:1981): avc: denied { getopt } for pid=10957 comm="syz.0.2529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 264.042894][T10950] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 264.097204][ T28] audit: type=1400 audit(2000000058.420:1982): avc: denied { checkpoint_restore } for pid=10963 comm="syz.5.2533" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 264.191212][ T28] audit: type=1326 audit(2000000058.420:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 264.258943][ T28] audit: type=1326 audit(2000000058.420:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 264.297437][T10978] netlink: 'syz.0.2538': attribute type 12 has an invalid length. [ 264.309224][ T28] audit: type=1326 audit(2000000058.420:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 264.406137][ T28] audit: type=1326 audit(2000000058.420:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 264.511624][ T28] audit: type=1326 audit(2000000058.420:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fd72787bce2 code=0x7ffc0000 [ 265.507126][ T28] audit: type=1326 audit(2000000058.450:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 265.530920][ T28] audit: type=1326 audit(2000000058.450:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10964 comm="syz.2.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fd72783c84e code=0x7ffc0000 [ 265.671097][T11005] loop0: detected capacity change from 0 to 128 [ 265.682239][T11000] __nla_validate_parse: 5 callbacks suppressed [ 265.682256][T11000] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2544'. [ 265.731107][T11000] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2544'. [ 265.811284][T11005] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 265.841124][T11005] ext4 filesystem being mounted at /489/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 265.858824][T11014] loop5: detected capacity change from 0 to 128 [ 265.867908][T11008] ip6_vti0 speed is unknown, defaulting to 1000 [ 265.892322][T11014] FAT-fs (loop5): invalid media value (0x00) [ 265.899037][T11014] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 265.909373][T11015] xt_NFQUEUE: number of total queues is 0 [ 265.945791][T11008] lo speed is unknown, defaulting to 1000 [ 265.970576][T11014] FAT-fs (loop5): Can't find a valid FAT filesystem [ 265.989486][T11018] netdevsim netdevsim1: Direct firmware load for ..€ failed with error -2 [ 266.015453][T11018] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pid=11018 comm=syz.1.2549 [ 266.042823][ T3314] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 266.054745][T11014] loop5: detected capacity change from 0 to 512 [ 266.070899][T11014] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 266.127979][T11014] EXT4-fs (loop5): 1 truncate cleaned up [ 266.134032][T11014] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 266.222685][ T8662] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 266.260028][T11027] netlink: 'syz.5.2552': attribute type 1 has an invalid length. [ 266.301545][T11027] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2552'. [ 266.313988][T11029] loop0: detected capacity change from 0 to 128 [ 266.345353][T11029] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 266.381290][T11029] ext4 filesystem being mounted at /491/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 266.439351][T11033] loop5: detected capacity change from 0 to 512 [ 266.499308][T11033] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x61000000 (sector = 1) [ 266.523627][T11029] xt_l2tp: missing protocol rule (udp|l2tpip) [ 266.549538][T11035] FAULT_INJECTION: forcing a failure. [ 266.549538][T11035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 266.605030][T11035] CPU: 0 UID: 0 PID: 11035 Comm: syz.3.2554 Not tainted syzkaller #0 PREEMPT(full) [ 266.605065][T11035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 266.605138][T11035] Call Trace: [ 266.605213][T11035] [ 266.605221][T11035] __dump_stack+0x1d/0x30 [ 266.605255][T11035] dump_stack_lvl+0x95/0xd0 [ 266.605309][T11035] dump_stack+0x15/0x1b [ 266.605335][T11035] should_fail_ex+0x263/0x280 [ 266.605368][T11035] should_fail_alloc_page+0xf2/0x100 [ 266.605409][T11035] __alloc_frozen_pages_noprof+0x108/0x360 [ 266.605456][T11035] alloc_pages_mpol+0xb3/0x260 [ 266.605486][T11035] vma_alloc_folio_noprof+0x1a9/0x300 [ 266.605523][T11035] do_wp_page+0xf62/0x2590 [ 266.605651][T11035] ? css_rstat_updated+0xbb/0x280 [ 266.605687][T11035] ? __rcu_read_lock+0x36/0x50 [ 266.605774][T11035] handle_mm_fault+0x8c7/0x3020 [ 266.605816][T11035] ? vma_start_read+0x1c7/0x2c0 [ 266.605905][T11035] do_user_addr_fault+0x62f/0x1050 [ 266.606017][T11035] ? ksys_mmap_pgoff+0xc1/0x310 [ 266.606045][T11035] ? fpregs_assert_state_consistent+0xb3/0xe0 [ 266.606084][T11035] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 266.606151][T11035] ? trace_page_fault_user+0x1f/0xe0 [ 266.606190][T11035] exc_page_fault+0x62/0xa0 [ 266.606225][T11035] asm_exc_page_fault+0x26/0x30 [ 266.606329][T11035] RIP: 0033:0x7f3cd6ff3898 [ 266.606345][T11035] Code: 85 ed 74 3b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 266.606435][T11035] RSP: 002b:00007f3cd5b96470 EFLAGS: 00010282 [ 266.606452][T11035] RAX: 000000000000c200 RBX: 00007f3cd5b96530 RCX: 0000000000000101 [ 266.606467][T11035] RDX: 0000000000000fff RSI: 0000000000004000 RDI: 00007f3cd5b965d0 [ 266.606484][T11035] RBP: 0000000000000102 R08: 00007f3ccd777000 R09: 00000000000000f8 [ 266.606511][T11035] R10: 00002000000012c2 R11: 00000000000011db R12: 0000000000003001 [ 266.606528][T11035] R13: 00007f3cd71f1ea0 R14: 000000000000001b R15: 00007f3cd5b965d0 [ 266.606553][T11035] [ 266.607379][T11035] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 267.204468][T11029] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 267.726626][T11063] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2563'. [ 267.746048][ T28] kauditd_printk_skb: 116 callbacks suppressed [ 267.746071][ T28] audit: type=1400 audit(2000000062.070:2106): avc: denied { accept } for pid=11061 comm="syz.5.2565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 267.867093][ T28] audit: type=1326 audit(2000000062.190:2107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 267.927793][T11060] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2563'. [ 267.957552][ T28] audit: type=1326 audit(2000000062.190:2108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.067371][ T28] audit: type=1326 audit(2000000062.210:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.117565][ T28] audit: type=1326 audit(2000000062.230:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.168507][T11093] 9p: Bad value for 'rfdno' [ 268.271546][ T28] audit: type=1326 audit(2000000062.230:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.295535][ T28] audit: type=1326 audit(2000000062.230:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11080 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f3cd70fc84e code=0x7ffc0000 [ 268.319622][ T28] audit: type=1326 audit(2000000062.230:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.343322][ T28] audit: type=1326 audit(2000000062.230:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.369684][T11097] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2564'. [ 268.399874][ T28] audit: type=1326 audit(2000000062.230:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11059 comm="syz.3.2563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 268.967213][T11119] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2576'. [ 269.041772][T11112] ip6_vti0 speed is unknown, defaulting to 1000 [ 269.048162][T11119] cgroup: noprefix used incorrectly [ 269.061605][T11119] loop5: detected capacity change from 0 to 736 [ 269.069432][T11119] iso9660: Unknown parameter '' [ 269.212334][T11119] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2576'. [ 269.258381][T11112] lo speed is unknown, defaulting to 1000 [ 269.412682][T11119] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2576'. [ 269.432466][T11128] netlink: 'syz.1.2580': attribute type 10 has an invalid length. [ 269.503261][T11128] 8021q: adding VLAN 0 to HW filter on device bond8 [ 269.611409][T11132] bond8: (slave macvlan2): Error -22 calling dev_set_mtu [ 269.639208][T11136] FAULT_INJECTION: forcing a failure. [ 269.639208][T11136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 269.674700][T11136] CPU: 1 UID: 0 PID: 11136 Comm: syz.3.2581 Not tainted syzkaller #0 PREEMPT(full) [ 269.674790][T11136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 269.674806][T11136] Call Trace: [ 269.674812][T11136] [ 269.674819][T11136] __dump_stack+0x1d/0x30 [ 269.674846][T11136] dump_stack_lvl+0x95/0xd0 [ 269.674874][T11136] dump_stack+0x15/0x1b [ 269.674908][T11136] should_fail_ex+0x263/0x280 [ 269.674940][T11136] should_fail_alloc_page+0xf2/0x100 [ 269.674982][T11136] __alloc_frozen_pages_noprof+0x108/0x360 [ 269.675065][T11136] alloc_pages_mpol+0xb3/0x260 [ 269.675095][T11136] ? css_rstat_updated+0xbb/0x280 [ 269.675146][T11136] vma_alloc_folio_noprof+0x1a9/0x300 [ 269.675196][T11136] handle_mm_fault+0x111f/0x3020 [ 269.675232][T11136] ? vma_start_read+0x1c7/0x2c0 [ 269.675257][T11136] do_user_addr_fault+0x62f/0x1050 [ 269.675309][T11136] ? ksys_mmap_pgoff+0xc1/0x310 [ 269.675338][T11136] ? fpregs_assert_state_consistent+0xb3/0xe0 [ 269.675451][T11136] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 269.675474][T11136] ? trace_page_fault_user+0x1f/0xe0 [ 269.675508][T11136] exc_page_fault+0x62/0xa0 [ 269.675650][T11136] asm_exc_page_fault+0x26/0x30 [ 269.675676][T11136] RIP: 0033:0x7f3cd6ff37e3 [ 269.675696][T11136] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 269.675720][T11136] RSP: 002b:00007f3cd5b96470 EFLAGS: 00010202 [ 269.675741][T11136] RAX: 0000000000003000 RBX: 00007f3cd5b96530 RCX: 00007f3ccd777000 [ 269.675854][T11136] RDX: 00007f3cd5b966d0 RSI: 0000000000000001 RDI: 00007f3cd5b965d0 [ 269.675872][T11136] RBP: 00000000000000d9 R08: 0000000000000007 R09: 0000000000000048 [ 269.675885][T11136] R10: 0000000000000050 R11: 00007f3cd5b96530 R12: 0000000000000001 [ 269.675897][T11136] R13: 00007f3cd71f1ea0 R14: 0000000000000002 R15: 00007f3cd5b965d0 [ 269.675917][T11136] [ 269.750995][T11136] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 269.835459][T11140] ip6_vti0 speed is unknown, defaulting to 1000 [ 269.995163][T11140] lo speed is unknown, defaulting to 1000 [ 270.012702][T11150] FAULT_INJECTION: forcing a failure. [ 270.012702][T11150] name failslab, interval 1, probability 0, space 0, times 0 [ 270.044377][T11150] CPU: 0 UID: 0 PID: 11150 Comm: syz.0.2586 Not tainted syzkaller #0 PREEMPT(full) [ 270.044410][T11150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 270.044479][T11150] Call Trace: [ 270.044487][T11150] [ 270.044495][T11150] __dump_stack+0x1d/0x30 [ 270.044527][T11150] dump_stack_lvl+0x95/0xd0 [ 270.044555][T11150] dump_stack+0x15/0x1b [ 270.044582][T11150] should_fail_ex+0x263/0x280 [ 270.044616][T11150] should_failslab+0x8c/0xb0 [ 270.044656][T11150] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 270.044690][T11150] ? __alloc_skb+0x2d6/0x690 [ 270.044718][T11150] __alloc_skb+0x2d6/0x690 [ 270.044830][T11150] ? __alloc_skb+0x200/0x690 [ 270.044852][T11150] netlink_ack+0xfd/0x500 [ 270.044954][T11150] netlink_rcv_skb+0x192/0x220 [ 270.044986][T11150] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 270.045023][T11150] nfnetlink_rcv+0x167/0x1720 [ 270.045050][T11150] ? xas_load+0x413/0x430 [ 270.045224][T11150] ? xas_load+0x413/0x430 [ 270.045256][T11150] ? __rcu_read_unlock+0x4e/0x70 [ 270.045276][T11150] ? xa_load+0xb1/0xe0 [ 270.045342][T11150] ? __account_obj_stock+0x211/0x350 [ 270.045380][T11150] ? raw_irqentry_exit_cond_resched+0x3d/0x60 [ 270.045404][T11150] ? irqentry_exit+0x91/0x520 [ 270.045441][T11150] ? should_fail_ex+0x30/0x280 [ 270.045471][T11150] ? __rcu_read_unlock+0x4e/0x70 [ 270.045495][T11150] ? avc_has_perm_noaudit+0xab/0x130 [ 270.045522][T11150] ? _raw_spin_lock_bh+0x56/0xb0 [ 270.045551][T11150] ? _raw_spin_unlock_bh+0x18/0x20 [ 270.045572][T11150] ? selinux_nlmsg_lookup+0x99/0x890 [ 270.045683][T11150] ? __rcu_read_unlock+0x33/0x70 [ 270.045708][T11150] ? __netlink_lookup+0x276/0x2b0 [ 270.045747][T11150] netlink_unicast+0x5c0/0x690 [ 270.045861][T11150] netlink_sendmsg+0x5c8/0x6f0 [ 270.045897][T11150] ? __pfx_netlink_sendmsg+0x10/0x10 [ 270.045934][T11150] ____sys_sendmsg+0x5af/0x600 [ 270.046049][T11150] ___sys_sendmsg+0x195/0x1e0 [ 270.046096][T11150] __x64_sys_sendmsg+0xd4/0x160 [ 270.046132][T11150] x64_sys_call+0x194c/0x3020 [ 270.046307][T11150] do_syscall_64+0x12c/0x370 [ 270.046350][T11150] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.046431][T11150] RIP: 0033:0x7fc65e50bf79 [ 270.046448][T11150] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 270.046467][T11150] RSP: 002b:00007fc65cf5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 270.046496][T11150] RAX: ffffffffffffffda RBX: 00007fc65e785fa0 RCX: 00007fc65e50bf79 [ 270.046514][T11150] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 270.046531][T11150] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 270.046548][T11150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.046563][T11150] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 270.046589][T11150] [ 270.368771][T11154] 9p: Bad value for 'rfdno' [ 270.463745][T11160] netlink: 'syz.0.2591': attribute type 12 has an invalid length. [ 270.487728][T11162] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2592'. [ 271.822627][T11192] __nla_validate_parse: 1 callbacks suppressed [ 271.822648][T11192] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2602'. [ 271.905757][T11197] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2604'. [ 271.915672][T11197] FAULT_INJECTION: forcing a failure. [ 271.915672][T11197] name failslab, interval 1, probability 0, space 0, times 0 [ 271.956481][T11197] CPU: 0 UID: 0 PID: 11197 Comm: syz.3.2604 Not tainted syzkaller #0 PREEMPT(full) [ 271.956515][T11197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 271.956580][T11197] Call Trace: [ 271.956589][T11197] [ 271.956598][T11197] __dump_stack+0x1d/0x30 [ 271.956637][T11197] dump_stack_lvl+0x95/0xd0 [ 271.956667][T11197] dump_stack+0x15/0x1b [ 271.956694][T11197] should_fail_ex+0x263/0x280 [ 271.956744][T11197] ? __hw_addr_add_ex+0x15b/0x3b0 [ 271.956766][T11197] should_failslab+0x8c/0xb0 [ 271.956933][T11197] __kmalloc_cache_noprof+0x5f/0x410 [ 271.957017][T11197] __hw_addr_add_ex+0x15b/0x3b0 [ 271.957041][T11197] ? __pfx_vlan_setup+0x10/0x10 [ 271.957062][T11197] dev_addr_init+0xb1/0x120 [ 271.957106][T11197] alloc_netdev_mqs+0x1ca/0xa40 [ 271.957143][T11197] rtnl_create_link+0x239/0x720 [ 271.957214][T11197] rtnl_newlink_create+0x174/0x650 [ 271.957310][T11197] ? security_capable+0x7b/0x90 [ 271.957337][T11197] ? netlink_ns_capable+0x86/0xa0 [ 271.957359][T11197] rtnl_newlink+0x10a0/0x1330 [ 271.957399][T11197] ? __memcg_slab_free_hook+0x154/0x250 [ 271.957484][T11197] ? __rcu_read_unlock+0x4e/0x70 [ 271.957510][T11197] ? avc_has_perm_noaudit+0xab/0x130 [ 271.957540][T11197] ? cred_has_capability+0x224/0x2a0 [ 271.957582][T11197] ? selinux_capable+0x31/0x40 [ 271.957616][T11197] ? security_capable+0x7b/0x90 [ 271.957636][T11197] ? ns_capable+0x7c/0xb0 [ 271.957677][T11197] ? __pfx_rtnl_newlink+0x10/0x10 [ 271.957714][T11197] rtnetlink_rcv_msg+0x64b/0x720 [ 271.957785][T11197] netlink_rcv_skb+0x123/0x220 [ 271.957813][T11197] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 271.957918][T11197] rtnetlink_rcv+0x1c/0x30 [ 271.957955][T11197] netlink_unicast+0x5c0/0x690 [ 271.957987][T11197] netlink_sendmsg+0x5c8/0x6f0 [ 271.958026][T11197] ? __pfx_netlink_sendmsg+0x10/0x10 [ 271.958077][T11197] ____sys_sendmsg+0x5af/0x600 [ 271.958112][T11197] ___sys_sendmsg+0x195/0x1e0 [ 271.958218][T11197] __x64_sys_sendmsg+0xd4/0x160 [ 271.958252][T11197] x64_sys_call+0x194c/0x3020 [ 271.958283][T11197] do_syscall_64+0x12c/0x370 [ 271.958386][T11197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 271.958409][T11197] RIP: 0033:0x7f3cd713bf79 [ 271.958482][T11197] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 271.958516][T11197] RSP: 002b:00007f3cd5b97028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 271.958537][T11197] RAX: ffffffffffffffda RBX: 00007f3cd73b5fa0 RCX: 00007f3cd713bf79 [ 271.958551][T11197] RDX: 0000000004000804 RSI: 0000200000000280 RDI: 0000000000000003 [ 271.958635][T11197] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 271.958691][T11197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 271.958704][T11197] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 271.958725][T11197] [ 272.293621][T11199] syzkaller1: entered promiscuous mode [ 272.299571][T11199] syzkaller1: entered allmulticast mode [ 272.429385][T11216] netlink: 16098 bytes leftover after parsing attributes in process `syz.1.2607'. [ 273.013730][T11232] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2615'. [ 273.286175][T11249] syzkaller0: entered promiscuous mode [ 273.291856][T11249] syzkaller0: entered allmulticast mode [ 273.345594][T11258] syzkaller1: entered promiscuous mode [ 273.351358][T11258] syzkaller1: entered allmulticast mode [ 273.391892][T11262] loop5: detected capacity change from 0 to 512 [ 273.421883][T11262] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x61000000 (sector = 1) [ 273.491836][T11269] loop5: detected capacity change from 0 to 1024 [ 273.529337][T11272] netlink: 'syz.1.2629': attribute type 1 has an invalid length. [ 273.540618][T11269] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 273.564044][T11272] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2629'. [ 273.573079][T11272] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2629'. [ 273.678186][ T8662] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 274.101337][T11293] ip6_vti0 speed is unknown, defaulting to 1000 [ 274.375224][T11293] lo speed is unknown, defaulting to 1000 [ 274.599532][T11318] netlink: 83992 bytes leftover after parsing attributes in process `syz.0.2641'. [ 274.599612][T11318] netlink: zone id is out of range [ 274.599620][T11318] netlink: zone id is out of range [ 274.600448][T11318] netlink: zone id is out of range [ 274.600457][T11318] netlink: zone id is out of range [ 274.600537][T11318] netlink: zone id is out of range [ 274.600545][T11318] netlink: zone id is out of range [ 274.600553][T11318] netlink: zone id is out of range [ 274.600630][T11318] netlink: zone id is out of range [ 274.600637][T11318] netlink: zone id is out of range [ 274.600644][T11318] netlink: zone id is out of range [ 274.889222][ T28] kauditd_printk_skb: 152 callbacks suppressed [ 274.889240][ T28] audit: type=1326 audit(2000000069.220:2268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 274.945262][ T28] audit: type=1326 audit(2000000069.250:2269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 275.017125][ T28] audit: type=1326 audit(2000000069.250:2270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 275.119861][ T28] audit: type=1326 audit(2000000069.250:2271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 275.143646][ T28] audit: type=1326 audit(2000000069.250:2272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf5aefbf79 code=0x7ffc0000 [ 275.167925][ T28] audit: type=1326 audit(2000000069.250:2273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fdf5aefbce2 code=0x7ffc0000 [ 275.191826][ T28] audit: type=1326 audit(2000000069.250:2274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fdf5aebc84e code=0x7ffc0000 [ 275.227161][ T28] audit: type=1326 audit(2000000069.250:2275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fdf5aefbda7 code=0x7ffc0000 [ 275.458917][T11354] loop5: detected capacity change from 0 to 512 [ 275.556191][T11354] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 275.694271][ T28] audit: type=1326 audit(2000000069.250:2276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf5aebc84e code=0x7ffc0000 [ 275.725836][ T28] audit: type=1326 audit(2000000069.250:2277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11336 comm="syz.1.2651" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fdf5aebc84e code=0x7ffc0000 [ 276.003017][T11369] loop5: detected capacity change from 0 to 128 [ 276.027474][T11369] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 276.047303][T11369] ext4 filesystem being mounted at /205/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 276.208357][ T8662] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 277.567348][T11414] netlink: 'syz.5.2679': attribute type 12 has an invalid length. [ 277.662154][T11412] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2677'. [ 277.773853][T11412] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2677'. [ 277.808900][T11412] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2677'. [ 277.954804][T11431] loop0: detected capacity change from 0 to 1764 [ 278.131847][T11440] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2690'. [ 278.173854][T11441] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2691'. [ 278.912157][T11431] loop0: detected capacity change from 0 to 32768 [ 279.364380][T11474] loop0: detected capacity change from 0 to 2048 [ 279.371029][T11475] ip6_vti0 speed is unknown, defaulting to 1000 [ 279.491691][T11474] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 279.509180][T11475] lo speed is unknown, defaulting to 1000 [ 280.586703][ T28] kauditd_printk_skb: 152 callbacks suppressed [ 280.586720][ T28] audit: type=1400 audit(2000000074.910:2430): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 280.619917][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 280.732461][ T28] audit: type=1400 audit(2000000075.060:2431): avc: denied { bind } for pid=11491 comm="syz.5.2709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 280.757259][ T28] audit: type=1400 audit(2000000075.090:2432): avc: denied { sys_module } for pid=11491 comm="syz.5.2709" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 280.813665][ T28] audit: type=1400 audit(2000000075.110:2433): avc: denied { write } for pid=11498 comm="syz.0.2708" name="vsock" dev="devtmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 280.859374][T11495] ip6_vti0 speed is unknown, defaulting to 1000 [ 280.882040][T11509] FAULT_INJECTION: forcing a failure. [ 280.882040][T11509] name failslab, interval 1, probability 0, space 0, times 0 [ 280.906795][ T28] audit: type=1400 audit(2000000075.110:2434): avc: denied { open } for pid=11498 comm="syz.0.2708" path="/dev/vsock" dev="devtmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 280.943540][T11509] CPU: 0 UID: 0 PID: 11509 Comm: syz.3.2714 Not tainted syzkaller #0 PREEMPT(full) [ 280.943568][T11509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 280.943582][T11509] Call Trace: [ 280.943642][T11509] [ 280.943652][T11509] __dump_stack+0x1d/0x30 [ 280.943682][T11509] dump_stack_lvl+0x95/0xd0 [ 280.943745][T11509] dump_stack+0x15/0x1b [ 280.943774][T11509] should_fail_ex+0x263/0x280 [ 280.943806][T11509] ? __request_module+0x1c4/0x3f0 [ 280.943883][T11509] should_failslab+0x8c/0xb0 [ 280.943915][T11509] ? tcf_proto_lookup_ops+0x1be/0x220 [ 280.943946][T11509] __kmalloc_cache_noprof+0x5f/0x410 [ 280.943967][T11509] ? tcf_proto_lookup_ops+0x1be/0x220 [ 280.944080][T11509] __request_module+0x1c4/0x3f0 [ 280.944108][T11509] tcf_proto_lookup_ops+0x1be/0x220 [ 280.944143][T11509] tcf_proto_is_unlocked+0x30/0xa0 [ 280.944229][T11509] tc_del_tfilter+0x39b/0xb60 [ 280.944304][T11509] ? ns_capable+0x7c/0xb0 [ 280.944344][T11509] ? __pfx_tc_del_tfilter+0x10/0x10 [ 280.944374][T11509] rtnetlink_rcv_msg+0x64b/0x720 [ 280.944450][T11509] netlink_rcv_skb+0x123/0x220 [ 280.944483][T11509] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 280.944531][T11509] rtnetlink_rcv+0x1c/0x30 [ 280.944629][T11509] netlink_unicast+0x5c0/0x690 [ 280.944670][T11509] netlink_sendmsg+0x5c8/0x6f0 [ 280.944784][T11509] ? __pfx_netlink_sendmsg+0x10/0x10 [ 280.944879][T11509] ____sys_sendmsg+0x5af/0x600 [ 280.944974][T11509] ___sys_sendmsg+0x195/0x1e0 [ 280.945024][T11509] __x64_sys_sendmsg+0xd4/0x160 [ 280.945078][T11509] x64_sys_call+0x194c/0x3020 [ 280.945104][T11509] do_syscall_64+0x12c/0x370 [ 280.945142][T11509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.945175][T11509] RIP: 0033:0x7f3cd713bf79 [ 280.945195][T11509] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 280.945270][T11509] RSP: 002b:00007f3cd5b97028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.945296][T11509] RAX: ffffffffffffffda RBX: 00007f3cd73b5fa0 RCX: 00007f3cd713bf79 [ 280.945313][T11509] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 280.945327][T11509] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 280.945340][T11509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.945356][T11509] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 280.945388][T11509] [ 280.988502][ T28] audit: type=1400 audit(2000000075.200:2435): avc: denied { setopt } for pid=11506 comm="syz.1.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 281.227765][T11495] lo speed is unknown, defaulting to 1000 [ 281.323918][T11523] syzkaller0: entered promiscuous mode [ 281.347345][T11523] syzkaller0: entered allmulticast mode [ 281.388327][ T28] audit: type=1400 audit(2000000075.200:2436): avc: denied { write } for pid=11506 comm="syz.1.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 281.434987][ T28] audit: type=1400 audit(2000000075.210:2437): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 281.501211][ T28] audit: type=1400 audit(2000000075.220:2438): avc: denied { search } for pid=3040 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 281.598177][T11549] ip6_vti0 speed is unknown, defaulting to 1000 [ 281.637111][ T28] audit: type=1400 audit(2000000075.220:2439): avc: denied { search } for pid=3040 comm="dhcpcd" name="udev" dev="tmpfs" ino=9 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 281.904363][T11577] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2728'. [ 281.937457][T11577] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2728'. [ 281.950814][T11549] lo speed is unknown, defaulting to 1000 [ 281.951786][T11577] bond0: ARP target 8.4.0.0 is already present [ 281.974141][T11577] bond0: option arp_ip_target: invalid value (1032) [ 282.112956][T11582] : port 1(gretap0) entered blocking state [ 282.119113][T11580] loop0: detected capacity change from 0 to 8192 [ 282.135524][T11582] : port 1(gretap0) entered disabled state [ 282.150934][T11582] gretap0: entered allmulticast mode [ 282.177610][ T3307] loop0: p1 p2 p3 p4 [ 282.184670][ T3307] loop0: p3 start 117772289 is beyond EOD, truncated [ 282.191974][ T3307] loop0: p4 size 262144 extends beyond EOD, truncated [ 282.204764][T11580] loop0: p1 p2 p3 p4 [ 282.223534][T11580] loop0: p3 start 117772289 is beyond EOD, truncated [ 282.241723][T11580] loop0: p4 size 262144 extends beyond EOD, truncated [ 282.349779][T11582] gretap0: entered promiscuous mode [ 282.355101][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 282.359710][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 282.376352][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 282.389468][T11586] FAULT_INJECTION: forcing a failure. [ 282.389468][T11586] name failslab, interval 1, probability 0, space 0, times 0 [ 282.399384][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 282.413461][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 282.413826][ T3307] udevd[3307]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 282.442697][T11586] CPU: 0 UID: 0 PID: 11586 Comm: syz.0.2731 Not tainted syzkaller #0 PREEMPT(full) [ 282.442732][T11586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 282.442749][T11586] Call Trace: [ 282.442756][T11586] [ 282.442763][T11586] __dump_stack+0x1d/0x30 [ 282.442790][T11586] dump_stack_lvl+0x95/0xd0 [ 282.442817][T11586] dump_stack+0x15/0x1b [ 282.442838][T11586] should_fail_ex+0x263/0x280 [ 282.442864][T11586] should_failslab+0x8c/0xb0 [ 282.442937][T11586] __kmalloc_noprof+0xb8/0x4e0 [ 282.443044][T11586] ? io_cache_alloc_new+0x2a/0xb0 [ 282.443073][T11586] io_cache_alloc_new+0x2a/0xb0 [ 282.443098][T11586] io_sqe_buffer_register+0xf2/0x14d0 [ 282.443124][T11586] ? _parse_integer_limit+0x170/0x190 [ 282.443215][T11586] ? _parse_integer+0x27/0x40 [ 282.443239][T11586] ? kstrtoull+0x111/0x140 [ 282.443259][T11586] ? iovec_from_user+0x179/0x200 [ 282.443288][T11586] __io_register_rsrc_update+0x31b/0xac0 [ 282.443335][T11586] ? get_pid_task+0x96/0xd0 [ 282.443367][T11586] ? should_fail_ex+0xd9/0x280 [ 282.443424][T11586] io_register_rsrc_update+0x12f/0x140 [ 282.443460][T11586] __se_sys_io_uring_register+0xbe2/0x12d0 [ 282.443551][T11586] ? mutex_unlock+0x4e/0x90 [ 282.443604][T11586] ? fput+0x8f/0xc0 [ 282.443630][T11586] ? ksys_write+0x194/0x1a0 [ 282.443668][T11586] __x64_sys_io_uring_register+0x55/0x70 [ 282.443709][T11586] x64_sys_call+0x2be0/0x3020 [ 282.443754][T11586] do_syscall_64+0x12c/0x370 [ 282.443853][T11586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.443943][T11586] RIP: 0033:0x7fc65e50bf79 [ 282.444007][T11586] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.444071][T11586] RSP: 002b:00007fc65cf5f028 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 282.444091][T11586] RAX: ffffffffffffffda RBX: 00007fc65e785fa0 RCX: 00007fc65e50bf79 [ 282.444105][T11586] RDX: 00002000000003c0 RSI: 0000000000000010 RDI: 0000000000000003 [ 282.444117][T11586] RBP: 00007fc65cf5f090 R08: 0000000000000000 R09: 0000000000000000 [ 282.444129][T11586] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000001 [ 282.444144][T11586] R13: 00007fc65e786038 R14: 00007fc65e785fa0 R15: 00007ffe4a73c608 [ 282.444188][T11586] [ 282.761024][T11594] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 282.773351][T11594] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 283.030167][T11611] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2742'. [ 283.073123][T11611] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2742'. [ 283.079465][T11616] netlink: 292 bytes leftover after parsing attributes in process `syz.2.2743'. [ 283.093004][T11611] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2742'. [ 283.477262][T11641] 9pnet_fd: Insufficient options for proto=fd [ 283.509348][T11643] FAULT_INJECTION: forcing a failure. [ 283.509348][T11643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.522882][T11643] CPU: 1 UID: 0 PID: 11643 Comm: syz.1.2755 Not tainted syzkaller #0 PREEMPT(full) [ 283.522911][T11643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 283.522954][T11643] Call Trace: [ 283.522963][T11643] [ 283.522972][T11643] __dump_stack+0x1d/0x30 [ 283.523005][T11643] dump_stack_lvl+0x95/0xd0 [ 283.523037][T11643] dump_stack+0x15/0x1b [ 283.523074][T11643] should_fail_ex+0x263/0x280 [ 283.523105][T11643] should_fail+0xb/0x20 [ 283.523133][T11643] should_fail_usercopy+0x1a/0x20 [ 283.523182][T11643] _copy_to_user+0x20/0xa0 [ 283.523219][T11643] simple_read_from_buffer+0xb5/0x130 [ 283.523281][T11643] proc_fail_nth_read+0x10e/0x150 [ 283.523371][T11643] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 283.523400][T11643] vfs_read+0x1ab/0x7f0 [ 283.523436][T11643] ? __rcu_read_unlock+0x4e/0x70 [ 283.523458][T11643] ? __fget_files+0x184/0x1c0 [ 283.523496][T11643] ? mutex_lock+0x57/0x90 [ 283.523524][T11643] ksys_read+0xdc/0x1a0 [ 283.523555][T11643] __x64_sys_read+0x40/0x50 [ 283.523667][T11643] x64_sys_call+0x2886/0x3020 [ 283.523701][T11643] do_syscall_64+0x12c/0x370 [ 283.523819][T11643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.523845][T11643] RIP: 0033:0x7fdf5aebc84e [ 283.523860][T11643] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 283.523881][T11643] RSP: 002b:00007fdf5994efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 283.523974][T11643] RAX: ffffffffffffffda RBX: 00007fdf5994f6c0 RCX: 00007fdf5aebc84e [ 283.524019][T11643] RDX: 000000000000000f RSI: 00007fdf5994f0a0 RDI: 0000000000000004 [ 283.524035][T11643] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 283.524052][T11643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.524147][T11643] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 283.524173][T11643] [ 283.761318][T11645] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2756'. [ 283.776370][T11645] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2756'. [ 283.785773][T11645] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2756'. [ 284.066327][T11665] ip6_vti0 speed is unknown, defaulting to 1000 [ 284.097388][T11667] loop5: detected capacity change from 0 to 512 [ 284.131230][T11665] lo speed is unknown, defaulting to 1000 [ 284.137912][T11667] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x61000000 (sector = 1) [ 284.189752][T11668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11668 comm=syz.2.2763 [ 284.239063][T11673] loop0: detected capacity change from 0 to 512 [ 284.247382][T11673] EXT4-fs: inline encryption not supported [ 284.260292][T11673] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 284.282269][T11675] C: renamed from team_slave_0 (while UP) [ 284.294373][T11673] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 284.305516][T11675] netlink: 'syz.5.2767': attribute type 3 has an invalid length. [ 284.315066][T11675] netlink: 148 bytes leftover after parsing attributes in process `syz.5.2767'. [ 284.324819][T11675] net_ratelimit: 315 callbacks suppressed [ 284.324834][T11675] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 284.356768][T11673] EXT4-fs (loop0): orphan cleanup on readonly fs [ 284.367929][T11673] EXT4-fs error (device loop0): ext4_mb_mark_diskspace_used:4224: comm syz.0.2766: Allocating blocks 41-42 which overlap fs metadata [ 284.382772][T11673] loop0: lost filesystem error report for type 5 error -117 [ 284.382985][T11673] EXT4-fs (loop0): Remounting filesystem read-only [ 284.390326][ C0] EXT4-fs (loop0): error count since last fsck: 1 [ 284.390373][ C0] EXT4-fs (loop0): initial error at time 2000000078: ext4_mb_mark_diskspace_used:4224 [ 284.390407][ C0] EXT4-fs (loop0): last error at time 2000000078: ext4_mb_mark_diskspace_used:4224 [ 284.430806][T11680] xt_cluster: you have exceeded the maximum number of cluster nodes (3131 > 32) [ 284.478566][T11684] loop5: detected capacity change from 0 to 256 [ 284.486593][T11673] EXT4-fs (loop0): 1 truncate cleaned up [ 284.493491][T11684] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 284.511536][T11673] EXT4-fs (loop0): pa ffff888107adf380: logic 1, phys. 41, len 23 [ 284.532868][T11673] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 284.546850][T11684] FAT-fs (loop5): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 284.560365][T11673] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 284.667132][T11686] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2772'. [ 284.702025][T11688] loop0: detected capacity change from 0 to 8192 [ 284.713621][T11686] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2772'. [ 284.713993][T11688] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 284.750852][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.773959][T11688] FAT-fs (loop0): Filesystem has been set read-only [ 284.781410][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.795888][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.805042][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.814103][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.823345][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.867567][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 284.874441][T11691] loop5: detected capacity change from 0 to 2048 [ 284.906104][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 285.027641][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 285.036946][T11688] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 285.037901][T11691] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 285.089406][T11698] siw: device registration error -23 [ 285.095011][T11698] smc: removing ib device syz2 [ 285.611042][T11691] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm syz.5.2774: bg 0: block 234: padding at end of block bitmap is not set [ 285.625878][T11691] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2048 with error 28 [ 285.638609][T11691] EXT4-fs (loop5): This should not happen!! Data will be lost [ 285.638609][T11691] [ 285.648769][T11691] EXT4-fs (loop5): Total free blocks count 0 [ 285.654898][T11691] EXT4-fs (loop5): Free/Dirty block details [ 285.661549][T11691] EXT4-fs (loop5): free_blocks=0 [ 285.666608][T11691] EXT4-fs (loop5): dirty_blocks=8192 [ 285.672293][T11691] EXT4-fs (loop5): Block reservation details [ 285.678501][T11691] EXT4-fs (loop5): i_reserved_data_blocks=512 [ 285.716871][ T4972] EXT4-fs (loop5): Delayed block allocation failed for inode 18 at logical offset 2050 with max blocks 2048 with error 28 [ 285.783971][T11703] lo speed is unknown, defaulting to 1000 [ 285.817112][T11703] lo speed is unknown, defaulting to 1000 [ 285.823107][T11703] lo speed is unknown, defaulting to 1000 [ 285.856566][ T28] kauditd_printk_skb: 136 callbacks suppressed [ 285.856586][ T28] audit: type=1400 audit(2000000080.180:2574): avc: denied { unlink } for pid=3315 comm="syz-executor" name="file0" dev="tmpfs" ino=2694 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 285.898334][T11703] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 285.927606][T11703] lo speed is unknown, defaulting to 1000 [ 285.933866][T11703] lo speed is unknown, defaulting to 1000 [ 285.960243][T11711] loop5: detected capacity change from 0 to 512 [ 285.973856][T11712] netlink: 'syz.0.2779': attribute type 10 has an invalid length. [ 285.995909][T11703] lo speed is unknown, defaulting to 1000 [ 286.002926][T11703] lo speed is unknown, defaulting to 1000 [ 286.009278][T11703] lo speed is unknown, defaulting to 1000 [ 286.015475][T11703] lo speed is unknown, defaulting to 1000 [ 286.024458][T11715] netlink: 'syz.0.2779': attribute type 10 has an invalid length. [ 286.040106][T11712] team0: Port device netdevsim1 added [ 286.063732][T11715] team0: Port device netdevsim1 removed [ 286.082390][T11715] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 286.168903][ T28] audit: type=1400 audit(2000000080.450:2575): avc: denied { map } for pid=11717 comm="syz.5.2782" path="socket:[40816]" dev="sockfs" ino=40816 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 286.230994][ T28] audit: type=1400 audit(2000000080.450:2576): avc: denied { read } for pid=11717 comm="syz.5.2782" path="socket:[40816]" dev="sockfs" ino=40816 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 286.258765][ T28] audit: type=1400 audit(2000000080.480:2577): avc: denied { ioctl } for pid=11722 comm="syz.3.2784" path="socket:[41394]" dev="sockfs" ino=41394 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 286.287841][ T28] audit: type=1400 audit(2000000080.530:2578): avc: denied { read } for pid=11722 comm="syz.3.2784" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 286.310939][ T28] audit: type=1400 audit(2000000080.530:2579): avc: denied { open } for pid=11722 comm="syz.3.2784" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 286.334578][ T28] audit: type=1400 audit(2000000080.530:2580): avc: denied { ioctl } for pid=11722 comm="syz.3.2784" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 286.370677][ T28] audit: type=1326 audit(2000000080.550:2581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11722 comm="syz.3.2784" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 286.413115][ T28] audit: type=1400 audit(2000000080.560:2582): avc: denied { bind } for pid=11717 comm="syz.5.2782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 286.433049][ T28] audit: type=1326 audit(2000000080.560:2583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11722 comm="syz.3.2784" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cd713bf79 code=0x7ffc0000 [ 286.652948][T11753] syzkaller0: entered promiscuous mode [ 286.673009][T11753] syzkaller0: entered allmulticast mode [ 286.741619][T11774] batadv_slave_1: entered promiscuous mode [ 286.778351][T11777] syzkaller1: entered promiscuous mode [ 286.783940][T11777] syzkaller1: entered allmulticast mode [ 286.886695][T11791] netlink: 'syz.3.2807': attribute type 6 has an invalid length. [ 286.900967][T11791] netlink: 'syz.3.2807': attribute type 6 has an invalid length. [ 287.250020][T11830] syzkaller0: entered promiscuous mode [ 287.255696][T11830] syzkaller0: entered allmulticast mode [ 287.263512][T11830] FAULT_INJECTION: forcing a failure. [ 287.263512][T11830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.276919][T11830] CPU: 1 UID: 0 PID: 11830 Comm: syz.1.2823 Not tainted syzkaller #0 PREEMPT(full) [ 287.276949][T11830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 287.276966][T11830] Call Trace: [ 287.276974][T11830] [ 287.276984][T11830] __dump_stack+0x1d/0x30 [ 287.277017][T11830] dump_stack_lvl+0x95/0xd0 [ 287.277091][T11830] dump_stack+0x15/0x1b [ 287.277117][T11830] should_fail_ex+0x263/0x280 [ 287.277147][T11830] should_fail+0xb/0x20 [ 287.277173][T11830] should_fail_usercopy+0x1a/0x20 [ 287.277207][T11830] _copy_from_iter+0xcf/0xea0 [ 287.277261][T11830] ? __rcu_read_unlock+0x4e/0x70 [ 287.277347][T11830] packet_sendmsg+0x2046/0x3370 [ 287.277377][T11830] ? avc_has_perm+0x101/0x190 [ 287.277404][T11830] ? selinux_socket_sendmsg+0x192/0x1c0 [ 287.277444][T11830] ? __pfx_packet_sendmsg+0x10/0x10 [ 287.277538][T11830] __sys_sendto+0x470/0x4d0 [ 287.277570][T11830] __x64_sys_sendto+0x76/0x90 [ 287.277604][T11830] x64_sys_call+0x2d35/0x3020 [ 287.277638][T11830] do_syscall_64+0x12c/0x370 [ 287.277731][T11830] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.277760][T11830] RIP: 0033:0x7fdf5aefbf79 [ 287.277781][T11830] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 287.277818][T11830] RSP: 002b:00007fdf5994f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 287.277855][T11830] RAX: ffffffffffffffda RBX: 00007fdf5b175fa0 RCX: 00007fdf5aefbf79 [ 287.277868][T11830] RDX: 000000000000fce0 RSI: 00002000000002c0 RDI: 0000000000000003 [ 287.277881][T11830] RBP: 00007fdf5994f090 R08: 0000200000000140 R09: 0000000000000014 [ 287.277965][T11830] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 287.277979][T11830] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 287.278001][T11830] [ 287.582664][T11838] syzkaller0: entered promiscuous mode [ 287.588472][T11838] syzkaller0: entered allmulticast mode [ 287.815692][T11852] loop5: detected capacity change from 0 to 128 [ 287.847270][T11852] workqueue: Failed to create a rescuer kthread for wq "ext4-rsv-conversion": -EINTR [ 287.847378][T11852] EXT4-fs: failed to create workqueue [ 287.862021][T11859] xt_CT: You must specify a L4 protocol and not use inversions on it [ 287.881279][T11852] EXT4-fs (loop5): mount failed [ 287.917501][T11864] netlink: 'syz.5.2836': attribute type 12 has an invalid length. [ 288.016005][T11872] lo speed is unknown, defaulting to 1000 [ 288.034037][T11872] lo speed is unknown, defaulting to 1000 [ 288.144387][T11885] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 288.153679][T11885] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 288.205000][T11891] xt_cluster: you have exceeded the maximum number of cluster nodes (3131 > 32) [ 288.289722][T11895] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 288.294204][T11891] loop5: detected capacity change from 0 to 256 [ 288.297075][T11895] IPv6: NLM_F_CREATE should be set when creating new route [ 288.430285][ T4972] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.441532][ T4972] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.457520][ T2297] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.481328][ T2297] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.539808][T11904] __nla_validate_parse: 7 callbacks suppressed [ 288.539840][T11904] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2850'. [ 288.565474][T11904] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2850'. [ 288.575842][T11904] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2850'. [ 288.685052][T11912] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2854'. [ 288.711741][T11912] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2854'. [ 288.721412][T11912] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2854'. [ 288.790521][T11922] xt_cluster: you have exceeded the maximum number of cluster nodes (3131 > 32) [ 289.018506][T11939] FAULT_INJECTION: forcing a failure. [ 289.018506][T11939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.031955][T11939] CPU: 1 UID: 0 PID: 11939 Comm: syz.1.2866 Not tainted syzkaller #0 PREEMPT(full) [ 289.031990][T11939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 289.032006][T11939] Call Trace: [ 289.032015][T11939] [ 289.032023][T11939] __dump_stack+0x1d/0x30 [ 289.032080][T11939] dump_stack_lvl+0x95/0xd0 [ 289.032109][T11939] dump_stack+0x15/0x1b [ 289.032144][T11939] should_fail_ex+0x263/0x280 [ 289.032249][T11939] should_fail+0xb/0x20 [ 289.032269][T11939] should_fail_usercopy+0x1a/0x20 [ 289.032346][T11939] _copy_from_user+0x1c/0xb0 [ 289.032382][T11939] ___sys_sendmsg+0xc1/0x1e0 [ 289.032483][T11939] __x64_sys_sendmsg+0xd4/0x160 [ 289.032515][T11939] x64_sys_call+0x194c/0x3020 [ 289.032681][T11939] do_syscall_64+0x12c/0x370 [ 289.032720][T11939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.032743][T11939] RIP: 0033:0x7fdf5aefbf79 [ 289.032774][T11939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 289.032809][T11939] RSP: 002b:00007fdf5994f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 289.032835][T11939] RAX: ffffffffffffffda RBX: 00007fdf5b175fa0 RCX: 00007fdf5aefbf79 [ 289.032861][T11939] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 289.032877][T11939] RBP: 00007fdf5994f090 R08: 0000000000000000 R09: 0000000000000000 [ 289.032906][T11939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.032969][T11939] R13: 00007fdf5b176038 R14: 00007fdf5b175fa0 R15: 00007fffadf0ec88 [ 289.032994][T11939] [ 289.206921][T11941] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2867'. [ 289.216674][T11941] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2867'. [ 289.377008][T11945] lo speed is unknown, defaulting to 1000 [ 289.383354][T11945] lo speed is unknown, defaulting to 1000 [ 289.442330][T11945] chnl_net:caif_netlink_parms(): no params data found [ 289.505131][T11945] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.512600][T11945] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.519942][T11945] bridge_slave_0: entered allmulticast mode [ 289.526604][T11945] bridge_slave_0: entered promiscuous mode [ 289.533927][T11945] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.541243][T11945] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.548599][T11945] bridge_slave_1: entered allmulticast mode [ 289.555330][T11945] bridge_slave_1: entered promiscuous mode [ 289.587440][T11945] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.597661][ T4972] bridge_slave_1: left allmulticast mode [ 289.603565][ T4972] bridge_slave_1: left promiscuous mode [ 289.609809][ T4972] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.620486][ T4972] bridge_slave_0: left allmulticast mode [ 289.633285][ T4972] bridge_slave_0: left promiscuous mode [ 289.647961][ T4972] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.680090][T11971] netlink: 27 bytes leftover after parsing attributes in process `syz.3.2875'. [ 289.791506][ T4972] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 289.801889][ T4972] bond0 (unregistering): Released all slaves [ 289.809701][ T4972] bond1 (unregistering): Released all slaves [ 289.818985][ T4972] bond2 (unregistering): Released all slaves [ 289.837022][ T4972] bond3 (unregistering): Released all slaves [ 289.846200][ T4972] bond4 (unregistering): Released all slaves [ 289.856184][ T4972] bond5 (unregistering): Released all slaves [ 289.866839][ T4972] bond6 (unregistering): Released all slaves [ 289.876120][ T4972] bond7 (unregistering): Released all slaves [ 289.885505][ T4972] bond8 (unregistering): Released all slaves [ 290.182952][T11751] batadv_slave_1: left promiscuous mode [ 290.191906][T11945] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.206932][T11978] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2875'. [ 290.237556][T11985] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 290.278822][T11945] team0: Port device team_slave_0 added [ 290.285470][T11945] team0: Port device team_slave_1 added [ 290.300736][ T4972] tipc: Left network mode [ 290.335217][T11990] syzkaller1: entered promiscuous mode [ 290.347272][T11990] syzkaller1: entered allmulticast mode [ 290.364156][ T4972] hsr_slave_0: left promiscuous mode [ 290.371515][ T4972] hsr_slave_1: left promiscuous mode [ 290.377546][ T4972] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 290.392794][ T4972] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 290.460449][ T4972] team0 (unregistering): Port device team_slave_1 removed [ 290.481957][ T4972] team0 (unregistering): Port device team_slave_0 removed [ 290.520078][ T4972] team0 (unregistering): Port device dummy0 removed [ 290.534908][T11945] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 290.542675][T11945] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 290.568998][T11945] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 290.598714][T12013] syzkaller0: entered promiscuous mode [ 290.604296][T12013] syzkaller0: entered allmulticast mode [ 290.619563][T11945] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 290.628173][T11945] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 290.655516][T11945] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 290.752431][T11945] hsr_slave_0: entered promiscuous mode [ 290.767869][T11945] hsr_slave_1: entered promiscuous mode [ 290.784271][T11945] debugfs: 'hsr0' already exists in 'hsr' [ 290.793980][T11945] Cannot create hsr debugfs directory [ 290.818523][T12028] ip6_vti0: entered allmulticast mode [ 291.258237][T11945] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 291.258886][ T28] kauditd_printk_skb: 139 callbacks suppressed [ 291.258906][ T28] audit: type=1326 audit(2000000085.590:2723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.297592][T11945] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 291.306663][T11945] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 291.327009][T11945] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 291.355044][ T28] audit: type=1326 audit(2000000085.630:2724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.423804][ T28] audit: type=1326 audit(2000000085.630:2725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.474934][ T28] audit: type=1326 audit(2000000085.630:2726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.498806][ T28] audit: type=1326 audit(2000000085.630:2727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.522721][ T28] audit: type=1326 audit(2000000085.630:2728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.578126][ T28] audit: type=1326 audit(2000000085.630:2729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.692852][T12099] syzkaller1: entered promiscuous mode [ 291.698882][T12099] syzkaller1: entered allmulticast mode [ 291.738858][T11945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.780567][T11945] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.841772][ T28] audit: type=1326 audit(2000000085.630:2730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.877801][T11945] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 291.907249][T11945] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.927110][ T28] audit: type=1326 audit(2000000085.630:2731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 291.955020][ T4977] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.962306][ T4977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.981336][ T4977] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.988566][ T4977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.027671][ T28] audit: type=1326 audit(2000000085.630:2732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12071 comm="syz.2.2893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fd72787bf79 code=0x7ffc0000 [ 292.087784][T12104] netlink: 'syz.3.2898': attribute type 12 has an invalid length. [ 292.226661][T11945] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 292.250637][T12118] xt_cluster: you have exceeded the maximum number of cluster nodes (3131 > 32) [ 292.295439][T12122] loop5: detected capacity change from 0 to 256 [ 292.381993][T12129] FAULT_INJECTION: forcing a failure. [ 292.381993][T12129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 292.404848][T12129] CPU: 1 UID: 0 PID: 12129 Comm: syz.3.2904 Not tainted syzkaller #0 PREEMPT(full) [ 292.404911][T12129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 292.404928][T12129] Call Trace: [ 292.404935][T12129] [ 292.404944][T12129] __dump_stack+0x1d/0x30 [ 292.404970][T12129] dump_stack_lvl+0x95/0xd0 [ 292.405039][T12129] dump_stack+0x15/0x1b [ 292.405067][T12129] should_fail_ex+0x263/0x280 [ 292.405099][T12129] should_fail+0xb/0x20 [ 292.405125][T12129] should_fail_usercopy+0x1a/0x20 [ 292.405230][T12129] _copy_from_iter+0xcf/0xea0 [ 292.405265][T12129] ? __alloc_skb+0x4f6/0x690 [ 292.405286][T12129] ? __alloc_skb+0x200/0x690 [ 292.405309][T12129] netlink_sendmsg+0x4ae/0x6f0 [ 292.405394][T12129] ? __pfx_netlink_sendmsg+0x10/0x10 [ 292.405428][T12129] ____sys_sendmsg+0x5af/0x600 [ 292.405467][T12129] ___sys_sendmsg+0x195/0x1e0 [ 292.405508][T12129] __x64_sys_sendmsg+0xd4/0x160 [ 292.405630][T12129] x64_sys_call+0x194c/0x3020 [ 292.405672][T12129] do_syscall_64+0x12c/0x370 [ 292.405716][T12129] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.405744][T12129] RIP: 0033:0x7f3cd713bf79 [ 292.405760][T12129] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 292.405780][T12129] RSP: 002b:00007f3cd5b97028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 292.405813][T12129] RAX: ffffffffffffffda RBX: 00007f3cd73b5fa0 RCX: 00007f3cd713bf79 [ 292.405832][T12129] RDX: 0000000000000000 RSI: 0000200000024c80 RDI: 0000000000000003 [ 292.405849][T12129] RBP: 00007f3cd5b97090 R08: 0000000000000000 R09: 0000000000000000 [ 292.405892][T12129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.405908][T12129] R13: 00007f3cd73b6038 R14: 00007f3cd73b5fa0 R15: 00007ffd5b97bdf8 [ 292.405929][T12129] [ 292.609524][ T4972] IPVS: stop unused estimator thread 0... [ 292.621833][T12133] bond6: option mode: invalid value (255) [ 292.628767][T12133] bond6 (unregistering): Released all slaves [ 292.678343][T11945] veth0_vlan: entered promiscuous mode [ 292.686124][T11945] veth1_vlan: entered promiscuous mode [ 292.737456][T11945] veth0_macvtap: entered promiscuous mode [ 292.751696][T12136] syzkaller1: entered promiscuous mode [ 292.769642][T12136] syzkaller1: entered allmulticast mode [ 292.790945][T11945] veth1_macvtap: entered promiscuous mode [ 292.810597][T11945] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 292.829701][T11945] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 292.862625][ T4929] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.877178][ T4929] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.912449][ T4929] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.934760][ T4929] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.974115][T12142] netlink: 'syz.5.2909': attribute type 12 has an invalid length. [ 293.084256][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.102653][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.112668][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.121819][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.183945][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.216951][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.226923][T12166] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 293.257303][T12166] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 293.268764][T12151] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 293.307355][T12151] vhci_hcd vhci_hcd.0: pdev(3) rhport(7) sockfd(20) [ 293.314014][T12151] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 293.364284][T12151] vhci_hcd vhci_hcd.0: Device attached [ 293.378956][T12171] vhci_hcd: connection closed [ 293.379054][ T4929] vhci_hcd vhci_hcd.3: stop threads [ 293.391081][ T4929] vhci_hcd vhci_hcd.3: release socket [ 293.396582][ T4929] vhci_hcd vhci_hcd.3: disconnect device [ 293.837500][T12194] __nla_validate_parse: 7 callbacks suppressed [ 293.837518][T12194] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2929'. [ 293.874700][T12194] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2929'. [ 293.887217][T12194] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2929'. [ 293.962560][T12201] syzkaller1: entered promiscuous mode [ 293.968219][T12201] syzkaller1: entered allmulticast mode [ 294.244620][T12207] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 294.258303][T12207] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 294.278680][T12207] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 294.308814][T12207] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 295.022073][T12225] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 295.057169][T12225] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 295.057426][ T2990] ================================================================== [ 295.073136][ T2990] BUG: KCSAN: data-race in _prb_read_valid / data_alloc [ 295.080141][ T2990] [ 295.082493][ T2990] write to 0xffffffff86c6ed78 of 8 bytes by task 12225 on cpu 1: [ 295.090241][ T2990] data_alloc+0x310/0x390 [ 295.094639][ T2990] prb_reserve+0x8d7/0xae0 [ 295.099107][ T2990] vprintk_store+0x54a/0x910 [ 295.103822][ T2990] vprintk_emit+0x1a4/0x600 [ 295.108350][ T2990] dev_vprintk_emit+0x242/0x2a0 [ 295.113224][ T2990] dev_printk_emit+0x84/0xb0 [ 295.117839][ T2990] __dev_printk+0xf3/0x110 [ 295.122275][ T2990] _dev_err+0xa6/0xd0 [ 295.126278][ T2990] raw_ioctl+0x1b4c/0x1e10 [ 295.130723][ T2990] __se_sys_ioctl+0xce/0x140 [ 295.135341][ T2990] __x64_sys_ioctl+0x43/0x50 [ 295.139962][ T2990] x64_sys_call+0x1563/0x3020 [ 295.144667][ T2990] do_syscall_64+0x12c/0x370 [ 295.149283][ T2990] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.155198][ T2990] [ 295.157549][ T2990] read to 0xffffffff86c6ed78 of 16 bytes by task 2990 on cpu 0: [ 295.165215][ T2990] _prb_read_valid+0x1bc/0x950 [ 295.170009][ T2990] prb_read_valid+0x3c/0x60 [ 295.174550][ T2990] syslog_print+0x258/0x560 [ 295.179085][ T2990] do_syslog+0x52b/0x7f0 [ 295.183359][ T2990] __x64_sys_syslog+0x41/0x50 [ 295.188063][ T2990] x64_sys_call+0x2b9e/0x3020 [ 295.192769][ T2990] do_syscall_64+0x12c/0x370 [ 295.197396][ T2990] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.203400][ T2990] [ 295.205744][ T2990] Reported by Kernel Concurrency Sanitizer on: [ 295.211905][ T2990] CPU: 0 UID: 0 PID: 2990 Comm: klogd Not tainted syzkaller #0 PREEMPT(full) [ 295.220771][ T2990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 295.230855][ T2990] ================================================================== [ 297.347347][ T3410] page_pool_release_retry() stalled pool shutdown: id 45, 3 inflight 60 sec