last executing test programs: 2.560246413s ago: executing program 1 (id=2439): bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0xfffffffeffffffff, 0x120741) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)=')/\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300), 0x240000, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r6}, &(0x7f0000000240), &(0x7f00000003c0)=r8}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r7, r3, 0x25, 0x2, @void}, 0x10) 2.493747457s ago: executing program 1 (id=2441): bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000100), 0x2, 0x0) 2.382387054s ago: executing program 2 (id=2443): prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)='+}[@\x00G5\v\x89n\xb2\x0e\xb7\xb4\x9a\xb3\xb9\xe1\xff@`\x87\xefy\xb7\xe0\xe6c\x91\x81ND\t3\xc4\xca\xf0\xd0Zp\xadbdY\xdcz\xc6lo\xd0\xc7\'CT') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff27}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="7f454c4600000006010000000000000003003e000000000003000000000000004000000000000000980100000000000002000000000038000200000002000000000000600300000008000000000000000d00000000000000ed08000000000000f0ffffffffffffff0000000000000000080000000000000003000000cff5ffff800300000000000001000000000000000500000000000000ff"], 0x5b0) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000240), &(0x7f0000000280)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x18) close(0xffffffffffffffff) r6 = socket$kcm(0x10, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0xf08, @local, 0xb22}, 0x1c) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="0200000008000000000000ff000000000000000010650000000000002000000000000000"], 0x24, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000004eabd4c2da8a84d2adedcb555f17f8697dfccf07c947d777a8046c493070c6bb2449b2b2d73f3b3b61d8afc0cef7d0fa489d6ce88d4d"], &(0x7f00000001c0)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE(0x1101000000000000, &(0x7f0000000440)=ANY=[@ANYRES64=r3, @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r7, r9, 0x25, 0x4, @void}, 0x10) 2.356001636s ago: executing program 2 (id=2444): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6(0xa, 0x80003, 0xff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) creat(&(0x7f00000001c0)='./file1\x00', 0x2) acct(&(0x7f0000000080)='./file1\x00') acct(0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x25, 0x2, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x7, 0x0, 0x6, 0x8, 0x20005, 0x80, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = syz_io_uring_setup(0x10a, 0x0, &(0x7f0000000040)=0x0, 0x0) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r6) close(0xffffffffffffffff) syz_io_uring_submit(r5, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r4, 0x6f77, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000240)) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000000300)=0x9, 0x4) close_range(r1, 0xffffffffffffffff, 0x0) 1.837030167s ago: executing program 0 (id=2451): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000600)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x800000000006}, 0x18) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r2, &(0x7f0000000500), 0x4, 0x0) 1.755155743s ago: executing program 4 (id=2453): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x810) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0xa86, 0x0) 1.699172556s ago: executing program 4 (id=2454): r0 = socket(0x8000000010, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c094, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) connect$inet(r1, &(0x7f0000000040)={0x2, 0x6e27, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x300) setsockopt$inet_int(r1, 0x0, 0x19, &(0x7f0000000180)=0x1f5, 0x4) setsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000080)=0x40, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xc4, 0x19, 0xfd3649826d894c67, 0x0, 0x0, {{@in6=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0xfffffffffffffffc}, {0x0, 0xacb0, 0x400000000}, 0x400, 0x0, 0x0, 0x0, 0x1}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xc4}}, 0x4c050) r3 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace5ffb2e9fc603dd282100000002ff02000000000000000000000000000104004e200023b0"], 0x0) recvmmsg(r1, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) write(r0, &(0x7f00000002c0)="fc0000001c000704ab5b2509b86803000aab087a0400000001481193210001c0f0030584050060100000000000039815fa2c53c28648000000b9d95662537a00bc000c00f0ff7f0000b400600033d44000040560916a0033f436313012dafd5a32e273fc83ab82d710f74cec184406f90d435ef8b29d3ef3d92c94170e5bba2e177312e081bea05d3a021e8ca062914a46ccfc510bb73c9455cdc8363ae4f5df77bc4cfd6239ec2a0f0d1bcae5fa0f5f9dcdd51af51af8502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd6433802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000090548de", 0xfc) 1.536437256s ago: executing program 2 (id=2455): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000083c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000280)={0x0, 0x9dc5, 0x2, 0x0, 0x3}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x8, 0x8, 0x0, 0x800, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="364000002600913e"], 0xfe33) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005000400000000000900020073797a310000000005000500020200000500010006000000"], 0x44}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r8, &(0x7f0000000140)='./file0\x00') openat(r8, &(0x7f0000000200)='./file0\x00', 0x414f02, 0x52abe154ad664fa4) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) r11 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r11, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a40)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000a80)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0xc, 0x4}, {}, {0xb, 0x9}}, [@filter_kind_options=@f_u32={{0x8}, {0x30, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0x3, 0xa, 0x1, 0xed8, 0x7, 0x8c, 0x40, 0x925e, [{0x101, 0x6, 0x200, 0x3}]}}, @TCA_U32_CLASSID={0x8, 0x1, {0xfff1, 0xd}}]}}]}, 0x5c}}, 0x20040054) sendmsg$TEAM_CMD_NOOP(r8, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={0x198, r9, 0x200, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r10}, {0x17c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x3, 0x2, 0x55, 0x8}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}]}, 0x198}, 0x1, 0x0, 0x0, 0x800}, 0x8001) sendmsg$IPSET_CMD_ADD(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x14, 0x9, 0x6, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0x10000047}, 0x24000004) 1.532843366s ago: executing program 0 (id=2456): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d61637674617000040002800800", @ANYRES32=r1], 0x44}}, 0x0) 1.446173552s ago: executing program 2 (id=2457): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5e, 0x0, &(0x7f0000000040), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x1806000, &(0x7f0000000200)="dd3097badb90026dc453733cee080e6df6ddb96fee3e33dddc6c3907bdb3c818dc86df94484aa1f47d28fe13c965b7107c83142c881c6807fd01872bbc3c5e8ed11c7daababe2ab3555931c08b7c0006da066bf1165715ca83d32f2bacb2df12ebaab14ce91fb037e8eb13cf09", 0x6d, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="28e9e89e91e1f9703dec4e3b59969116d41fdbe81bba76221c4c38527cd7306fd4143dfde34107e05640b0386be0c8cbdbe497afbba0032502ca41d120778b9b6f8b6f9975af3a46f09aa21ca66c3d586c455093408722d37de6a5474fa768d69d635abdf4169d43a5baa4357394a14aff9986582bfcc7bf919cb3f9513614b9162109f109a2e02da0c6fb188ac5ec8b1c5442861206eb789470219b") bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 1.398950614s ago: executing program 0 (id=2458): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r0, 0x0, 0x33, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r3) 1.30495043s ago: executing program 4 (id=2459): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xabc}, {0x0}, {0x0}], 0x3}, 0x0) 1.278994121s ago: executing program 4 (id=2460): bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0xfffffffeffffffff, 0x120741) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)=')/\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300), 0x240000, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 1.264202892s ago: executing program 0 (id=2461): r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x1c9001, 0x0) write$snapshot(r0, 0x0, 0x0) 1.122409221s ago: executing program 4 (id=2462): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, &(0x7f0000000100), &(0x7f0000000380)) r2 = mq_open(&(0x7f0000000440)='!selin\xdb\xa1\x02\xbf\xd9l\xd7\xcd\xc0uxse\xee\x0e\xcd\xceq\xa2\xa5\t\x98\x8a\x8f>\xba', 0x6e93ebbbcc088cf2, 0x0, 0x0) poll(&(0x7f0000000040)=[{r2, 0x5220}], 0x1, 0xc) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) io_setup(0x2004, &(0x7f0000000680)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d00)=ANY=[], 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000000080)=0x8000000ffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)=0x0) timer_settime(r6, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) splice(r3, 0x0, r4, 0x0, 0x7, 0x0) 1.122062551s ago: executing program 0 (id=2463): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000600)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r2, &(0x7f0000000500), 0x4, 0x0) 797.431101ms ago: executing program 0 (id=2466): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6(0xa, 0x80003, 0xff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) creat(&(0x7f00000001c0)='./file1\x00', 0x2) acct(&(0x7f0000000080)='./file1\x00') acct(0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x25, 0x2, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x7, 0x0, 0x6, 0x8, 0x20005, 0x80, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = syz_io_uring_setup(0x10a, 0x0, &(0x7f0000000040)=0x0, 0x0) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r6) close(0xffffffffffffffff) syz_io_uring_submit(r5, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r4, 0x6f77, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000240)) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000000300)=0x9, 0x4) close_range(r1, 0xffffffffffffffff, 0x0) 585.208104ms ago: executing program 2 (id=2471): r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) read(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x2004000, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0xfe, 0x1227, &(0x7f00000024c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000200)='./bus\x00', 0x3140088, &(0x7f00000005c0)=ANY=[], 0x1, 0x126f, &(0x7f0000001600)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$inet6(0xa, 0x5, 0x0) r6 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000000040)=0x80000004, 0x4) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x33}}}, 0x1c) bind$inet6(r5, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc0400, 0x0, 0xfffffffffffffca8, 0x0, 0x0, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000700)=ANY=[@ANYBLOB="96a2aaaaaaaaffffffffffff8604fe8000000000000000000000000000aafe8100000000000000000000000000aa00004001", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="8002000090780000fe08f989fe2e80ee02040200"], 0x0) r7 = syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r8) mount(0x0, &(0x7f00000010c0)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r9 = syz_open_procfs(r7, &(0x7f0000000400)='ns\x00') readlinkat(r9, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000440)=""/163, 0xa3) 440.644983ms ago: executing program 3 (id=2474): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r1) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x10, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r6, 0x0, 0x4}, 0x18) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r10, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r11, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x34, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r11, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r11}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x2}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc00}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000e40)=@newtfilter={0x84, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0x0, 0x3}, {}, {0xfff3, 0xffe0}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xd, 0xd0ea, 0x20000001, 0x7, 0x4}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x0) close(0x3) 437.956233ms ago: executing program 1 (id=2475): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000600)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x800000000006}, 0x18) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r2, &(0x7f0000000500), 0x4, 0x0) 354.037798ms ago: executing program 3 (id=2476): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x10, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x8, 0x0, 0x16}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc0\x1b\xb5d\xc7\x7f0\x9a&\xb0\x12#\x9c`\xa6\xed\x05\x95g\a\xccYb\xaf\xe9\xb6G?\x9f\xf5\xfe\xc1\xc0JJ\xc8\xd9d\x80\x13\x8fX\xb4\x19\xc4\\\xcb\x89-)\x90\x01\v\xac^\xdbBQ|\xaej;\x92\\\xf8u\x19Y\xee\x99EI\xf1t\xadn<\x9b\xc9\x87\xd0\xa7\x1a\x81\xb9\xc87sq\xd7\x15\xd6\x91O\x9c\x99!9>\xff\xa8\xfa\xe6=d\xcf\xca\xa9\xc61!\xc6P\x13\xd0\x88gZ\xbe\xdfl\xfa\xff\xb0m;d07tx\xbb\xabd\xe5\x16\xc4\xae\xf0', 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000440)={0x48, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000090601020000000000000000000000000900020073797a31000000000500010007000000100007800c00018008000140fffffffe054cfb23fce52bca532045c957b26056b95e8b351505d6e399fdca3c35c6"], 0x38}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000084) write$binfmt_script(r5, &(0x7f0000000340)={'#! ', './file0'}, 0xb) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$binfmt_misc(r0, &(0x7f0000000180)="e502", 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 337.023059ms ago: executing program 3 (id=2477): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000600)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r2, &(0x7f0000000500), 0x4, 0x0) 245.347875ms ago: executing program 4 (id=2478): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) writev(r0, &(0x7f0000000140), 0x3d) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r1, 0x400, 0x1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x800, 0x0, 0x2, 0x1, 0x80, 0x7}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000240)={@loopback, 0x800, 0x0, 0x1, 0x0, 0x8, 0x8}, 0x20) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x80, 0x24) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143141, 0x0) pread64(r4, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x2, @empty, 0xcac2d78a}}, 0x0, 0x0, 0x3f, 0x0, "ee080e650926a96ecc136e7fb980e989db9e8bf9b93129488f65178de213eb94cd46e19d9c65a018444a131f4000000065569607462029add09240005c6776267517308a3d40aa1c788df600"}, 0xd8) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x4e20, 0x3ff, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_128={{0x304}, "cb186c02102000", "c1c70fec6b88da6da052ceab2c37482a", "bdc8edc9", "670f9b7d29e2c3ab"}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$int_in(r5, 0x5452, &(0x7f0000000200)=0x2000000000000001) writev(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x6, 0x0) 241.889755ms ago: executing program 1 (id=2479): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11c167, 0x0, 0xfffffffa, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) pwrite64(r0, 0x0, 0x0, 0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0xdeff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000300)=[@in={0x2, 0x4e24, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) 175.003769ms ago: executing program 1 (id=2480): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$eJzs3c1vVFUbAPDnzkwLpe9rKzEqLkyjIZAoLS1g8GMBe0LwY+fGSgtBho/QGi2aWBLcmBg3LkhcuRD/CyW6dWXiwoUbV4akGsNGY3TMnbkzDO1MOy0dbu39/ZLbOeeeOz3nQp85Z+49ZyaAwhpLf5Qi9kTE5SRipK2sElnhWOO4O7+/fzrdkqjVXv0tiSTb1zw+yR6Hsyf/PRLx/TdJ7C6vrHdu4er56Wp19kqWn5i/cHlibuHqgXMXps/Onp29OPXc1NEjh48cnTx4X+dXakufuP7WOyMfnXz9i8/+Sia//OlkEsfi1zONsvbz2CxjMRZ/1GofLN+f/rse3ezKclJu/Z3clSzfwZZVyWJkMCIei5Eot/1vjsSHL+faOKCvaklEDSioRPxDQTXHAc339r29Dy71eVQCPAhLx9OfAx3iv9K4NhijMRARe5c9r8MlvQ1J6/ju25PX0y36dB0O6Gzx2o4stTz+k3psjsbOem7XndI913nTEcCp7DHd/8oG6x9blhf/8OAsXouIxzuN/9eO/zfa4v/NDdYv/gEAAAAAAGDz3DoeEc92uv9Xyu7N7Yyn6vf/ksb9vx/urhA8tgn1r33/r3R7E6oBOlg6HvFSx/m/rTm+o+Us9//GbMDkzLnq7MGIeCgi9sfAjjQ/uUodBz7efaNbWfv8v3RL62/OBczacbuy497nzEzPT9/POQMNS9cinqh0n/+T9v9Je/+fSV8PLvdYx+69N091K1s7/oF+qX0esa9j/5+0jklW/3yOifp4YKI5Kljpyfc++apb/eIf8pP2/7tWj//RpP3zeubW9/sHI+LQQqXWrXyj4//B5LVy8/en3p2en78yGTGYnFi5f2p9bYbtqhkPzXhJ43//06tf/2uN/9vicCgiFnus89F/hn/uVqb/h/yk8T+zrv5//Ympm6Nfd6u/t/7/cL1P35/tcf0PVtdrgObdTgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4LypFxP8iKY230qXS+HjEcEQ8ErtK1Utz88+cufT2xZm0rP79/6XmN/2ONPJJ8/v/R9vyU8vyhyLi4Yj4tDxUz4+fvlSdyfvkAQAAAAAAAAAAAAAAAAAAYIsY7rL+P/VLOe/WAX1XyR7FOxRPJe8GALkR/1Bc4h+KS/xDcYl/KK4Nxr/bBbAN6P+hqAZ6O2xnv9sB5EH/DwAAAAAA28qtF5+/kUTE4gtD9S01mJW1bgwO5dU6oJ9KeTcAyI05vFBcpv5AcfU4+RfYxpJW6s9ap/Lus/+T/jQIAAAAAAAAAAAAAFhh355bP665/h/Ylqz/h+Ky/h+Ky/p/KC7v8YG1VvFb/w8AAAAAAAAAAAAA+ZtbuHp+ulqdvSIhsdUSAxGxBZqRQ2Iw//DM+YUJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABo+TcAAP//Swsk/Q==") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, 0x0) 145.209121ms ago: executing program 3 (id=2481): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163767461700004000280080005", @ANYRES32=r1], 0x44}}, 0x0) 105.063733ms ago: executing program 1 (id=2482): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5e, 0x0, &(0x7f0000000040), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x1806000, &(0x7f0000000200)="dd3097badb90026dc453733cee080e6df6ddb96fee3e33dddc6c3907bdb3c818dc86df94484aa1f47d28fe13c965b7107c83142c881c6807fd01872bbc3c5e8ed11c7daababe2ab3555931c08b7c0006da066bf1165715ca83d32f2bacb2df12ebaab14ce91fb037e8eb13cf09", 0x6d, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="28e9e89e91e1f9703dec4e3b59969116d41fdbe81bba76221c4c38527cd7306fd4143dfde34107e05640b0386be0c8cbdbe497afbba0032502ca41d120778b9b6f8b6f9975af3a46f09aa21ca66c3d586c455093408722d37de6a5474fa768d69d635abdf4169d43a5baa4357394a14aff9986582bfcc7bf919cb3f9513614b9162109f109a2e02da0c6fb188ac5ec8b1c5442861206eb789470219b") bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 67.830945ms ago: executing program 3 (id=2483): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xc86}, {0x0}, {0x0}], 0x3}, 0x0) 769.369µs ago: executing program 3 (id=2484): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r0, 0x0, 0x33, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r3) 0s ago: executing program 2 (id=2485): bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000100), 0x2, 0x0) kernel console output (not intermixed with test programs): s=can_socket permissive=1 [ 80.269305][ T5578] lo speed is unknown, defaulting to 1000 [ 80.296455][ T29] audit: type=1326 audit(1759785006.967:2252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.320068][ T29] audit: type=1326 audit(1759785006.967:2253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.345261][ T29] audit: type=1326 audit(1759785006.978:2254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.368707][ T29] audit: type=1326 audit(1759785006.978:2255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.392247][ T29] audit: type=1326 audit(1759785006.978:2256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.415672][ T29] audit: type=1326 audit(1759785007.020:2257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.439111][ T29] audit: type=1326 audit(1759785007.020:2258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5576 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 80.477077][ T52] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 80.486324][ T52] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 80.797587][ T5603] loop4: detected capacity change from 0 to 164 [ 80.806349][ T5603] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 80.816447][ T5603] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 80.838022][ T5603] Symlink component flag not implemented [ 80.843751][ T5603] Symlink component flag not implemented [ 80.851425][ T5603] Symlink component flag not implemented (7) [ 80.857443][ T5603] Symlink component flag not implemented (116) [ 80.870737][ T5603] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 80.879808][ T5603] rock: directory entry would overflow storage [ 80.886064][ T5603] rock: sig=0x4f50, size=4, remaining=3 [ 80.891712][ T5603] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 80.923929][ T5605] netlink: 'syz.1.776': attribute type 10 has an invalid length. [ 80.931935][ T5605] batadv0: left allmulticast mode [ 80.937246][ T5605] batadv0: left promiscuous mode [ 80.942408][ T5605] bridge0: port 3(batadv0) entered disabled state [ 80.950964][ T5605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.959265][ T5605] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 80.969507][ T5605] netlink: 'syz.1.776': attribute type 10 has an invalid length. [ 80.977435][ T5605] batadv0: entered promiscuous mode [ 80.982762][ T5605] batadv0: entered allmulticast mode [ 80.992250][ T5605] bond0: (slave batadv0): Releasing backup interface [ 81.000256][ T5605] bridge0: port 3(batadv0) entered blocking state [ 81.006984][ T5605] bridge0: port 3(batadv0) entered disabled state [ 81.467764][ T52] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 81.477034][ T52] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 81.529238][ T5634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=5634 comm=syz.2.788 [ 81.546613][ T5634] __nla_validate_parse: 17 callbacks suppressed [ 81.546657][ T5634] netlink: 20 bytes leftover after parsing attributes in process `syz.2.788'. [ 81.572042][ T5638] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 81.753669][ T5653] veth0_vlan: entered allmulticast mode [ 82.088557][ T5669] netlink: 4 bytes leftover after parsing attributes in process `syz.4.802'. [ 82.387336][ T5665] Set syz1 is full, maxelem 65536 reached [ 82.531939][ T5685] FAULT_INJECTION: forcing a failure. [ 82.531939][ T5685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 82.545257][ T5685] CPU: 0 UID: 0 PID: 5685 Comm: syz.1.807 Not tainted syzkaller #0 PREEMPT(voluntary) [ 82.545291][ T5685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 82.545307][ T5685] Call Trace: [ 82.545316][ T5685] [ 82.545324][ T5685] __dump_stack+0x1d/0x30 [ 82.545431][ T5685] dump_stack_lvl+0xe8/0x140 [ 82.545471][ T5685] dump_stack+0x15/0x1b [ 82.545509][ T5685] should_fail_ex+0x265/0x280 [ 82.545599][ T5685] should_fail_alloc_page+0xf2/0x100 [ 82.545625][ T5685] __alloc_frozen_pages_noprof+0xff/0x360 [ 82.545663][ T5685] alloc_pages_mpol+0xb3/0x260 [ 82.545764][ T5685] alloc_pages_noprof+0x90/0x130 [ 82.545854][ T5685] __pud_alloc+0x47/0x470 [ 82.545895][ T5685] handle_mm_fault+0x1882/0x2be0 [ 82.545931][ T5685] ? check_vma_flags+0x26e/0x340 [ 82.545961][ T5685] __get_user_pages+0x102a/0x1ed0 [ 82.545993][ T5685] get_user_pages_remote+0x1d5/0x6c0 [ 82.546054][ T5685] ? down_read+0x77/0xe0 [ 82.546088][ T5685] get_arg_page+0x8e/0x1e0 [ 82.546109][ T5685] copy_string_kernel+0x12c/0x1f0 [ 82.546158][ T5685] do_execveat_common+0x5ad/0x750 [ 82.546193][ T5685] ? getname_flags+0x154/0x3b0 [ 82.546231][ T5685] __x64_sys_execveat+0x73/0x90 [ 82.546261][ T5685] x64_sys_call+0x1fec/0x3000 [ 82.546284][ T5685] do_syscall_64+0xd2/0x200 [ 82.546329][ T5685] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 82.546354][ T5685] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 82.546396][ T5685] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.546454][ T5685] RIP: 0033:0x7f29108deec9 [ 82.546472][ T5685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.546540][ T5685] RSP: 002b:00007f290f33f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 82.546563][ T5685] RAX: ffffffffffffffda RBX: 00007f2910b35fa0 RCX: 00007f29108deec9 [ 82.546578][ T5685] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 82.546643][ T5685] RBP: 00007f290f33f090 R08: 0000000000001000 R09: 0000000000000000 [ 82.546658][ T5685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 82.546672][ T5685] R13: 00007f2910b36038 R14: 00007f2910b35fa0 R15: 00007fff69885d48 [ 82.546696][ T5685] [ 82.774521][ T3382] Process accounting resumed [ 83.793823][ T5728] netlink: 4 bytes leftover after parsing attributes in process `syz.0.823'. [ 83.832814][ T5728] netlink: 12 bytes leftover after parsing attributes in process `syz.0.823'. [ 83.841629][ T5732] netlink: '+}[@': attribute type 10 has an invalid length. [ 83.909160][ T5739] netlink: 'syz.4.828': attribute type 1 has an invalid length. [ 83.947737][ T5741] netlink: 4 bytes leftover after parsing attributes in process `syz.1.829'. [ 84.036092][ T5743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=5743 comm=syz.0.830 [ 84.069249][ T5743] netlink: 20 bytes leftover after parsing attributes in process `syz.0.830'. [ 84.205096][ T5760] netlink: 8 bytes leftover after parsing attributes in process `syz.0.837'. [ 84.214018][ T5760] netlink: 'syz.0.837': attribute type 30 has an invalid length. [ 84.281698][ T5766] FAULT_INJECTION: forcing a failure. [ 84.281698][ T5766] name failslab, interval 1, probability 0, space 0, times 0 [ 84.294491][ T5766] CPU: 1 UID: 0 PID: 5766 Comm: syz.4.840 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.294581][ T5766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 84.294597][ T5766] Call Trace: [ 84.294605][ T5766] [ 84.294614][ T5766] __dump_stack+0x1d/0x30 [ 84.294660][ T5766] dump_stack_lvl+0xe8/0x140 [ 84.294791][ T5766] dump_stack+0x15/0x1b [ 84.294830][ T5766] should_fail_ex+0x265/0x280 [ 84.294873][ T5766] should_failslab+0x8c/0xb0 [ 84.294962][ T5766] kmem_cache_alloc_noprof+0x50/0x480 [ 84.294995][ T5766] ? audit_log_start+0x342/0x720 [ 84.295094][ T5766] audit_log_start+0x342/0x720 [ 84.295137][ T5766] ? kstrtouint+0x76/0xc0 [ 84.295224][ T5766] audit_seccomp+0x48/0x100 [ 84.295302][ T5766] ? __seccomp_filter+0x82d/0x1250 [ 84.295327][ T5766] __seccomp_filter+0x83e/0x1250 [ 84.295484][ T5766] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 84.295522][ T5766] ? vfs_write+0x7e8/0x960 [ 84.295635][ T5766] __secure_computing+0x82/0x150 [ 84.295667][ T5766] syscall_trace_enter+0xcf/0x1e0 [ 84.295694][ T5766] do_syscall_64+0xac/0x200 [ 84.295720][ T5766] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 84.295796][ T5766] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 84.295854][ T5766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.295881][ T5766] RIP: 0033:0x7f18239aeec9 [ 84.295900][ T5766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.295922][ T5766] RSP: 002b:00007f1822417038 EFLAGS: 00000246 ORIG_RAX: 0000000000000074 [ 84.295953][ T5766] RAX: ffffffffffffffda RBX: 00007f1823c05fa0 RCX: 00007f18239aeec9 [ 84.295969][ T5766] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 84.296008][ T5766] RBP: 00007f1822417090 R08: 0000000000000000 R09: 0000000000000000 [ 84.296023][ T5766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.296037][ T5766] R13: 00007f1823c06038 R14: 00007f1823c05fa0 R15: 00007fff9e04f018 [ 84.296128][ T5766] [ 84.884495][ T29] kauditd_printk_skb: 331 callbacks suppressed [ 84.884513][ T29] audit: type=1326 audit(1759785011.786:2588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 84.914232][ T29] audit: type=1326 audit(1759785011.786:2589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 84.959920][ T29] audit: type=1326 audit(1759785011.849:2590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 84.983364][ T29] audit: type=1326 audit(1759785011.849:2591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.006742][ T29] audit: type=1326 audit(1759785011.849:2592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.030220][ T29] audit: type=1326 audit(1759785011.849:2593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.053593][ T29] audit: type=1326 audit(1759785011.849:2594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.076988][ T29] audit: type=1326 audit(1759785011.849:2595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.100404][ T29] audit: type=1326 audit(1759785011.849:2596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.123755][ T29] audit: type=1326 audit(1759785011.849:2597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5789 comm="syz.4.848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f18239aeec9 code=0x7ffc0000 [ 85.204173][ T5781] FAULT_INJECTION: forcing a failure. [ 85.204173][ T5781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.217452][ T5781] CPU: 0 UID: 0 PID: 5781 Comm: syz.1.844 Not tainted syzkaller #0 PREEMPT(voluntary) [ 85.217540][ T5781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 85.217554][ T5781] Call Trace: [ 85.217561][ T5781] [ 85.217569][ T5781] __dump_stack+0x1d/0x30 [ 85.217744][ T5781] dump_stack_lvl+0xe8/0x140 [ 85.217778][ T5781] dump_stack+0x15/0x1b [ 85.217856][ T5781] should_fail_ex+0x265/0x280 [ 85.217891][ T5781] should_fail+0xb/0x20 [ 85.217941][ T5781] should_fail_usercopy+0x1a/0x20 [ 85.217962][ T5781] _copy_from_user+0x1c/0xb0 [ 85.217987][ T5781] ___sys_sendmsg+0xc1/0x1d0 [ 85.218026][ T5781] __x64_sys_sendmsg+0xd4/0x160 [ 85.218054][ T5781] x64_sys_call+0x191e/0x3000 [ 85.218114][ T5781] do_syscall_64+0xd2/0x200 [ 85.218142][ T5781] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 85.218175][ T5781] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 85.218246][ T5781] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.218267][ T5781] RIP: 0033:0x7f29108deec9 [ 85.218282][ T5781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.218367][ T5781] RSP: 002b:00007f290f31e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 85.218385][ T5781] RAX: ffffffffffffffda RBX: 00007f2910b36090 RCX: 00007f29108deec9 [ 85.218397][ T5781] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 85.218418][ T5781] RBP: 00007f290f31e090 R08: 0000000000000000 R09: 0000000000000000 [ 85.218430][ T5781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.218441][ T5781] R13: 00007f2910b36128 R14: 00007f2910b36090 R15: 00007fff69885d48 [ 85.218497][ T5781] [ 85.544203][ T5810] loop4: detected capacity change from 0 to 1024 [ 85.575010][ T5810] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 85.586005][ T5810] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 85.625286][ T5810] JBD2: no valid journal superblock found [ 85.631321][ T5810] EXT4-fs (loop4): Could not load journal inode [ 85.651856][ T5810] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 85.699990][ T5814] netlink: 'syz.2.857': attribute type 10 has an invalid length. [ 85.708058][ T5814] batadv0: left allmulticast mode [ 85.713112][ T5814] batadv0: left promiscuous mode [ 85.718246][ T5814] bridge0: port 3(batadv0) entered disabled state [ 85.751910][ T5814] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.756284][ T5819] netlink: 'syz.2.857': attribute type 10 has an invalid length. [ 85.764066][ T5814] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 85.766601][ T5819] netlink: 40 bytes leftover after parsing attributes in process `syz.2.857'. [ 85.787901][ T5819] batadv0: entered promiscuous mode [ 85.793304][ T5819] batadv0: entered allmulticast mode [ 85.799853][ T5819] bond0: (slave batadv0): Releasing backup interface [ 85.809660][ T5819] bridge0: port 3(batadv0) entered blocking state [ 85.816279][ T5819] bridge0: port 3(batadv0) entered disabled state [ 85.890327][ T5829] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 85.974153][ T10] Process accounting resumed [ 86.048979][ T5848] netlink: 'syz.3.873': attribute type 10 has an invalid length. [ 86.057048][ T5848] batadv0: left allmulticast mode [ 86.062264][ T5848] batadv0: left promiscuous mode [ 86.067375][ T5848] bridge0: port 3(batadv0) entered disabled state [ 86.075189][ T5848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.082892][ T5848] batadv0: entered promiscuous mode [ 86.088504][ T5848] $Hÿ: (slave batadv0): Enslaving as an active interface with an up link [ 86.097495][ T5851] netlink: 'syz.3.873': attribute type 10 has an invalid length. [ 86.105279][ T5851] netlink: 40 bytes leftover after parsing attributes in process `syz.3.873'. [ 86.114456][ T5851] batadv0: entered allmulticast mode [ 86.120836][ T5851] $Hÿ: (slave batadv0): Releasing backup interface [ 86.128581][ T5851] bridge0: port 3(batadv0) entered blocking state [ 86.135129][ T5851] bridge0: port 3(batadv0) entered disabled state [ 86.159229][ T5853] netlink: 8 bytes leftover after parsing attributes in process `syz.3.874'. [ 86.168195][ T5853] netlink: 'syz.3.874': attribute type 30 has an invalid length. [ 86.179301][ T2639] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 86.188751][ T2639] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 86.197973][ T2639] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 86.208603][ T2639] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 86.532851][ T5866] netlink: 'syz.1.880': attribute type 1 has an invalid length. [ 86.556833][ T5866] 8021q: adding VLAN 0 to HW filter on device bond1 [ 86.591095][ T5875] netlink: 4 bytes leftover after parsing attributes in process `syz.3.883'. [ 86.600387][ T5875] netlink: 12 bytes leftover after parsing attributes in process `syz.3.883'. [ 86.612609][ T5876] netlink: 4 bytes leftover after parsing attributes in process `syz.0.884'. [ 86.639871][ T5878] netlink: '+}[@': attribute type 10 has an invalid length. [ 86.694967][ T5886] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 86.869464][ T5909] netlink: 4 bytes leftover after parsing attributes in process `syz.2.898'. [ 87.014641][ T5919] netlink: 'syz.2.902': attribute type 3 has an invalid length. [ 87.260688][ T5935] loop4: detected capacity change from 0 to 512 [ 87.296581][ T5935] ext2: Unknown parameter 'dont_measure' [ 87.343600][ T5937] netlink: 8 bytes leftover after parsing attributes in process `syz.1.905'. [ 87.352534][ T5937] netlink: 'syz.1.905': attribute type 30 has an invalid length. [ 87.394232][ T37] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 87.412841][ T37] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 87.436273][ T37] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 87.441728][ T5943] netlink: 4 bytes leftover after parsing attributes in process `syz.1.911'. [ 87.473682][ T37] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 87.483628][ T5943] netlink: 12 bytes leftover after parsing attributes in process `syz.1.911'. [ 87.498379][ T5938] loop4: detected capacity change from 0 to 1024 [ 87.521180][ T5938] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 87.668093][ T5960] loop1: detected capacity change from 0 to 1024 [ 87.691885][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 87.727360][ T5960] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 87.738338][ T5960] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 87.764237][ T5960] JBD2: no valid journal superblock found [ 87.770038][ T5960] EXT4-fs (loop1): Could not load journal inode [ 87.828894][ T5960] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 88.257757][ T5990] batadv0: left allmulticast mode [ 88.262956][ T5990] batadv0: left promiscuous mode [ 88.268106][ T5990] bridge0: port 3(batadv0) entered disabled state [ 88.275423][ T5990] batman_adv: batadv0: Local translation table size (60) exceeds maximum packet size (-320); Ignoring new local tt entry: aa:aa:aa:aa:aa:17 [ 88.290745][ T5990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.299301][ T5990] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 88.306537][ T5991] netlink: 40 bytes leftover after parsing attributes in process `syz.0.927'. [ 88.317076][ T5991] batadv0: entered promiscuous mode [ 88.322355][ T5991] batadv0: entered allmulticast mode [ 88.328793][ T5991] bond0: (slave batadv0): Releasing backup interface [ 88.337563][ T5991] bridge0: port 3(batadv0) entered blocking state [ 88.344024][ T5991] bridge0: port 3(batadv0) entered disabled state [ 88.351277][ T5991] batman_adv: batadv0: Local translation table size (68) exceeds maximum packet size (-320); Ignoring new local tt entry: aa:aa:aa:aa:aa:2a [ 88.382830][ T5993] netlink: 8 bytes leftover after parsing attributes in process `syz.0.928'. [ 88.418866][ T5995] batman_adv: batadv0: Interface deactivated: dummy0 [ 88.425700][ T5995] batman_adv: batadv0: Removing interface: dummy0 [ 88.433814][ T5995] bridge0: port 3(batadv0) entered disabled state [ 88.441618][ T3382] syz_tun: tun_net_xmit 110 [ 88.450197][ T5995] bridge_slave_0: left allmulticast mode [ 88.455969][ T5995] bridge_slave_0: left promiscuous mode [ 88.461771][ T5995] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.472185][ T5995] bridge_slave_1: left allmulticast mode [ 88.477909][ T5995] bridge_slave_1: left promiscuous mode [ 88.483753][ T5995] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.493505][ T5995] bond0: (slave bond_slave_0): Releasing backup interface [ 88.503571][ T5995] bond0: (slave bond_slave_1): Releasing backup interface [ 88.516277][ T5995] team0: Port device team_slave_0 removed [ 88.524968][ T5995] team0: Port device team_slave_1 removed [ 88.532204][ T5995] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 88.539660][ T5995] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 88.548897][ T5995] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 88.556340][ T5995] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 88.566272][ T5995] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 88.623671][ T5999] team0: Port device dummy0 removed [ 88.630165][ T5999] bridge0: port 3(batadv0) entered disabled state [ 88.637216][ T3382] syz_tun: tun_net_xmit 110 [ 88.648272][ T5999] bridge_slave_0: left promiscuous mode [ 88.654109][ T5999] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.679946][ T5999] bridge_slave_1: left allmulticast mode [ 88.685659][ T5999] bridge_slave_1: left promiscuous mode [ 88.691499][ T5999] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.705328][ T5999] bond0: (slave bond_slave_0): Releasing backup interface [ 88.715998][ T5999] bond0: (slave bond_slave_1): Releasing backup interface [ 88.730344][ T5999] team0: Port device team_slave_0 removed [ 88.741757][ T5999] team0: Port device team_slave_1 removed [ 88.748873][ T5999] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 88.756312][ T5999] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 88.772563][ T5999] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 88.780153][ T5999] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 88.784822][ T6022] netlink: 4 bytes leftover after parsing attributes in process `syz.3.939'. [ 88.798134][ T6021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=6021 comm=syz.4.940 [ 88.813378][ T5999] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 88.821244][ T6021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6021 comm=syz.4.940 [ 88.849736][ T6021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6021 comm=syz.4.940 [ 88.887659][ T6027] bond0: (slave dummy0): Releasing backup interface [ 88.907551][ T6027] team0: Port device dummy0 added [ 88.984195][ T6048] FAULT_INJECTION: forcing a failure. [ 88.984195][ T6048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 88.997591][ T6048] CPU: 1 UID: 0 PID: 6048 Comm: syz.4.952 Not tainted syzkaller #0 PREEMPT(voluntary) [ 88.997660][ T6048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 88.997683][ T6048] Call Trace: [ 88.997692][ T6048] [ 88.997702][ T6048] __dump_stack+0x1d/0x30 [ 88.997746][ T6048] dump_stack_lvl+0xe8/0x140 [ 88.997813][ T6048] dump_stack+0x15/0x1b [ 88.997850][ T6048] should_fail_ex+0x265/0x280 [ 88.997892][ T6048] should_fail_alloc_page+0xf2/0x100 [ 88.997924][ T6048] __alloc_frozen_pages_noprof+0xff/0x360 [ 88.998014][ T6048] alloc_pages_mpol+0xb3/0x260 [ 88.998057][ T6048] vma_alloc_folio_noprof+0x1aa/0x300 [ 88.998122][ T6048] do_wp_page+0xf60/0x2510 [ 88.998157][ T6048] ? __rcu_read_lock+0x37/0x50 [ 88.998248][ T6048] ? css_rstat_updated+0xb7/0x240 [ 88.998309][ T6048] ? __rcu_read_lock+0x37/0x50 [ 88.998341][ T6048] handle_mm_fault+0x77d/0x2be0 [ 88.998369][ T6048] ? vma_start_read+0x141/0x1f0 [ 88.998402][ T6048] do_user_addr_fault+0x630/0x1080 [ 88.998423][ T6048] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 88.998535][ T6048] exc_page_fault+0x62/0xa0 [ 88.998562][ T6048] asm_exc_page_fault+0x26/0x30 [ 88.998651][ T6048] RIP: 0033:0x7f1823870cb0 [ 88.998718][ T6048] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 88.998737][ T6048] RSP: 002b:00007f18224164a0 EFLAGS: 00010202 [ 88.998752][ T6048] RAX: 0000000000006005 RBX: 00007f1822416540 RCX: 0000000000000101 [ 88.998764][ T6048] RDX: 00000000000003ff RSI: 0000000000001000 RDI: 00007f18224165e0 [ 88.998775][ T6048] RBP: 0000000000000102 R08: 00007f1819ff7000 R09: 0000000000000010 [ 88.998786][ T6048] R10: 0000200000000542 R11: 0000000000000529 R12: 0000000000000c01 [ 88.998804][ T6048] R13: 00007f1823a4db80 R14: 0000000000000017 R15: 00007f18224165e0 [ 88.998872][ T6048] [ 88.998883][ T6048] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 89.140698][ T6065] validate_nla: 4 callbacks suppressed [ 89.140717][ T6065] netlink: '+}[@': attribute type 10 has an invalid length. [ 89.189518][ T6069] netlink: 'syz.4.961': attribute type 30 has an invalid length. [ 89.219606][ T6065] team0: Port device dummy0 added [ 89.355370][ T6094] FAULT_INJECTION: forcing a failure. [ 89.355370][ T6094] name failslab, interval 1, probability 0, space 0, times 0 [ 89.368206][ T6094] CPU: 0 UID: 0 PID: 6094 Comm: syz.0.972 Not tainted syzkaller #0 PREEMPT(voluntary) [ 89.368240][ T6094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 89.368255][ T6094] Call Trace: [ 89.368265][ T6094] [ 89.368273][ T6094] __dump_stack+0x1d/0x30 [ 89.368386][ T6094] dump_stack_lvl+0xe8/0x140 [ 89.368423][ T6094] dump_stack+0x15/0x1b [ 89.368522][ T6094] should_fail_ex+0x265/0x280 [ 89.368561][ T6094] should_failslab+0x8c/0xb0 [ 89.368589][ T6094] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 89.368626][ T6094] ? sidtab_sid2str_get+0xa0/0x130 [ 89.368810][ T6094] kmemdup_noprof+0x2b/0x70 [ 89.368902][ T6094] sidtab_sid2str_get+0xa0/0x130 [ 89.368935][ T6094] security_sid_to_context_core+0x1eb/0x2e0 [ 89.368972][ T6094] security_sid_to_context+0x27/0x40 [ 89.369047][ T6094] avc_audit_post_callback+0x9d/0x520 [ 89.369079][ T6094] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 89.369163][ T6094] common_lsm_audit+0x1bb/0x230 [ 89.369194][ T6094] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 89.369238][ T6094] slow_avc_audit+0x104/0x140 [ 89.369291][ T6094] avc_has_perm+0x13a/0x180 [ 89.369334][ T6094] selinux_kernel_module_request+0xb0/0xe0 [ 89.369424][ T6094] security_kernel_module_request+0x36/0x70 [ 89.369454][ T6094] __request_module+0x121/0x3e0 [ 89.369546][ T6094] ? capable+0x7c/0xb0 [ 89.369638][ T6094] ? security_capable+0x83/0x90 [ 89.369719][ T6094] dev_load+0x61/0xc0 [ 89.369740][ T6094] dev_ioctl+0x777/0x960 [ 89.369796][ T6094] sock_ioctl+0x593/0x610 [ 89.369829][ T6094] ? __pfx_sock_ioctl+0x10/0x10 [ 89.369945][ T6094] __se_sys_ioctl+0xce/0x140 [ 89.369966][ T6094] __x64_sys_ioctl+0x43/0x50 [ 89.369983][ T6094] x64_sys_call+0x1816/0x3000 [ 89.370003][ T6094] do_syscall_64+0xd2/0x200 [ 89.370049][ T6094] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 89.370082][ T6094] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 89.370114][ T6094] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.370176][ T6094] RIP: 0033:0x7f165238eec9 [ 89.370191][ T6094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.370212][ T6094] RSP: 002b:00007f1650df7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 89.370230][ T6094] RAX: ffffffffffffffda RBX: 00007f16525e5fa0 RCX: 00007f165238eec9 [ 89.370242][ T6094] RDX: 0000200000000940 RSI: 00000000000089f3 RDI: 0000000000000003 [ 89.370253][ T6094] RBP: 00007f1650df7090 R08: 0000000000000000 R09: 0000000000000000 [ 89.370264][ T6094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.370275][ T6094] R13: 00007f16525e6038 R14: 00007f16525e5fa0 R15: 00007ffdbfcc57f8 [ 89.370372][ T6094] [ 89.657335][ T29] kauditd_printk_skb: 525 callbacks suppressed [ 89.657349][ T29] audit: type=1400 audit(1759785016.793:3123): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.702337][ T29] audit: type=1400 audit(1759785016.835:3124): avc: denied { prog_load } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.721400][ T29] audit: type=1400 audit(1759785016.835:3125): avc: denied { create } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 89.741548][ T29] audit: type=1400 audit(1759785016.835:3126): avc: denied { create } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 89.761265][ T29] audit: type=1400 audit(1759785016.835:3127): avc: denied { create } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 89.780733][ T29] audit: type=1400 audit(1759785016.835:3128): avc: denied { map_create } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.799859][ T29] audit: type=1400 audit(1759785016.835:3129): avc: denied { prog_load } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.818875][ T29] audit: type=1400 audit(1759785016.835:3130): avc: denied { prog_load } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.838106][ T29] audit: type=1400 audit(1759785016.835:3131): avc: denied { create } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 89.858735][ T29] audit: type=1400 audit(1759785016.835:3132): avc: denied { create } for pid=6098 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 89.867114][ T6116] netlink: 'syz.0.982': attribute type 1 has an invalid length. [ 89.985623][ T6128] syz.3.988 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 90.194867][ T52] netdevsim netdevsim1 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 90.203916][ T52] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 20001 - 0 [ 90.213007][ T52] netdevsim netdevsim1 netdevsim0: unset [1, 1] type 2 family 0 port 6081 - 0 [ 90.238420][ T52] netdevsim netdevsim1 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 90.247376][ T52] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 20001 - 0 [ 90.256486][ T52] netdevsim netdevsim1 netdevsim1: unset [1, 1] type 2 family 0 port 6081 - 0 [ 90.278892][ T52] netdevsim netdevsim1 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 90.287957][ T52] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 20001 - 0 [ 90.297009][ T52] netdevsim netdevsim1 netdevsim2: unset [1, 1] type 2 family 0 port 6081 - 0 [ 90.353033][ T6182] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 90.368900][ T52] netdevsim netdevsim1 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 90.377951][ T52] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 20001 - 0 [ 90.387012][ T52] netdevsim netdevsim1 netdevsim3: unset [1, 1] type 2 family 0 port 6081 - 0 [ 91.063514][ T6241] netlink: '+}[@': attribute type 10 has an invalid length. [ 91.082705][ T6241] team0: Port device dummy0 added [ 91.247068][ T6263] netlink: '+}[@': attribute type 10 has an invalid length. [ 91.367859][ T6277] __nla_validate_parse: 20 callbacks suppressed [ 91.367874][ T6277] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1054'. [ 91.513651][ T6282] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1058'. [ 91.527588][ T6282] FAULT_INJECTION: forcing a failure. [ 91.527588][ T6282] name failslab, interval 1, probability 0, space 0, times 0 [ 91.540382][ T6282] CPU: 0 UID: 0 PID: 6282 Comm: syz.1.1058 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.540415][ T6282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.540430][ T6282] Call Trace: [ 91.540437][ T6282] [ 91.540446][ T6282] __dump_stack+0x1d/0x30 [ 91.540490][ T6282] dump_stack_lvl+0xe8/0x140 [ 91.540532][ T6282] dump_stack+0x15/0x1b [ 91.540566][ T6282] should_fail_ex+0x265/0x280 [ 91.540610][ T6282] should_failslab+0x8c/0xb0 [ 91.540663][ T6282] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 91.540728][ T6282] ? __alloc_skb+0x101/0x320 [ 91.540766][ T6282] __alloc_skb+0x101/0x320 [ 91.540868][ T6282] netlink_ack+0xfd/0x500 [ 91.540892][ T6282] ? avc_has_perm_noaudit+0x1b1/0x200 [ 91.540934][ T6282] netlink_rcv_skb+0x192/0x220 [ 91.540954][ T6282] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 91.541005][ T6282] rtnetlink_rcv+0x1c/0x30 [ 91.541034][ T6282] netlink_unicast+0x5c0/0x690 [ 91.541075][ T6282] netlink_sendmsg+0x58b/0x6b0 [ 91.541148][ T6282] ? __pfx_netlink_sendmsg+0x10/0x10 [ 91.541168][ T6282] __sock_sendmsg+0x142/0x180 [ 91.541198][ T6282] ____sys_sendmsg+0x31e/0x4e0 [ 91.541249][ T6282] ___sys_sendmsg+0x17b/0x1d0 [ 91.541285][ T6282] __x64_sys_sendmsg+0xd4/0x160 [ 91.541309][ T6282] x64_sys_call+0x191e/0x3000 [ 91.541329][ T6282] do_syscall_64+0xd2/0x200 [ 91.541396][ T6282] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.541473][ T6282] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 91.541520][ T6282] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.541548][ T6282] RIP: 0033:0x7f29108deec9 [ 91.541567][ T6282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.541636][ T6282] RSP: 002b:00007f290f33f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.541660][ T6282] RAX: ffffffffffffffda RBX: 00007f2910b35fa0 RCX: 00007f29108deec9 [ 91.541675][ T6282] RDX: 00000000000040c0 RSI: 00002000000003c0 RDI: 0000000000000004 [ 91.541691][ T6282] RBP: 00007f290f33f090 R08: 0000000000000000 R09: 0000000000000000 [ 91.541762][ T6282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.541773][ T6282] R13: 00007f2910b36038 R14: 00007f2910b35fa0 R15: 00007fff69885d48 [ 91.541792][ T6282] [ 91.811500][ T6293] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1063'. [ 91.820923][ T6293] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1063'. [ 91.864269][ T6300] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1067'. [ 91.895593][ T6308] FAULT_INJECTION: forcing a failure. [ 91.895593][ T6308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.908864][ T6308] CPU: 1 UID: 0 PID: 6308 Comm: syz.1.1069 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.908929][ T6308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.908945][ T6308] Call Trace: [ 91.908953][ T6308] [ 91.908963][ T6308] __dump_stack+0x1d/0x30 [ 91.909057][ T6308] dump_stack_lvl+0xe8/0x140 [ 91.909098][ T6308] dump_stack+0x15/0x1b [ 91.909135][ T6308] should_fail_ex+0x265/0x280 [ 91.909188][ T6308] should_fail+0xb/0x20 [ 91.909209][ T6308] should_fail_usercopy+0x1a/0x20 [ 91.909235][ T6308] _copy_from_user+0x1c/0xb0 [ 91.909266][ T6308] kstrtouint_from_user+0x69/0xf0 [ 91.909291][ T6308] ? 0xffffffff81000000 [ 91.909371][ T6308] ? selinux_file_permission+0x1e4/0x320 [ 91.909447][ T6308] proc_fail_nth_write+0x50/0x160 [ 91.909523][ T6308] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 91.909557][ T6308] vfs_write+0x266/0x960 [ 91.909584][ T6308] ? vfs_read+0x4e6/0x770 [ 91.909609][ T6308] ? __rcu_read_unlock+0x4f/0x70 [ 91.909670][ T6308] ? __fget_files+0x184/0x1c0 [ 91.909726][ T6308] ksys_write+0xda/0x1a0 [ 91.909752][ T6308] __x64_sys_write+0x40/0x50 [ 91.909778][ T6308] x64_sys_call+0x2802/0x3000 [ 91.909873][ T6308] do_syscall_64+0xd2/0x200 [ 91.909904][ T6308] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.909971][ T6308] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 91.910079][ T6308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.910107][ T6308] RIP: 0033:0x7f29108dd97f [ 91.910125][ T6308] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 91.910146][ T6308] RSP: 002b:00007f290f33f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 91.910201][ T6308] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f29108dd97f [ 91.910219][ T6308] RDX: 0000000000000001 RSI: 00007f290f33f0a0 RDI: 0000000000000003 [ 91.910235][ T6308] RBP: 00007f290f33f090 R08: 0000000000000000 R09: 0000000000000000 [ 91.910251][ T6308] R10: 0000000000000056 R11: 0000000000000293 R12: 0000000000000001 [ 91.910266][ T6308] R13: 00007f2910b36038 R14: 00007f2910b35fa0 R15: 00007fff69885d48 [ 91.910293][ T6308] [ 92.176881][ T6320] netlink: 52 bytes leftover after parsing attributes in process `syz.3.1075'. [ 92.196458][ T6323] FAULT_INJECTION: forcing a failure. [ 92.196458][ T6323] name failslab, interval 1, probability 0, space 0, times 0 [ 92.209405][ T6323] CPU: 1 UID: 0 PID: 6323 Comm: syz.1.1077 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.209431][ T6323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.209447][ T6323] Call Trace: [ 92.209455][ T6323] [ 92.209464][ T6323] __dump_stack+0x1d/0x30 [ 92.209508][ T6323] dump_stack_lvl+0xe8/0x140 [ 92.209603][ T6323] dump_stack+0x15/0x1b [ 92.209634][ T6323] should_fail_ex+0x265/0x280 [ 92.209670][ T6323] should_failslab+0x8c/0xb0 [ 92.209733][ T6323] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 92.209768][ T6323] ? __alloc_skb+0x101/0x320 [ 92.209808][ T6323] __alloc_skb+0x101/0x320 [ 92.209910][ T6323] ? audit_log_start+0x342/0x720 [ 92.209997][ T6323] audit_log_start+0x3a0/0x720 [ 92.210038][ T6323] ? kstrtouint+0x76/0xc0 [ 92.210072][ T6323] audit_seccomp+0x48/0x100 [ 92.210151][ T6323] ? __seccomp_filter+0x82d/0x1250 [ 92.210176][ T6323] __seccomp_filter+0x83e/0x1250 [ 92.210214][ T6323] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 92.210385][ T6323] ? vfs_write+0x7e8/0x960 [ 92.210414][ T6323] ? __rcu_read_unlock+0x4f/0x70 [ 92.210441][ T6323] ? __fget_files+0x184/0x1c0 [ 92.210469][ T6323] __secure_computing+0x82/0x150 [ 92.210554][ T6323] syscall_trace_enter+0xcf/0x1e0 [ 92.210586][ T6323] do_syscall_64+0xac/0x200 [ 92.210614][ T6323] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.210670][ T6323] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.210703][ T6323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.210742][ T6323] RIP: 0033:0x7f29108deec9 [ 92.210760][ T6323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.210779][ T6323] RSP: 002b:00007f290f33f038 EFLAGS: 00000246 ORIG_RAX: 000000000000004e [ 92.210800][ T6323] RAX: ffffffffffffffda RBX: 00007f2910b35fa0 RCX: 00007f29108deec9 [ 92.210816][ T6323] RDX: 0000000000000018 RSI: 0000000000000000 RDI: 0000000000000003 [ 92.210853][ T6323] RBP: 00007f290f33f090 R08: 0000000000000000 R09: 0000000000000000 [ 92.210869][ T6323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.210883][ T6323] R13: 00007f2910b36038 R14: 00007f2910b35fa0 R15: 00007fff69885d48 [ 92.210902][ T6323] [ 92.441151][ T6329] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1079'. [ 92.450693][ T6329] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1079'. [ 92.502866][ T6338] FAULT_INJECTION: forcing a failure. [ 92.502866][ T6338] name failslab, interval 1, probability 0, space 0, times 0 [ 92.515632][ T6338] CPU: 1 UID: 0 PID: 6338 Comm: syz.0.1082 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.515664][ T6338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.515730][ T6338] Call Trace: [ 92.515737][ T6338] [ 92.515745][ T6338] __dump_stack+0x1d/0x30 [ 92.515780][ T6338] dump_stack_lvl+0xe8/0x140 [ 92.515818][ T6338] dump_stack+0x15/0x1b [ 92.515855][ T6338] should_fail_ex+0x265/0x280 [ 92.515895][ T6338] ? audit_log_d_path+0x8d/0x150 [ 92.515913][ T6338] should_failslab+0x8c/0xb0 [ 92.515944][ T6338] __kmalloc_cache_noprof+0x4c/0x4a0 [ 92.516042][ T6338] audit_log_d_path+0x8d/0x150 [ 92.516065][ T6338] audit_log_d_path_exe+0x42/0x70 [ 92.516089][ T6338] audit_log_task+0x1e9/0x250 [ 92.516185][ T6338] ? kstrtouint+0x76/0xc0 [ 92.516220][ T6338] audit_seccomp+0x61/0x100 [ 92.516255][ T6338] ? __seccomp_filter+0x82d/0x1250 [ 92.516286][ T6338] __seccomp_filter+0x83e/0x1250 [ 92.516325][ T6338] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 92.516423][ T6338] ? vfs_write+0x7e8/0x960 [ 92.516473][ T6338] ? __rcu_read_unlock+0x4f/0x70 [ 92.516544][ T6338] ? __fget_files+0x184/0x1c0 [ 92.516571][ T6338] __secure_computing+0x82/0x150 [ 92.516595][ T6338] syscall_trace_enter+0xcf/0x1e0 [ 92.516626][ T6338] do_syscall_64+0xac/0x200 [ 92.516661][ T6338] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.516706][ T6338] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.516737][ T6338] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.516764][ T6338] RIP: 0033:0x7f165238eec9 [ 92.516860][ T6338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.516882][ T6338] RSP: 002b:00007f1650df7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 92.516905][ T6338] RAX: ffffffffffffffda RBX: 00007f16525e5fa0 RCX: 00007f165238eec9 [ 92.516921][ T6338] RDX: 0000000000000000 RSI: 000000003f0b55c6 RDI: 0000000000000004 [ 92.516937][ T6338] RBP: 00007f1650df7090 R08: 0000000000000000 R09: 0000000000000000 [ 92.516952][ T6338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.516967][ T6338] R13: 00007f16525e6038 R14: 00007f16525e5fa0 R15: 00007ffdbfcc57f8 [ 92.517022][ T6338] [ 92.743645][ C1] syz_tun: tun_net_xmit 42 [ 92.879794][ T6352] $Hÿ: renamed from bond0 (while UP) [ 92.887519][ T6352] $Hÿ: entered promiscuous mode [ 93.337269][ T6373] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1096'. [ 93.346212][ T6373] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1096'. [ 93.631955][ T6380] netlink: '+}[@': attribute type 10 has an invalid length. [ 93.744086][ C1] syz_tun: tun_net_xmit 42 [ 94.005417][ T6405] netlink: 'syz.2.1111': attribute type 1 has an invalid length. [ 94.020490][ T6405] 8021q: adding VLAN 0 to HW filter on device bond1 [ 94.212641][ T6430] netlink: 'syz.3.1123': attribute type 1 has an invalid length. [ 94.229384][ T6430] 8021q: adding VLAN 0 to HW filter on device bond1 [ 94.396915][ T29] kauditd_printk_skb: 1244 callbacks suppressed [ 94.396930][ T29] audit: type=1400 audit(1759785789.801:4375): avc: denied { prog_load } for pid=6459 comm="syz.4.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.423230][ T29] audit: type=1400 audit(1759785789.822:4376): avc: denied { mount } for pid=6459 comm="syz.4.1136" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 94.497608][ T6467] netlink: 'syz.2.1139': attribute type 1 has an invalid length. [ 94.513016][ T6467] 8021q: adding VLAN 0 to HW filter on device bond2 [ 94.554264][ T29] audit: type=1400 audit(1759785789.959:4377): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.631983][ T29] audit: type=1400 audit(1759785789.991:4378): avc: denied { mounton } for pid=6470 comm="syz.1.1141" path="/207" dev="tmpfs" ino=1110 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 94.654709][ T29] audit: type=1400 audit(1759785790.002:4379): avc: denied { prog_load } for pid=6469 comm="syz.2.1140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.673777][ T29] audit: type=1400 audit(1759785790.023:4380): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.698223][ T29] audit: type=1400 audit(1759785790.033:4381): avc: denied { prog_load } for pid=6473 comm=77DEA105FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.727526][ T29] audit: type=1400 audit(1759785790.150:4382): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.727650][ C1] syz_tun: tun_net_xmit 42 [ 94.779280][ T29] audit: type=1400 audit(1759785790.181:4383): avc: denied { map_create } for pid=6477 comm="syz.2.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.798605][ T29] audit: type=1400 audit(1759785790.181:4384): avc: denied { prog_load } for pid=6477 comm="syz.2.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.875813][ T6492] netlink: 'syz.0.1151': attribute type 1 has an invalid length. [ 94.895467][ T6492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.903983][ T6484] $Hÿ: renamed from bond0 [ 94.912706][ T6484] $Hÿ: entered promiscuous mode [ 94.917880][ T6484] bond_slave_0: entered promiscuous mode [ 94.923669][ T6484] bond_slave_1: entered promiscuous mode [ 95.153709][ T6519] FAULT_INJECTION: forcing a failure. [ 95.153709][ T6519] name failslab, interval 1, probability 0, space 0, times 0 [ 95.166468][ T6519] CPU: 0 UID: 0 PID: 6519 Comm: syz.0.1161 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.166560][ T6519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 95.166576][ T6519] Call Trace: [ 95.166584][ T6519] [ 95.166593][ T6519] __dump_stack+0x1d/0x30 [ 95.166681][ T6519] dump_stack_lvl+0xe8/0x140 [ 95.166734][ T6519] dump_stack+0x15/0x1b [ 95.166770][ T6519] should_fail_ex+0x265/0x280 [ 95.166871][ T6519] should_failslab+0x8c/0xb0 [ 95.166979][ T6519] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 95.167013][ T6519] ? __alloc_skb+0x101/0x320 [ 95.167054][ T6519] __alloc_skb+0x101/0x320 [ 95.167133][ T6519] ? audit_log_start+0x342/0x720 [ 95.167178][ T6519] audit_log_start+0x3a0/0x720 [ 95.167243][ T6519] ? kstrtouint+0x76/0xc0 [ 95.167286][ T6519] audit_seccomp+0x48/0x100 [ 95.167366][ T6519] ? __seccomp_filter+0x82d/0x1250 [ 95.167461][ T6519] __seccomp_filter+0x83e/0x1250 [ 95.167576][ T6519] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 95.167697][ T6519] ? vfs_write+0x7e8/0x960 [ 95.167732][ T6519] __secure_computing+0x82/0x150 [ 95.167762][ T6519] syscall_trace_enter+0xcf/0x1e0 [ 95.167800][ T6519] do_syscall_64+0xac/0x200 [ 95.167858][ T6519] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.167887][ T6519] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 95.167919][ T6519] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.167939][ T6519] RIP: 0033:0x7f165238eec9 [ 95.167957][ T6519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.168022][ T6519] RSP: 002b:00007f1650df7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000087 [ 95.168054][ T6519] RAX: ffffffffffffffda RBX: 00007f16525e5fa0 RCX: 00007f165238eec9 [ 95.168070][ T6519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000500006 [ 95.168083][ T6519] RBP: 00007f1650df7090 R08: 0000000000000000 R09: 0000000000000000 [ 95.168097][ T6519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.168153][ T6519] R13: 00007f16525e6038 R14: 00007f16525e5fa0 R15: 00007ffdbfcc57f8 [ 95.168178][ T6519] [ 95.396717][ T6523] netlink: 'syz.4.1163': attribute type 1 has an invalid length. [ 95.450685][ T6523] 8021q: adding VLAN 0 to HW filter on device bond1 [ 95.537455][ T6529] $Hÿ: renamed from bond0 (while UP) [ 95.552609][ T6529] $Hÿ: entered promiscuous mode [ 95.711509][ C1] syz_tun: tun_net_xmit 42 [ 95.762387][ T6574] team0: Port device dummy0 removed [ 95.769058][ T6574] bridge0: port 3(batadv0) entered disabled state [ 95.777248][ T6574] bridge_slave_0: left allmulticast mode [ 95.777266][ T6574] bridge_slave_0: left promiscuous mode [ 95.777366][ T6574] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.778112][ T6574] bridge_slave_1: left allmulticast mode [ 95.778213][ T6574] bridge_slave_1: left promiscuous mode [ 95.778327][ T6574] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.785857][ T6574] bond0: (slave bond_slave_0): Releasing backup interface [ 95.811038][ T6578] netlink: 'syz.4.1184': attribute type 10 has an invalid length. [ 95.833637][ T6574] bond0: (slave bond_slave_1): Releasing backup interface [ 95.842272][ T6574] team0: Port device team_slave_0 removed [ 95.848554][ T6574] team0: Port device team_slave_1 removed [ 95.848717][ T6574] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 95.849545][ T6574] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 95.871063][ T6574] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 95.887530][ T6578] veth1_vlan: left promiscuous mode [ 95.888658][ T6578] batman_adv: batadv0: Adding interface: veth1_vlan [ 95.899437][ T6578] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 95.900082][ T6578] batman_adv: batadv0: Interface activated: veth1_vlan [ 96.218892][ T6617] 8021q: adding VLAN 0 to HW filter on device bond1 [ 96.481518][ T6625] __nla_validate_parse: 21 callbacks suppressed [ 96.481532][ T6625] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1202'. [ 96.497670][ T6625] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1202'. [ 96.595757][ T6630] lo speed is unknown, defaulting to 1000 [ 96.695365][ C1] syz_tun: tun_net_xmit 42 [ 96.768110][ T6644] netlink: 'syz.1.1209': attribute type 1 has an invalid length. [ 96.843720][ T6654] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1213'. [ 96.853430][ T6654] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1213'. [ 97.036171][ T6666] netlink: 'syz.0.1219': attribute type 4 has an invalid length. [ 97.037506][ T6623] Process accounting resumed [ 97.050859][ T6666] netlink: 'syz.0.1219': attribute type 4 has an invalid length. [ 97.084109][ T6673] netlink: 'syz.0.1222': attribute type 1 has an invalid length. [ 97.679265][ C1] syz_tun: tun_net_xmit 42 [ 97.761237][ T6714] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1240'. [ 97.770318][ T6714] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1240'. [ 97.775453][ T6716] macsec1: entered promiscuous mode [ 97.784569][ T6716] bridge0: entered promiscuous mode [ 97.790717][ T6716] bridge0: port 4(macsec1) entered blocking state [ 97.797346][ T6716] bridge0: port 4(macsec1) entered disabled state [ 97.804259][ T6716] macsec1: entered allmulticast mode [ 97.809667][ T6716] bridge0: entered allmulticast mode [ 97.815905][ T6716] macsec1: left allmulticast mode [ 97.820974][ T6716] bridge0: left allmulticast mode [ 97.826801][ T6716] bridge0: left promiscuous mode [ 98.133022][ T6695] Process accounting resumed [ 98.510729][ T6750] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1255'. [ 99.028032][ T6767] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1261'. [ 99.037004][ T6767] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1261'. [ 99.126046][ T6771] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1263'. [ 99.145161][ T29] kauditd_printk_skb: 794 callbacks suppressed [ 99.145185][ T29] audit: type=1400 audit(1759785794.811:5177): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.178741][ T29] audit: type=1400 audit(1759785794.853:5178): avc: denied { map_create } for pid=6774 comm="syz.2.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.198155][ T29] audit: type=1400 audit(1759785794.853:5179): avc: denied { prog_load } for pid=6774 comm="syz.2.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.217301][ T29] audit: type=1400 audit(1759785794.853:5180): avc: denied { prog_load } for pid=6774 comm="syz.2.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.236528][ T29] audit: type=1400 audit(1759785794.853:5181): avc: denied { mount } for pid=6774 comm="syz.2.1265" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 99.259620][ T29] audit: type=1400 audit(1759785794.874:5182): avc: denied { create } for pid=6777 comm="syz.4.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 99.280240][ T29] audit: type=1400 audit(1759785794.874:5183): avc: denied { create } for pid=6777 comm="syz.4.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 99.300925][ T29] audit: type=1400 audit(1759785794.906:5184): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.310023][ T6780] validate_nla: 2 callbacks suppressed [ 99.310043][ T6780] netlink: '+}[@': attribute type 10 has an invalid length. [ 99.325791][ T29] audit: type=1400 audit(1759785794.990:5185): avc: denied { prog_load } for pid=6779 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.356626][ T29] audit: type=1400 audit(1759785794.990:5186): avc: denied { map_create } for pid=6779 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.380354][ T6780] team0: Port device dummy0 added [ 99.547292][ T6798] FAULT_INJECTION: forcing a failure. [ 99.547292][ T6798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.560451][ T6798] CPU: 1 UID: 0 PID: 6798 Comm: syz.1.1275 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.560533][ T6798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.560607][ T6798] Call Trace: [ 99.560679][ T6798] [ 99.560689][ T6798] __dump_stack+0x1d/0x30 [ 99.560732][ T6798] dump_stack_lvl+0xe8/0x140 [ 99.560823][ T6798] dump_stack+0x15/0x1b [ 99.560853][ T6798] should_fail_ex+0x265/0x280 [ 99.560893][ T6798] should_fail+0xb/0x20 [ 99.560913][ T6798] should_fail_usercopy+0x1a/0x20 [ 99.560982][ T6798] _copy_from_iter+0xd2/0xe80 [ 99.561016][ T6798] ? alloc_pages_mpol+0x217/0x260 [ 99.561314][ T6798] copy_page_from_iter+0x178/0x2a0 [ 99.561340][ T6798] tun_get_user+0x679/0x26e0 [ 99.561368][ T6798] ? ref_tracker_alloc+0x1f2/0x2f0 [ 99.561427][ T6798] tun_chr_write_iter+0x15e/0x210 [ 99.561455][ T6798] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 99.561507][ T6798] vfs_write+0x527/0x960 [ 99.561605][ T6798] ksys_write+0xda/0x1a0 [ 99.561632][ T6798] __x64_sys_write+0x40/0x50 [ 99.561714][ T6798] x64_sys_call+0x2802/0x3000 [ 99.561737][ T6798] do_syscall_64+0xd2/0x200 [ 99.561798][ T6798] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.561826][ T6798] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 99.561853][ T6798] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.561897][ T6798] RIP: 0033:0x7f29108dd97f [ 99.561912][ T6798] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 99.561990][ T6798] RSP: 002b:00007f290f33f000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 99.562027][ T6798] RAX: ffffffffffffffda RBX: 00007f2910b35fa0 RCX: 00007f29108dd97f [ 99.562052][ T6798] RDX: 000000000000007a RSI: 0000200000000000 RDI: 00000000000000c8 [ 99.562136][ T6798] RBP: 00007f290f33f090 R08: 0000000000000000 R09: 0000000000000000 [ 99.562149][ T6798] R10: 000000000000007a R11: 0000000000000293 R12: 0000000000000001 [ 99.562161][ T6798] R13: 00007f2910b36038 R14: 00007f2910b35fa0 R15: 00007fff69885d48 [ 99.562286][ T6798] [ 100.039467][ T6820] netlink: 'syz.0.1281': attribute type 2 has an invalid length. [ 100.231757][ T6829] netlink: 'syz.0.1284': attribute type 4 has an invalid length. [ 100.285871][ T6829] netlink: 'syz.0.1284': attribute type 4 has an invalid length. [ 100.416290][ T6843] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6843 comm=syz.3.1287 [ 100.466240][ T6846] syz_tun: tun_net_xmit 42 [ 100.766792][ T6873] netlink: '+}[@': attribute type 10 has an invalid length. [ 100.849862][ T6883] netlink: 'syz.2.1305': attribute type 13 has an invalid length. [ 101.017425][ T6884] geneve2: entered promiscuous mode [ 101.022738][ T6884] geneve2: entered allmulticast mode [ 101.029084][ T2639] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 101.038675][ T2639] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 101.047709][ T2639] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 101.057092][ T2639] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 101.464928][ C1] syz_tun: tun_net_xmit 42 [ 102.185554][ T6937] FAULT_INJECTION: forcing a failure. [ 102.185554][ T6937] name failslab, interval 1, probability 0, space 0, times 0 [ 102.198268][ T6937] CPU: 0 UID: 0 PID: 6937 Comm: syz.4.1328 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.198300][ T6937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.198317][ T6937] Call Trace: [ 102.198324][ T6937] [ 102.198334][ T6937] __dump_stack+0x1d/0x30 [ 102.198449][ T6937] dump_stack_lvl+0xe8/0x140 [ 102.198488][ T6937] dump_stack+0x15/0x1b [ 102.198523][ T6937] should_fail_ex+0x265/0x280 [ 102.198601][ T6937] ? tcf_block_get_ext+0xcf/0xb30 [ 102.198635][ T6937] should_failslab+0x8c/0xb0 [ 102.198719][ T6937] __kmalloc_cache_noprof+0x4c/0x4a0 [ 102.198759][ T6937] tcf_block_get_ext+0xcf/0xb30 [ 102.198800][ T6937] ? rtnetlink_rcv+0x1c/0x30 [ 102.198831][ T6937] ? netlink_unicast+0x5c0/0x690 [ 102.198956][ T6937] ? __sock_sendmsg+0x142/0x180 [ 102.198992][ T6937] ? __pfx_multiq_init+0x10/0x10 [ 102.199013][ T6937] tcf_block_get+0x67/0xa0 [ 102.199092][ T6937] ? __pfx_tcf_chain_head_change_dflt+0x10/0x10 [ 102.199138][ T6937] multiq_init+0x58/0x1a0 [ 102.199163][ T6937] ? nla_strcmp+0xc3/0xe0 [ 102.199249][ T6937] ? __pfx_multiq_init+0x10/0x10 [ 102.199269][ T6937] qdisc_create+0x58e/0x9e0 [ 102.199307][ T6937] tc_modify_qdisc+0xf2e/0x1420 [ 102.199354][ T6937] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 102.199391][ T6937] rtnetlink_rcv_msg+0x65a/0x6d0 [ 102.199416][ T6937] ? avc_has_perm_noaudit+0x1b1/0x200 [ 102.199456][ T6937] netlink_rcv_skb+0x123/0x220 [ 102.199480][ T6937] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 102.199596][ T6937] rtnetlink_rcv+0x1c/0x30 [ 102.199622][ T6937] netlink_unicast+0x5c0/0x690 [ 102.199660][ T6937] netlink_sendmsg+0x58b/0x6b0 [ 102.199690][ T6937] ? __pfx_netlink_sendmsg+0x10/0x10 [ 102.199773][ T6937] __sock_sendmsg+0x142/0x180 [ 102.199811][ T6937] ____sys_sendmsg+0x31e/0x4e0 [ 102.199834][ T6937] ___sys_sendmsg+0x17b/0x1d0 [ 102.199871][ T6937] __x64_sys_sendmsg+0xd4/0x160 [ 102.199903][ T6937] x64_sys_call+0x191e/0x3000 [ 102.199992][ T6937] do_syscall_64+0xd2/0x200 [ 102.200027][ T6937] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.200062][ T6937] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 102.200137][ T6937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.200208][ T6937] RIP: 0033:0x7f18239aeec9 [ 102.200228][ T6937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.200252][ T6937] RSP: 002b:00007f1822417038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.200352][ T6937] RAX: ffffffffffffffda RBX: 00007f1823c05fa0 RCX: 00007f18239aeec9 [ 102.200365][ T6937] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000006 [ 102.200377][ T6937] RBP: 00007f1822417090 R08: 0000000000000000 R09: 0000000000000000 [ 102.200389][ T6937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.200400][ T6937] R13: 00007f1823c06038 R14: 00007f1823c05fa0 R15: 00007fff9e04f018 [ 102.200419][ T6937] [ 102.449431][ C1] syz_tun: tun_net_xmit 42 [ 102.785960][ T6957] __nla_validate_parse: 10 callbacks suppressed [ 102.785980][ T6957] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1337'. [ 102.836341][ T6958] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1338'. [ 102.914517][ T6970] FAULT_INJECTION: forcing a failure. [ 102.914517][ T6970] name failslab, interval 1, probability 0, space 0, times 0 [ 102.927396][ T6970] CPU: 1 UID: 0 PID: 6970 Comm: syz.4.1344 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.927422][ T6970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.927435][ T6970] Call Trace: [ 102.927443][ T6970] [ 102.927453][ T6970] __dump_stack+0x1d/0x30 [ 102.927506][ T6970] dump_stack_lvl+0xe8/0x140 [ 102.927549][ T6970] dump_stack+0x15/0x1b [ 102.927587][ T6970] should_fail_ex+0x265/0x280 [ 102.927660][ T6970] should_failslab+0x8c/0xb0 [ 102.927693][ T6970] kmem_cache_alloc_noprof+0x50/0x480 [ 102.927833][ T6970] ? __anon_vma_prepare+0x70/0x2f0 [ 102.927875][ T6970] __anon_vma_prepare+0x70/0x2f0 [ 102.927979][ T6970] do_wp_page+0x18ee/0x2510 [ 102.928002][ T6970] ? __rcu_read_lock+0x37/0x50 [ 102.928029][ T6970] ? css_rstat_updated+0xb7/0x240 [ 102.928062][ T6970] ? __rcu_read_lock+0x37/0x50 [ 102.928100][ T6970] handle_mm_fault+0x77d/0x2be0 [ 102.928140][ T6970] ? vma_start_read+0x141/0x1f0 [ 102.928183][ T6970] do_user_addr_fault+0x630/0x1080 [ 102.928255][ T6970] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 102.928295][ T6970] exc_page_fault+0x62/0xa0 [ 102.928323][ T6970] asm_exc_page_fault+0x26/0x30 [ 102.928366][ T6970] RIP: 0033:0x7f1823870c03 [ 102.928457][ T6970] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 102.928482][ T6970] RSP: 002b:00007f18224164a0 EFLAGS: 00010202 [ 102.928501][ T6970] RAX: 0000000000000400 RBX: 00007f1822416540 RCX: 00007f1819ff7000 [ 102.928547][ T6970] RDX: 00007f18224166e0 RSI: 0000000000000009 RDI: 00007f18224165e0 [ 102.928563][ T6970] RBP: 00000000000000f9 R08: 0000000000000008 R09: 00000000000000aa [ 102.928579][ T6970] R10: 00000000000000c0 R11: 00007f1822416540 R12: 0000000000000001 [ 102.928614][ T6970] R13: 00007f1823a4db80 R14: 0000000000000020 R15: 00007f18224165e0 [ 102.928640][ T6970] [ 102.928724][ T6970] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 103.094758][ T6980] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1346'. [ 103.133690][ T6980] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1346'. [ 103.434192][ C1] syz_tun: tun_net_xmit 42 [ 103.751734][ T7000] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1353'. [ 103.879058][ T29] kauditd_printk_skb: 29623 callbacks suppressed [ 103.879074][ T29] audit: type=1400 audit(1759785799.818:21367): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.888560][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.913164][ T3030] audit: audit_lost=4487 audit_rate_limit=0 audit_backlog_limit=64 [ 103.921157][ T3030] audit: backlog limit exceeded [ 103.928084][ T29] audit: type=1400 audit(1759785799.818:21368): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.929601][ T7007] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.949416][ T29] audit: type=1400 audit(1759785799.828:21369): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.949454][ T29] audit: type=1400 audit(1759785799.828:21370): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.956046][ T7007] audit: audit_lost=4488 audit_rate_limit=0 audit_backlog_limit=64 [ 103.977186][ T29] audit: type=1400 audit(1759785799.828:21371): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.039014][ T7005] lo speed is unknown, defaulting to 1000 [ 104.292895][ T7026] bridge: RTM_NEWNEIGH with invalid ether address [ 104.418844][ C1] syz_tun: tun_net_xmit 42 [ 105.209708][ T7072] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1382'. [ 105.235863][ T7074] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1379'. [ 105.262101][ T7076] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1383'. [ 105.318385][ T7074] wireguard2: entered promiscuous mode [ 105.323921][ T7074] wireguard2: entered allmulticast mode [ 105.403848][ C1] syz_tun: tun_net_xmit 42 [ 105.531104][ T7088] FAULT_INJECTION: forcing a failure. [ 105.531104][ T7088] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 105.544530][ T7088] CPU: 0 UID: 0 PID: 7088 Comm: syz.1.1388 Not tainted syzkaller #0 PREEMPT(voluntary) [ 105.544563][ T7088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 105.544594][ T7088] Call Trace: [ 105.544602][ T7088] [ 105.544612][ T7088] __dump_stack+0x1d/0x30 [ 105.544690][ T7088] dump_stack_lvl+0xe8/0x140 [ 105.544729][ T7088] dump_stack+0x15/0x1b [ 105.544842][ T7088] should_fail_ex+0x265/0x280 [ 105.544885][ T7088] should_fail_alloc_page+0xf2/0x100 [ 105.544941][ T7088] __alloc_frozen_pages_noprof+0xff/0x360 [ 105.544984][ T7088] alloc_pages_mpol+0xb3/0x260 [ 105.545026][ T7088] vma_alloc_folio_noprof+0x1aa/0x300 [ 105.545088][ T7088] do_wp_page+0xf60/0x2510 [ 105.545107][ T7088] ? __rcu_read_lock+0x37/0x50 [ 105.545134][ T7088] ? css_rstat_updated+0xb7/0x240 [ 105.545177][ T7088] ? __rcu_read_lock+0x37/0x50 [ 105.545200][ T7088] handle_mm_fault+0x77d/0x2be0 [ 105.545228][ T7088] ? vma_start_read+0x141/0x1f0 [ 105.545303][ T7088] do_user_addr_fault+0x630/0x1080 [ 105.545328][ T7088] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 105.545358][ T7088] exc_page_fault+0x62/0xa0 [ 105.545453][ T7088] asm_exc_page_fault+0x26/0x30 [ 105.545472][ T7088] RIP: 0033:0x7f29107a0cb0 [ 105.545486][ T7088] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 105.545503][ T7088] RSP: 002b:00007f290f33e4a0 EFLAGS: 00010202 [ 105.545519][ T7088] RAX: 0000000000005005 RBX: 00007f290f33e540 RCX: 0000000000000013 [ 105.545616][ T7088] RDX: 00000000000000ff RSI: 0000000000000400 RDI: 00007f290f33e5e0 [ 105.545632][ T7088] RBP: 0000000000000014 R08: 00007f2906f1f000 R09: 0000000000000004 [ 105.545648][ T7088] R10: 0000200000001202 R11: 000000000000046d R12: 0000000000000301 [ 105.545659][ T7088] R13: 00007f291097db80 R14: 0000000000000013 R15: 00007f290f33e5e0 [ 105.545682][ T7088] [ 105.732956][ T7088] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 106.027963][ T7106] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1395'. [ 106.054607][ T7110] netlink: 'syz.4.1397': attribute type 6 has an invalid length. [ 106.219848][ T7123] netlink: '+}[@': attribute type 10 has an invalid length. [ 106.278320][ T7126] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1403'. [ 106.289347][ T7128] capability: warning: `syz.2.1405' uses 32-bit capabilities (legacy support in use) [ 106.403520][ T52] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.412447][ T52] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.440203][ T52] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.469225][ T52] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.496479][ T52] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.502400][ T7148] netlink: '+}[@': attribute type 10 has an invalid length. [ 106.524821][ T52] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.553352][ T52] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 106.580244][ T52] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 107.561566][ T7225] netlink: '+}[@': attribute type 10 has an invalid length. [ 107.641500][ T7230] __nla_validate_parse: 7 callbacks suppressed [ 107.641520][ T7230] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1449'. [ 107.932519][ T7254] netlink: '+}[@': attribute type 10 has an invalid length. [ 108.016689][ T7258] FAULT_INJECTION: forcing a failure. [ 108.016689][ T7258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 108.030054][ T7258] CPU: 1 UID: 0 PID: 7258 Comm: syz.0.1464 Not tainted syzkaller #0 PREEMPT(voluntary) [ 108.030089][ T7258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 108.030106][ T7258] Call Trace: [ 108.030114][ T7258] [ 108.030124][ T7258] __dump_stack+0x1d/0x30 [ 108.030214][ T7258] dump_stack_lvl+0xe8/0x140 [ 108.030253][ T7258] dump_stack+0x15/0x1b [ 108.030281][ T7258] should_fail_ex+0x265/0x280 [ 108.030340][ T7258] should_fail_alloc_page+0xf2/0x100 [ 108.030376][ T7258] __alloc_frozen_pages_noprof+0xff/0x360 [ 108.030411][ T7258] alloc_pages_mpol+0xb3/0x260 [ 108.030524][ T7258] ? __rcu_read_lock+0x37/0x50 [ 108.030556][ T7258] vma_alloc_folio_noprof+0x1aa/0x300 [ 108.030593][ T7258] handle_mm_fault+0xec2/0x2be0 [ 108.030633][ T7258] ? vma_start_read+0x141/0x1f0 [ 108.030671][ T7258] do_user_addr_fault+0x630/0x1080 [ 108.030700][ T7258] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 108.030732][ T7258] exc_page_fault+0x62/0xa0 [ 108.030779][ T7258] asm_exc_page_fault+0x26/0x30 [ 108.030804][ T7258] RIP: 0033:0x7f1652250c03 [ 108.030818][ T7258] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 108.030890][ T7258] RSP: 002b:00007f1650df64a0 EFLAGS: 00010202 [ 108.030910][ T7258] RAX: 0000000000010000 RBX: 00007f1650df6540 RCX: 00007f16489d7000 [ 108.030922][ T7258] RDX: 00007f1650df66e0 RSI: 000000000000001d RDI: 00007f1650df65e0 [ 108.030934][ T7258] RBP: 0000000000000087 R08: 0000000000000008 R09: 00000000000000a7 [ 108.030945][ T7258] R10: 00000000000000c0 R11: 00007f1650df6540 R12: 0000000000000001 [ 108.030958][ T7258] R13: 00007f165242db80 R14: 000000000000000b R15: 00007f1650df65e0 [ 108.030983][ T7258] [ 108.030993][ T7258] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 108.623932][ T29] kauditd_printk_skb: 14802 callbacks suppressed [ 108.623951][ T29] audit: type=1400 audit(1759785804.823:36147): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.635145][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.651723][ T7288] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.658193][ T3030] audit: audit_lost=4498 audit_rate_limit=0 audit_backlog_limit=64 [ 108.658218][ T3030] audit: backlog limit exceeded [ 108.664790][ T7288] audit: audit_lost=4499 audit_rate_limit=0 audit_backlog_limit=64 [ 108.685845][ T7288] audit: backlog limit exceeded [ 108.691479][ T29] audit: type=1400 audit(1759785804.833:36148): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.692614][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.712756][ T29] audit: type=1400 audit(1759785804.833:36149): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.960227][ T7295] lo speed is unknown, defaulting to 1000 [ 108.997204][ T7297] C: renamed from team_slave_0 [ 109.012159][ T7297] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1479'. [ 109.146908][ T7308] netlink: '+}[@': attribute type 10 has an invalid length. [ 109.317437][ T7325] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1492'. [ 109.376517][ T7316] $Hÿ: renamed from bond0 [ 109.383092][ T7316] $Hÿ: entered promiscuous mode [ 109.394231][ T7330] lo: entered allmulticast mode [ 109.405814][ T7330] tunl0: entered allmulticast mode [ 109.425779][ T7330] gre0: entered allmulticast mode [ 109.436365][ T7332] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1496'. [ 109.447636][ T7330] gretap0: entered allmulticast mode [ 109.475279][ T7330] erspan0: entered allmulticast mode [ 109.536178][ T7330] ip_vti0: entered allmulticast mode [ 109.542267][ T7330] ip6_vti0: entered allmulticast mode [ 109.581696][ T7330] sit0: entered allmulticast mode [ 109.592240][ T7330] ip6tnl0: entered allmulticast mode [ 109.606515][ T7330] ip6gre0: entered allmulticast mode [ 109.630000][ T7330] syz_tun: entered allmulticast mode [ 109.647954][ T7330] ip6gretap0: entered allmulticast mode [ 109.663916][ T7330] bridge0: entered allmulticast mode [ 109.679900][ T7330] vcan0: entered allmulticast mode [ 109.695348][ T7330] $Hÿ: entered allmulticast mode [ 109.700518][ T7330] bond_slave_0: entered allmulticast mode [ 109.706367][ T7330] bond_slave_1: entered allmulticast mode [ 109.727163][ T7330] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 109.739395][ T7330] team0: entered allmulticast mode [ 109.744604][ T7330] team_slave_0: entered allmulticast mode [ 109.750333][ T7330] team_slave_1: entered allmulticast mode [ 109.771818][ T7330] dummy0: entered allmulticast mode [ 109.785488][ T7330] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.812486][ T7330] nlmon0: entered allmulticast mode [ 109.827078][ T7330] caif0: entered allmulticast mode [ 109.832246][ T7330] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 109.848389][ T3415] lo speed is unknown, defaulting to 1000 [ 109.854232][ T3415] syz0: Port: 1 Link ACTIVE [ 109.889313][ T7336] lo speed is unknown, defaulting to 1000 [ 110.043991][ T7376] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1512'. [ 110.071964][ T7378] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 110.106418][ T7380] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 110.158516][ T7387] netlink: 'syz.3.1517': attribute type 4 has an invalid length. [ 110.168926][ T3359] lo speed is unknown, defaulting to 1000 [ 110.174782][ T3359] syz0: Port: 1 Link DOWN [ 110.327021][ T7393] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1519'. [ 110.646594][ T7407] FAULT_INJECTION: forcing a failure. [ 110.646594][ T7407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.659751][ T7407] CPU: 0 UID: 0 PID: 7407 Comm: syz.4.1525 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.659785][ T7407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.659801][ T7407] Call Trace: [ 110.659810][ T7407] [ 110.659820][ T7407] __dump_stack+0x1d/0x30 [ 110.659964][ T7407] dump_stack_lvl+0xe8/0x140 [ 110.660000][ T7407] dump_stack+0x15/0x1b [ 110.660089][ T7407] should_fail_ex+0x265/0x280 [ 110.660124][ T7407] should_fail+0xb/0x20 [ 110.660141][ T7407] should_fail_usercopy+0x1a/0x20 [ 110.660165][ T7407] _copy_to_user+0x20/0xa0 [ 110.660231][ T7407] simple_read_from_buffer+0xb5/0x130 [ 110.660262][ T7407] proc_fail_nth_read+0x10e/0x150 [ 110.660303][ T7407] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 110.660362][ T7407] vfs_read+0x1a5/0x770 [ 110.660403][ T7407] ? __rcu_read_unlock+0x4f/0x70 [ 110.660433][ T7407] ? __fget_files+0x184/0x1c0 [ 110.660480][ T7407] ksys_read+0xda/0x1a0 [ 110.660559][ T7407] __x64_sys_read+0x40/0x50 [ 110.660589][ T7407] x64_sys_call+0x27c0/0x3000 [ 110.660616][ T7407] do_syscall_64+0xd2/0x200 [ 110.660672][ T7407] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.660705][ T7407] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 110.660738][ T7407] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.660765][ T7407] RIP: 0033:0x7f18239ad8dc [ 110.660848][ T7407] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 110.660871][ T7407] RSP: 002b:00007f1822417030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 110.660895][ T7407] RAX: ffffffffffffffda RBX: 00007f1823c05fa0 RCX: 00007f18239ad8dc [ 110.660911][ T7407] RDX: 000000000000000f RSI: 00007f18224170a0 RDI: 0000000000000007 [ 110.660927][ T7407] RBP: 00007f1822417090 R08: 0000000000000000 R09: 0000000000000000 [ 110.660943][ T7407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.660958][ T7407] R13: 00007f1823c06038 R14: 00007f1823c05fa0 R15: 00007fff9e04f018 [ 110.660980][ T7407] [ 111.192781][ T7417] pim6reg1: entered allmulticast mode [ 111.212982][ T7425] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1530'. [ 111.684819][ T7445] netlink: '': attribute type 4 has an invalid length. [ 111.730372][ T7447] bridge0: entered promiscuous mode [ 111.750458][ T7447] macsec1: entered promiscuous mode [ 111.756320][ T7447] bridge0: port 1(macsec1) entered blocking state [ 111.762864][ T7447] bridge0: port 1(macsec1) entered disabled state [ 111.897875][ T7447] macsec1: entered allmulticast mode [ 111.903315][ T7447] bridge0: entered allmulticast mode [ 111.912797][ T7447] macsec1: left allmulticast mode [ 111.917926][ T7447] bridge0: left allmulticast mode [ 111.930179][ T7447] bridge0: left promiscuous mode [ 112.059557][ T7453] netlink: '+}[@': attribute type 10 has an invalid length. [ 112.139512][ T7459] netlink: '+}[@': attribute type 10 has an invalid length. [ 112.211966][ T7468] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1548'. [ 112.213255][ T7469] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1549'. [ 112.357726][ T7477] netlink: 'syz.4.1553': attribute type 10 has an invalid length. [ 112.376874][ T7477] team0: Port device dummy0 removed [ 112.476881][ T7483] netlink: '+}[@': attribute type 10 has an invalid length. [ 112.486662][ T7483] team0: Port device dummy0 added [ 112.558970][ T7492] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1559'. [ 112.728298][ T7502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.767241][ T7502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.791208][ T7502] bond0: (slave vxcan7): The slave device specified does not support setting the MAC address [ 112.825140][ T7502] bond0: (slave vxcan7): Error -95 calling set_mac_address [ 113.371478][ T29] kauditd_printk_skb: 25950 callbacks suppressed [ 113.371494][ T29] audit: type=1400 audit(1759785809.847:55162): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.410688][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.417235][ T3030] audit: audit_lost=6813 audit_rate_limit=0 audit_backlog_limit=64 [ 113.425282][ T3030] audit: backlog limit exceeded [ 113.430214][ T7518] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.436723][ T7518] audit: audit_lost=6814 audit_rate_limit=0 audit_backlog_limit=64 [ 113.444682][ T7518] audit: backlog limit exceeded [ 113.449722][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.456460][ T3030] audit: audit_lost=6815 audit_rate_limit=0 audit_backlog_limit=64 [ 113.459336][ T7519] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.490880][ T7522] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1572'. [ 113.600057][ T7528] netlink: '+}[@': attribute type 10 has an invalid length. [ 113.958922][ T7550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7550 comm=syz.0.1574 [ 114.016752][ T7551] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1583'. [ 114.025703][ T7551] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1583'. [ 114.191531][ T7562] netlink: '+}[@': attribute type 10 has an invalid length. [ 114.426386][ T7566] netlink: 'syz.2.1589': attribute type 4 has an invalid length. [ 114.514560][ T7568] 8021q: adding VLAN 0 to HW filter on device bond3 [ 114.766562][ T7572] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 114.773803][ T7572] IPv6: NLM_F_CREATE should be set when creating new route [ 114.781094][ T7572] IPv6: NLM_F_CREATE should be set when creating new route [ 114.849827][ T7571] 8021q: adding VLAN 0 to HW filter on device bond3 [ 114.867912][ T7571] bond3: (slave vxcan7): The slave device specified does not support setting the MAC address [ 114.892959][ T7571] bond3: (slave vxcan7): Error -95 calling set_mac_address [ 114.963606][ T7583] netlink: 'syz.3.1596': attribute type 1 has an invalid length. [ 114.971533][ T7583] netlink: 14318 bytes leftover after parsing attributes in process `syz.3.1596'. [ 114.987254][ T7583] netlink: 'syz.3.1596': attribute type 1 has an invalid length. [ 114.995065][ T7583] netlink: 14318 bytes leftover after parsing attributes in process `syz.3.1596'. [ 115.006590][ T7585] macsec1: entered promiscuous mode [ 115.012038][ T7585] bridge0: entered promiscuous mode [ 115.018045][ T7585] bridge0: port 1(macsec1) entered blocking state [ 115.024637][ T7585] bridge0: port 1(macsec1) entered disabled state [ 115.031979][ T7585] macsec1: entered allmulticast mode [ 115.031996][ T7585] bridge0: entered allmulticast mode [ 115.038054][ T7585] macsec1: left allmulticast mode [ 115.038070][ T7585] bridge0: left allmulticast mode [ 115.048977][ T7585] bridge0: left promiscuous mode [ 115.056354][ T7583] macvlan1: entered promiscuous mode [ 115.056369][ T7583] macvlan1: entered allmulticast mode [ 115.056737][ T7583] veth1_vlan: entered allmulticast mode [ 115.058939][ T7586] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1596'. [ 115.059076][ T7583] $Hÿ: (slave macvlan1): Enslaving as an active interface with an up link [ 115.106370][ T7591] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1599'. [ 115.150831][ T3359] Process accounting resumed [ 115.965895][ T7605] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1604'. [ 115.974853][ T7605] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1604'. [ 116.181904][ T3415] Process accounting resumed [ 116.525785][ T7649] validate_nla: 2 callbacks suppressed [ 116.525802][ T7649] netlink: 'syz.0.1624': attribute type 21 has an invalid length. [ 116.575171][ T7653] FAULT_INJECTION: forcing a failure. [ 116.575171][ T7653] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.588305][ T7653] CPU: 1 UID: 0 PID: 7653 Comm: syz.0.1626 Not tainted syzkaller #0 PREEMPT(voluntary) [ 116.588338][ T7653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 116.588500][ T7653] Call Trace: [ 116.588508][ T7653] [ 116.588515][ T7653] __dump_stack+0x1d/0x30 [ 116.588555][ T7653] dump_stack_lvl+0xe8/0x140 [ 116.588597][ T7653] dump_stack+0x15/0x1b [ 116.588647][ T7653] should_fail_ex+0x265/0x280 [ 116.588689][ T7653] should_fail+0xb/0x20 [ 116.588704][ T7653] should_fail_usercopy+0x1a/0x20 [ 116.588726][ T7653] _copy_from_user+0x1c/0xb0 [ 116.588754][ T7653] kstrtouint_from_user+0x69/0xf0 [ 116.588783][ T7653] ? 0xffffffff81000000 [ 116.588795][ T7653] ? selinux_file_permission+0x1e4/0x320 [ 116.588835][ T7653] proc_fail_nth_write+0x50/0x160 [ 116.588874][ T7653] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 116.588943][ T7653] vfs_write+0x266/0x960 [ 116.588969][ T7653] ? vfs_read+0x4e6/0x770 [ 116.588990][ T7653] ? __rcu_read_unlock+0x4f/0x70 [ 116.589013][ T7653] ? __fget_files+0x184/0x1c0 [ 116.589049][ T7653] ksys_write+0xda/0x1a0 [ 116.589103][ T7653] __x64_sys_write+0x40/0x50 [ 116.589202][ T7653] x64_sys_call+0x2802/0x3000 [ 116.589228][ T7653] do_syscall_64+0xd2/0x200 [ 116.589263][ T7653] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 116.589297][ T7653] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 116.589326][ T7653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 116.589381][ T7653] RIP: 0033:0x7f165238d97f [ 116.589414][ T7653] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 116.589438][ T7653] RSP: 002b:00007f1650df7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 116.589469][ T7653] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f165238d97f [ 116.589484][ T7653] RDX: 0000000000000001 RSI: 00007f1650df70a0 RDI: 0000000000000007 [ 116.589499][ T7653] RBP: 00007f1650df7090 R08: 0000000000000000 R09: 0000000000000000 [ 116.589515][ T7653] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 116.589538][ T7653] R13: 00007f16525e6038 R14: 00007f16525e5fa0 R15: 00007ffdbfcc57f8 [ 116.589625][ T7653] [ 117.033169][ T7664] netlink: '+}[@': attribute type 10 has an invalid length. [ 117.079839][ T7668] netlink: '+}[@': attribute type 10 has an invalid length. [ 117.149088][ T7674] netlink: 'syz.2.1636': attribute type 1 has an invalid length. [ 117.194394][ T7674] 8021q: adding VLAN 0 to HW filter on device bond4 [ 117.212831][ T7679] FAULT_INJECTION: forcing a failure. [ 117.212831][ T7679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.226088][ T7679] CPU: 0 UID: 0 PID: 7679 Comm: syz.4.1638 Not tainted syzkaller #0 PREEMPT(voluntary) [ 117.226122][ T7679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 117.226145][ T7679] Call Trace: [ 117.226151][ T7679] [ 117.226234][ T7679] __dump_stack+0x1d/0x30 [ 117.226314][ T7679] dump_stack_lvl+0xe8/0x140 [ 117.226349][ T7679] dump_stack+0x15/0x1b [ 117.226442][ T7679] should_fail_ex+0x265/0x280 [ 117.226486][ T7679] should_fail+0xb/0x20 [ 117.226525][ T7679] should_fail_usercopy+0x1a/0x20 [ 117.226551][ T7679] _copy_to_user+0x20/0xa0 [ 117.226631][ T7679] simple_read_from_buffer+0xb5/0x130 [ 117.226659][ T7679] proc_fail_nth_read+0x10e/0x150 [ 117.226756][ T7679] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 117.226791][ T7679] vfs_read+0x1a5/0x770 [ 117.226812][ T7679] ? __rcu_read_unlock+0x4f/0x70 [ 117.226916][ T7679] ? __fget_files+0x184/0x1c0 [ 117.226988][ T7679] ksys_read+0xda/0x1a0 [ 117.227016][ T7679] __x64_sys_read+0x40/0x50 [ 117.227046][ T7679] x64_sys_call+0x27c0/0x3000 [ 117.227137][ T7679] do_syscall_64+0xd2/0x200 [ 117.227163][ T7679] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 117.227195][ T7679] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 117.227226][ T7679] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.227319][ T7679] RIP: 0033:0x7f18239ad8dc [ 117.227339][ T7679] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 117.227363][ T7679] RSP: 002b:00007f1822417030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 117.227385][ T7679] RAX: ffffffffffffffda RBX: 00007f1823c05fa0 RCX: 00007f18239ad8dc [ 117.227399][ T7679] RDX: 000000000000000f RSI: 00007f18224170a0 RDI: 0000000000000003 [ 117.227415][ T7679] RBP: 00007f1822417090 R08: 0000000000000000 R09: 0000000000000002 [ 117.227431][ T7679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.227466][ T7679] R13: 00007f1823c06038 R14: 00007f1823c05fa0 R15: 00007fff9e04f018 [ 117.227485][ T7679] [ 117.438152][ T7674] 8021q: adding VLAN 0 to HW filter on device bond4 [ 117.449005][ T7674] bond4: (slave vxcan7): The slave device specified does not support setting the MAC address [ 117.471297][ T7674] bond4: (slave vxcan7): Error -95 calling set_mac_address [ 117.496863][ T7677] __nla_validate_parse: 7 callbacks suppressed [ 117.496881][ T7677] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1637'. [ 117.524589][ T7682] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1639'. [ 117.533596][ T7682] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1639'. [ 117.670778][ T7698] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1646'. [ 117.777773][ T7707] netlink: 'syz.2.1651': attribute type 1 has an invalid length. [ 117.808358][ T7707] 8021q: adding VLAN 0 to HW filter on device bond5 [ 117.827567][ T7710] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1652'. [ 117.836582][ T7710] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1652'. [ 117.847172][ T7707] 8021q: adding VLAN 0 to HW filter on device bond5 [ 117.870064][ T7707] bond5: (slave vxcan7): The slave device specified does not support setting the MAC address [ 117.882313][ T7707] bond5: (slave vxcan7): Error -95 calling set_mac_address [ 118.119879][ T29] kauditd_printk_skb: 20312 callbacks suppressed [ 118.119956][ T29] audit: type=1400 audit(1759785814.847:74197): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.158252][ T7731] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.158322][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.164802][ T7731] audit: audit_lost=7242 audit_rate_limit=0 audit_backlog_limit=64 [ 118.164821][ T7731] audit: backlog limit exceeded [ 118.167060][ T3302] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.171371][ T3030] audit: audit_lost=7243 audit_rate_limit=0 audit_backlog_limit=64 [ 118.171390][ T3030] audit: backlog limit exceeded [ 118.171585][ T29] audit: type=1400 audit(1759785814.879:74198): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.179503][ T3302] audit: audit_lost=7244 audit_rate_limit=0 audit_backlog_limit=64 [ 118.205833][ T7731] netlink: '+}[@': attribute type 10 has an invalid length. [ 118.305710][ T7740] netlink: 'syz.0.1665': attribute type 1 has an invalid length. [ 118.338034][ T7740] 8021q: adding VLAN 0 to HW filter on device bond2 [ 118.374462][ T7744] 8021q: adding VLAN 0 to HW filter on device bond2 [ 118.395662][ T7744] bond2: (slave vxcan9): The slave device specified does not support setting the MAC address [ 118.407346][ T7744] bond2: (slave vxcan9): Error -95 calling set_mac_address [ 118.418248][ T7750] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1669'. [ 118.638858][ T7768] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1675'. [ 118.647863][ T7768] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1675'. [ 119.180890][ T7816] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1696'. [ 119.744809][ T7843] wireguard0: entered promiscuous mode [ 119.750396][ T7843] wireguard0: entered allmulticast mode [ 119.763212][ T7849] netlink: '+}[@': attribute type 10 has an invalid length. [ 120.097567][ T7878] netlink: '+}[@': attribute type 10 has an invalid length. [ 120.586601][ T7912] netlink: '+}[@': attribute type 10 has an invalid length. [ 121.375963][ T7959] validate_nla: 2 callbacks suppressed [ 121.376001][ T7959] netlink: 'syz.4.1759': attribute type 21 has an invalid length. [ 122.468585][ T7997] __nla_validate_parse: 17 callbacks suppressed [ 122.468610][ T7997] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1773'. [ 122.483904][ T7997] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1773'. [ 122.550505][ T8001] netlink: '+}[@': attribute type 10 has an invalid length. [ 122.594283][ T8005] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1777'. [ 122.801997][ T8021] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1783'. [ 122.870231][ T29] kauditd_printk_skb: 25832 callbacks suppressed [ 122.870256][ T29] audit: type=1400 audit(1759785819.867:96520): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.880348][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.904415][ T3030] audit: audit_lost=8415 audit_rate_limit=0 audit_backlog_limit=64 [ 122.904437][ T3030] audit: backlog limit exceeded [ 122.905599][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.924368][ T3030] audit: audit_lost=8416 audit_rate_limit=0 audit_backlog_limit=64 [ 122.932305][ T3030] audit: backlog limit exceeded [ 122.937052][ T29] audit: type=1400 audit(1759785819.867:96521): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.958354][ T29] audit: type=1400 audit(1759785819.867:96522): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.979866][ T29] audit: type=1400 audit(1759785819.867:96523): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.279958][ T8041] bridge0: entered promiscuous mode [ 123.285279][ T8041] macvtap1: entered allmulticast mode [ 123.290947][ T8041] bridge0: entered allmulticast mode [ 123.302332][ T8041] bridge0: port 1(macvtap1) entered blocking state [ 123.309024][ T8041] bridge0: port 1(macvtap1) entered disabled state [ 123.330001][ T8041] bridge0: left allmulticast mode [ 123.335293][ T8041] bridge0: left promiscuous mode [ 123.470572][ T8067] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1802'. [ 123.481251][ T8066] netlink: 'syz.1.1802': attribute type 10 has an invalid length. [ 123.682986][ T8083] FAULT_INJECTION: forcing a failure. [ 123.682986][ T8083] name failslab, interval 1, probability 0, space 0, times 0 [ 123.695734][ T8083] CPU: 1 UID: 0 PID: 8083 Comm: syz.0.1810 Not tainted syzkaller #0 PREEMPT(voluntary) [ 123.695840][ T8083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 123.695857][ T8083] Call Trace: [ 123.695865][ T8083] [ 123.695873][ T8083] __dump_stack+0x1d/0x30 [ 123.695925][ T8083] dump_stack_lvl+0xe8/0x140 [ 123.696035][ T8083] dump_stack+0x15/0x1b [ 123.696118][ T8083] should_fail_ex+0x265/0x280 [ 123.696164][ T8083] should_failslab+0x8c/0xb0 [ 123.696189][ T8083] kmem_cache_alloc_noprof+0x50/0x480 [ 123.696326][ T8083] ? security_file_alloc+0x32/0x100 [ 123.696373][ T8083] security_file_alloc+0x32/0x100 [ 123.696405][ T8083] init_file+0x5c/0x1d0 [ 123.696435][ T8083] alloc_empty_file+0x8b/0x200 [ 123.696472][ T8083] dentry_open+0x2d/0x90 [ 123.696550][ T8083] pidfs_alloc_file+0xe2/0x180 [ 123.696619][ T8083] pidfd_prepare+0x11d/0x170 [ 123.696654][ T8083] __se_sys_pidfd_open+0x133/0x270 [ 123.696707][ T8083] __x64_sys_pidfd_open+0x31/0x40 [ 123.696731][ T8083] x64_sys_call+0x2ae3/0x3000 [ 123.696803][ T8083] do_syscall_64+0xd2/0x200 [ 123.696837][ T8083] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 123.696872][ T8083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.696964][ T8083] RIP: 0033:0x7f165238eec9 [ 123.696990][ T8083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.697014][ T8083] RSP: 002b:00007f1650df7028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b2 [ 123.697046][ T8083] RAX: ffffffffffffffda RBX: 00007f16525e5fa0 RCX: 00007f165238eec9 [ 123.697058][ T8083] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000037b [ 123.697069][ T8083] RBP: 00007f1650df7090 R08: 0000000000000000 R09: 0000000000000000 [ 123.697081][ T8083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.697152][ T8083] R13: 00007f16525e6038 R14: 00007f16525e5fa0 R15: 00007ffdbfcc57f8 [ 123.697177][ T8083] [ 123.984893][ T8098] netlink: 'syz.1.1816': attribute type 21 has an invalid length. [ 124.025566][ T8100] $Hÿ: left allmulticast mode [ 124.030608][ T8100] bond_slave_0: left allmulticast mode [ 124.036096][ T8100] bond_slave_1: left allmulticast mode [ 124.926825][ T8147] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1838'. [ 124.940871][ T8146] netlink: 'syz.3.1839': attribute type 21 has an invalid length. [ 125.369969][ T8204] FAULT_INJECTION: forcing a failure. [ 125.369969][ T8204] name failslab, interval 1, probability 0, space 0, times 0 [ 125.382793][ T8204] CPU: 1 UID: 0 PID: 8204 Comm: syz.0.1866 Not tainted syzkaller #0 PREEMPT(voluntary) [ 125.382894][ T8204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 125.382978][ T8204] Call Trace: [ 125.382987][ T8204] [ 125.382997][ T8204] __dump_stack+0x1d/0x30 [ 125.383105][ T8204] dump_stack_lvl+0xe8/0x140 [ 125.383270][ T8204] dump_stack+0x15/0x1b [ 125.383300][ T8204] should_fail_ex+0x265/0x280 [ 125.383368][ T8204] should_failslab+0x8c/0xb0 [ 125.383400][ T8204] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 125.383428][ T8204] ? sidtab_sid2str_get+0xa0/0x130 [ 125.383487][ T8204] kmemdup_noprof+0x2b/0x70 [ 125.383514][ T8204] sidtab_sid2str_get+0xa0/0x130 [ 125.383623][ T8204] security_sid_to_context_core+0x1eb/0x2e0 [ 125.383783][ T8204] security_sid_to_context+0x27/0x40 [ 125.383830][ T8204] selinux_lsmprop_to_secctx+0x67/0xf0 [ 125.384016][ T8204] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 125.384046][ T8204] audit_log_subj_ctx+0xa4/0x3e0 [ 125.384066][ T8204] ? skb_put+0xa9/0xf0 [ 125.384097][ T8204] audit_log_task_context+0x48/0x70 [ 125.384116][ T8204] audit_log_task+0xf4/0x250 [ 125.384198][ T8204] audit_seccomp+0x61/0x100 [ 125.384256][ T8204] ? __seccomp_filter+0x82d/0x1250 [ 125.384282][ T8204] __seccomp_filter+0x83e/0x1250 [ 125.384350][ T8204] ? __sys_bpf+0x4c0/0x7c0 [ 125.384391][ T8204] __secure_computing+0x82/0x150 [ 125.384415][ T8204] syscall_trace_enter+0xcf/0x1e0 [ 125.384514][ T8204] do_syscall_64+0xac/0x200 [ 125.384550][ T8204] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 125.384651][ T8204] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 125.384747][ T8204] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.384772][ T8204] RIP: 0033:0x7f165238d8dc [ 125.384809][ T8204] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 125.384834][ T8204] RSP: 002b:00007f1650df7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 125.384939][ T8204] RAX: ffffffffffffffda RBX: 00007f16525e5fa0 RCX: 00007f165238d8dc [ 125.384956][ T8204] RDX: 000000000000000f RSI: 00007f1650df70a0 RDI: 0000000000000003 [ 125.384972][ T8204] RBP: 00007f1650df7090 R08: 0000000000000000 R09: 0000000000000000 [ 125.384988][ T8204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.385004][ T8204] R13: 00007f16525e6038 R14: 00007f16525e5fa0 R15: 00007ffdbfcc57f8 [ 125.385029][ T8204] [ 125.774225][ T8235] netlink: 'syz.3.1877': attribute type 21 has an invalid length. [ 126.090801][ T8260] netlink: 'syz.4.1889': attribute type 21 has an invalid length. [ 126.123024][ T8262] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1890'. [ 126.163703][ T8264] FAULT_INJECTION: forcing a failure. [ 126.163703][ T8264] name failslab, interval 1, probability 0, space 0, times 0 [ 126.176521][ T8264] CPU: 0 UID: 0 PID: 8264 Comm: syz.4.1891 Not tainted syzkaller #0 PREEMPT(voluntary) [ 126.176554][ T8264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 126.176570][ T8264] Call Trace: [ 126.176578][ T8264] [ 126.176588][ T8264] __dump_stack+0x1d/0x30 [ 126.176653][ T8264] dump_stack_lvl+0xe8/0x140 [ 126.176688][ T8264] dump_stack+0x15/0x1b [ 126.176724][ T8264] should_fail_ex+0x265/0x280 [ 126.176780][ T8264] should_failslab+0x8c/0xb0 [ 126.176893][ T8264] __kmalloc_noprof+0xa5/0x570 [ 126.176924][ T8264] ? posix_acl_from_xattr+0xf0/0x360 [ 126.176956][ T8264] posix_acl_from_xattr+0xf0/0x360 [ 126.176988][ T8264] do_set_acl+0x6b/0x130 [ 126.177087][ T8264] filename_setxattr+0x1ff/0x400 [ 126.177225][ T8264] path_setxattrat+0x2c9/0x310 [ 126.177328][ T8264] __x64_sys_lsetxattr+0x71/0x90 [ 126.177364][ T8264] x64_sys_call+0x287b/0x3000 [ 126.177395][ T8264] do_syscall_64+0xd2/0x200 [ 126.177431][ T8264] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 126.177496][ T8264] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 126.177521][ T8264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.177627][ T8264] RIP: 0033:0x7f18239aeec9 [ 126.177660][ T8264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.177690][ T8264] RSP: 002b:00007f1822417038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 126.177709][ T8264] RAX: ffffffffffffffda RBX: 00007f1823c05fa0 RCX: 00007f18239aeec9 [ 126.177723][ T8264] RDX: 00002000000010c0 RSI: 0000200000000440 RDI: 0000200000000500 [ 126.177739][ T8264] RBP: 00007f1822417090 R08: 0000000000000001 R09: 0000000000000000 [ 126.177755][ T8264] R10: 0000000000000034 R11: 0000000000000246 R12: 0000000000000001 [ 126.177771][ T8264] R13: 00007f1823c06038 R14: 00007f1823c05fa0 R15: 00007fff9e04f018 [ 126.177850][ T8264] [ 126.872345][ T8291] FAULT_INJECTION: forcing a failure. [ 126.872345][ T8291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 126.886039][ T8291] CPU: 0 UID: 0 PID: 8291 Comm: syz.1.1903 Not tainted syzkaller #0 PREEMPT(voluntary) [ 126.886074][ T8291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 126.886090][ T8291] Call Trace: [ 126.886122][ T8291] [ 126.886130][ T8291] __dump_stack+0x1d/0x30 [ 126.886164][ T8291] dump_stack_lvl+0xe8/0x140 [ 126.886237][ T8291] dump_stack+0x15/0x1b [ 126.886278][ T8291] should_fail_ex+0x265/0x280 [ 126.886384][ T8291] should_fail_alloc_page+0xf2/0x100 [ 126.886449][ T8291] __alloc_frozen_pages_noprof+0xff/0x360 [ 126.886485][ T8291] alloc_pages_mpol+0xb3/0x260 [ 126.886564][ T8291] alloc_pages_noprof+0x90/0x130 [ 126.886607][ T8291] pte_alloc_one+0x1e/0xd0 [ 126.886680][ T8291] __pte_alloc+0x32/0x290 [ 126.886718][ T8291] handle_mm_fault+0x1c18/0x2be0 [ 126.886751][ T8291] ? vma_start_read+0x141/0x1f0 [ 126.886821][ T8291] do_user_addr_fault+0x630/0x1080 [ 126.886850][ T8291] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 126.886889][ T8291] exc_page_fault+0x62/0xa0 [ 126.886913][ T8291] asm_exc_page_fault+0x26/0x30 [ 126.886938][ T8291] RIP: 0033:0x7f29107a0c03 [ 126.887037][ T8291] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 126.887055][ T8291] RSP: 002b:00007f290f33e4a0 EFLAGS: 00010206 [ 126.887071][ T8291] RAX: 0000000000000000 RBX: 00007f290f33e540 RCX: 00007f2906f1f000 [ 126.887087][ T8291] RDX: 00007f290f33e6e0 RSI: 000000000000003f RDI: 00007f290f33e5e0 [ 126.887102][ T8291] RBP: 000000000000013b R08: 0000000000000008 R09: 00000000000000bd [ 126.887117][ T8291] R10: 00000000000000cc R11: 00007f290f33e540 R12: 00007f290f33e540 [ 126.887133][ T8291] R13: 00007f291097db80 R14: 00000000000000eb R15: 00007f290f33e5e0 [ 126.887225][ T8291] [ 126.887236][ T8291] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 127.111166][ T8295] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1905'. [ 127.383385][ T8317] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1916'. [ 127.539475][ T8333] FAULT_INJECTION: forcing a failure. [ 127.539475][ T8333] name failslab, interval 1, probability 0, space 0, times 0 [ 127.552181][ T8333] CPU: 0 UID: 0 PID: 8333 Comm: syz.4.1924 Not tainted syzkaller #0 PREEMPT(voluntary) [ 127.552205][ T8333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 127.552220][ T8333] Call Trace: [ 127.552229][ T8333] [ 127.552238][ T8333] __dump_stack+0x1d/0x30 [ 127.552353][ T8333] dump_stack_lvl+0xe8/0x140 [ 127.552464][ T8333] dump_stack+0x15/0x1b [ 127.552499][ T8333] should_fail_ex+0x265/0x280 [ 127.552611][ T8333] should_failslab+0x8c/0xb0 [ 127.552684][ T8333] kmem_cache_alloc_noprof+0x50/0x480 [ 127.552716][ T8333] ? security_file_alloc+0x32/0x100 [ 127.552750][ T8333] security_file_alloc+0x32/0x100 [ 127.552790][ T8333] init_file+0x5c/0x1d0 [ 127.552843][ T8333] alloc_empty_file+0x8b/0x200 [ 127.552883][ T8333] alloc_file_pseudo+0xc6/0x160 [ 127.552975][ T8333] anon_inode_getfd+0xc1/0x150 [ 127.553056][ T8333] __se_sys_fsopen+0x193/0x1e0 [ 127.553085][ T8333] __x64_sys_fsopen+0x31/0x40 [ 127.553116][ T8333] x64_sys_call+0x2aa1/0x3000 [ 127.553143][ T8333] do_syscall_64+0xd2/0x200 [ 127.553195][ T8333] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 127.553229][ T8333] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 127.553262][ T8333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 127.553339][ T8333] RIP: 0033:0x7f18239aeec9 [ 127.553355][ T8333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.553379][ T8333] RSP: 002b:00007f1822417038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ae [ 127.553402][ T8333] RAX: ffffffffffffffda RBX: 00007f1823c05fa0 RCX: 00007f18239aeec9 [ 127.553414][ T8333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000400 [ 127.553492][ T8333] RBP: 00007f1822417090 R08: 0000000000000000 R09: 0000000000000000 [ 127.553508][ T8333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.553523][ T8333] R13: 00007f1823c06038 R14: 00007f1823c05fa0 R15: 00007fff9e04f018 [ 127.553547][ T8333] [ 127.622863][ T29] kauditd_printk_skb: 34792 callbacks suppressed [ 127.622882][ T29] audit: type=1400 audit(1759785824.864:122489): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.701345][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.710643][ T29] audit: type=1400 audit(1759785824.875:122490): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 127.716792][ T3030] audit: audit_lost=11359 audit_rate_limit=0 audit_backlog_limit=64 [ 127.716808][ T3030] audit: backlog limit exceeded [ 127.717554][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.724914][ T29] audit: type=1400 audit(1759785824.885:122491): avc: denied { prog_load } for pid=8336 comm="syz.4.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.732924][ T3030] audit: audit_lost=11360 audit_rate_limit=0 audit_backlog_limit=64 [ 127.741006][ T29] audit: type=1400 audit(1759785824.885:122492): avc: denied { create } for pid=8336 comm="syz.4.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 127.748979][ T3030] audit: backlog limit exceeded [ 127.891254][ T8345] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1928'. [ 128.211359][ T8361] netlink: 'syz.1.1936': attribute type 21 has an invalid length. [ 128.277605][ T8368] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1939'. [ 128.896620][ T8393] netlink: 'syz.4.1949': attribute type 21 has an invalid length. [ 129.370152][ T8427] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1963'. [ 129.506332][ T8439] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1969'. [ 129.798282][ T8456] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1977'. [ 129.896697][ T8464] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1981'. [ 129.907425][ T8465] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1980'. [ 130.142476][ T8483] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1989'. [ 130.390072][ T8492] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1993'. [ 130.451167][ T8498] netlink: 'syz.2.1996': attribute type 21 has an invalid length. [ 130.844472][ T8525] netlink: 'syz.0.2008': attribute type 21 has an invalid length. [ 130.913468][ T8529] lo speed is unknown, defaulting to 1000 [ 131.209110][ T8562] netlink: 'syz.2.2022': attribute type 21 has an invalid length. [ 131.386059][ T8580] lo speed is unknown, defaulting to 1000 [ 131.522180][ T8598] futex_wake_op: syz.0.2037 tries to shift op by 32; fix this program [ 132.378557][ T29] kauditd_printk_skb: 35199 callbacks suppressed [ 132.378678][ T29] audit: type=1400 audit(1759788407.873:152488): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.415131][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.421755][ T3030] audit: audit_lost=13096 audit_rate_limit=0 audit_backlog_limit=64 [ 132.422787][ T29] audit: type=1400 audit(1759788407.884:152489): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.429884][ T3030] audit: backlog limit exceeded [ 132.451079][ T29] audit: type=1400 audit(1759788407.884:152490): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.451110][ T29] audit: type=1400 audit(1759788407.884:152491): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.486006][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.498441][ T29] audit: type=1400 audit(1759788407.884:152492): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.505023][ T3030] audit: audit_lost=13097 audit_rate_limit=0 audit_backlog_limit=64 [ 132.845377][ T8705] __nla_validate_parse: 11 callbacks suppressed [ 132.845396][ T8705] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2085'. [ 133.123493][ T8729] netlink: 'syz.3.2094': attribute type 21 has an invalid length. [ 133.305987][ T8740] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2100'. [ 133.382481][ T8749] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2104'. [ 134.059191][ T8777] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2114'. [ 134.503174][ T3359] Process accounting resumed [ 134.854823][ T8827] netlink: '+}[@': attribute type 10 has an invalid length. [ 134.906089][ T8829] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2135'. [ 135.500184][ T8849] netlink: 'syz.4.2143': attribute type 21 has an invalid length. [ 135.626145][ T8856] netlink: '+}[@': attribute type 10 has an invalid length. [ 136.523490][ T8872] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2151'. [ 136.619354][ T8892] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2161'. [ 137.150641][ T29] kauditd_printk_skb: 17117 callbacks suppressed [ 137.150657][ T29] audit: type=1400 audit(1759788412.882:169486): avc: denied { execute } for pid=8915 comm="syz.2.2171" dev="tmpfs" ino=1318 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 137.165821][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 137.178483][ T29] audit: type=1400 audit(1759788412.882:169487): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.178510][ T29] audit: type=1400 audit(1759788412.882:169488): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.178535][ T29] audit: type=1400 audit(1759788412.882:169489): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.185066][ T3030] audit: audit_lost=13139 audit_rate_limit=0 audit_backlog_limit=64 [ 137.206271][ T29] audit: type=1400 audit(1759788412.882:169490): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.227480][ T3030] audit: backlog limit exceeded [ 137.228350][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 137.248800][ T29] audit: type=1400 audit(1759788412.892:169491): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.404795][ T8921] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2173'. [ 137.441551][ T8923] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.2174'. [ 137.591315][ T8938] netlink: 'syz.4.2180': attribute type 21 has an invalid length. [ 137.698563][ T8942] netlink: '+}[@': attribute type 10 has an invalid length. [ 138.629991][ T8971] netlink: '+}[@': attribute type 10 has an invalid length. [ 138.699725][ T8977] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2197'. [ 138.915651][ T8999] netlink: '+}[@': attribute type 10 has an invalid length. [ 139.461304][ T9036] netlink: '+}[@': attribute type 10 has an invalid length. [ 139.808341][ T3415] Process accounting resumed [ 139.882583][ T9061] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2231'. [ 139.910619][ T9063] netlink: '+}[@': attribute type 10 has an invalid length. [ 140.477153][ T9089] netlink: '+}[@': attribute type 10 has an invalid length. [ 140.816951][ T9122] netlink: '+}[@': attribute type 10 has an invalid length. [ 141.132750][ T9149] netlink: '+}[@': attribute type 10 has an invalid length. [ 141.206345][ T9156] netlink: 36 bytes leftover after parsing attributes in process `syz.3.2277'. [ 141.599291][ T9201] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2299'. [ 141.921893][ T29] kauditd_printk_skb: 20534 callbacks suppressed [ 141.921911][ T29] audit: type=1400 audit(1759788417.900:188257): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 141.958557][ T29] audit: type=1400 audit(1759788417.932:188258): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 141.979898][ T29] audit: type=1400 audit(1759788417.932:188259): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.001292][ T29] audit: type=1400 audit(1759788417.932:188260): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.022564][ T29] audit: type=1400 audit(1759788417.932:188261): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.043855][ T29] audit: type=1400 audit(1759788417.932:188262): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.065122][ T29] audit: type=1400 audit(1759788417.932:188263): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.086362][ T29] audit: type=1400 audit(1759788417.932:188264): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.107871][ T29] audit: type=1400 audit(1759788417.932:188265): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.129134][ T29] audit: type=1400 audit(1759788417.932:188266): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.273254][ T9237] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2314'. [ 142.282349][ T9237] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2314'. [ 142.582257][ T9262] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2326'. [ 142.623845][ T9268] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2329'. [ 142.633042][ T9268] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2329'. [ 143.311134][ T9306] netlink: '+}[@': attribute type 10 has an invalid length. [ 143.322445][ T9308] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2345'. [ 144.065409][ T9337] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.2359'. [ 144.809432][ T9360] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2368'. [ 144.818495][ T9360] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2368'. [ 144.843613][ T3359] Process accounting resumed [ 145.165123][ T9373] netlink: '+}[@': attribute type 10 has an invalid length. [ 145.271438][ T9382] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.2375'. [ 145.451183][ T9397] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2381'. [ 145.460587][ T9397] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2381'. [ 145.875550][ T9413] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.2388'. [ 146.007687][ T9417] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2389'. [ 146.359986][ T9433] netlink: '+}[@': attribute type 10 has an invalid length. [ 146.493139][ T9439] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2400'. [ 146.694531][ T29] kauditd_printk_skb: 32603 callbacks suppressed [ 146.694550][ T29] audit: type=1326 audit(1759788422.909:207085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9456 comm="syz.2.2407" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbc06eeeec9 code=0x7ffc0000 [ 146.704658][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 146.731016][ T3030] audit: audit_lost=18325 audit_rate_limit=0 audit_backlog_limit=64 [ 146.739069][ T3030] audit: backlog limit exceeded [ 146.744817][ T9460] audit: audit_backlog=65 > audit_backlog_limit=64 [ 146.751415][ T9460] audit: audit_lost=18326 audit_rate_limit=0 audit_backlog_limit=64 [ 146.759466][ T9460] audit: backlog limit exceeded [ 146.765474][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 146.772141][ T3030] audit: audit_lost=18327 audit_rate_limit=0 audit_backlog_limit=64 [ 146.780181][ T3030] audit: backlog limit exceeded [ 146.846701][ T9459] netlink: '+}[@': attribute type 10 has an invalid length. [ 147.420492][ T9481] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2415'. [ 147.798041][ C1] syz_tun: tun_net_xmit 42 [ 147.851871][ T1037] Process accounting resumed [ 148.323963][ T9510] lo speed is unknown, defaulting to 1000 [ 148.630099][ T9522] netlink: '+}[@': attribute type 10 has an invalid length. [ 148.788456][ C1] syz_tun: tun_net_xmit 42 [ 148.934991][ T9542] __nla_validate_parse: 2 callbacks suppressed [ 148.935006][ T9542] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2440'. [ 149.009661][ T9545] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2442'. [ 149.042680][ T9548] netlink: '+}[@': attribute type 10 has an invalid length. [ 149.074505][ T3382] Process accounting resumed [ 149.778962][ C1] syz_tun: tun_net_xmit 42 [ 149.804205][ T9578] netlink: 'syz.4.2454': attribute type 12 has an invalid length. [ 149.905327][ T9581] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.2455'. [ 149.916604][ T9582] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2456'. [ 150.582921][ T9602] netlink: '+}[@': attribute type 10 has an invalid length. [ 150.638099][ T9607] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2467'. [ 150.649710][ T1037] Process accounting resumed [ 150.769465][ C1] syz_tun: tun_net_xmit 42 [ 150.784608][ T9614] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2469'. [ 150.954180][ T9624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9624 comm=syz.3.2474 [ 151.008540][ T9624] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2474'. [ 151.036122][ T9624] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2474'. [ 151.294607][ T9642] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2481'. [ 151.394923][ T3309] ================================================================== [ 151.403058][ T3309] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_getattr [ 151.410983][ T3309] [ 151.413328][ T3309] read-write to 0xffff88811b2fbf50 of 8 bytes by task 9646 on cpu 1: [ 151.421425][ T3309] shmem_add_to_page_cache+0x414/0x530 [ 151.426925][ T3309] shmem_get_folio_gfp+0x4e8/0xd60 [ 151.432072][ T3309] shmem_write_begin+0xa8/0x190 [ 151.437040][ T3309] generic_perform_write+0x184/0x490 [ 151.442366][ T3309] shmem_file_write_iter+0xc5/0xf0 [ 151.447503][ T3309] __kernel_write_iter+0x2d3/0x540 [ 151.452644][ T3309] dump_user_range+0x61e/0x8f0 [ 151.457428][ T3309] elf_core_dump+0x1de7/0x1f80 [ 151.462222][ T3309] coredump_write+0xb0f/0xe30 [ 151.466934][ T3309] vfs_coredump+0x143a/0x20d0 [ 151.471651][ T3309] get_signal+0xd84/0xf70 [ 151.476015][ T3309] arch_do_signal_or_restart+0x96/0x440 [ 151.481611][ T3309] irqentry_exit_to_user_mode+0x5b/0xa0 [ 151.487187][ T3309] irqentry_exit+0x12/0x50 [ 151.491644][ T3309] asm_exc_page_fault+0x26/0x30 [ 151.496519][ T3309] [ 151.498861][ T3309] read to 0xffff88811b2fbf50 of 8 bytes by task 3309 on cpu 0: [ 151.506409][ T3309] shmem_getattr+0x68/0x200 [ 151.510932][ T3309] vfs_getattr_nosec+0x143/0x1e0 [ 151.515893][ T3309] vfs_statx+0x113/0x390 [ 151.520167][ T3309] vfs_fstatat+0x115/0x170 [ 151.524613][ T3309] __se_sys_newfstatat+0x55/0x260 [ 151.529669][ T3309] __x64_sys_newfstatat+0x55/0x70 [ 151.534723][ T3309] x64_sys_call+0x135a/0x3000 [ 151.539432][ T3309] do_syscall_64+0xd2/0x200 [ 151.543964][ T3309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.549869][ T3309] [ 151.552205][ T3309] value changed: 0x00000000000001c7 -> 0x00000000000001cb [ 151.559326][ T3309] [ 151.561667][ T3309] Reported by Kernel Concurrency Sanitizer on: [ 151.567834][ T3309] CPU: 0 UID: 0 PID: 3309 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 151.577760][ T3309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 151.587835][ T3309] ================================================================== [ 151.596304][ T29] kauditd_printk_skb: 25559 callbacks suppressed [ 151.596320][ T29] audit: type=1400 audit(1759788428.054:225442): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 151.624741][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 151.631309][ T3030] audit: audit_lost=20729 audit_rate_limit=0 audit_backlog_limit=64 [ 151.639334][ T3030] audit: backlog limit exceeded [ 151.641261][ T9658] audit: audit_backlog=65 > audit_backlog_limit=64 [ 151.650768][ T9658] audit: audit_lost=20730 audit_rate_limit=0 audit_backlog_limit=64 [ 151.658897][ T9658] audit: backlog limit exceeded [ 151.670072][ T29] audit: type=1400 audit(1759788428.054:225443): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 151.671773][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 151.691486][ T29] audit: type=1400 audit(1759788428.054:225444): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 151.759952][ C1] syz_tun: tun_net_xmit 42 [ 152.750460][ C1] syz_tun: tun_net_xmit 42 [ 156.360066][ T29] kauditd_printk_skb: 41042 callbacks suppressed [ 156.360084][ T29] audit: type=1400 audit(1759788433.052:261058): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 156.369519][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 156.388024][ T29] audit: type=1400 audit(1759788433.062:261059): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 156.394386][ T3030] audit: audit_lost=22541 audit_rate_limit=0 audit_backlog_limit=64 [ 156.415598][ T29] audit: type=1400 audit(1759788433.062:261060): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 156.423579][ T3030] audit: backlog limit exceeded [ 156.424154][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 156.444890][ T29] audit: type=1400 audit(1759788433.062:261061): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 156.449764][ T3030] audit: audit_lost=22542 audit_rate_limit=0 audit_backlog_limit=64 [ 156.456366][ T29] audit: type=1400 audit(1759788433.062:261062): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 161.132042][ T29] kauditd_printk_skb: 43122 callbacks suppressed [ 161.132060][ T29] audit: type=1400 audit(1759788438.060:303173): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 161.146451][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 161.160039][ T29] audit: type=1400 audit(1759788438.070:303174): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 161.166190][ T3030] audit: audit_lost=22880 audit_rate_limit=0 audit_backlog_limit=64 [ 161.187402][ T29] audit: type=1400 audit(1759788438.070:303175): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 161.195473][ T3030] audit: backlog limit exceeded [ 161.196295][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 161.216770][ T29] audit: type=1400 audit(1759788438.070:303176): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 161.221631][ T3030] audit: audit_lost=22881 audit_rate_limit=0 audit_backlog_limit=64 [ 161.221648][ T3030] audit: backlog limit exceeded