last executing test programs: 4.437726614s ago: executing program 0 (id=1732): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x22) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a3100000000080005400000002b0900020073797a310000000008000a4014"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b0001006272696467650000180002"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000090) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0x7}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4004001) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) move_mount(0xffffffffffffff9c, 0x0, r0, 0x0, 0x64) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2b40, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x3, 0x9}, 0xc84, 0x7f, 0x0, 0x1, 0x8, 0x20005, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) r2 = getpid() syz_pidfd_open(r2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001340)=ANY=[@ANYBLOB="9807e9d73126010400000068868d49792411c8d1ca7beeb62faa074f04732d7f6d65ebdc37212148abb9f912b45610ccceab354e6fdc26c5671522e5161deecff0b34749cc53f65bac9629704799b9291bfd56e0719e77757967a675ba163427e7f7dc30a4176a93d784fcbc22f9430f942e7278839ccae4c8d8e8488f55d6c21fa400b1211f2078f89d746640acc84235d6518c96544230", @ANYRES16=0x0, @ANYBLOB="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"], 0x798}, 0x1, 0x0, 0x0, 0x20000005}, 0x4000000) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff49, &(0x7f0000000380)=[{&(0x7f0000000040)="c01803002e000b12d25a80648c2594f90124fc60100c044002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) get_robust_list(0x0, &(0x7f0000000340)=&(0x7f0000000280), &(0x7f0000000380)=0x18) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="796100000000000000007e0000003333e23190820fd828d13f59016e6f66855bf8a4dd02b85a5ecd27fab4e87a04381457b035249cddf9b8a37a0dbf5b723652e88b3ba6d172d1a2fab2b6064cc1257a37dacc84dd50e9ede5329fcd943e58e416d77a6d3e02a2f7cc0e42eccde8ac"], 0x14}, 0x1, 0x0, 0x0, 0x4045}, 0x4000054) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff6000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89c, 0xc000, 0x2, 0x20002f9}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0xf4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x48004}, 0x0) socket$inet(0x2, 0x80001, 0x84) 4.410922556s ago: executing program 0 (id=1733): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000280)=ANY=[], 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x5, 0x1, 0x1, 0x1, 0x0, 0x401, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc28, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x144c7, 0x6, 0x4, 0x7, 0x80, 0x3, 0x8, 0x0, 0x3, 0x0, 0x4}, r2, 0xa, r0, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x1, 0x0, 0x0, {{}, {0x0, 0x6}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4a63f}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000005) 3.723513994s ago: executing program 0 (id=1739): syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3010046, &(0x7f0000000e00), 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") r0 = creat(&(0x7f0000000000)='./file1\x00', 0x14c) fallocate(r0, 0x0, 0xbf5, 0x2000402) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) fsetxattr$security_ima(r0, &(0x7f0000000040), &(0x7f0000000580)=ANY=[], 0x6b, 0x0) (fail_nth: 2) 3.010786514s ago: executing program 0 (id=1748): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) 2.733609531s ago: executing program 0 (id=1752): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="94000000", @ANYRES16=r2, @ANYBLOB="010027bd7000000000000c000000180001801400020076657468315f746f5f626174616476006800038064000380100001800800010002000000040003"], 0x94}}, 0x804) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) write$UHID_INPUT(r4, &(0x7f000001fd00)={0x8, {"6049170ccdd6ad7219964684666384f92007a6ccee62e1e4c6ef8ed21e098b8028eccd3b24a6054e80f6c56f0447200691af5733b9709e564c49fd1a580316c837c7fc702cc257d087c69ffa85674f21f89655317efcef5b0130929a0133e6e1e0cd70f398c201af607cf38400954f679d7fd5b771c46dacb9d5d52fcf1aab923ffcd8838fb88c3b66f08c19c011bedf06cf04e3000f50b79242e1459687d6f0f0ddbb4abb632128eb5e595658b1d79c3edd975badfefcd01e5462d8fd0a35eed71bd0e66780ea2eedb1f9a6740ee9abc6b0fbae0d569c9455cbdaaaf4028e63588bd745d2b3ee68b40f4ca1ec870e710c66fac71a8783f5fe7fa27275efc46f698873ad5578b1f422ecf83e5ebb539da573a8c373c174c152606e20b47f1972d4e1073e29e2ec4ec00094da1521c105cedd55d745bc6ddb45e30cb0c9221149bff9bfefb868cd6dd86fda4e66b2c4dea877845dd5f6f3c877253944f5e7a0191189aa192c4f1e8f2f44a4007d8f81e2c7b729469d206a2bf9de307619d54cb121bc2f1b5a55c5cfaf8186e1bb1e23879e932802dee082f20193af2db5e4efe59ac0ff44648852dd88c1e102bbe28428f33c8fc8b65eb1c5a23f1ae8be39cb0e0aa034370ac88684a6ce2aaa50acd2f145eb00746fc439910a90e62693cb523296bd267b181d02946a3a528193e047bab03070ff6285aaa86c16e2b4b7c3009761ed8199c8efee5331e9eb0f71f650a87ddfdea7acac6044bdcd37d3a6807ecf0a0d40db6a43e4cceaf3b8ae2f1882159d8ebe858acd932c4876a615c74f2c18e57e9588fdda0e91a4c5d391b941ed17ea08934a678c0d2476249f3553bd112528bf84513483690c5fbda9a0a779e0c120b755987c0e34e47ebd17c209080faacf95f34deca36eea22bf4e34be39dbdd6079efe88cf8ab1118ac9cdfe4d1e75b4e9a0455c435b009b9a08d34940506e87bf0f27e4153e4540e1a5be236a1c365f56330288bb80d124295c31b7e0ea1698de057a5fb7774405a7bfdfac5fc3f12ee1d6e902cfbffa08197aaa73851ab58019ba0278b69d495d64c7fe8096ad037976c7a2c6284ae9607c66d3a658e603f74f8492f98c4bf0ca894c1e919a6e527c34ec6452897da4ef5b774ace18f2c457f06bc4d3106d73997c59eacb0be7cdba174d490397836473c9518939cd6c1397fdf45af1081d00d11473848817eb1569f5db5e8c2188030116e63fdf1a65bb799d182f713a844bb6dcdde5e20c0ecb5a328f67f7b685df5e513982de3cb0dde87246c39095a7eb4ce2e6f1757cf839bd71f68a85159668480f2fb0391a9b08fd3d2f8da4bb7fd282ff2e5831c351e1771250a1ece5fe31399b21bd971b8848b1c1eaacd48f5e307f0730cdcf0cbbfc325bdfcb1fac14623c2e15cb919e883dda5171f4c70aeee003331c45f8c2737451801df05b0de475d56b74e3bcb8e92c4742734318b144a51d521af2b74319c6bdfa93053f71e4965dbd33e1296ec982a12c4c2360a6128e5dedcdd077833c1c302a681d56a349b4273ea46328cf7782c0b12733616e321a25e1e49cf579d6d222701790d9efed501f6fc56a93fd1262f367d056295235d3efe4842097e6f7565c5d9acec3bf7752eaf257c0d76a2d6894361ad814c0e94a66b8b29607c10e4f35c1cad6a1418ec237aa1bf295944e76ea46a69d0345e7edda920284ec0a3ced94f57242c5db4c45de6d9938cfdfcf63fcfc7be862d034461d0b17424e181625321106c9671b7df06c63ea8ca16cca81f3c15a589aaa6d35fcf5ec0408a0044d177aa6ce38120b8a7a1c1655864930fb3360b7f205894325678b29985dd8ef38828a44fc0e999268de7983c2d39169a2a4b364e2cca6b5fa4e1d8cd030ed5fe87488154ee320901aa7c89831559238cc35ea2ce0d3f3fc9718ef3d3509c5d2f1099863fd6bbc5792868cb59af5eb7dce21b703011d25e0b7d95b8e5704f24f9ea7dfcc32df96f7152f572f52499aab5f56b8127def313300df34dd22dcbf37d77fe18f2e7fa8356d13b831fc5363e4963d2a1ccbeebe426fd6ab2ea41a80b9b87cb5a532ce9b58e8f4b0c1d19f41c5a68aad24e37d5a16f322bc437b34deab29967c6463aef8af8297569de58efef5fea788d4976f1ef6bad353656009a9a67803fa5bdf6e2102b5452cb6251ea3b9017a46f84b89b7f48e79a8645818e83aa81d841294d803ca7cc08938b0b3d621a0fa7d27297b5cda01700f3752df8f9d9c0e748e749ed118e21853d92e6ec91b2a49e68cec49c200a35db40e90f3d9069a5c43da77eeb879c2028dd2e9ede2f22a437ceb7caea05164f4a17f6cee1fb22bb8b4bc427301bc3e750d4ca7b5ce84e0cae3f33cd8f2254502ed27a6d585b6db79bed5792128e55a3f73a7f5f25441f8989714e09cb1b25b4ef85537662a46170644cae6bbdc1e51cfac05b2912cf3ad105d1bce85046f38dd88e169c896a811f4257bf8a2f4bcf1e58a7d1ae552373f5fb15479348843063b59ec95b68d3e3bb0626f85d8fdd12e54ff560af4581080ceba975f15460edd4747a1923f5b915df6ec99ce16c60dc2fc12d13427e84c27a4897c75650c59d787d7db86d8da0b63b201469e34f94d46756a9be8bf9a11816d58dd192efc0705e80457e1de730632a4f0a4c4fe555c8abf740994ea24c439fb0445e00121edd14d2c2620c2dd1b74a49868ea1641093fde8864530e47c266ef1d9788f928fbfa5c01ed8d8515b6f978d032d65d791ccd1dab2e8d390e41ecc5a69fa97d2db00e396ca8a1bbc5454b90fc8470ace45438e7f4934b12d3f867ce1945d80c9c93e7bd4df30ab4d0cb9b8cec8feb658c298e8ffcdb2b0463e5feca16a35b29d5f58c36c2bd49da1d29b710deefc41169e556be7d463ff99b237b65cd3e4e341b5db7d98393608bae008d3663ed55ea6e3f039e191940e3f4f21c0b1bd017182dc9308f3f9e0602d301e29408ed1b7e148ee13e15cd6a75dec8a2fc9698a5ad3ba42099daca95926612257bb9383b4a21a14c329e29769587748089ad3c2e8cf2e3c62323cc227d14dcd1ce0da91de3cbaeae6a75dcea06f48e15f1cbc1e436f052794f15db33e29be3c0eb7d92365a021b144e25205c46903000dff5bc8ca85e1c6a711c3c22664f98ae30902e8e51e6efc29c0c569694adef98b87c6933210e4948da6761716ac50fa11c8a5bc8e9c8db08f509e5b8d939c1868f701968ed8ac13c7bb793b0a0bb4f6fbdaf9fc4841f20250feeb8af9e1c15c25e35cf7c75d3c5344f03a4bc6a4fa229b020b3ea1a527d2d53df36248d7f5b20da4222626a49a71c8c7f72d1e78c06f6417714730bd52fbecafc4a73684a0261a3f88221a3b11aca4b1aab73e7b40a89155c1c61a37e6a091fefd5ceedb2e6d0d013184d81490ee883d43058c226d56b7d236b42f48ac5dfe90457f41ac94c816b4a831e2a3da3368645fcb5b402583017385a06dd7436c7d3dafe9ade042d4129b886c1226117f318a616fecf5cd2e4f184babad1f4d8dbde8aa116573a7993a276803fb03fc83ceeb23d1963a022943121568f843a3e27c14eba7fb92d2beeceb40344f1d5b3270ae2876ace80233a66b25666d1fa47eed79a44dccef29805065d490ce2441d6991a8807474e367a6bee2b67c50ca1cad28d25ec78052a770430608c086ae3a3a6b56e9faf5591ad81d6a3d87ee83d8270967aa7745dd8ad11ce4d23e58f15156717846248091f1234083bc938b9907c947915aa51f0b2f6056439a508cf126338cb340617cfe402d34bd78f2bbc05c9cf1ad25145dc432d0874d3a8370cdcb451f770a6ac71cabe09a5865f122b92ed15c43a072847ca544d6bfee074281a4c0a2ae7090f0e029a90a51e3c0e2d3bd4a91421cac7633ed5c822db337bdc5cb0c0f9abd1e2b341c47a14b94640b5eee22a2cbac341de1c6146ff3158d7fd6a37d3dac82ad0b9cee076c60fa5d570cea015c2b3ece0b0e910330233f0ec4fe54b8fb03ccab1c5790c8a534dbaaf3d206a975e84f2522547c10132825d77aaa12f7148a53b98c9003c3fa9ecee28951a73f34510fb324b6df9a5836c31b12bfb043eead184b32953d3870bcb9565d792651453a27d440a6544f691ff0326750cd56dcfc4dc4e4b134ef810a3db4a2fa1e8a12c2d7dde0c81f1a7f572fd34c62dcd91c748f0c9054ca74579bc04658907c864159ea72a4d98e4fd91c7a09a23d8369fc07c788368f05baa0f3218185ac9ab4a0786d6e43e7b0f9bc12af7519f1cc412ec1aaeed35baf5a7ffd70a7c283a5a400579ec7e767b577822459cea1ae957468af7150466621ed4cb9f9f301b6ae87582c4760a138ee07bfe3222cce7ef002b77319fe2adde38287faee00f39dca33439c1a13d585fb334f35648beabc0ee56ba301a2c544f8bd4169a7aa01b8c1e435defa0cd6b88ec287fde3c0b84c88b221bbcbde4357f1464cbeada5055a9e97ee2379d74dca9a4395c9b9ab9a6ae2c809c5ae9cc7a84d03321f8c510c83fde6393bb3ce179c3177f589dab462ed3489d0fcbddd26fba03c84bcef0e672489e630b6fbc4da1b35d75929da1947b9f6ee0e878e7b04a5fcced395a00592ba06cafb46bcd69365ff5c0e4b53ae72abe02767f0e9ea5c8404f5b725156b45668ecdee43d5f8a3063c36a7ba70e1659dd8b52b1ab255e483584fcfe8258c77d08fe1b8092205dcebbb089d2ac14c84a6774135c8cd4840cad1e869a3b414f07bb98144c42f9032083a75b03b329bd6cea9c9cdf0ba4547e1cd9c8ed3a96fead8deb1b107e72f949b6958a056f72770b535ff90c87c05a9c4bfeb23725b3acda25dd4dd5089c6dcd45b21797bbd62936a13899baace863ede934f787174ad7d911458b048fac0f143c8602b57e6f6fb1f7b12708cf5306e1b502c16c47c54161a2c68dad0bfe2940696086357c7f1ce2768788359022e5a1753a694127027927e0b3c28266bcf2158f555dec3c817566000e3b7390b9197c85580663bf006a89135f2ea4fcecab27bae744cd70861ce124fab426d40765d7d8a83c26800d981e2141a1f158d673f62d3215c39f1d7ba0b3a7be97f916894d2a65c0bbebc46e91f6b27b9a327012001c49e0b0928de06bccce852ffb2f2fbe152aa6320e2f52f8c72aa216cc891bd0d595fc0e8924b1e704d376132582d85b678b612aa59f8de1f4c8e2bd8291d4e97dc7fce559f19a9bdb50557f75ea4a4c066d32c578cb1006d9d5725b5cea41c2a11d284ed0d5f598c868ffbc1ebb005e9f109c9d2f1f8bfccf3b0e17a99dbf8ecede819fa8534909ecc5e14a6aef33a855cd2c700fcdd5c6cbf569bfd304ff8f45af9704dbe1a9275360501c6b323676e6c27755b14c49b54463a1f6b07233dc9404b1a30f062f3dd2b06ffa81cf5c662a823213be56f8657f880623e322a818354e3bdac81488388d012a19d80920d3c31a6b70c3f9481c0c635c2a65624de842ea4975f6d2ef2d946d318a38d838524f78bc320646e34958aab2c28e866092817fa64e4024882f8319db4e3c2ad25054d1947f6651a2bae6205409338351930bf05e0d3e6de9f55507256e91079e820703623826a9f95634f09c9778790acdf36171e5ef3637faa276b57e00b1685e9c690a62e4cf828383e3787e2e1805b7f329160c10a72ade5cc84795d803390a8c8116a753542d6fe73a9ae9e6d8bd785b6c65e847380476ff65b016a836f2e8c43d36ae4fb2babb6cdf65dfc87a4672fce977f6c521fe41666c6c714ab654e9de5570", 0x106}}, 0x1006) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_bcm(r4, &(0x7f0000000580)={&(0x7f0000000340)={0x1d, r5}, 0x10, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="01560000200400000101000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="040000e00100000003000060070200007b8956f7fc646e72"], 0x48}, 0x1, 0x0, 0x0, 0x40080}, 0x811) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r3, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000083850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x18) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x441c, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) socket$netlink(0x10, 0x3, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) r11 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r11, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r11, 0x1, 0x27, &(0x7f0000000000)=0x83, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r11, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@private0={0xfc, 0x0, '\x00', 0x1}, @empty, @local, 0x3, 0x9, 0x0, 0x400, 0x9, 0x4}) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.676226147s ago: executing program 3 (id=1753): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001200), 0x101101, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x4e, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='f2fs_write_checkpoint\x00', r3, 0x0, 0x1}, 0xfe35) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r4, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)=0x0) timer_settime(r6, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) 2.675403797s ago: executing program 0 (id=1754): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r1, 0x400455c8, 0x0) syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (fail_nth: 3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x18) 2.513369993s ago: executing program 4 (id=1759): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r1, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000000540)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x87, &(0x7f0000000c40)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x35, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001000)={&(0x7f0000000e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x3, [@volatile={0x8, 0x0, 0x0, 0x9, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x2}}, @var={0xc, 0x0, 0x0, 0xe, 0x1, 0x1}, @enum={0x1, 0x9, 0x0, 0x6, 0x4, [{0xe, 0xffff}, {0xe}, {0x0, 0x10}, {0xf, 0x9}, {0x8, 0x1}, {0x5, 0x72}, {0x5, 0x4}, {0xb, 0x7}, {0x1, 0x74}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xc, 0x1}, {0xe, 0x5}, {0x6, 0x5}, {}, {0x6}, {0x0, 0x2}, {0xd, 0x4}, {0x0, 0x3}]}]}, {0x0, [0x30]}}, &(0x7f0000000f80)=""/119, 0xef, 0x77, 0x1, 0x8001}, 0x28) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r5, &(0x7f0000000980)=ANY=[@ANYBLOB="7f454c4600000006010000000000000003003e000000000003000000000000004000000000000000980100000000000002000000000038000200000002000000000000600300000008000000000000000d00000000000000ed08000000000000f0ffffffffffffff0000000000000000080000000000000003000000cff5ffff800300000000000001000000000000000500000000000000ff"], 0x5b0) (async) close(r5) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x20a2, &(0x7f0000001080)=ANY=[@ANYBLOB="c21f332dd65f7a349674dca56efb6904e8266a0012303b94bcbc5109bef75e6dd3e21a763c50e5484ff9ed4b593b05fe6aec495b494054277fd68cfbf581ce8b", @ANYRES64=r3, @ANYBLOB="fa034697d629", @ANYRES64=r2], &(0x7f0000001040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, @fallback=0x29, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x55c, &(0x7f00000006c0)="$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") memfd_create(&(0x7f00000003c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,U\xb1]*\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3S\xef}\xfd\x12\xbc:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec=\x9e\xc3\xfd\x85d\x0fl5\xf3\xbe\" 6\r<\xea\x8dz\xcf6\x99\x91\xear8p\xaaR\xd5\xa6\xab#N>\x9a\xdf\xea\x009\xfbB\xc1\xd0_\xc0\'Z\xeb\xd8\xaf\xf0\'J\xe2\xff\xe5x*;(p\xf7p\xce\xbb\xa7\xfe\x04\xd0t\x81\x1a\x1b?m/\x1ex\xf8\x88^\xbaU\xb9\xa6\xab\x8d\a\xa6\"\xd9\x13\xeb\xe2\rh\x8dsx\xaa!\xd5Q\xf8\xce*\x95\x0es\xfaZ\x94t\x19\xdc\xdc\xcf\x0f\x9a\xa2O>\xb9\xfc\x01\fW\xee\xffh\xbd\xb2\xb4z\xeb\x84\x13\x13u\x8f\xe2\\Z\xef\xa3\xe1c\xc5\xe6', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r7 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)=0x0) timer_settime(r8, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) (async) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x40200, 0x0) preadv2(r9, &(0x7f0000000180)=[{&(0x7f0000000000)=""/167, 0xa7}], 0x1, 0x0, 0x4, 0x1) socket(0xa, 0x3, 0x87) (async) r10 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r10, 0x400, 0x1) (async) fremovexattr(r10, &(0x7f0000000040)=@known='system.posix_acl_default\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r10, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, r9, {0x2}}, './bus\x00'}) (async) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000001140)=@newtaction={0x44, 0x31, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x30, 0x1, [@m_ct={0x2c, 0x1, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kfree\x00', r12}, 0x18) (async) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 32) socket$nl_netfilter(0x10, 0x3, 0xc) (async, rerun: 32) syz_open_procfs$userns(r7, &(0x7f0000000240)) socket(0x10, 0x803, 0x2) 2.232964831s ago: executing program 2 (id=1762): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000080)={[{@bsdgroups}]}, 0xfc, 0x574, &(0x7f0000001980)="$eJzs3c9rHFUcAPDvbJI2/aFJoRT1IIEerNRumsQfFTzUk4gWC3qvS7INJZtuyW5KEwu2B3vxIkUQsSB69+6x+A/4VxS0UKQEPXiJzGY2XZPZNNlumm3384Fp35uZzZvvvvm+fbOzywbQt8bSfwoRL0fEN0nESMu2wcg2jq3tt/Lw+nS6JLG6+ulfSSTZuub+Sfb/oazyUkT89lXEycLmdmtLy3OlSqW8kNXH6/NXxmtLy6cuzZdmy7Ply5NTU2fempp89523uxbr6+f/+f6Tux+e+fr4yne/3D9yO4mzcTjb1hrHE7jRWhmLsew5GYqzG3ac6EJjvSTZ6wOgIwNZng9FOgaMxECW9blWR57moQG77Ms0rYE+lch/6FPNeUDz2r5L18HPjAfvr10AbY5/cO29kRhuXBsdXEn+d2WUXu+OdqH9tI1f/7xzO12i3fsQ+7vQEMAGN25GxOnBwc3jX5KNf507vY19NrbRb68/sJfupvOfN/LmP4X1+U/kzH8O5eRuJx6f/4X7XWimrXT+917u/Hf9ptXoQFZ7oTHnG0ouXqqU07HtxYg4EUP70/pERHyQfxPk88LKvdV27bfO/9Ilbb85F8yO4/7ghvnfTKleevLI1zy4GfFK7vw3We//JKf/0+fj/DbbOFa+82q7bY+Pf3et/hTxWm7/P+rMZOv7k+ON82G8eVZs9vetY7+3a3+v40/7/+DW8Y8mrfdraztv48fhf8vttnV6/u9LPmuU92XrrpXq9YWJiH3Jx5vXTz56bLPe3D+N/8Txrce/vPP/QJrY24z/1tFbrbsO7yz+3ZXGP7Oj/t954d5HX/zQrv3t9f+bjdKJbM12xr/tHuCTPHcAAAAAAADQawoRcTiSQnG9XCgUi2uf7zgaBwuVaq1+8mJ18fJMNL4rOxpDhead7pGWz0NMZJ+HbdYnN9SnIuJIRHw7cKBRL05XKzN7HTwAAAAAAAAAAAAAAAAAAAD0iEMRw3nf/0/9MZD/mDargWfRFj/5DTzn2ud/tqUbv/QE9CSv/9C/5D/0L/kP/Uv+Q/+S/9C/5D/0L/kP/Wsn+f/zuV08EAAAAAAAAAAAAAAAAAAAAAAAAAAAAHg+nD93Ll1WVx5en07rM1eXFueqV0/NlGtzxfnF6eJ0deFKcbZana2Ui9PV+cf9vUq1emViMhavjdfLtfp4bWn5wnx18XL9wqX50mz5QnnoqUQFAAAAAAAAAAAAAAAAAAAAz5ba0vJcqVIpLygodFQY7I3D6MFCoTcOo8PCXo9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDIfwEAAP//wGE62g==") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@var, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2}, {}, {0x1}]}, @fwd, @volatile={0x0, 0x0, 0x0, 0x9, 0x6}]}}, 0x0, 0x66}, 0x28) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="d4181e1b8e54fefeaa71b252bd1c93d76385fb741d1116c982e97e54fd74249bf7bbad74170850d16f62177a9246b74f0fd844f5d0aeb09fba286820f2c320ca82f764fa6751b4cdf8b003d38031909a915890e77ddc1e994f06fdf37a8dfd2e69397c0523176791ef80db9e1be1aebed743a62ad9ed8fbc08407fd8744af8d0b9be30e3a6b1dbda05a3690debaa22bf0a2bafaead8883bfcfc4a9bafafad6135638055cb46ac2a57e461adf1dd9b0feedc272594a52a6229d0dc9049120cfeb9ff9ceb4617ef042ce3ca5fbe859128d1f955514bb5f27c5a087a79208602e98b9bbc714bdee0930033dd010f8ee115cb76694ebc1b4525a5038c2"], 0x0, 0x26}, 0x28) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x2800050, &(0x7f0000003240)=ANY=[], 0x6, 0x33c, &(0x7f0000000340)="$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") (async, rerun: 64) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80042, 0x94) (rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x2c, 0x2, 0x2, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x200000c4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) (async, rerun: 32) pwrite64(r0, &(0x7f00000005c0)='\"', 0x1, 0x4eed0) (rerun: 32) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) (async) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) (async) umount2(&(0x7f0000000040)='.\x00', 0x2) close_range(r3, 0xffffffffffffffff, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (async) r9 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') unshare(0x0) (async, rerun: 64) getdents(r9, &(0x7f0000000dc0)=""/4106, 0x100a) (async, rerun: 64) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x7c}, 0x8) 2.216551562s ago: executing program 4 (id=1763): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000c00)=@deltfilter={0x6f0, 0x2d, 0x200, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0xffe2}, {0xd, 0x6}, {0x4, 0xf}}, [@filter_kind_options=@f_flow={{0x9}, {0x6c0, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x2026}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0x7, 0x5}}, @TCA_FLOW_MODE={0x8, 0x2, 0x4735122ef27ab3ca}, @TCA_FLOW_POLICE={0x45c, 0xa, 0x0, 0x1, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x800, 0x10, 0x8, 0x1, 0x9, 0x6, 0x4, 0x1, 0x1, 0x8000, 0x6, 0xc9e, 0x3, 0x6, 0xdf53, 0xcb1d, 0x7, 0x7, 0xc, 0x6, 0xf, 0x4, 0x9, 0x3, 0x7, 0x20, 0x6, 0x3, 0x8, 0x41f, 0x6, 0xfff, 0x9, 0x7, 0xb, 0x55, 0xb0c8, 0x5, 0x222c400, 0x9, 0x6, 0x1, 0x2, 0x8, 0x5, 0x1, 0x6a, 0x8, 0xc, 0x6, 0x0, 0x7, 0x8, 0x6, 0x0, 0xe19, 0x1, 0x40, 0x1, 0x3, 0x9, 0x7, 0xe, 0x9, 0x4, 0x3e, 0x3, 0x3, 0x7fff, 0x7, 0x5, 0x633c4426, 0x2, 0x4, 0x2, 0x8, 0x6, 0x80, 0x1, 0x5, 0x1, 0x200, 0x8, 0x97e, 0x4, 0x6, 0x8001, 0x8, 0x1e7b, 0x5c, 0x6, 0x5, 0x1, 0x9, 0x1, 0x2e, 0xffffffff, 0x7, 0x6, 0xab7c, 0x3, 0x4, 0x8, 0x5, 0x8, 0xf, 0x8, 0xbc5, 0x61e58a1d, 0xff, 0x81, 0x9, 0xed30, 0x30000000, 0x2b3d361, 0xa, 0x3, 0x2, 0xf679, 0x0, 0x4, 0x7f, 0x4, 0x2, 0xfffffffc, 0x5, 0x1, 0x400, 0x7, 0x4e, 0x8683, 0xbc, 0x0, 0xd9, 0x12, 0x831, 0xdd, 0x5, 0x400, 0xad9, 0x4, 0xd, 0x514, 0x6, 0x4, 0xe64dc77, 0x7ad, 0x9000, 0xffffffff, 0x4f9, 0x40, 0x7, 0x1, 0x19a5df59, 0x1, 0x8, 0xffffffff, 0x7ff, 0x7a, 0x45b, 0x2d0, 0x9, 0x800, 0x7, 0x9, 0xb, 0xff, 0x9, 0x7b, 0x3ff, 0x541, 0x8, 0x80000000, 0x10, 0x7fffffff, 0x1, 0x4, 0x800, 0x6, 0x3, 0x1, 0x1, 0x401, 0x9, 0x8, 0x2, 0x1, 0x8000, 0xb, 0x8, 0x2fc, 0xc, 0x9, 0xfd, 0xd, 0x5, 0x7ff, 0xf58d, 0x1, 0x8, 0x6, 0x1, 0xd, 0x8, 0x0, 0x0, 0x80000000, 0xa0, 0xffffffff, 0xe, 0x5, 0x0, 0x8, 0xd5, 0x9, 0x7, 0x8, 0x8, 0xc30f, 0x2, 0x6, 0x4, 0x2, 0x4, 0x4, 0x8, 0x6, 0xffffffff, 0x401, 0x7ff, 0x0, 0x7, 0x35a, 0x9, 0xb22, 0x4, 0x8, 0x5, 0x9, 0x7fffffff, 0x9b5, 0x0, 0x9, 0x3, 0x401, 0x5, 0x10, 0x400, 0x6, 0x10, 0x1, 0xe, 0xfffffffc, 0xdec4, 0xfff]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7ff, 0x0, 0x1, 0x4, 0x80000001, {0x3, 0x0, 0x3, 0xb, 0x2, 0x7fffffff}, {0x4, 0x1, 0x3, 0x6, 0x8, 0x5}, 0xb, 0x7}}]}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xfff2, 0x6}}, @TCA_FLOW_ADDEND={0x8, 0x5, 0x3d0}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0x1, 0xd}}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x3}, @TCA_FLOW_EMATCHES={0x220, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x21c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x2, 0x0, 0x0, {{0x7, 0x2, 0xe}, {0xf75}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x7, 0x3, 0x2}, {0x1, 0x5d, 0x6, 0x3}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x2, 0x1, 0xffff}, {0x1000, 0x8001, 0x6, 0x0, 0x8, 0x0, 0x2}}}, @TCF_EM_IPT={0x50, 0x2, 0x0, 0x0, {{0x8}, [@TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x3}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xf8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x1}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x9}]}}, @TCF_EM_CONTAINER={0x108, 0x3, 0x0, 0x0, {{0xfff8}, "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"}}, @TCF_EM_NBYTE={0x18, 0x1, 0x0, 0x0, {{0x4, 0x2, 0x800}, {0x6, 0x7, 0x0, "28facfd99fefe3"}}}, @TCF_EM_META={0x64, 0x1, 0x0, 0x0, {{0x3}, [@TCA_EM_META_HDR={0xc, 0x1, {{0xd, 0x0, 0x2}, {0x80, 0x7, 0x2}}}, @TCA_EM_META_LVALUE={0xc, 0x2, [@TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_RVALUE={0x12, 0x3, [@TCF_META_TYPE_VAR="88b8b992a759816b0849", @TCF_META_TYPE_VAR="20839f63"]}, @TCA_EM_META_LVALUE={0x7, 0x2, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="9bf2c9"]}, @TCA_EM_META_LVALUE={0x22, 0x2, [@TCF_META_TYPE_VAR="0f344be038b92724e2f3", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x4]}]}}]}]}, @TCA_FLOW_RSHIFT={0x8, 0x4, 0x5}]}}]}, 0x6f0}}, 0x14000000) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'dummy0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=ANY=[@ANYRES64=r0, @ANYRES32=0x0, @ANYRES16=r2, @ANYRESHEX=r0, @ANYBLOB='\b\x00\n\x00', @ANYBLOB="5dda862f9a3ddce10fd99de85452d1c6660a761b9923efb547ca7ea7816168bd40f27a83b2a9fbf6d24792571c2f2e1f812984f2989d8564fdc0f2489f9205e63cdafc2612523eed33266fb8b59632025b9cbc6da1d35b5feccf50f39511caa78a357a2738dd9457cf01facd8b17ba0bf49b5a35bdfc3c537c73846bd58039fb64966837c1d5eb6dcd71ea45e5e47976e82b9eebfc85500cba151de75fb08b97a0018cc92d861a805b28283bfd534ed2c3d8f3fe419f"], 0xb4}}, 0x20008050) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x3, 0x400}}, './file0\x00'}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x424000, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYRESOCT=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x18) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r9, &(0x7f0000000180)=""/65, 0x41) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), &(0x7f0000000240)='%pK \x00'}, 0x20) r10 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo\x00') getdents64(r10, &(0x7f0000001fc0)=""/4079, 0xfef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0x1}, &(0x7f00000002c0), &(0x7f0000000300)='%pS \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{}, &(0x7f00000003c0), &(0x7f0000000400)='%-010d \x00'}, 0x20) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @loopback, @initdev}, &(0x7f0000000800)=0xc) pipe2(&(0x7f0000000840), 0x800) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e8000000000040d900008500000023000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r11}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002c80)={r11, 0xe0, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, &(0x7f0000002980)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, &(0x7f0000002f00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x71, &(0x7f0000002a40)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000002ac0), &(0x7f0000002b00), 0x8, 0x800c9, 0x8, 0x8, &(0x7f0000002b40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYRES16=r8], &(0x7f0000000540)='syzkaller\x00', 0x4b7, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) dup(r6) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000808000400", @ANYRES32=r13, @ANYBLOB="06001500070000000c0016800800", @ANYRES64=r13], 0x38}}, 0x10) 2.154709918s ago: executing program 1 (id=1764): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) ioprio_get$pid(0x2, 0x0) (fail_nth: 3) 2.154468028s ago: executing program 2 (id=1765): mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00'}, 0x10) r0 = socket(0x29, 0x5, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x8400001e}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x30}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x50, r1, 0x1, 0x4, 0x1, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x48c1}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000007c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x14, r1, 0x100, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000030000000900010073797a30000000005c000000030a030000000000000000000300000009000b0073797a30000000000900010073797a300000000014000480080002400000000008000140000000001c0008800c00024000000000000000000c00"], 0xcc}}, 0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x11, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT, @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) inotify_init1(0x800) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8080, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000340)={'pimreg1\x00', 0x1}) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) read(r6, &(0x7f0000000040)=""/170, 0xaa) 2.122356981s ago: executing program 1 (id=1766): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x102000200032, r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0xea60}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2e, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330b9072}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x18) quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000000)=@rnullb, 0x0, &(0x7f00000000c0)='./file0\x00') socket(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x3, &(0x7f0000000140)=[{0x20}, {0x54}, {0x6}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000780)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x20, 0x7ffc1ffb}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(r6, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r5, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) io_destroy(r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000600)="$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") bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000d00)) 1.83737867s ago: executing program 3 (id=1767): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x102000200032, r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0xea60}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2e, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330b9072}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x18) quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000000)=@rnullb, 0x0, &(0x7f00000000c0)='./file0\x00') socket(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x3, &(0x7f0000000140)=[{0x20}, {0x54}, {0x6}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000780)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x20, 0x7ffc1ffb}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(r6, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r5, &(0x7f0000000040)="5400ffff00", 0x5, 0x0, 0x0, 0x2}]) io_destroy(r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000600)="$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") bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001440)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x20) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000d00)) 1.383828214s ago: executing program 4 (id=1768): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) name_to_handle_at(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 1.355539227s ago: executing program 4 (id=1769): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) name_to_handle_at(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 1.092116883s ago: executing program 1 (id=1770): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') openat(r0, &(0x7f0000000d80)='./file1\x00', 0x143042, 0x20) (async) r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x3, 0x9}, 0x20) (async) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0x4) (async) sendmmsg(r1, &(0x7f0000001500)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x500, 0x80000, @remote, 0x0, 0x3}, 0x80, 0x0}, 0x5b4}, {{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7080000, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="120000000000000029"], 0x108}}], 0x2, 0xc040) (async) syz_clone(0x20000000, &(0x7f0000000000)="2675f5bfcd62393e62a1b943bca0a5430f2f43b6a704932bebf9961318d6cf16e5ad8537a53895099efc947b0d28b4657d4c02484b1ddab36de8f5701ad6615d08f4a88fa5cb7bc9acb3150cf7bd202f4bc5c0a04ecd051b00cdb343f3d79373a15ac73b97621b409932de13c2f787ad9b92593349eab4b6f3bf2cfa6feefa3b3d591922c8c45b8a79677482125dfeb327b997abb1930f9e1b643245b34a937f7404a571da6526b776d7a8005c4f85e7855c9c496a", 0xb5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180)="36fcc03afefbbe0961dfa4d9226b83140724ad213afcfcca8273d2200d697e5397e5b035d3f597c8c8fab1a188c0a0381136b56742") 1.071645565s ago: executing program 4 (id=1771): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000680)={0x1c, 0x5e, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x76, 0x0, 0x0, @u32=0x9}, @nested={0x4, 0x1}]}, 0x1c}], 0x1}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xb76f4236adaf916}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@gettfilter={0x44, 0x2e, 0x408, 0x70bd27, 0x68, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x4, 0x2}, {0x9, 0xb}}, [{0x8, 0xb, 0x200}, {0x8, 0xb, 0x81}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x3}]}, 0x44}}, 0x4000850) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX]) 1.070975655s ago: executing program 2 (id=1772): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) ioprio_get$pid(0x2, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f00000001c0)={0x3, {{0xa, 0x4e24, 0x2, @mcast1, 0xff7ffffd}}, {{0xa, 0x4e08, 0x4a3, @local, 0x4f1}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000180)={0x3, {{0xa, 0x4e23, 0xa46, @mcast2, 0xbf9}}, {{0xa, 0x4e24, 0x7, @loopback, 0xfffffe01}}}, 0x108) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000040)={0x3, &(0x7f0000000100)=[{0xa, 0x2, 0xc0, 0x9}, {0x9c6, 0x7, 0x9c, 0xfffe0000}, {0x7, 0xd, 0x1, 0x3}]}, 0x10) 993.077403ms ago: executing program 4 (id=1773): pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000300000000000004000000080002000500000006000b000a"], 0x24}}, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x10, 0x10000, 0x0, 0x5, 0x8, 0x20002, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r5, 0x0, 0x0) listen(r5, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000001480)) r6 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r6, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) splice(r2, 0x0, r1, 0x0, 0x2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000012c0), 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f00000011c0)=0x0, &(0x7f0000001200)=0x4) sendmsg$nl_route_sched_retired(r1, &(0x7f0000001280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001240)={&(0x7f0000001300)=@deltclass={0x10c, 0x29, 0x400, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x4, 0xf}, {0x8, 0x7}, {0x2, 0xe}}, [@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x5, 0x5, 0x1d}}}, @c_cbq={{0x8}, {0x5c, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0x37, 0x7, 0x1, 0x1, 0x7, 0x6}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0xfff1, 0xa}, 0x5, 0x6}}, @TCA_CBQ_RATE={0x10, 0x5, {0x9, 0x2, 0x2, 0x5, 0x1, 0x2519}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x8, 0x3, 0x18, 0x6, 0x9, 0x673, 0x2, 0x80}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x0, 0x6, 0xfa, 0x8, 0x80000000}}]}}, @c_atm={{0x8}, {0x64, 0x2, [@TCA_ATM_HDR={0xd, 0x3, "4676bd1d936256cb25"}, @TCA_ATM_EXCESS={0x8, 0x4, {0x0, 0x5}}, @TCA_ATM_FD={0x8, 0x1, r1}, @TCA_ATM_HDR={0x35, 0x3, "200a382cd06725ade7ebdf478fa22018aac4e4b5eed547c5d3a0e075c85991b4096e40253bdc47d0d1ac9798ecdca61bd4"}, @TCA_ATM_FD={0x8, 0x1, r0}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x1}, 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r9}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f00000014c0)=ANY=[@ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r10}, 0x18) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) brk(0x400000ffc000) readv(r7, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) ioctl$TIOCVHANGUP(r7, 0x5437, 0x0) pipe2(&(0x7f0000000080), 0x80) 948.263837ms ago: executing program 1 (id=1774): bind$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x3}, 0x10) listen(0xffffffffffffffff, 0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) sync() keyctl$invalidate(0x15, r0) 916.49031ms ago: executing program 3 (id=1775): r0 = socket(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x10007ffffffff}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a14000000000000000a"], 0x28}}, 0x0) 812.18077ms ago: executing program 2 (id=1776): r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000880)=@newtaction={0x70, 0x30, 0x53b, 0x0, 0x0, {0x9}, [{0x5c, 0x1, [@m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x15}, @TCA_SAMPLE_PARMS={0x18}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x20}]}, {0x4}, {0xc}, {0xc, 0x4}}}]}]}, 0x70}}, 0x0) 811.81454ms ago: executing program 3 (id=1777): socket$inet_udp(0x2, 0x2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000e1ff00000017"], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) r5 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r6}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x73, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x2b, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000540)='inet_sock_set_state\x00', r8}, 0x10) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) syz_open_dev$usbfs(0x0, 0x76, 0x160341) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r10, 0xffffffffffffffff, 0x0) 810.85049ms ago: executing program 3 (id=1778): r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) fallocate(r0, 0x0, 0x9, 0x2000406) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x2, 0x8, 0x7f}) r1 = socket(0x10, 0x80002, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x50e33000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) write(r2, &(0x7f0000000000)="de6562474a870d70e01965c2c3b26c9c67199ddf269f12ffb584ecee14d0d741a979f2b6a16a2f5d18ece5a35b7fb11cb29e6b5eaf44238e7890b26bdd977dccedaaf48d1d1fdf77274800161f71713584712b5e3d28851db9de6d712d2ae10a9ccedb7adae186f375f2747110cba6dcc3d72c4868cffe5a726a0ed38c6c7f917236251f79faa3afced575ebccdaa38704b252e90a2f81f52718ea5cea11c8", 0x9f) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) waitid(0x0, 0x0, &(0x7f0000002ff9), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000600)=@newqdisc={0x54, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x24, 0x2, {{0x71, 0x53, 0x5, 0x2, 0xe, 0x1e}, [@TCA_NETEM_ECN={0x8, 0x7, 0x1}]}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtclass={0x5c, 0x28, 0x300, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0xc, 0xffff}, {0xd, 0xfff2}, {0xb, 0x2}}, [@TCA_RATE={0x6, 0x5, {0xc, 0x48}}, @TCA_RATE={0x6, 0x5, {0xf, 0x9}}, @tclass_kind_options=@c_sfb={0x8}, @tclass_kind_options=@c_prio={0x9}, @TCA_RATE={0x6, 0x5, {0xff, 0x43}}, @tclass_kind_options=@c_clsact={0xb}]}, 0x5c}}, 0x0) 776.610734ms ago: executing program 2 (id=1779): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x22) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a3100000000080005400000002b0900020073797a310000000008000a4014"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b0001006272696467650000180002"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000090) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0x7}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4004001) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) move_mount(0xffffffffffffff9c, 0x0, r0, 0x0, 0x64) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2b40, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x3, 0x9}, 0xc84, 0x7f, 0x0, 0x1, 0x8, 0x20005, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) r2 = getpid() syz_pidfd_open(r2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001340)=ANY=[@ANYBLOB="9807e9d73126010400000068868d49792411c8d1ca7beeb62faa074f04732d7f6d65ebdc37212148abb9f912b45610ccceab354e6fdc26c5671522e5161deecff0b34749cc53f65bac9629704799b9291bfd56e0719e77757967a675ba163427e7f7dc30a4176a93d784fcbc22f9430f942e7278839ccae4c8d8e8488f55d6c21fa400b1211f2078f89d746640acc84235d6518c96544230", @ANYBLOB="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"], 0x798}, 0x1, 0x0, 0x0, 0x20000005}, 0x4000000) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffffffffff49, &(0x7f0000000380)=[{&(0x7f0000000040)="c01803002e000b12d25a80648c2594f90124fc60100c044002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) get_robust_list(0x0, &(0x7f0000000340)=&(0x7f0000000280), &(0x7f0000000380)=0x18) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="796100000000000000007e0000003333e23190820fd828d13f59016e6f66855bf8a4dd02b85a5ecd27fab4e87a04381457b035249cddf9b8a37a0dbf5b723652e88b3ba6d172d1a2fab2b6064cc1257a37dacc84dd50e9ede5329fcd943e58e416d77a6d3e02a2f7cc0e42eccde8ac"], 0x14}, 0x1, 0x0, 0x0, 0x4045}, 0x4000054) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff6000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89c, 0xc000, 0x2, 0x20002f9}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0xf4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x48004}, 0x0) socket$inet(0x2, 0x80001, 0x84) 726.643689ms ago: executing program 1 (id=1780): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000)={{}, {0x0, 0x989680}}, 0x0) readv(r0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000300)='./file1\x00', 0x21081e, &(0x7f0000000b80)={[{@resgid}, {@nogrpid}, {@grpquota}, {@noquota}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) statfs(0x0, &(0x7f0000000440)=""/137) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x20100, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8000) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000007000010010ab4be68e8da23507000000", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x1ff003, 0x81, 0xffff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x50) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0xfffffffe, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x1001, 0x0) 698.067021ms ago: executing program 2 (id=1781): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x102000200032, r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0xea60}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2e, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330b9072}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x18) quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000000)=@rnullb, 0x0, &(0x7f00000000c0)='./file0\x00') socket(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x3, &(0x7f0000000140)=[{0x20}, {0x54}, {0x6}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000780)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x20, 0x7ffc1ffb}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(r6, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r5, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) io_destroy(r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000600)="$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") bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000d00)) 240.982506ms ago: executing program 1 (id=1782): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (fail_nth: 2) 0s ago: executing program 3 (id=1783): mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00'}, 0x10) r0 = socket(0x29, 0x5, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x8400001e}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x30}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x50, r1, 0x1, 0x4, 0x1, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x48c1}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000007c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x14, r1, 0x100, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000030000000900010073797a30000000005c000000030a030000000000000000000300000009000b0073797a30000000000900010073797a300000000014000480080002400000000008000140000000001c0008800c00024000000000000000000c00"], 0xcc}}, 0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x11, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT, @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) inotify_init1(0x800) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8080, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000340)={'pimreg1\x00', 0x1}) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) read(r6, &(0x7f0000000040)=""/170, 0xaa) 0s ago: executing program 0 (id=1784): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x400, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000050) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000200)={@mcast2, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x0, 0xe, 0x20, @dev={0xfe, 0x80, '\x00', 0x13}, @empty, 0x1, 0x20, 0x0, 0x7}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x0, 0xe, 0x20, @dev={0xfe, 0x80, '\x00', 0x13}, @empty, 0x1, 0x20, 0x0, 0x7}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000340)={'tunl0\x00', 0x0, 0x1, 0x80, 0x9, 0xfffffffc, {{0x9, 0x4, 0x1, 0x3b, 0x24, 0x67, 0x0, 0x3, 0x4, 0x0, @multicast2, @private=0xa010101, {[@cipso={0x86, 0x9, 0x3, [{0x5, 0x3, '4'}]}, @generic={0x7, 0x4, '$h'}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000740)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000700)={&(0x7f0000000440)={0x2b4, r4, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_STRSET_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x118, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x9d002a35ee7f1251}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xc0, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x4004000}, 0x20080884) sendfile(r0, r0, &(0x7f0000000780)=0xb, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000800)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000840)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000840)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000cc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000880)={0x3cc, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xd}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r5}, {0x21c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb8cf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x4}}]}, 0x3cc}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) (async) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000cc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000880)={0x3cc, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xd}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r5}, {0x21c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb8cf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x4}}]}, 0x3cc}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000000d40), r0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000e80)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d80)={0x90, r11, 0x10, 0x70bd28, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x3ff}, {0x8, 0x13, 0x6d}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x7fff}, {0x8, 0x13, 0x80000000}, {0x5, 0x14, 0x1}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4004804}, 0x20000000) (async) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000e80)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d80)={0x90, r11, 0x10, 0x70bd28, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x3ff}, {0x8, 0x13, 0x6d}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x7fff}, {0x8, 0x13, 0x80000000}, {0x5, 0x14, 0x1}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4004804}, 0x20000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000ec0)={0x86, 0xa8d5, 0x5, 0xe, 0xc}, 0x14) syz_genetlink_get_family_id$nl80211(&(0x7f0000000f40), r3) (async) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f40), r3) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000f80)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000001480)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001440)={&(0x7f0000000fc0)={0x458, r12, 0x4, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r13}, @val={0xc, 0x99, {0x8, 0x47}}}}, [@NL80211_ATTR_IE={0xa, 0x2a, [@chsw_timing={0x68, 0x4, {0xbc1, 0xfff}}]}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x9}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_IE={0x18d, 0x2a, [@cf={0x4, 0x6, {0x6, 0xff, 0x458c, 0xb7c3}}, @gcr_ga={0xbd, 0x6, @broadcast}, @mesh_config={0x71, 0x7, {0x0, 0x1, 0xffffffffffffffff, 0x0, 0x1, 0x5, 0x9}}, @link_id={0x65, 0x12, {@initial, @device_b, @device_b}}, @measure_req={0x26, 0xcd, {0x61, 0x2, 0x5, "110f342ce450cb37170d7f3e313cabf95561c259bb353244032b733128726ea58caa2f3373d6f2e632e7e7d4968e8b79393f0d6c4cb16195ad060c17ea10dfb782d34b1c633bd4c9396c1d86b75b77d9959a6a484879b5e6e7f8088829a7a59440668a5176b9e8577e1809d577216f321a293be8e9916e303a0771de72d560861487944995e0d91907ba8e04cf8e5b32b1827328634b18bb2aebc6ea5fd6c0402c7b4a47afad285d1482e4215d61ac6c5cd417bc9b432227907b85440aaa04bc34e75cd62357765d3a1d"}}, @chsw_timing={0x68, 0x4, {0xe732, 0x6}}, @mic={0x8c, 0x18, {0x9df, "6a8af66468d6", @long="749b142473dbaeafb3ec4ba670671a7d"}}, @preq={0x82, 0x62, {{0x1, 0x1, 0x0, 0x0, 0x1}, 0x5, 0xe9, 0x8, @device_a, 0xffff, @value, 0x7fff, 0x0, 0x6, [{{0x0, 0x0, 0x1}, @device_a, 0x3}, {{0x1}, @device_b, 0x9}, {{}, @device_b, 0xffff0d5b}, {{0x0, 0x0, 0x1}, @device_b, 0xfff}, {{0x1, 0x0, 0x1}, @device_b, 0x9}, {{}, @broadcast, 0x10}]}}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x60}}]}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_IE={0x252, 0x2a, [@channel_switch={0x25, 0x3, {0x0, 0x70, 0x9}}, @tim={0x5, 0xee, {0x74, 0x75, 0xa, "4ef5a7149345840a6c27e03b0539ff0e5dd5af4a1ba784195da8d93f0ec0a3c000e5b717a66526157e121d2faec3e42a60daf6ff1f5d31e3b2dfd573e9d2ec89ee6e73b3bc030291687693f00c8ba1a4db823f4f13242c02ac83a2b270854d873e6f7f8cda5575bd990229b7aacf73696a4f80a8b2a05e79f9a0abc486cb7873ee772fbdedd25bcd86b5be1d3ab1ce8f9bee06f02f31ea06a465074f77bed474d248562e917e45facf32fb56cf1eaa5f7f95267501fa060d7810d80159fe757ee8145d66e385848507270eb1e0619598296c24261509393597a266b28c493baf65e9a71f49ccf33fec9a95"}}, @random_vendor={0xdd, 0xcb, "9d916c8331bcc248c36d9f0db1c9353f229067f9eb0fd5a9105906b1454a4cb2d4929118cfa50ecbc814162c9c6fec96d632b44c0c85397368ed76adcb63070f6d0d440441671d1ab64854d433fdfbbd4fb4563f5fd53b22ee3c267aea985dae9b38a15abe5a2c6a1d0ffa2ad9202970059c8a76dfe8ad117a0b914dc4bfd33f7a6553b6019380d9074565a209a2d7c59c8e269c958f9ee9c335a0a5e17b6e4b8309b9d54f00f91e37550d95c51e2038e60c3a98729bdf09dfd08cc37e68d218f429260b9f2411e50b788d"}, @prep={0x83, 0x1f, {{}, 0x3, 0xfc, @device_b, 0x1ff, @void, 0xff, 0x7, @device_a, 0xd8f}}, @cf={0x4, 0x6, {0xe, 0x8, 0x7, 0x6}}, @tim={0x5, 0x5b, {0xb, 0x1b, 0x8, "9bf6a89b979fcc6567bf65afafd8cdea9efa8b8d89896c1a96fb3397ce408eee43d6bc9ea438f65e72c0557ea218ca2cfbd83530d884d7dcc2402be303b9f18f28d8dc762043509224c437c7f41415f285af54fc90e0b6ee"}}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x5, 0x80, 0x3}}]}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_SSID={0x1f, 0x34, @random="955719639450cd870225778525bcf2c1829ba30b148fb368f739f2"}]}, 0x458}, 0x1, 0x0, 0x0, 0x840}, 0x4804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001500)={&(0x7f00000014c0)='btrfs_inode_mod_outstanding_extents\x00', r3, 0x0, 0x29}, 0x18) setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f0000001540)=0x8, 0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000001580)={0x4, {{0x2, 0x4e24, @rand_addr=0x64010100}}}, 0x88) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000001640)={0xfffc, 0x2, 0x5, 0x7fff, 0x9, 0xffff}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001680)={0x0, "c7bebc209a81d7c11eccc1c5619edf2c"}) (async) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000001680)={0x0, "c7bebc209a81d7c11eccc1c5619edf2c"}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000002680)={0x10, 0x7, {0x8, @struct={0xbb, 0x92a6}, r14, 0x6, 0xfffffffeffffffff, 0x3, 0x8cbe, 0x6, 0x20, @struct={0x5, 0x1}, 0x1000, 0x5, [0xffffffff7fffffff, 0x6dd, 0x1, 0x9, 0x200, 0xffff0000000]}, {0x5, @usage=0x3, 0x0, 0x2, 0x5, 0x7, 0x7, 0x6, 0x8b, @usage=0xf3df, 0x6, 0x0, [0x400, 0x0, 0x2, 0x0, 0xb, 0x200]}, {0xe5c, @struct={0xfffffff7, 0x1a75}, 0x0, 0x5, 0x1, 0x4959, 0x8001, 0x3, 0xe, @struct={0x3b9, 0xf}, 0x1222, 0xd44b, [0x0, 0xd2f, 0x7, 0x77, 0x3, 0x6]}, {0xd, 0x4, 0x1ff}}) (async) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000002680)={0x10, 0x7, {0x8, @struct={0xbb, 0x92a6}, r14, 0x6, 0xfffffffeffffffff, 0x3, 0x8cbe, 0x6, 0x20, @struct={0x5, 0x1}, 0x1000, 0x5, [0xffffffff7fffffff, 0x6dd, 0x1, 0x9, 0x200, 0xffff0000000]}, {0x5, @usage=0x3, 0x0, 0x2, 0x5, 0x7, 0x7, 0x6, 0x8b, @usage=0xf3df, 0x6, 0x0, [0x400, 0x0, 0x2, 0x0, 0xb, 0x200]}, {0xe5c, @struct={0xfffffff7, 0x1a75}, 0x0, 0x5, 0x1, 0x4959, 0x8001, 0x3, 0xe, @struct={0x3b9, 0xf}, 0x1222, 0xd44b, [0x0, 0xd2f, 0x7, 0x77, 0x3, 0x6]}, {0xd, 0x4, 0x1ff}}) syz_open_dev$sg(&(0x7f0000002a80), 0xffffffffffffff74, 0x400800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002b00)={&(0x7f0000002ac0)='svcrdma_decode_wseg\x00', r3, 0x0, 0x4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002b00)={&(0x7f0000002ac0)='svcrdma_decode_wseg\x00', r3, 0x0, 0x4}, 0x18) quotactl_fd$Q_QUOTAOFF(r3, 0xffffffff80000301, 0x0, 0x0) kernel console output (not intermixed with test programs): _close+0x56/0xf0 [ 86.835313][ T6286] x64_sys_call+0x273c/0x3000 [ 86.835340][ T6286] do_syscall_64+0xd2/0x200 [ 86.835501][ T6286] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 86.835538][ T6286] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 86.835638][ T6286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.835667][ T6286] RIP: 0033:0x7fc59aedeec9 [ 86.835686][ T6286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.835711][ T6286] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 86.835740][ T6286] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 86.835758][ T6286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 86.835772][ T6286] RBP: 00007fc599947090 R08: 0000000000000000 R09: 0000000000000000 [ 86.835852][ T6286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.835868][ T6286] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 86.835891][ T6286] [ 87.301971][ T6302] FAULT_INJECTION: forcing a failure. [ 87.301971][ T6302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.315189][ T6302] CPU: 0 UID: 0 PID: 6302 Comm: syz.2.1121 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.315227][ T6302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 87.315245][ T6302] Call Trace: [ 87.315253][ T6302] [ 87.315264][ T6302] __dump_stack+0x1d/0x30 [ 87.315292][ T6302] dump_stack_lvl+0xe8/0x140 [ 87.315320][ T6302] dump_stack+0x15/0x1b [ 87.315406][ T6302] should_fail_ex+0x265/0x280 [ 87.315455][ T6302] should_fail+0xb/0x20 [ 87.315536][ T6302] should_fail_usercopy+0x1a/0x20 [ 87.315565][ T6302] _copy_from_user+0x1c/0xb0 [ 87.315596][ T6302] ___sys_sendmsg+0xc1/0x1d0 [ 87.315651][ T6302] __x64_sys_sendmsg+0xd4/0x160 [ 87.315764][ T6302] x64_sys_call+0x191e/0x3000 [ 87.315804][ T6302] do_syscall_64+0xd2/0x200 [ 87.315828][ T6302] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 87.315872][ T6302] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 87.315894][ T6302] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.315954][ T6302] RIP: 0033:0x7fd7b127eec9 [ 87.315977][ T6302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.316003][ T6302] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 87.316030][ T6302] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 87.316048][ T6302] RDX: 0000000000004000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 87.316111][ T6302] RBP: 00007fd7afce7090 R08: 0000000000000000 R09: 0000000000000000 [ 87.316128][ T6302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.316146][ T6302] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 87.316228][ T6302] [ 87.742951][ T6321] FAULT_INJECTION: forcing a failure. [ 87.742951][ T6321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.756482][ T6321] CPU: 0 UID: 0 PID: 6321 Comm: syz.2.1128 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.756512][ T6321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 87.756527][ T6321] Call Trace: [ 87.756535][ T6321] [ 87.756545][ T6321] __dump_stack+0x1d/0x30 [ 87.756573][ T6321] dump_stack_lvl+0xe8/0x140 [ 87.756594][ T6321] dump_stack+0x15/0x1b [ 87.756610][ T6321] should_fail_ex+0x265/0x280 [ 87.756645][ T6321] should_fail+0xb/0x20 [ 87.756721][ T6321] should_fail_usercopy+0x1a/0x20 [ 87.756750][ T6321] _copy_from_user+0x1c/0xb0 [ 87.756895][ T6321] __copy_msghdr+0x244/0x300 [ 87.756927][ T6321] ___sys_sendmsg+0x109/0x1d0 [ 87.756974][ T6321] __sys_sendmmsg+0x178/0x300 [ 87.757022][ T6321] __x64_sys_sendmmsg+0x57/0x70 [ 87.757127][ T6321] x64_sys_call+0x1c4a/0x3000 [ 87.757152][ T6321] do_syscall_64+0xd2/0x200 [ 87.757186][ T6321] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 87.757216][ T6321] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 87.757253][ T6321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.757275][ T6321] RIP: 0033:0x7fd7b127eec9 [ 87.757290][ T6321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.757313][ T6321] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 87.757403][ T6321] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 87.757421][ T6321] RDX: 0000000000000001 RSI: 0000200000004980 RDI: 0000000000000004 [ 87.757468][ T6321] RBP: 00007fd7afce7090 R08: 0000000000000000 R09: 0000000000000000 [ 87.757481][ T6321] R10: 0000000020000810 R11: 0000000000000246 R12: 0000000000000001 [ 87.757493][ T6321] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 87.757511][ T6321] [ 88.895956][ T6359] netlink: 'syz.3.1139': attribute type 10 has an invalid length. [ 88.917142][ T6359] team0: Port device dummy0 added [ 89.060236][ T6373] bridge0: entered promiscuous mode [ 89.065711][ T6373] macvtap1: entered allmulticast mode [ 89.071175][ T6373] bridge0: entered allmulticast mode [ 89.078529][ T6373] bridge0: port 3(macvtap1) entered blocking state [ 89.085220][ T6373] bridge0: port 3(macvtap1) entered disabled state [ 89.093019][ T6373] bridge0: left allmulticast mode [ 89.098109][ T6373] bridge0: left promiscuous mode [ 89.185844][ T29] kauditd_printk_skb: 1127 callbacks suppressed [ 89.185864][ T29] audit: type=1400 audit(1760603524.856:13977): avc: denied { create } for pid=6377 comm="syz.1.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 89.213006][ T29] audit: type=1400 audit(1760603524.856:13978): avc: denied { allowed } for pid=6377 comm="syz.1.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 89.232608][ T29] audit: type=1400 audit(1760603524.856:13979): avc: denied { create } for pid=6377 comm="syz.1.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 89.252512][ T29] audit: type=1400 audit(1760603524.886:13980): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.294631][ T29] audit: type=1400 audit(1760603524.956:13981): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.316097][ T6382] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1149'. [ 89.318997][ T29] audit: type=1400 audit(1760603524.956:13982): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.352371][ T29] audit: type=1400 audit(1760603524.966:13983): avc: denied { map_create } for pid=6381 comm="syz.2.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.373180][ T29] audit: type=1400 audit(1760603524.966:13984): avc: denied { read write } for pid=6379 comm="syz.1.1149" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.374900][ T6382] netlink: 'syz.1.1149': attribute type 13 has an invalid length. [ 89.397592][ T29] audit: type=1400 audit(1760603524.966:13985): avc: denied { prog_load } for pid=6384 comm="syz.0.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.424876][ T29] audit: type=1400 audit(1760603524.966:13986): avc: denied { prog_load } for pid=6384 comm="syz.0.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 89.445793][ T6391] FAULT_INJECTION: forcing a failure. [ 89.445793][ T6391] name failslab, interval 1, probability 0, space 0, times 0 [ 89.458608][ T6391] CPU: 0 UID: 0 PID: 6391 Comm: syz.0.1153 Not tainted syzkaller #0 PREEMPT(voluntary) [ 89.458669][ T6391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 89.458681][ T6391] Call Trace: [ 89.458688][ T6391] [ 89.458695][ T6391] __dump_stack+0x1d/0x30 [ 89.458716][ T6391] dump_stack_lvl+0xe8/0x140 [ 89.458733][ T6391] dump_stack+0x15/0x1b [ 89.458748][ T6391] should_fail_ex+0x265/0x280 [ 89.458818][ T6391] should_failslab+0x8c/0xb0 [ 89.458843][ T6391] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 89.458890][ T6391] ? __alloc_skb+0x101/0x320 [ 89.458913][ T6391] __alloc_skb+0x101/0x320 [ 89.458933][ T6391] ? audit_log_start+0x342/0x720 [ 89.458951][ T6391] audit_log_start+0x3a0/0x720 [ 89.459018][ T6391] ? kstrtouint+0x76/0xc0 [ 89.459047][ T6391] audit_seccomp+0x48/0x100 [ 89.459074][ T6391] ? __seccomp_filter+0x82d/0x1250 [ 89.459097][ T6391] __seccomp_filter+0x83e/0x1250 [ 89.459169][ T6391] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 89.459196][ T6391] ? vfs_write+0x7e8/0x960 [ 89.459221][ T6391] __secure_computing+0x82/0x150 [ 89.459274][ T6391] syscall_trace_enter+0xcf/0x1e0 [ 89.459299][ T6391] do_syscall_64+0xac/0x200 [ 89.459334][ T6391] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 89.459426][ T6391] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 89.459463][ T6391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.459490][ T6391] RIP: 0033:0x7fc98afbeec9 [ 89.459505][ T6391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.459521][ T6391] RSP: 002b:00007fc989a1f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c8 [ 89.459563][ T6391] RAX: ffffffffffffffda RBX: 00007fc98b215fa0 RCX: 00007fc98afbeec9 [ 89.459574][ T6391] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000000 [ 89.459585][ T6391] RBP: 00007fc989a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 89.459596][ T6391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.459607][ T6391] R13: 00007fc98b216038 R14: 00007fc98b215fa0 R15: 00007ffc8df7c7a8 [ 89.459623][ T6391] [ 89.698443][ T6382] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.705844][ T6382] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.755072][ T6382] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 89.765758][ T6382] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 89.831833][ T1719] netdevsim netdevsim1 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 89.840994][ T1719] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.850070][ T1719] netdevsim netdevsim1 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 89.859068][ T1719] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.869669][ T1719] netdevsim netdevsim1 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 89.878857][ T1719] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.887954][ T1719] netdevsim netdevsim1 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 89.897237][ T1719] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.983171][ T6410] netlink: 'syz.3.1162': attribute type 21 has an invalid length. [ 89.991353][ T6410] netlink: 'syz.3.1162': attribute type 1 has an invalid length. [ 89.999337][ T6410] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1162'. [ 90.132842][ T6427] FAULT_INJECTION: forcing a failure. [ 90.132842][ T6427] name failslab, interval 1, probability 0, space 0, times 0 [ 90.145576][ T6427] CPU: 1 UID: 0 PID: 6427 Comm: syz.1.1168 Not tainted syzkaller #0 PREEMPT(voluntary) [ 90.145618][ T6427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 90.145636][ T6427] Call Trace: [ 90.145644][ T6427] [ 90.145653][ T6427] __dump_stack+0x1d/0x30 [ 90.145681][ T6427] dump_stack_lvl+0xe8/0x140 [ 90.145707][ T6427] dump_stack+0x15/0x1b [ 90.145728][ T6427] should_fail_ex+0x265/0x280 [ 90.145773][ T6427] should_failslab+0x8c/0xb0 [ 90.145807][ T6427] kmem_cache_alloc_noprof+0x50/0x480 [ 90.145843][ T6427] ? mas_alloc_nodes+0x1a2/0x210 [ 90.145874][ T6427] mas_alloc_nodes+0x1a2/0x210 [ 90.145903][ T6427] mas_preallocate+0x2ca/0x510 [ 90.145937][ T6427] __split_vma+0x240/0x650 [ 90.145968][ T6427] ? __mpol_equal+0x2e/0x1e0 [ 90.145993][ T6427] ? can_vma_merge_right+0x105/0x2e0 [ 90.146021][ T6427] vma_modify+0x21e/0xc80 [ 90.146050][ T6427] vma_modify_policy+0x101/0x130 [ 90.146082][ T6427] mbind_range+0x1b8/0x440 [ 90.146107][ T6427] ? mas_find+0x5d5/0x700 [ 90.146136][ T6427] __se_sys_mbind+0x648/0xac0 [ 90.146185][ T6427] __x64_sys_mbind+0x78/0x90 [ 90.146221][ T6427] x64_sys_call+0x2936/0x3000 [ 90.146249][ T6427] do_syscall_64+0xd2/0x200 [ 90.146278][ T6427] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 90.146314][ T6427] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 90.146342][ T6427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.146370][ T6427] RIP: 0033:0x7fc59aedeec9 [ 90.146389][ T6427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.146411][ T6427] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 90.146433][ T6427] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 90.146448][ T6427] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000001000 [ 90.146464][ T6427] RBP: 00007fc599947090 R08: 000000000000000a R09: 0000000000000002 [ 90.146478][ T6427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.146489][ T6427] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 90.146507][ T6427] [ 91.146558][ T6452] FAULT_INJECTION: forcing a failure. [ 91.146558][ T6452] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.159733][ T6452] CPU: 0 UID: 0 PID: 6452 Comm: syz.4.1176 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.159760][ T6452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.159854][ T6452] Call Trace: [ 91.159863][ T6452] [ 91.159873][ T6452] __dump_stack+0x1d/0x30 [ 91.159899][ T6452] dump_stack_lvl+0xe8/0x140 [ 91.159917][ T6452] dump_stack+0x15/0x1b [ 91.159933][ T6452] should_fail_ex+0x265/0x280 [ 91.160016][ T6452] should_fail+0xb/0x20 [ 91.160051][ T6452] should_fail_usercopy+0x1a/0x20 [ 91.160072][ T6452] _copy_from_user+0x1c/0xb0 [ 91.160125][ T6452] core_sys_select+0x34f/0x6e0 [ 91.160163][ T6452] ? set_user_sigmask+0x84/0x190 [ 91.160246][ T6452] __se_sys_pselect6+0x216/0x280 [ 91.160274][ T6452] __x64_sys_pselect6+0x78/0x90 [ 91.160305][ T6452] x64_sys_call+0x28bd/0x3000 [ 91.160334][ T6452] do_syscall_64+0xd2/0x200 [ 91.160422][ T6452] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.160460][ T6452] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 91.160490][ T6452] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.160519][ T6452] RIP: 0033:0x7f943173eec9 [ 91.160535][ T6452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.160626][ T6452] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 91.160652][ T6452] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 91.160737][ T6452] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000040 [ 91.160750][ T6452] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 91.160762][ T6452] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000001 [ 91.160776][ T6452] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 91.160847][ T6452] [ 91.346274][ T6454] netlink: 68 bytes leftover after parsing attributes in process `syz.0.1177'. [ 91.420216][ T6461] FAULT_INJECTION: forcing a failure. [ 91.420216][ T6461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.433364][ T6461] CPU: 0 UID: 0 PID: 6461 Comm: syz.2.1180 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.433467][ T6461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.433480][ T6461] Call Trace: [ 91.433488][ T6461] [ 91.433495][ T6461] __dump_stack+0x1d/0x30 [ 91.433516][ T6461] dump_stack_lvl+0xe8/0x140 [ 91.433536][ T6461] dump_stack+0x15/0x1b [ 91.433553][ T6461] should_fail_ex+0x265/0x280 [ 91.433622][ T6461] should_fail+0xb/0x20 [ 91.433728][ T6461] should_fail_usercopy+0x1a/0x20 [ 91.433806][ T6461] _copy_from_user+0x1c/0xb0 [ 91.433838][ T6461] sk_getsockopt+0xcf/0x1a30 [ 91.433921][ T6461] ? selinux_socket_getsockopt+0x175/0x1b0 [ 91.433963][ T6461] ? should_fail_ex+0xdb/0x280 [ 91.434002][ T6461] do_sock_getsockopt+0x14d/0x240 [ 91.434041][ T6461] __x64_sys_getsockopt+0x11e/0x1a0 [ 91.434121][ T6461] x64_sys_call+0x2bca/0x3000 [ 91.434148][ T6461] do_syscall_64+0xd2/0x200 [ 91.434177][ T6461] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.434208][ T6461] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 91.434230][ T6461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.434254][ T6461] RIP: 0033:0x7fd7b127eec9 [ 91.434274][ T6461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.434333][ T6461] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 91.434352][ T6461] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 91.434365][ T6461] RDX: 000000000000001f RSI: 0000000000000001 RDI: 0000000000000003 [ 91.434377][ T6461] RBP: 00007fd7afce7090 R08: 0000200000001040 R09: 0000000000000000 [ 91.434389][ T6461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.434401][ T6461] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 91.434486][ T6461] [ 92.624791][ T6509] FAULT_INJECTION: forcing a failure. [ 92.624791][ T6509] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.638075][ T6509] CPU: 0 UID: 0 PID: 6509 Comm: syz.0.1198 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.638103][ T6509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.638121][ T6509] Call Trace: [ 92.638128][ T6509] [ 92.638138][ T6509] __dump_stack+0x1d/0x30 [ 92.638165][ T6509] dump_stack_lvl+0xe8/0x140 [ 92.638239][ T6509] dump_stack+0x15/0x1b [ 92.638256][ T6509] should_fail_ex+0x265/0x280 [ 92.638302][ T6509] should_fail+0xb/0x20 [ 92.638343][ T6509] should_fail_usercopy+0x1a/0x20 [ 92.638378][ T6509] _copy_from_user+0x1c/0xb0 [ 92.638406][ T6509] __sys_bpf+0x183/0x7c0 [ 92.638449][ T6509] __x64_sys_bpf+0x41/0x50 [ 92.638499][ T6509] x64_sys_call+0x2aee/0x3000 [ 92.638600][ T6509] do_syscall_64+0xd2/0x200 [ 92.638654][ T6509] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.638692][ T6509] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.638722][ T6509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.638764][ T6509] RIP: 0033:0x7fc98afbeec9 [ 92.638783][ T6509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.638807][ T6509] RSP: 002b:00007fc989a1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 92.638833][ T6509] RAX: ffffffffffffffda RBX: 00007fc98b215fa0 RCX: 00007fc98afbeec9 [ 92.638918][ T6509] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 92.638934][ T6509] RBP: 00007fc989a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 92.638951][ T6509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.638968][ T6509] R13: 00007fc98b216038 R14: 00007fc98b215fa0 R15: 00007ffc8df7c7a8 [ 92.638991][ T6509] [ 92.641888][ T6510] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1197'. [ 92.801240][ T6518] netlink: 'syz.2.1197': attribute type 13 has an invalid length. [ 93.766043][ T6566] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1221'. [ 93.910611][ T6578] FAULT_INJECTION: forcing a failure. [ 93.910611][ T6578] name failslab, interval 1, probability 0, space 0, times 0 [ 93.923432][ T6578] CPU: 1 UID: 0 PID: 6578 Comm: syz.0.1227 Not tainted syzkaller #0 PREEMPT(voluntary) [ 93.923478][ T6578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 93.923490][ T6578] Call Trace: [ 93.923496][ T6578] [ 93.923504][ T6578] __dump_stack+0x1d/0x30 [ 93.923523][ T6578] dump_stack_lvl+0xe8/0x140 [ 93.923540][ T6578] dump_stack+0x15/0x1b [ 93.923623][ T6578] should_fail_ex+0x265/0x280 [ 93.923668][ T6578] should_failslab+0x8c/0xb0 [ 93.923698][ T6578] kmem_cache_alloc_noprof+0x50/0x480 [ 93.923730][ T6578] ? getname_flags+0x80/0x3b0 [ 93.923757][ T6578] getname_flags+0x80/0x3b0 [ 93.923843][ T6578] __x64_sys_renameat2+0x6c/0x90 [ 93.923867][ T6578] x64_sys_call+0x3f9/0x3000 [ 93.923886][ T6578] do_syscall_64+0xd2/0x200 [ 93.923976][ T6578] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 93.924001][ T6578] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 93.924030][ T6578] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.924050][ T6578] RIP: 0033:0x7fc98afbeec9 [ 93.924143][ T6578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.924199][ T6578] RSP: 002b:00007fc989a1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 93.924216][ T6578] RAX: ffffffffffffffda RBX: 00007fc98b215fa0 RCX: 00007fc98afbeec9 [ 93.924228][ T6578] RDX: ffffffffffffff9c RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 93.924239][ T6578] RBP: 00007fc989a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 93.924251][ T6578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.924261][ T6578] R13: 00007fc98b216038 R14: 00007fc98b215fa0 R15: 00007ffc8df7c7a8 [ 93.924305][ T6578] [ 94.178779][ T6593] FAULT_INJECTION: forcing a failure. [ 94.178779][ T6593] name failslab, interval 1, probability 0, space 0, times 0 [ 94.191726][ T6593] CPU: 1 UID: 0 PID: 6593 Comm: syz.3.1233 Not tainted syzkaller #0 PREEMPT(voluntary) [ 94.191756][ T6593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 94.191770][ T6593] Call Trace: [ 94.191777][ T6593] [ 94.191784][ T6593] __dump_stack+0x1d/0x30 [ 94.191863][ T6593] dump_stack_lvl+0xe8/0x140 [ 94.191882][ T6593] dump_stack+0x15/0x1b [ 94.191952][ T6593] should_fail_ex+0x265/0x280 [ 94.192141][ T6593] should_failslab+0x8c/0xb0 [ 94.192238][ T6593] __kmalloc_noprof+0xa5/0x570 [ 94.192271][ T6593] ? security_prepare_creds+0x52/0x120 [ 94.192308][ T6593] security_prepare_creds+0x52/0x120 [ 94.192412][ T6593] prepare_creds+0x34a/0x4c0 [ 94.192447][ T6593] copy_creds+0x8f/0x3f0 [ 94.192481][ T6593] copy_process+0x658/0x2000 [ 94.192520][ T6593] ? copy_clone_args_from_user+0x3ce/0x490 [ 94.192625][ T6593] kernel_clone+0x16c/0x5c0 [ 94.192666][ T6593] __se_sys_clone3+0x1c2/0x200 [ 94.192760][ T6593] __x64_sys_clone3+0x31/0x40 [ 94.192793][ T6593] x64_sys_call+0x1fc9/0x3000 [ 94.192818][ T6593] do_syscall_64+0xd2/0x200 [ 94.192850][ T6593] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 94.192888][ T6593] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 94.192918][ T6593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.192947][ T6593] RIP: 0033:0x7f9dd933eec9 [ 94.192973][ T6593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.192997][ T6593] RSP: 002b:00007f9dd7d9ef08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 94.193023][ T6593] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f9dd933eec9 [ 94.193122][ T6593] RDX: 00007f9dd7d9ef20 RSI: 0000000000000058 RDI: 00007f9dd7d9ef20 [ 94.193152][ T6593] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 0000000000000058 [ 94.193168][ T6593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.193193][ T6593] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 94.193216][ T6593] [ 94.194017][ T29] kauditd_printk_skb: 1249 callbacks suppressed [ 94.194034][ T29] audit: type=1400 audit(1760603529.866:15234): avc: denied { prog_load } for pid=6594 comm="syz.0.1234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.288675][ T6598] FAULT_INJECTION: forcing a failure. [ 94.288675][ T6598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 94.294676][ T29] audit: type=1400 audit(1760603529.886:15235): avc: denied { prog_load } for pid=6594 comm="syz.0.1234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.297370][ T6598] CPU: 1 UID: 0 PID: 6598 Comm: syz.3.1236 Not tainted syzkaller #0 PREEMPT(voluntary) [ 94.297416][ T6598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 94.297509][ T6598] Call Trace: [ 94.297542][ T6598] [ 94.297554][ T6598] __dump_stack+0x1d/0x30 [ 94.297584][ T6598] dump_stack_lvl+0xe8/0x140 [ 94.297619][ T6598] dump_stack+0x15/0x1b [ 94.297697][ T6598] should_fail_ex+0x265/0x280 [ 94.297798][ T6598] should_fail+0xb/0x20 [ 94.297841][ T6598] should_fail_usercopy+0x1a/0x20 [ 94.297871][ T6598] _copy_to_user+0x20/0xa0 [ 94.297908][ T6598] simple_read_from_buffer+0xb5/0x130 [ 94.297941][ T6598] proc_fail_nth_read+0x10e/0x150 [ 94.298001][ T6598] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 94.298042][ T6598] vfs_read+0x1a8/0x770 [ 94.298068][ T6598] ? __rcu_read_unlock+0x4f/0x70 [ 94.298144][ T6598] ? __fget_files+0x184/0x1c0 [ 94.298180][ T6598] ksys_read+0xda/0x1a0 [ 94.298214][ T6598] __x64_sys_read+0x40/0x50 [ 94.298261][ T6598] x64_sys_call+0x27c0/0x3000 [ 94.298292][ T6598] do_syscall_64+0xd2/0x200 [ 94.298328][ T6598] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 94.298367][ T6598] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 94.298442][ T6598] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.298473][ T6598] RIP: 0033:0x7f9dd933d8dc [ 94.298495][ T6598] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 94.298520][ T6598] RSP: 002b:00007f9dd7d9f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 94.298548][ T6598] RAX: ffffffffffffffda RBX: 00007f9dd9595fa0 RCX: 00007f9dd933d8dc [ 94.298566][ T6598] RDX: 000000000000000f RSI: 00007f9dd7d9f0a0 RDI: 0000000000000005 [ 94.298657][ T6598] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 0000000000000000 [ 94.298673][ T6598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.298764][ T6598] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 94.298789][ T6598] [ 94.653738][ T29] audit: type=1400 audit(1760603529.896:15236): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.678212][ T29] audit: type=1400 audit(1760603529.916:15237): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.703035][ T29] audit: type=1400 audit(1760603529.926:15238): avc: denied { map_create } for pid=6597 comm="syz.3.1236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.722460][ T29] audit: type=1400 audit(1760603529.926:15239): avc: denied { prog_load } for pid=6597 comm="syz.3.1236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.741745][ T29] audit: type=1400 audit(1760603529.956:15240): avc: denied { create } for pid=6597 comm="syz.3.1236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 94.762362][ T29] audit: type=1400 audit(1760603529.956:15241): avc: denied { create } for pid=6597 comm="syz.3.1236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 94.782942][ T29] audit: type=1400 audit(1760603529.966:15242): avc: denied { map_create } for pid=6596 comm="syz.0.1235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.784788][ T6604] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.019074][ T6614] FAULT_INJECTION: forcing a failure. [ 95.019074][ T6614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.032360][ T6614] CPU: 0 UID: 0 PID: 6614 Comm: syz.0.1241 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.032394][ T6614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 95.032408][ T6614] Call Trace: [ 95.032417][ T6614] [ 95.032424][ T6614] __dump_stack+0x1d/0x30 [ 95.032502][ T6614] dump_stack_lvl+0xe8/0x140 [ 95.032521][ T6614] dump_stack+0x15/0x1b [ 95.032542][ T6614] should_fail_ex+0x265/0x280 [ 95.032584][ T6614] should_fail+0xb/0x20 [ 95.032625][ T6614] should_fail_usercopy+0x1a/0x20 [ 95.032657][ T6614] _copy_from_user+0x1c/0xb0 [ 95.032682][ T6614] __se_sys_mount+0x10d/0x2e0 [ 95.032714][ T6614] ? fput+0x8f/0xc0 [ 95.032791][ T6614] ? ksys_write+0x192/0x1a0 [ 95.032867][ T6614] __x64_sys_mount+0x67/0x80 [ 95.032892][ T6614] x64_sys_call+0x2b51/0x3000 [ 95.032954][ T6614] do_syscall_64+0xd2/0x200 [ 95.032989][ T6614] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.033031][ T6614] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 95.033055][ T6614] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.033160][ T6614] RIP: 0033:0x7fc98afbeec9 [ 95.033180][ T6614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.033265][ T6614] RSP: 002b:00007fc989a1f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 95.033290][ T6614] RAX: ffffffffffffffda RBX: 00007fc98b215fa0 RCX: 00007fc98afbeec9 [ 95.033307][ T6614] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 95.033324][ T6614] RBP: 00007fc989a1f090 R08: 0000200000000300 R09: 0000000000000000 [ 95.033341][ T6614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.033358][ T6614] R13: 00007fc98b216038 R14: 00007fc98b215fa0 R15: 00007ffc8df7c7a8 [ 95.033376][ T6614] [ 95.245726][ T6622] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 95.357290][ T6633] FAULT_INJECTION: forcing a failure. [ 95.357290][ T6633] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.370463][ T6633] CPU: 1 UID: 0 PID: 6633 Comm: syz.0.1249 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.370564][ T6633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 95.370581][ T6633] Call Trace: [ 95.370590][ T6633] [ 95.370599][ T6633] __dump_stack+0x1d/0x30 [ 95.370641][ T6633] dump_stack_lvl+0xe8/0x140 [ 95.370692][ T6633] dump_stack+0x15/0x1b [ 95.370715][ T6633] should_fail_ex+0x265/0x280 [ 95.370760][ T6633] should_fail+0xb/0x20 [ 95.370803][ T6633] should_fail_usercopy+0x1a/0x20 [ 95.370830][ T6633] _copy_from_iter+0xd2/0xe80 [ 95.370859][ T6633] ? __build_skb_around+0x1ab/0x200 [ 95.370914][ T6633] ? __alloc_skb+0x223/0x320 [ 95.370949][ T6633] netlink_sendmsg+0x471/0x6b0 [ 95.371033][ T6633] ? __pfx_netlink_sendmsg+0x10/0x10 [ 95.371074][ T6633] __sock_sendmsg+0x145/0x180 [ 95.371100][ T6633] ____sys_sendmsg+0x31e/0x4e0 [ 95.371191][ T6633] ___sys_sendmsg+0x17b/0x1d0 [ 95.371310][ T6633] __x64_sys_sendmsg+0xd4/0x160 [ 95.371414][ T6633] x64_sys_call+0x191e/0x3000 [ 95.371436][ T6633] do_syscall_64+0xd2/0x200 [ 95.371462][ T6633] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.371529][ T6633] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 95.371559][ T6633] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.371588][ T6633] RIP: 0033:0x7fc98afbeec9 [ 95.371607][ T6633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.371630][ T6633] RSP: 002b:00007fc989a1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.371756][ T6633] RAX: ffffffffffffffda RBX: 00007fc98b215fa0 RCX: 00007fc98afbeec9 [ 95.371773][ T6633] RDX: 0000000000000000 RSI: 00002000000007c0 RDI: 0000000000000003 [ 95.371790][ T6633] RBP: 00007fc989a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 95.371806][ T6633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.371861][ T6633] R13: 00007fc98b216038 R14: 00007fc98b215fa0 R15: 00007ffc8df7c7a8 [ 95.371880][ T6633] [ 95.633476][ T6640] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1252'. [ 95.647930][ T6640] netlink: 'syz.1.1252': attribute type 13 has an invalid length. [ 95.835117][ T6656] FAULT_INJECTION: forcing a failure. [ 95.835117][ T6656] name failslab, interval 1, probability 0, space 0, times 0 [ 95.848090][ T6656] CPU: 1 UID: 0 PID: 6656 Comm: syz.1.1257 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.848125][ T6656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 95.848143][ T6656] Call Trace: [ 95.848152][ T6656] [ 95.848161][ T6656] __dump_stack+0x1d/0x30 [ 95.848187][ T6656] dump_stack_lvl+0xe8/0x140 [ 95.848207][ T6656] dump_stack+0x15/0x1b [ 95.848297][ T6656] should_fail_ex+0x265/0x280 [ 95.848332][ T6656] ? __se_sys_memfd_create+0x1cc/0x590 [ 95.848360][ T6656] should_failslab+0x8c/0xb0 [ 95.848389][ T6656] __kmalloc_cache_noprof+0x4c/0x4a0 [ 95.848480][ T6656] __se_sys_memfd_create+0x1cc/0x590 [ 95.848510][ T6656] __x64_sys_memfd_create+0x31/0x40 [ 95.848532][ T6656] x64_sys_call+0x2ac2/0x3000 [ 95.848553][ T6656] do_syscall_64+0xd2/0x200 [ 95.848641][ T6656] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.848678][ T6656] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 95.848707][ T6656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.848749][ T6656] RIP: 0033:0x7fc59aedeec9 [ 95.848789][ T6656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.848814][ T6656] RSP: 002b:00007fc599946e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 95.848840][ T6656] RAX: ffffffffffffffda RBX: 0000000000000473 RCX: 00007fc59aedeec9 [ 95.848857][ T6656] RDX: 00007fc599946ef0 RSI: 0000000000000000 RDI: 00007fc59af62960 [ 95.848875][ T6656] RBP: 0000200000000bc0 R08: 00007fc599946bb7 R09: 00007fc599946e40 [ 95.848892][ T6656] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 95.848909][ T6656] R13: 00007fc599946ef0 R14: 00007fc599946eb0 R15: 0000200000000680 [ 95.848973][ T6656] [ 96.077336][ T6661] netlink: 'wÞ££‘': attribute type 39 has an invalid length. [ 96.129825][ T6671] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1264'. [ 96.146106][ T6671] netlink: 'syz.3.1264': attribute type 13 has an invalid length. [ 96.273051][ T6685] netlink: 'syz.1.1269': attribute type 10 has an invalid length. [ 96.282317][ T6685] team0: Port device dummy0 added [ 97.110920][ T6710] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1277'. [ 97.147828][ T6710] netlink: 'syz.4.1277': attribute type 13 has an invalid length. [ 97.183457][ T6712] FAULT_INJECTION: forcing a failure. [ 97.183457][ T6712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.196645][ T6712] CPU: 0 UID: 0 PID: 6712 Comm: syz.1.1278 Not tainted syzkaller #0 PREEMPT(voluntary) [ 97.196679][ T6712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 97.196694][ T6712] Call Trace: [ 97.196700][ T6712] [ 97.196723][ T6712] __dump_stack+0x1d/0x30 [ 97.196745][ T6712] dump_stack_lvl+0xe8/0x140 [ 97.196848][ T6712] dump_stack+0x15/0x1b [ 97.196865][ T6712] should_fail_ex+0x265/0x280 [ 97.196905][ T6712] should_fail+0xb/0x20 [ 97.197043][ T6712] should_fail_usercopy+0x1a/0x20 [ 97.197072][ T6712] _copy_from_user+0x1c/0xb0 [ 97.197185][ T6712] memdup_user+0x5e/0xd0 [ 97.197214][ T6712] strndup_user+0x68/0xb0 [ 97.197243][ T6712] __se_sys_mount+0x4d/0x2e0 [ 97.197297][ T6712] ? fput+0x8f/0xc0 [ 97.197337][ T6712] ? ksys_write+0x192/0x1a0 [ 97.197366][ T6712] __x64_sys_mount+0x67/0x80 [ 97.197389][ T6712] x64_sys_call+0x2b51/0x3000 [ 97.197411][ T6712] do_syscall_64+0xd2/0x200 [ 97.197495][ T6712] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 97.197613][ T6712] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 97.197637][ T6712] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.197673][ T6712] RIP: 0033:0x7fc59aedeec9 [ 97.197692][ T6712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.197717][ T6712] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 97.197743][ T6712] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 97.197805][ T6712] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 97.197823][ T6712] RBP: 00007fc599947090 R08: 0000200000000740 R09: 0000000000000000 [ 97.197840][ T6712] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 97.197914][ T6712] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 97.197939][ T6712] [ 97.478402][ T6717] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1280'. [ 97.898521][ T6728] FAULT_INJECTION: forcing a failure. [ 97.898521][ T6728] name failslab, interval 1, probability 0, space 0, times 0 [ 97.911257][ T6728] CPU: 1 UID: 0 PID: 6728 Comm: syz.2.1285 Not tainted syzkaller #0 PREEMPT(voluntary) [ 97.911292][ T6728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 97.911309][ T6728] Call Trace: [ 97.911317][ T6728] [ 97.911327][ T6728] __dump_stack+0x1d/0x30 [ 97.911354][ T6728] dump_stack_lvl+0xe8/0x140 [ 97.911376][ T6728] dump_stack+0x15/0x1b [ 97.911394][ T6728] should_fail_ex+0x265/0x280 [ 97.911431][ T6728] should_failslab+0x8c/0xb0 [ 97.911466][ T6728] kmem_cache_alloc_noprof+0x50/0x480 [ 97.911503][ T6728] ? mas_alloc_nodes+0x1a2/0x210 [ 97.911534][ T6728] mas_alloc_nodes+0x1a2/0x210 [ 97.911563][ T6728] mas_preallocate+0x2ca/0x510 [ 97.911590][ T6728] __split_vma+0x240/0x650 [ 97.911615][ T6728] ? __mpol_equal+0x2e/0x1e0 [ 97.911635][ T6728] vma_modify+0x3f2/0xc80 [ 97.911663][ T6728] vma_modify_policy+0x101/0x130 [ 97.911700][ T6728] mbind_range+0x1b8/0x440 [ 97.911728][ T6728] ? mas_find+0x5d5/0x700 [ 97.911756][ T6728] __se_sys_mbind+0x648/0xac0 [ 97.911807][ T6728] __x64_sys_mbind+0x78/0x90 [ 97.911848][ T6728] x64_sys_call+0x2936/0x3000 [ 97.911886][ T6728] do_syscall_64+0xd2/0x200 [ 97.911919][ T6728] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 97.911955][ T6728] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 97.911985][ T6728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.912015][ T6728] RIP: 0033:0x7fd7b127eec9 [ 97.912033][ T6728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.912052][ T6728] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 97.912071][ T6728] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 97.912084][ T6728] RDX: 0000000000004003 RSI: 0000000000004000 RDI: 0000200000000000 [ 97.912100][ T6728] RBP: 00007fd7afce7090 R08: 0000000000000006 R09: 0000000000000002 [ 97.912126][ T6728] R10: 0000200000000c00 R11: 0000000000000246 R12: 0000000000000001 [ 97.912143][ T6728] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 97.912166][ T6728] [ 98.178276][ T6736] FAULT_INJECTION: forcing a failure. [ 98.178276][ T6736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.191624][ T6736] CPU: 1 UID: 0 PID: 6736 Comm: syz.2.1287 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.191671][ T6736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 98.191689][ T6736] Call Trace: [ 98.191699][ T6736] [ 98.191709][ T6736] __dump_stack+0x1d/0x30 [ 98.191735][ T6736] dump_stack_lvl+0xe8/0x140 [ 98.191758][ T6736] dump_stack+0x15/0x1b [ 98.191781][ T6736] should_fail_ex+0x265/0x280 [ 98.191842][ T6736] should_fail+0xb/0x20 [ 98.191892][ T6736] should_fail_usercopy+0x1a/0x20 [ 98.191913][ T6736] _copy_from_user+0x1c/0xb0 [ 98.191943][ T6736] memdup_user+0x5e/0xd0 [ 98.191977][ T6736] strndup_user+0x68/0xb0 [ 98.192028][ T6736] __se_sys_mount+0x4d/0x2e0 [ 98.192059][ T6736] ? fput+0x8f/0xc0 [ 98.192100][ T6736] ? ksys_write+0x192/0x1a0 [ 98.192145][ T6736] __x64_sys_mount+0x67/0x80 [ 98.192177][ T6736] x64_sys_call+0x2b51/0x3000 [ 98.192207][ T6736] do_syscall_64+0xd2/0x200 [ 98.192239][ T6736] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.192272][ T6736] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 98.192334][ T6736] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.192363][ T6736] RIP: 0033:0x7fd7b127eec9 [ 98.192384][ T6736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.192408][ T6736] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.192495][ T6736] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 98.192508][ T6736] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 98.192568][ T6736] RBP: 00007fd7afce7090 R08: 0000200000000740 R09: 0000000000000000 [ 98.192583][ T6736] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 98.192628][ T6736] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 98.192645][ T6736] [ 98.404800][ T6739] FAULT_INJECTION: forcing a failure. [ 98.404800][ T6739] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.418081][ T6739] CPU: 1 UID: 0 PID: 6739 Comm: syz.2.1288 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.418109][ T6739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 98.418169][ T6739] Call Trace: [ 98.418176][ T6739] [ 98.418185][ T6739] __dump_stack+0x1d/0x30 [ 98.418211][ T6739] dump_stack_lvl+0xe8/0x140 [ 98.418234][ T6739] dump_stack+0x15/0x1b [ 98.418253][ T6739] should_fail_ex+0x265/0x280 [ 98.418357][ T6739] should_fail+0xb/0x20 [ 98.418462][ T6739] should_fail_usercopy+0x1a/0x20 [ 98.418485][ T6739] _copy_from_user+0x1c/0xb0 [ 98.418556][ T6739] __se_sys_mount+0x10d/0x2e0 [ 98.418581][ T6739] ? fput+0x8f/0xc0 [ 98.418612][ T6739] ? ksys_write+0x192/0x1a0 [ 98.418658][ T6739] __x64_sys_mount+0x67/0x80 [ 98.418682][ T6739] x64_sys_call+0x2b51/0x3000 [ 98.418705][ T6739] do_syscall_64+0xd2/0x200 [ 98.418730][ T6739] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.418758][ T6739] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 98.418870][ T6739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.418892][ T6739] RIP: 0033:0x7fd7b127eec9 [ 98.418908][ T6739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.418927][ T6739] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.418947][ T6739] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 98.418960][ T6739] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 98.419037][ T6739] RBP: 00007fd7afce7090 R08: 0000200000000340 R09: 0000000000000000 [ 98.419050][ T6739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.419071][ T6739] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 98.419122][ T6739] [ 98.711691][ T6752] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1292'. [ 98.768155][ T6752] netlink: 'syz.1.1292': attribute type 13 has an invalid length. [ 99.083047][ T6771] FAULT_INJECTION: forcing a failure. [ 99.083047][ T6771] name failslab, interval 1, probability 0, space 0, times 0 [ 99.095755][ T6771] CPU: 1 UID: 0 PID: 6771 Comm: syz.4.1299 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.095850][ T6771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.095864][ T6771] Call Trace: [ 99.095871][ T6771] [ 99.095879][ T6771] __dump_stack+0x1d/0x30 [ 99.095934][ T6771] dump_stack_lvl+0xe8/0x140 [ 99.095953][ T6771] dump_stack+0x15/0x1b [ 99.095971][ T6771] should_fail_ex+0x265/0x280 [ 99.096085][ T6771] should_failslab+0x8c/0xb0 [ 99.096122][ T6771] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 99.096224][ T6771] ? __alloc_skb+0x101/0x320 [ 99.096250][ T6771] __alloc_skb+0x101/0x320 [ 99.096274][ T6771] netlink_alloc_large_skb+0xbf/0xf0 [ 99.096367][ T6771] netlink_sendmsg+0x3cf/0x6b0 [ 99.096408][ T6771] ? __pfx_netlink_sendmsg+0x10/0x10 [ 99.096466][ T6771] __sock_sendmsg+0x145/0x180 [ 99.096489][ T6771] ____sys_sendmsg+0x345/0x4e0 [ 99.096623][ T6771] ___sys_sendmsg+0x17b/0x1d0 [ 99.096747][ T6771] __sys_sendmmsg+0x178/0x300 [ 99.096795][ T6771] __x64_sys_sendmmsg+0x57/0x70 [ 99.096832][ T6771] x64_sys_call+0x1c4a/0x3000 [ 99.096891][ T6771] do_syscall_64+0xd2/0x200 [ 99.096923][ T6771] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.096959][ T6771] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 99.097039][ T6771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.097064][ T6771] RIP: 0033:0x7f943173eec9 [ 99.097083][ T6771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.097118][ T6771] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 99.097143][ T6771] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 99.097160][ T6771] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000003 [ 99.097176][ T6771] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 99.097256][ T6771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.097273][ T6771] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 99.097292][ T6771] [ 99.344388][ T29] kauditd_printk_skb: 899 callbacks suppressed [ 99.344447][ T29] audit: type=1400 audit(1760603535.016:16140): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.409603][ T29] audit: type=1400 audit(1760603535.026:16141): avc: denied { allowed } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 99.429208][ T29] audit: type=1400 audit(1760603535.026:16142): avc: denied { map_create } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.448532][ T29] audit: type=1400 audit(1760603535.026:16143): avc: denied { create } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 99.468234][ T29] audit: type=1400 audit(1760603535.026:16144): avc: denied { map_create } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.487622][ T29] audit: type=1400 audit(1760603535.026:16145): avc: denied { prog_load } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.507165][ T29] audit: type=1400 audit(1760603535.036:16146): avc: denied { execmem } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 99.526646][ T29] audit: type=1400 audit(1760603535.036:16147): avc: denied { prog_load } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.546057][ T29] audit: type=1400 audit(1760603535.036:16148): avc: denied { prog_load } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.565526][ T29] audit: type=1400 audit(1760603535.036:16149): avc: denied { create } for pid=6772 comm="syz.4.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 99.636298][ T6779] vlan2: entered promiscuous mode [ 99.641634][ T6779] vlan2: entered allmulticast mode [ 99.647580][ T6779] FAULT_INJECTION: forcing a failure. [ 99.647580][ T6779] name failslab, interval 1, probability 0, space 0, times 0 [ 99.660434][ T6779] CPU: 0 UID: 0 PID: 6779 Comm: syz.1.1304 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.660464][ T6779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.660477][ T6779] Call Trace: [ 99.660483][ T6779] [ 99.660491][ T6779] __dump_stack+0x1d/0x30 [ 99.660513][ T6779] dump_stack_lvl+0xe8/0x140 [ 99.660585][ T6779] dump_stack+0x15/0x1b [ 99.660606][ T6779] should_fail_ex+0x265/0x280 [ 99.660641][ T6779] should_failslab+0x8c/0xb0 [ 99.660672][ T6779] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 99.660752][ T6779] ? __alloc_skb+0x101/0x320 [ 99.660786][ T6779] __alloc_skb+0x101/0x320 [ 99.660822][ T6779] netlink_alloc_large_skb+0xbf/0xf0 [ 99.660849][ T6779] netlink_sendmsg+0x3cf/0x6b0 [ 99.660947][ T6779] ? __pfx_netlink_sendmsg+0x10/0x10 [ 99.660976][ T6779] __sock_sendmsg+0x145/0x180 [ 99.661105][ T6779] ____sys_sendmsg+0x31e/0x4e0 [ 99.661163][ T6779] ___sys_sendmsg+0x17b/0x1d0 [ 99.661209][ T6779] __x64_sys_sendmsg+0xd4/0x160 [ 99.661252][ T6779] x64_sys_call+0x191e/0x3000 [ 99.661342][ T6779] do_syscall_64+0xd2/0x200 [ 99.661367][ T6779] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.661401][ T6779] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 99.661431][ T6779] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.661475][ T6779] RIP: 0033:0x7fc59aedeec9 [ 99.661495][ T6779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.661514][ T6779] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.661532][ T6779] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 99.661545][ T6779] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 99.661612][ T6779] RBP: 00007fc599947090 R08: 0000000000000000 R09: 0000000000000000 [ 99.661624][ T6779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.661635][ T6779] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 99.661653][ T6779] [ 99.998295][ T6800] FAULT_INJECTION: forcing a failure. [ 99.998295][ T6800] name failslab, interval 1, probability 0, space 0, times 0 [ 100.011102][ T6800] CPU: 0 UID: 0 PID: 6800 Comm: syz.4.1311 Not tainted syzkaller #0 PREEMPT(voluntary) [ 100.011135][ T6800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 100.011148][ T6800] Call Trace: [ 100.011155][ T6800] [ 100.011162][ T6800] __dump_stack+0x1d/0x30 [ 100.011189][ T6800] dump_stack_lvl+0xe8/0x140 [ 100.011234][ T6800] dump_stack+0x15/0x1b [ 100.011255][ T6800] should_fail_ex+0x265/0x280 [ 100.011343][ T6800] should_failslab+0x8c/0xb0 [ 100.011375][ T6800] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 100.011415][ T6800] ? __alloc_skb+0x101/0x320 [ 100.011463][ T6800] __alloc_skb+0x101/0x320 [ 100.011493][ T6800] netlink_alloc_large_skb+0xbf/0xf0 [ 100.011524][ T6800] netlink_sendmsg+0x3cf/0x6b0 [ 100.011566][ T6800] ? __pfx_netlink_sendmsg+0x10/0x10 [ 100.011683][ T6800] __sock_sendmsg+0x145/0x180 [ 100.011710][ T6800] ____sys_sendmsg+0x31e/0x4e0 [ 100.011752][ T6800] ___sys_sendmsg+0x17b/0x1d0 [ 100.011859][ T6800] __x64_sys_sendmsg+0xd4/0x160 [ 100.011896][ T6800] x64_sys_call+0x191e/0x3000 [ 100.011918][ T6800] do_syscall_64+0xd2/0x200 [ 100.011994][ T6800] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 100.012023][ T6800] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 100.012044][ T6800] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.012110][ T6800] RIP: 0033:0x7f943173eec9 [ 100.012130][ T6800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.012151][ T6800] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.012173][ T6800] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 100.012191][ T6800] RDX: 0000000004000850 RSI: 0000200000000140 RDI: 0000000000000003 [ 100.012208][ T6800] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 100.012225][ T6800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.012245][ T6800] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 100.012265][ T6800] [ 100.240958][ T6804] netlink: 44 bytes leftover after parsing attributes in process `syz.4.1313'. [ 100.321412][ T6806] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1312'. [ 100.351212][ T6814] FAULT_INJECTION: forcing a failure. [ 100.351212][ T6814] name failslab, interval 1, probability 0, space 0, times 0 [ 100.363891][ T6814] CPU: 0 UID: 0 PID: 6814 Comm: syz.2.1316 Not tainted syzkaller #0 PREEMPT(voluntary) [ 100.363920][ T6814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 100.363935][ T6814] Call Trace: [ 100.363944][ T6814] [ 100.363954][ T6814] __dump_stack+0x1d/0x30 [ 100.363983][ T6814] dump_stack_lvl+0xe8/0x140 [ 100.364008][ T6814] dump_stack+0x15/0x1b [ 100.364068][ T6814] should_fail_ex+0x265/0x280 [ 100.364104][ T6814] should_failslab+0x8c/0xb0 [ 100.364138][ T6814] __kvmalloc_node_noprof+0x12e/0x670 [ 100.364198][ T6814] ? do_getxattr+0xa2/0x2b0 [ 100.364229][ T6814] do_getxattr+0xa2/0x2b0 [ 100.364304][ T6814] path_getxattrat+0x22c/0x2a0 [ 100.364345][ T6814] __x64_sys_fgetxattr+0x59/0x70 [ 100.364381][ T6814] x64_sys_call+0x1ab3/0x3000 [ 100.364484][ T6814] do_syscall_64+0xd2/0x200 [ 100.364509][ T6814] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 100.364542][ T6814] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 100.364573][ T6814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.364648][ T6814] RIP: 0033:0x7fd7b127eec9 [ 100.364664][ T6814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.364683][ T6814] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 100.364716][ T6814] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 100.364733][ T6814] RDX: 0000200000000080 RSI: 0000200000000040 RDI: 0000000000000003 [ 100.364751][ T6814] RBP: 00007fd7afce7090 R08: 0000000000000000 R09: 0000000000000000 [ 100.364767][ T6814] R10: 0000000000000072 R11: 0000000000000246 R12: 0000000000000001 [ 100.364837][ T6814] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 100.364855][ T6814] [ 101.151033][ T10] IPVS: starting estimator thread 0... [ 101.243274][ T6873] IPVS: using max 1680 ests per chain, 84000 per kthread [ 101.396523][ T6907] FAULT_INJECTION: forcing a failure. [ 101.396523][ T6907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.409683][ T6907] CPU: 0 UID: 0 PID: 6907 Comm: syz.4.1351 Not tainted syzkaller #0 PREEMPT(voluntary) [ 101.409719][ T6907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 101.409737][ T6907] Call Trace: [ 101.409748][ T6907] [ 101.409757][ T6907] __dump_stack+0x1d/0x30 [ 101.409787][ T6907] dump_stack_lvl+0xe8/0x140 [ 101.409840][ T6907] dump_stack+0x15/0x1b [ 101.409858][ T6907] should_fail_ex+0x265/0x280 [ 101.409905][ T6907] should_fail+0xb/0x20 [ 101.409947][ T6907] should_fail_usercopy+0x1a/0x20 [ 101.409974][ T6907] _copy_from_user+0x1c/0xb0 [ 101.410008][ T6907] ___sys_sendmsg+0xc1/0x1d0 [ 101.410063][ T6907] __x64_sys_sendmsg+0xd4/0x160 [ 101.410148][ T6907] x64_sys_call+0x191e/0x3000 [ 101.410188][ T6907] do_syscall_64+0xd2/0x200 [ 101.410213][ T6907] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 101.410244][ T6907] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 101.410275][ T6907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.410354][ T6907] RIP: 0033:0x7f943173eec9 [ 101.410374][ T6907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.410398][ T6907] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 101.410423][ T6907] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 101.410435][ T6907] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 101.410601][ T6907] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 101.410623][ T6907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.410675][ T6907] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 101.410699][ T6907] [ 101.909510][ T6947] netlink: 72 bytes leftover after parsing attributes in process `syz.4.1366'. [ 102.001159][ T6954] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1371'. [ 102.049863][ T6954] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6954 comm=syz.4.1371 [ 102.073629][ T6954] FAULT_INJECTION: forcing a failure. [ 102.073629][ T6954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.086807][ T6954] CPU: 0 UID: 0 PID: 6954 Comm: syz.4.1371 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.086850][ T6954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.086864][ T6954] Call Trace: [ 102.086871][ T6954] [ 102.086879][ T6954] __dump_stack+0x1d/0x30 [ 102.086930][ T6954] dump_stack_lvl+0xe8/0x140 [ 102.086955][ T6954] dump_stack+0x15/0x1b [ 102.086975][ T6954] should_fail_ex+0x265/0x280 [ 102.087011][ T6954] should_fail+0xb/0x20 [ 102.087080][ T6954] should_fail_usercopy+0x1a/0x20 [ 102.087166][ T6954] _copy_to_user+0x20/0xa0 [ 102.087199][ T6954] simple_read_from_buffer+0xb5/0x130 [ 102.087223][ T6954] proc_fail_nth_read+0x10e/0x150 [ 102.087253][ T6954] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 102.087297][ T6954] vfs_read+0x1a8/0x770 [ 102.087324][ T6954] ? __rcu_read_unlock+0x4f/0x70 [ 102.087419][ T6954] ? __fget_files+0x184/0x1c0 [ 102.087446][ T6954] ksys_read+0xda/0x1a0 [ 102.087477][ T6954] __x64_sys_read+0x40/0x50 [ 102.087526][ T6954] x64_sys_call+0x27c0/0x3000 [ 102.087548][ T6954] do_syscall_64+0xd2/0x200 [ 102.087574][ T6954] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.087659][ T6954] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 102.087684][ T6954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.087711][ T6954] RIP: 0033:0x7f943173d8dc [ 102.087731][ T6954] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 102.087788][ T6954] RSP: 002b:00007f94301a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 102.087821][ T6954] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173d8dc [ 102.087839][ T6954] RDX: 000000000000000f RSI: 00007f94301a70a0 RDI: 0000000000000007 [ 102.087856][ T6954] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 102.087873][ T6954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.087890][ T6954] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 102.087921][ T6954] [ 102.327752][ T6970] FAULT_INJECTION: forcing a failure. [ 102.327752][ T6970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.340970][ T6970] CPU: 0 UID: 0 PID: 6970 Comm: syz.3.1375 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.341005][ T6970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.341021][ T6970] Call Trace: [ 102.341027][ T6970] [ 102.341033][ T6970] __dump_stack+0x1d/0x30 [ 102.341134][ T6970] dump_stack_lvl+0xe8/0x140 [ 102.341160][ T6970] dump_stack+0x15/0x1b [ 102.341177][ T6970] should_fail_ex+0x265/0x280 [ 102.341214][ T6970] should_fail+0xb/0x20 [ 102.341270][ T6970] should_fail_usercopy+0x1a/0x20 [ 102.341291][ T6970] strncpy_from_user+0x25/0x230 [ 102.341467][ T6970] ? kmem_cache_alloc_noprof+0x242/0x480 [ 102.341505][ T6970] ? getname_flags+0x80/0x3b0 [ 102.341544][ T6970] getname_flags+0xae/0x3b0 [ 102.341596][ T6970] do_sys_openat2+0x60/0x110 [ 102.341674][ T6970] __x64_sys_open+0xe6/0x110 [ 102.341719][ T6970] x64_sys_call+0x1457/0x3000 [ 102.341747][ T6970] do_syscall_64+0xd2/0x200 [ 102.341854][ T6970] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.341884][ T6970] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 102.341912][ T6970] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.341941][ T6970] RIP: 0033:0x7f9dd933eec9 [ 102.342018][ T6970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.342036][ T6970] RSP: 002b:00007f9dd7d9f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 102.342055][ T6970] RAX: ffffffffffffffda RBX: 00007f9dd9595fa0 RCX: 00007f9dd933eec9 [ 102.342102][ T6970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 102.342119][ T6970] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 0000000000000000 [ 102.342136][ T6970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.342152][ T6970] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 102.342176][ T6970] [ 102.778405][ T6997] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1387'. [ 102.804356][ T6997] netlink: 'syz.1.1387': attribute type 13 has an invalid length. [ 102.919717][ T7018] sch_tbf: burst 3 is lower than device geneve1 mtu (1514) ! [ 102.969918][ T7027] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1400'. [ 103.304705][ T7039] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1403'. [ 103.322377][ T7039] netlink: 'syz.3.1403': attribute type 13 has an invalid length. [ 103.683329][ T7060] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1412'. [ 103.716604][ T7064] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1414'. [ 103.743800][ T7066] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1415'. [ 103.758621][ T7064] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7064 comm=syz.4.1414 [ 103.802444][ T7066] netlink: 'syz.1.1415': attribute type 13 has an invalid length. [ 103.973502][ T7090] FAULT_INJECTION: forcing a failure. [ 103.973502][ T7090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.986886][ T7090] CPU: 1 UID: 0 PID: 7090 Comm: syz.3.1426 Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.987056][ T7090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 103.987073][ T7090] Call Trace: [ 103.987108][ T7090] [ 103.987118][ T7090] __dump_stack+0x1d/0x30 [ 103.987145][ T7090] dump_stack_lvl+0xe8/0x140 [ 103.987164][ T7090] dump_stack+0x15/0x1b [ 103.987238][ T7090] should_fail_ex+0x265/0x280 [ 103.987279][ T7090] should_fail+0xb/0x20 [ 103.987320][ T7090] should_fail_usercopy+0x1a/0x20 [ 103.987346][ T7090] strncpy_from_user+0x25/0x230 [ 103.987451][ T7090] ? kmem_cache_alloc_noprof+0x242/0x480 [ 103.987562][ T7090] ? getname_flags+0x80/0x3b0 [ 103.987592][ T7090] getname_flags+0xae/0x3b0 [ 103.987628][ T7090] do_sys_openat2+0x60/0x110 [ 103.987716][ T7090] __x64_sys_openat+0xf2/0x120 [ 103.987761][ T7090] x64_sys_call+0x2eab/0x3000 [ 103.987791][ T7090] do_syscall_64+0xd2/0x200 [ 103.987824][ T7090] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.987886][ T7090] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 103.987909][ T7090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.987937][ T7090] RIP: 0033:0x7f9dd933eec9 [ 103.987971][ T7090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.987996][ T7090] RSP: 002b:00007f9dd7d9f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 103.988047][ T7090] RAX: ffffffffffffffda RBX: 00007f9dd9595fa0 RCX: 00007f9dd933eec9 [ 103.988060][ T7090] RDX: 0000000000005400 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 103.988103][ T7090] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 0000000000000000 [ 103.988121][ T7090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.988138][ T7090] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 103.988161][ T7090] [ 104.219816][ T7102] netlink: 9 bytes leftover after parsing attributes in process `syz.2.1430'. [ 104.229429][ T7102] gretap0: entered promiscuous mode [ 104.236332][ T7102] netlink: 5 bytes leftover after parsing attributes in process `syz.2.1430'. [ 104.245662][ T7102] 0ªî{X¹¦: renamed from gretap0 [ 104.253505][ T7102] 0ªî{X¹¦: left promiscuous mode [ 104.258855][ T7102] 0ªî{X¹¦: entered allmulticast mode [ 104.266452][ T7102] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 104.291452][ T7106] netlink: 'syz.1.1432': attribute type 13 has an invalid length. [ 104.374855][ T29] kauditd_printk_skb: 1858 callbacks suppressed [ 104.374873][ T29] audit: type=1400 audit(1760603540.038:17976): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 104.411725][ T29] audit: type=1400 audit(1760603540.068:17977): avc: denied { prog_load } for pid=7111 comm="syz.2.1435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.431053][ T29] audit: type=1400 audit(1760603540.068:17978): avc: denied { prog_load } for pid=7111 comm="syz.2.1435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.443556][ T7118] FAULT_INJECTION: forcing a failure. [ 104.443556][ T7118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 104.450267][ T29] audit: type=1400 audit(1760603540.068:17979): avc: denied { create } for pid=7110 comm="syz.0.1434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 104.463309][ T7118] CPU: 1 UID: 0 PID: 7118 Comm: syz.1.1436 Not tainted syzkaller #0 PREEMPT(voluntary) [ 104.463391][ T7118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 104.463410][ T7118] Call Trace: [ 104.463420][ T7118] [ 104.463433][ T7118] __dump_stack+0x1d/0x30 [ 104.463461][ T7118] dump_stack_lvl+0xe8/0x140 [ 104.463563][ T7118] dump_stack+0x15/0x1b [ 104.463587][ T7118] should_fail_ex+0x265/0x280 [ 104.463684][ T7118] should_fail+0xb/0x20 [ 104.463782][ T7118] should_fail_usercopy+0x1a/0x20 [ 104.463811][ T7118] _copy_from_iter+0xd2/0xe80 [ 104.463845][ T7118] ? __build_skb_around+0x1ab/0x200 [ 104.463906][ T7118] ? __alloc_skb+0x223/0x320 [ 104.463943][ T7118] netlink_sendmsg+0x471/0x6b0 [ 104.464027][ T7118] ? __pfx_netlink_sendmsg+0x10/0x10 [ 104.464070][ T7118] __sock_sendmsg+0x145/0x180 [ 104.464100][ T7118] ____sys_sendmsg+0x31e/0x4e0 [ 104.464142][ T7118] ___sys_sendmsg+0x17b/0x1d0 [ 104.464267][ T7118] __x64_sys_sendmsg+0xd4/0x160 [ 104.464349][ T7118] x64_sys_call+0x191e/0x3000 [ 104.464380][ T7118] do_syscall_64+0xd2/0x200 [ 104.464488][ T7118] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 104.464529][ T7118] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 104.464561][ T7118] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.464712][ T7118] RIP: 0033:0x7fc59aedeec9 [ 104.464728][ T7118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.464753][ T7118] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.464781][ T7118] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 104.464801][ T7118] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 104.464819][ T7118] RBP: 00007fc599947090 R08: 0000000000000000 R09: 0000000000000000 [ 104.464879][ T7118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.464897][ T7118] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 104.464922][ T7118] [ 104.685428][ T29] audit: type=1400 audit(1760603540.068:17980): avc: denied { create } for pid=7110 comm="syz.0.1434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 104.705248][ T29] audit: type=1400 audit(1760603540.068:17981): avc: denied { read append } for pid=7110 comm="syz.0.1434" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=0 [ 104.729185][ T29] audit: type=1400 audit(1760603540.238:17982): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 104.753494][ T29] audit: type=1400 audit(1760603540.338:17983): avc: denied { prog_load } for pid=7097 comm="syz.3.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.773113][ T29] audit: type=1400 audit(1760603540.338:17984): avc: denied { prog_load } for pid=7097 comm="syz.3.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.792660][ T29] audit: type=1400 audit(1760603540.338:17985): avc: denied { prog_load } for pid=7097 comm="syz.3.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 105.206795][ T7156] netlink: 'syz.0.1450': attribute type 21 has an invalid length. [ 106.260822][ T7208] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 106.269292][ T7208] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 106.760729][ T7217] ªªªªªª: renamed from wg2 [ 106.769579][ T7220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7220 comm=syz.4.1472 [ 107.333006][ C1] Adjusting tsc more than 11% (8579265 vs 8464875) [ 108.904668][ T7350] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 108.972256][ T7355] wireguard0: entered promiscuous mode [ 108.977817][ T7355] wireguard0: entered allmulticast mode [ 109.020450][ T7361] FAULT_INJECTION: forcing a failure. [ 109.020450][ T7361] name failslab, interval 1, probability 0, space 0, times 0 [ 109.033300][ T7361] CPU: 0 UID: 0 PID: 7361 Comm: syz.1.1528 Not tainted syzkaller #0 PREEMPT(voluntary) [ 109.033338][ T7361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 109.033356][ T7361] Call Trace: [ 109.033366][ T7361] [ 109.033377][ T7361] __dump_stack+0x1d/0x30 [ 109.033405][ T7361] dump_stack_lvl+0xe8/0x140 [ 109.033431][ T7361] dump_stack+0x15/0x1b [ 109.033513][ T7361] should_fail_ex+0x265/0x280 [ 109.033559][ T7361] should_failslab+0x8c/0xb0 [ 109.033597][ T7361] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 109.033638][ T7361] ? __alloc_skb+0x101/0x320 [ 109.033706][ T7361] __alloc_skb+0x101/0x320 [ 109.033764][ T7361] netlink_alloc_large_skb+0xbf/0xf0 [ 109.033801][ T7361] netlink_sendmsg+0x3cf/0x6b0 [ 109.033841][ T7361] ? __pfx_netlink_sendmsg+0x10/0x10 [ 109.033871][ T7361] __sock_sendmsg+0x145/0x180 [ 109.033937][ T7361] ____sys_sendmsg+0x31e/0x4e0 [ 109.034031][ T7361] ___sys_sendmsg+0x17b/0x1d0 [ 109.034111][ T7361] __x64_sys_sendmsg+0xd4/0x160 [ 109.034154][ T7361] x64_sys_call+0x191e/0x3000 [ 109.034204][ T7361] do_syscall_64+0xd2/0x200 [ 109.034309][ T7361] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 109.034348][ T7361] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 109.034451][ T7361] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.034474][ T7361] RIP: 0033:0x7fc59aedeec9 [ 109.034538][ T7361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.034562][ T7361] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.034613][ T7361] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 109.034631][ T7361] RDX: 0000000000000000 RSI: 0000200000001200 RDI: 0000000000000003 [ 109.034648][ T7361] RBP: 00007fc599947090 R08: 0000000000000000 R09: 0000000000000000 [ 109.034663][ T7361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.034681][ T7361] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 109.034706][ T7361] [ 109.238470][ T29] kauditd_printk_skb: 7239 callbacks suppressed [ 109.238555][ T29] audit: type=1400 audit(1760603544.891:25223): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.266249][ T29] audit: type=1400 audit(1760603544.891:25224): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.287645][ T29] audit: type=1400 audit(1760603544.891:25225): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.299307][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 109.309044][ T29] audit: type=1400 audit(1760603544.891:25226): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.315585][ T3042] audit: audit_lost=122 audit_rate_limit=0 audit_backlog_limit=64 [ 109.336841][ T29] audit: type=1400 audit(1760603544.891:25227): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.344787][ T3042] audit: backlog limit exceeded [ 109.368011][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 109.371241][ T29] audit: type=1400 audit(1760603544.891:25228): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.546683][ T7378] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 109.883556][ T7394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=7394 comm=syz.4.1537 [ 109.902061][ T7409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=7409 comm=syz.4.1537 [ 111.760830][ T7474] netlink: 'syz.2.1567': attribute type 4 has an invalid length. [ 111.809492][ T7475] netlink: 'syz.2.1567': attribute type 4 has an invalid length. [ 112.090685][ T7485] __nla_validate_parse: 3 callbacks suppressed [ 112.090701][ T7485] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1573'. [ 112.148288][ T7485] netlink: 'syz.3.1573': attribute type 13 has an invalid length. [ 112.216458][ T271] Bluetooth: hci0: Frame reassembly failed (-84) [ 112.253604][ T7499] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1577'. [ 112.398829][ T7503] netlink: 'syz.3.1579': attribute type 21 has an invalid length. [ 112.422220][ T7503] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1579'. [ 112.431353][ T7503] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1579'. [ 112.543176][ T7507] netlink: 'syz.1.1581': attribute type 1 has an invalid length. [ 112.585408][ T7507] bond1: (slave geneve2): making interface the new active one [ 112.593974][ T7507] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 112.603175][ T271] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 20004 - 0 [ 112.614260][ T271] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 20004 - 0 [ 112.630111][ T7507] syz.1.1581 (7507) used greatest stack depth: 9808 bytes left [ 112.656846][ T271] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 20004 - 0 [ 112.698485][ T271] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 20004 - 0 [ 112.855832][ T7523] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1587'. [ 113.005362][ T7533] FAULT_INJECTION: forcing a failure. [ 113.005362][ T7533] name failslab, interval 1, probability 0, space 0, times 0 [ 113.018082][ T7533] CPU: 1 UID: 0 PID: 7533 Comm: syz.2.1591 Not tainted syzkaller #0 PREEMPT(voluntary) [ 113.018137][ T7533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 113.018155][ T7533] Call Trace: [ 113.018164][ T7533] [ 113.018232][ T7533] __dump_stack+0x1d/0x30 [ 113.018261][ T7533] dump_stack_lvl+0xe8/0x140 [ 113.018286][ T7533] dump_stack+0x15/0x1b [ 113.018307][ T7533] should_fail_ex+0x265/0x280 [ 113.018348][ T7533] should_failslab+0x8c/0xb0 [ 113.018459][ T7533] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 113.018493][ T7533] ? __alloc_skb+0x101/0x320 [ 113.018628][ T7533] __alloc_skb+0x101/0x320 [ 113.018663][ T7533] netlink_alloc_large_skb+0xbf/0xf0 [ 113.018695][ T7533] netlink_sendmsg+0x3cf/0x6b0 [ 113.018731][ T7533] ? __pfx_netlink_sendmsg+0x10/0x10 [ 113.018785][ T7533] __sock_sendmsg+0x145/0x180 [ 113.018812][ T7533] ____sys_sendmsg+0x345/0x4e0 [ 113.018916][ T7533] ___sys_sendmsg+0x17b/0x1d0 [ 113.018970][ T7533] __sys_sendmmsg+0x178/0x300 [ 113.019022][ T7533] __x64_sys_sendmmsg+0x57/0x70 [ 113.019190][ T7533] x64_sys_call+0x1c4a/0x3000 [ 113.019218][ T7533] do_syscall_64+0xd2/0x200 [ 113.019277][ T7533] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 113.019354][ T7533] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 113.019378][ T7533] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.019409][ T7533] RIP: 0033:0x7fd7b127eec9 [ 113.019429][ T7533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.019523][ T7533] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 113.019545][ T7533] RAX: ffffffffffffffda RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 113.019558][ T7533] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000003 [ 113.019640][ T7533] RBP: 00007fd7afce7090 R08: 0000000000000000 R09: 0000000000000000 [ 113.019658][ T7533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.019675][ T7533] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 113.019698][ T7533] [ 113.236406][ T7540] FAULT_INJECTION: forcing a failure. [ 113.236406][ T7540] name failslab, interval 1, probability 0, space 0, times 0 [ 113.249182][ T7540] CPU: 0 UID: 0 PID: 7540 Comm: syz.4.1593 Not tainted syzkaller #0 PREEMPT(voluntary) [ 113.249216][ T7540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 113.249233][ T7540] Call Trace: [ 113.249240][ T7540] [ 113.249250][ T7540] __dump_stack+0x1d/0x30 [ 113.249300][ T7540] dump_stack_lvl+0xe8/0x140 [ 113.249325][ T7540] dump_stack+0x15/0x1b [ 113.249347][ T7540] should_fail_ex+0x265/0x280 [ 113.249420][ T7540] should_failslab+0x8c/0xb0 [ 113.249456][ T7540] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 113.249494][ T7540] ? __alloc_skb+0x101/0x320 [ 113.249527][ T7540] __alloc_skb+0x101/0x320 [ 113.249580][ T7540] netlink_alloc_large_skb+0xbf/0xf0 [ 113.249615][ T7540] netlink_sendmsg+0x3cf/0x6b0 [ 113.249713][ T7540] ? __pfx_netlink_sendmsg+0x10/0x10 [ 113.249751][ T7540] __sock_sendmsg+0x145/0x180 [ 113.249809][ T7540] ____sys_sendmsg+0x345/0x4e0 [ 113.249900][ T7540] ___sys_sendmsg+0x17b/0x1d0 [ 113.249939][ T7540] __sys_sendmmsg+0x178/0x300 [ 113.250064][ T7540] __x64_sys_sendmmsg+0x57/0x70 [ 113.250177][ T7540] x64_sys_call+0x1c4a/0x3000 [ 113.250206][ T7540] do_syscall_64+0xd2/0x200 [ 113.250245][ T7540] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 113.250282][ T7540] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 113.250312][ T7540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.250419][ T7540] RIP: 0033:0x7f943173eec9 [ 113.250440][ T7540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.250498][ T7540] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 113.250520][ T7540] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 113.250537][ T7540] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000003 [ 113.250553][ T7540] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 113.250570][ T7540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.250586][ T7540] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 113.250608][ T7540] [ 113.798668][ T7552] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1595'. [ 114.003284][ T29] kauditd_printk_skb: 29423 callbacks suppressed [ 114.003303][ T29] audit: type=1400 audit(1760604318.120:49023): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.039177][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.045811][ T3042] audit: audit_lost=2000 audit_rate_limit=0 audit_backlog_limit=64 [ 114.053769][ T3042] audit: backlog limit exceeded [ 114.070885][ T3320] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.077544][ T3320] audit: audit_lost=2001 audit_rate_limit=0 audit_backlog_limit=64 [ 114.085544][ T3320] audit: backlog limit exceeded [ 114.091221][ T29] audit: type=1400 audit(1760604318.151:49024): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.112589][ T29] audit: type=1400 audit(1760604318.151:49025): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.134227][ T29] audit: type=1400 audit(1760604318.151:49026): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.171051][ T3596] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 114.323465][ T7558] FAULT_INJECTION: forcing a failure. [ 114.323465][ T7558] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.336636][ T7558] CPU: 1 UID: 0 PID: 7558 Comm: syz.2.1599 Not tainted syzkaller #0 PREEMPT(voluntary) [ 114.336670][ T7558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 114.336687][ T7558] Call Trace: [ 114.336697][ T7558] [ 114.336706][ T7558] __dump_stack+0x1d/0x30 [ 114.336763][ T7558] dump_stack_lvl+0xe8/0x140 [ 114.336784][ T7558] dump_stack+0x15/0x1b [ 114.336800][ T7558] should_fail_ex+0x265/0x280 [ 114.336851][ T7558] should_fail+0xb/0x20 [ 114.336890][ T7558] should_fail_usercopy+0x1a/0x20 [ 114.336910][ T7558] copy_fpstate_to_sigframe+0x628/0x7d0 [ 114.337050][ T7558] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 114.337088][ T7558] ? x86_task_fpu+0x36/0x60 [ 114.337126][ T7558] get_sigframe+0x34d/0x490 [ 114.337150][ T7558] ? get_signal+0xdc7/0xf70 [ 114.337201][ T7558] x64_setup_rt_frame+0xa8/0x580 [ 114.337224][ T7558] arch_do_signal_or_restart+0x23e/0x440 [ 114.337314][ T7558] exit_to_user_mode_loop+0x77/0x110 [ 114.337345][ T7558] do_syscall_64+0x1d6/0x200 [ 114.337370][ T7558] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 114.337405][ T7558] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 114.337453][ T7558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.337554][ T7558] RIP: 0033:0x7fd7b127eec7 [ 114.337574][ T7558] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 114.337601][ T7558] RSP: 002b:00007fd7afce7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000049 [ 114.337627][ T7558] RAX: 0000000000000049 RBX: 00007fd7b14d5fa0 RCX: 00007fd7b127eec9 [ 114.337644][ T7558] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 114.337660][ T7558] RBP: 00007fd7afce7090 R08: 0000000000000000 R09: 0000000000000000 [ 114.337702][ T7558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.337715][ T7558] R13: 00007fd7b14d6038 R14: 00007fd7b14d5fa0 R15: 00007ffdcc6a0008 [ 114.337734][ T7558] [ 115.051573][ T7577] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1607'. [ 115.069614][ T7577] netlink: 'syz.2.1607': attribute type 13 has an invalid length. [ 115.162986][ T7584] netlink: 'syz.2.1610': attribute type 4 has an invalid length. [ 115.195242][ T7584] netlink: 'syz.2.1610': attribute type 4 has an invalid length. [ 115.293747][ T7593] FAULT_INJECTION: forcing a failure. [ 115.293747][ T7593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.306988][ T7593] CPU: 1 UID: 0 PID: 7593 Comm: syz.0.1612 Not tainted syzkaller #0 PREEMPT(voluntary) [ 115.307059][ T7593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 115.307076][ T7593] Call Trace: [ 115.307086][ T7593] [ 115.307096][ T7593] __dump_stack+0x1d/0x30 [ 115.307120][ T7593] dump_stack_lvl+0xe8/0x140 [ 115.307251][ T7593] dump_stack+0x15/0x1b [ 115.307269][ T7593] should_fail_ex+0x265/0x280 [ 115.307388][ T7593] should_fail+0xb/0x20 [ 115.307422][ T7593] should_fail_usercopy+0x1a/0x20 [ 115.307493][ T7593] copy_folio_from_iter_atomic+0x278/0x11b0 [ 115.307524][ T7593] ? shmem_write_begin+0xa8/0x190 [ 115.307558][ T7593] ? shmem_write_begin+0xe1/0x190 [ 115.307594][ T7593] generic_perform_write+0x2c2/0x490 [ 115.307663][ T7593] shmem_file_write_iter+0xc5/0xf0 [ 115.307688][ T7593] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 115.307769][ T7593] vfs_write+0x52a/0x960 [ 115.307797][ T7593] __x64_sys_pwrite64+0xfd/0x150 [ 115.307825][ T7593] x64_sys_call+0xc4d/0x3000 [ 115.307847][ T7593] do_syscall_64+0xd2/0x200 [ 115.307914][ T7593] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 115.307943][ T7593] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 115.307967][ T7593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.307998][ T7593] RIP: 0033:0x7fc98afbeec9 [ 115.308087][ T7593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.308107][ T7593] RSP: 002b:00007fc9899fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 115.308148][ T7593] RAX: ffffffffffffffda RBX: 00007fc98b216090 RCX: 00007fc98afbeec9 [ 115.308162][ T7593] RDX: 00000000200000c1 RSI: 00002000000000c0 RDI: 0000000000000006 [ 115.308175][ T7593] RBP: 00007fc9899fe090 R08: 0000000000000000 R09: 0000000000000000 [ 115.308188][ T7593] R10: 0000000000009000 R11: 0000000000000246 R12: 0000000000000001 [ 115.308200][ T7593] R13: 00007fc98b216128 R14: 00007fc98b216090 R15: 00007ffc8df7c7a8 [ 115.308285][ T7593] [ 115.566498][ T7598] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1615'. [ 115.613053][ T7598] netlink: 'syz.2.1615': attribute type 13 has an invalid length. [ 116.382066][ T7619] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 116.452979][ T7623] FAULT_INJECTION: forcing a failure. [ 116.452979][ T7623] name failslab, interval 1, probability 0, space 0, times 0 [ 116.465812][ T7623] CPU: 1 UID: 0 PID: 7623 Comm: syz.4.1624 Not tainted syzkaller #0 PREEMPT(voluntary) [ 116.465849][ T7623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 116.465867][ T7623] Call Trace: [ 116.465877][ T7623] [ 116.465886][ T7623] __dump_stack+0x1d/0x30 [ 116.465967][ T7623] dump_stack_lvl+0xe8/0x140 [ 116.465988][ T7623] dump_stack+0x15/0x1b [ 116.466008][ T7623] should_fail_ex+0x265/0x280 [ 116.466056][ T7623] should_failslab+0x8c/0xb0 [ 116.466094][ T7623] __kvmalloc_node_noprof+0x12e/0x670 [ 116.466153][ T7623] ? xt_alloc_table_info+0x40/0x80 [ 116.466190][ T7623] xt_alloc_table_info+0x40/0x80 [ 116.466229][ T7623] do_ip6t_set_ctl+0x5a5/0x840 [ 116.466308][ T7623] ? kstrtoull+0x111/0x140 [ 116.466353][ T7623] ? __rcu_read_unlock+0x4f/0x70 [ 116.466446][ T7623] nf_setsockopt+0x199/0x1b0 [ 116.466557][ T7623] ipv6_setsockopt+0x11a/0x130 [ 116.466591][ T7623] tcp_setsockopt+0x98/0xb0 [ 116.466656][ T7623] sock_common_setsockopt+0x69/0x80 [ 116.466684][ T7623] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 116.466730][ T7623] __sys_setsockopt+0x184/0x200 [ 116.466763][ T7623] __x64_sys_setsockopt+0x64/0x80 [ 116.466818][ T7623] x64_sys_call+0x20ec/0x3000 [ 116.466848][ T7623] do_syscall_64+0xd2/0x200 [ 116.466882][ T7623] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 116.466926][ T7623] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 116.467008][ T7623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 116.467117][ T7623] RIP: 0033:0x7f943173eec9 [ 116.467133][ T7623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.467151][ T7623] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 116.467171][ T7623] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 116.467188][ T7623] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000004 [ 116.467205][ T7623] RBP: 00007f94301a7090 R08: 0000000000000500 R09: 0000000000000000 [ 116.467221][ T7623] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.467252][ T7623] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 116.467275][ T7623] [ 116.966614][ T7642] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1629'. [ 117.121256][ T7649] macvtap1: entered allmulticast mode [ 117.127291][ T7649] bridge0: entered allmulticast mode [ 117.174046][ T7649] bridge0: port 3(macvtap1) entered blocking state [ 117.180769][ T7649] bridge0: port 3(macvtap1) entered disabled state [ 117.227136][ T7649] bridge0: left allmulticast mode [ 117.746562][ T7658] FAULT_INJECTION: forcing a failure. [ 117.746562][ T7658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.759738][ T7658] CPU: 0 UID: 0 PID: 7658 Comm: syz.1.1637 Not tainted syzkaller #0 PREEMPT(voluntary) [ 117.759769][ T7658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 117.759795][ T7658] Call Trace: [ 117.759803][ T7658] [ 117.759813][ T7658] __dump_stack+0x1d/0x30 [ 117.759840][ T7658] dump_stack_lvl+0xe8/0x140 [ 117.759859][ T7658] dump_stack+0x15/0x1b [ 117.759879][ T7658] should_fail_ex+0x265/0x280 [ 117.759924][ T7658] should_fail+0xb/0x20 [ 117.760000][ T7658] should_fail_usercopy+0x1a/0x20 [ 117.760022][ T7658] _copy_to_user+0x20/0xa0 [ 117.760047][ T7658] simple_read_from_buffer+0xb5/0x130 [ 117.760141][ T7658] proc_fail_nth_read+0x10e/0x150 [ 117.760183][ T7658] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 117.760283][ T7658] vfs_read+0x1a8/0x770 [ 117.760371][ T7658] ? __rcu_read_unlock+0x4f/0x70 [ 117.760405][ T7658] ? __fget_files+0x184/0x1c0 [ 117.760442][ T7658] ksys_read+0xda/0x1a0 [ 117.760531][ T7658] __x64_sys_read+0x40/0x50 [ 117.760636][ T7658] x64_sys_call+0x27c0/0x3000 [ 117.760668][ T7658] do_syscall_64+0xd2/0x200 [ 117.760714][ T7658] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 117.760751][ T7658] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 117.760779][ T7658] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.760843][ T7658] RIP: 0033:0x7fc59aedd8dc [ 117.760859][ T7658] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 117.760936][ T7658] RSP: 002b:00007fc599947030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 117.760963][ T7658] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedd8dc [ 117.761013][ T7658] RDX: 000000000000000f RSI: 00007fc5999470a0 RDI: 0000000000000004 [ 117.761026][ T7658] RBP: 00007fc599947090 R08: 0000000000000000 R09: 0000000000000000 [ 117.761039][ T7658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.761053][ T7658] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 117.761074][ T7658] [ 118.072018][ T7662] FAULT_INJECTION: forcing a failure. [ 118.072018][ T7662] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.085179][ T7662] CPU: 0 UID: 0 PID: 7662 Comm: syz.1.1640 Not tainted syzkaller #0 PREEMPT(voluntary) [ 118.085212][ T7662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 118.085228][ T7662] Call Trace: [ 118.085236][ T7662] [ 118.085244][ T7662] __dump_stack+0x1d/0x30 [ 118.085266][ T7662] dump_stack_lvl+0xe8/0x140 [ 118.085285][ T7662] dump_stack+0x15/0x1b [ 118.085367][ T7662] should_fail_ex+0x265/0x280 [ 118.085410][ T7662] should_fail+0xb/0x20 [ 118.085452][ T7662] should_fail_usercopy+0x1a/0x20 [ 118.085478][ T7662] strncpy_from_user+0x25/0x230 [ 118.085620][ T7662] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 118.085703][ T7662] __se_sys_memfd_create+0x1ff/0x590 [ 118.085730][ T7662] __x64_sys_memfd_create+0x31/0x40 [ 118.085752][ T7662] x64_sys_call+0x2ac2/0x3000 [ 118.085813][ T7662] do_syscall_64+0xd2/0x200 [ 118.085841][ T7662] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 118.085877][ T7662] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 118.085908][ T7662] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 118.085937][ T7662] RIP: 0033:0x7fc59aedeec9 [ 118.085957][ T7662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.085982][ T7662] RSP: 002b:00007fc599946d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 118.086006][ T7662] RAX: ffffffffffffffda RBX: 0000000000004073 RCX: 00007fc59aedeec9 [ 118.086024][ T7662] RDX: 00007fc599946dec RSI: 0000000000000000 RDI: 00007fc59af62960 [ 118.086065][ T7662] RBP: 00002000000004c0 R08: 00007fc599946b07 R09: 0000000000000000 [ 118.086079][ T7662] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 118.086120][ T7662] R13: 00007fc599946dec R14: 00007fc599946df0 R15: 00007ffdeef1ff08 [ 118.086138][ T7662] [ 118.386079][ T7669] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7669 comm=syz.4.1642 [ 118.775001][ T29] kauditd_printk_skb: 23074 callbacks suppressed [ 118.775082][ T29] audit: type=1400 audit(1760604323.118:65502): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.793958][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.809504][ T3042] audit: audit_lost=4202 audit_rate_limit=0 audit_backlog_limit=64 [ 118.817452][ T3042] audit: backlog limit exceeded [ 118.886666][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.893291][ T3042] audit: audit_lost=4203 audit_rate_limit=0 audit_backlog_limit=64 [ 118.901334][ T3042] audit: backlog limit exceeded [ 118.926153][ T7675] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.932843][ T7675] audit: audit_lost=4204 audit_rate_limit=0 audit_backlog_limit=64 [ 118.940820][ T7675] audit: backlog limit exceeded [ 119.372119][ T7705] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1655'. [ 119.409998][ T7705] bridge0: entered promiscuous mode [ 119.421726][ T7705] macvtap1: entered allmulticast mode [ 119.427374][ T7705] bridge0: entered allmulticast mode [ 119.888575][ T7714] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1659'. [ 119.908514][ T7714] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1659'. [ 119.927919][ T7714] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1659'. [ 119.940088][ T7714] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1659'. [ 119.959908][ T7714] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1659'. [ 120.000739][ T7723] netlink: 'syz.2.1663': attribute type 29 has an invalid length. [ 120.012068][ T7725] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1664'. [ 120.437185][ T7737] netlink: 'syz.3.1669': attribute type 29 has an invalid length. [ 120.467108][ T7752] x_tables: duplicate underflow at hook 3 [ 120.556727][ T7760] FAULT_INJECTION: forcing a failure. [ 120.556727][ T7760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 120.570019][ T7760] CPU: 1 UID: 0 PID: 7760 Comm: syz.3.1676 Not tainted syzkaller #0 PREEMPT(voluntary) [ 120.570064][ T7760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 120.570080][ T7760] Call Trace: [ 120.570086][ T7760] [ 120.570093][ T7760] __dump_stack+0x1d/0x30 [ 120.570197][ T7760] dump_stack_lvl+0xe8/0x140 [ 120.570292][ T7760] dump_stack+0x15/0x1b [ 120.570313][ T7760] should_fail_ex+0x265/0x280 [ 120.570359][ T7760] should_fail+0xb/0x20 [ 120.570475][ T7760] should_fail_usercopy+0x1a/0x20 [ 120.570498][ T7760] _copy_from_user+0x1c/0xb0 [ 120.570523][ T7760] __sys_bpf+0x183/0x7c0 [ 120.570564][ T7760] __x64_sys_bpf+0x41/0x50 [ 120.570644][ T7760] x64_sys_call+0x2aee/0x3000 [ 120.570740][ T7760] do_syscall_64+0xd2/0x200 [ 120.570778][ T7760] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 120.570807][ T7760] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 120.570833][ T7760] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.570931][ T7760] RIP: 0033:0x7f9dd933eec9 [ 120.570946][ T7760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.570966][ T7760] RSP: 002b:00007f9dd7d9f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 120.570986][ T7760] RAX: ffffffffffffffda RBX: 00007f9dd9595fa0 RCX: 00007f9dd933eec9 [ 120.571014][ T7760] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 120.571027][ T7760] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 0000000000000000 [ 120.571045][ T7760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.571058][ T7760] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 120.571077][ T7760] [ 120.653891][ T7763] Cannot find add_set index 0 as target [ 120.758322][ T7765] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=263 sclass=netlink_tcpdiag_socket pid=7765 comm=syz.3.1678 [ 121.100245][ T7789] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1688'. [ 121.139016][ T7789] netlink: 'syz.0.1688': attribute type 13 has an invalid length. [ 121.363822][ T7789] bridge0: left allmulticast mode [ 121.385015][ T52] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.398617][ T52] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.426154][ T52] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.458608][ T52] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.679512][ T7841] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1705'. [ 122.689409][ T7841] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1705'. [ 122.703554][ T7841] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1705'. [ 122.718808][ T7841] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1705'. [ 122.761358][ T7846] netlink: 'syz.0.1707': attribute type 12 has an invalid length. [ 122.817574][ T7849] FAULT_INJECTION: forcing a failure. [ 122.817574][ T7849] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.830927][ T7849] CPU: 1 UID: 0 PID: 7849 Comm: syz.0.1708 Not tainted syzkaller #0 PREEMPT(voluntary) [ 122.830955][ T7849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 122.830971][ T7849] Call Trace: [ 122.830979][ T7849] [ 122.830989][ T7849] __dump_stack+0x1d/0x30 [ 122.831092][ T7849] dump_stack_lvl+0xe8/0x140 [ 122.831113][ T7849] dump_stack+0x15/0x1b [ 122.831135][ T7849] should_fail_ex+0x265/0x280 [ 122.831180][ T7849] should_fail+0xb/0x20 [ 122.831232][ T7849] should_fail_usercopy+0x1a/0x20 [ 122.831256][ T7849] copy_fpstate_to_sigframe+0x628/0x7d0 [ 122.831365][ T7849] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 122.831410][ T7849] ? kmem_cache_free+0xe4/0x3d0 [ 122.831448][ T7849] ? x86_task_fpu+0x36/0x60 [ 122.831480][ T7849] get_sigframe+0x34d/0x490 [ 122.831504][ T7849] ? get_signal+0xdc7/0xf70 [ 122.831604][ T7849] x64_setup_rt_frame+0xa8/0x580 [ 122.831627][ T7849] arch_do_signal_or_restart+0x23e/0x440 [ 122.831659][ T7849] irqentry_exit_to_user_mode+0x5b/0xa0 [ 122.831689][ T7849] irqentry_exit+0x12/0x50 [ 122.831713][ T7849] exc_general_protection+0x15b/0x1f0 [ 122.831797][ T7849] asm_exc_general_protection+0x26/0x30 [ 122.832007][ T7849] RIP: 0033:0x7fc98af978f9 [ 122.832026][ T7849] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 122.832107][ T7849] RSP: 002b:00007fc989a1e7c8 EFLAGS: 00010283 [ 122.832123][ T7849] RAX: 0000000000000999 RBX: 00007fc989a1ed30 RCX: 00007fc98b1d8120 [ 122.832136][ T7849] RDX: 9999999999999999 RSI: 00007fc98b041ca9 RDI: 9999999999999999 [ 122.832149][ T7849] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 122.832162][ T7849] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 122.832179][ T7849] R13: 00007fc989a1eeb0 R14: 9999999999999999 R15: 0000000000000000 [ 122.832203][ T7849] [ 123.130527][ T7851] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1710'. [ 123.180249][ T7851] netlink: 'syz.2.1710': attribute type 13 has an invalid length. [ 123.260507][ T52] Bluetooth: hci0: Frame reassembly failed (-84) [ 123.546832][ T29] kauditd_printk_skb: 24274 callbacks suppressed [ 123.546851][ T29] audit: type=1400 audit(1760604328.136:83887): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.586585][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 123.593145][ T3042] audit: audit_lost=6169 audit_rate_limit=0 audit_backlog_limit=64 [ 123.601153][ T3042] audit: backlog limit exceeded [ 123.616039][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 123.622256][ T29] audit: type=1400 audit(1760604328.136:83888): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.622677][ T3042] audit: audit_lost=6170 audit_rate_limit=0 audit_backlog_limit=64 [ 123.643936][ T29] audit: type=1400 audit(1760604328.136:83889): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.651799][ T3042] audit: backlog limit exceeded [ 123.677930][ T29] audit: type=1400 audit(1760604328.136:83890): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 124.387961][ T7883] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1718'. [ 124.414397][ T7883] netlink: 'syz.2.1718': attribute type 13 has an invalid length. [ 125.215171][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 125.406806][ T7930] FAULT_INJECTION: forcing a failure. [ 125.406806][ T7930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.419964][ T7930] CPU: 0 UID: 0 PID: 7930 Comm: syz.1.1738 Not tainted syzkaller #0 PREEMPT(voluntary) [ 125.420000][ T7930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 125.420076][ T7930] Call Trace: [ 125.420086][ T7930] [ 125.420096][ T7930] __dump_stack+0x1d/0x30 [ 125.420127][ T7930] dump_stack_lvl+0xe8/0x140 [ 125.420153][ T7930] dump_stack+0x15/0x1b [ 125.420201][ T7930] should_fail_ex+0x265/0x280 [ 125.420250][ T7930] should_fail+0xb/0x20 [ 125.420301][ T7930] should_fail_usercopy+0x1a/0x20 [ 125.420329][ T7930] _copy_from_user+0x1c/0xb0 [ 125.420386][ T7930] memdup_user+0x5e/0xd0 [ 125.420419][ T7930] strndup_user+0x68/0xb0 [ 125.420452][ T7930] __se_sys_mount+0x4d/0x2e0 [ 125.420485][ T7930] ? fput+0x8f/0xc0 [ 125.420580][ T7930] ? ksys_write+0x192/0x1a0 [ 125.420612][ T7930] __x64_sys_mount+0x67/0x80 [ 125.420657][ T7930] x64_sys_call+0x2b51/0x3000 [ 125.420678][ T7930] do_syscall_64+0xd2/0x200 [ 125.420703][ T7930] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 125.420757][ T7930] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 125.420788][ T7930] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.420817][ T7930] RIP: 0033:0x7fc59aedeec9 [ 125.420884][ T7930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.420907][ T7930] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 125.420933][ T7930] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 125.420951][ T7930] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 125.420968][ T7930] RBP: 00007fc599947090 R08: 0000200000000740 R09: 0000000000000000 [ 125.420986][ T7930] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 125.421079][ T7930] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 125.421104][ T7930] [ 125.712004][ T7938] FAULT_INJECTION: forcing a failure. [ 125.712004][ T7938] name failslab, interval 1, probability 0, space 0, times 0 [ 125.724815][ T7938] CPU: 1 UID: 0 PID: 7938 Comm: syz.0.1739 Not tainted syzkaller #0 PREEMPT(voluntary) [ 125.724908][ T7938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 125.724923][ T7938] Call Trace: [ 125.724931][ T7938] [ 125.724939][ T7938] __dump_stack+0x1d/0x30 [ 125.724965][ T7938] dump_stack_lvl+0xe8/0x140 [ 125.725024][ T7938] dump_stack+0x15/0x1b [ 125.725045][ T7938] should_fail_ex+0x265/0x280 [ 125.725149][ T7938] should_failslab+0x8c/0xb0 [ 125.725181][ T7938] __kvmalloc_node_noprof+0x12e/0x670 [ 125.725270][ T7938] ? vmemdup_user+0x2b/0xd0 [ 125.725303][ T7938] ? should_fail_usercopy+0x1a/0x20 [ 125.725333][ T7938] vmemdup_user+0x2b/0xd0 [ 125.725390][ T7938] path_setxattrat+0x1b6/0x310 [ 125.725513][ T7938] __x64_sys_fsetxattr+0x6b/0x80 [ 125.725557][ T7938] x64_sys_call+0x1ced/0x3000 [ 125.725587][ T7938] do_syscall_64+0xd2/0x200 [ 125.725620][ T7938] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 125.725730][ T7938] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 125.725752][ T7938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.725774][ T7938] RIP: 0033:0x7fc98afbeec9 [ 125.725807][ T7938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.725825][ T7938] RSP: 002b:00007fc9899fe038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 125.725846][ T7938] RAX: ffffffffffffffda RBX: 00007fc98b216090 RCX: 00007fc98afbeec9 [ 125.725859][ T7938] RDX: 0000200000000580 RSI: 0000200000000040 RDI: 0000000000000003 [ 125.725874][ T7938] RBP: 00007fc9899fe090 R08: 0000000000000000 R09: 0000000000000000 [ 125.725891][ T7938] R10: 000000000000006b R11: 0000000000000246 R12: 0000000000000001 [ 125.725910][ T7938] R13: 00007fc98b216128 R14: 00007fc98b216090 R15: 00007ffc8df7c7a8 [ 125.725933][ T7938] [ 126.038619][ T7947] FAULT_INJECTION: forcing a failure. [ 126.038619][ T7947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.051825][ T7947] CPU: 1 UID: 0 PID: 7947 Comm: syz.3.1746 Not tainted syzkaller #0 PREEMPT(voluntary) [ 126.051860][ T7947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 126.051887][ T7947] Call Trace: [ 126.051896][ T7947] [ 126.051906][ T7947] __dump_stack+0x1d/0x30 [ 126.051932][ T7947] dump_stack_lvl+0xe8/0x140 [ 126.052015][ T7947] dump_stack+0x15/0x1b [ 126.052037][ T7947] should_fail_ex+0x265/0x280 [ 126.052078][ T7947] should_fail+0xb/0x20 [ 126.052154][ T7947] should_fail_usercopy+0x1a/0x20 [ 126.052182][ T7947] _copy_to_user+0x20/0xa0 [ 126.052274][ T7947] simple_read_from_buffer+0xb5/0x130 [ 126.052305][ T7947] proc_fail_nth_read+0x10e/0x150 [ 126.052341][ T7947] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 126.052383][ T7947] vfs_read+0x1a8/0x770 [ 126.052411][ T7947] ? signal_setup_done+0x266/0x290 [ 126.052438][ T7947] ? __rcu_read_unlock+0x4f/0x70 [ 126.052463][ T7947] ? __fget_files+0x184/0x1c0 [ 126.052570][ T7947] ksys_read+0xda/0x1a0 [ 126.052678][ T7947] __x64_sys_read+0x40/0x50 [ 126.052705][ T7947] x64_sys_call+0x27c0/0x3000 [ 126.052732][ T7947] do_syscall_64+0xd2/0x200 [ 126.052765][ T7947] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 126.052802][ T7947] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 126.052857][ T7947] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.052882][ T7947] RIP: 0033:0x7f9dd933d8dc [ 126.052901][ T7947] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 126.052926][ T7947] RSP: 002b:00007f9dd7d9f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 126.052951][ T7947] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f9dd933d8dc [ 126.053038][ T7947] RDX: 000000000000000f RSI: 00007f9dd7d9f0a0 RDI: 0000000000000004 [ 126.053055][ T7947] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 00007f9dd7d9f090 [ 126.053071][ T7947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.053087][ T7947] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 126.053106][ T7947] [ 126.377445][ T7957] FAULT_INJECTION: forcing a failure. [ 126.377445][ T7957] name failslab, interval 1, probability 0, space 0, times 0 [ 126.390206][ T7957] CPU: 0 UID: 0 PID: 7957 Comm: syz.3.1750 Not tainted syzkaller #0 PREEMPT(voluntary) [ 126.390241][ T7957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 126.390257][ T7957] Call Trace: [ 126.390309][ T7957] [ 126.390319][ T7957] __dump_stack+0x1d/0x30 [ 126.390348][ T7957] dump_stack_lvl+0xe8/0x140 [ 126.390420][ T7957] dump_stack+0x15/0x1b [ 126.390436][ T7957] should_fail_ex+0x265/0x280 [ 126.390482][ T7957] should_failslab+0x8c/0xb0 [ 126.390528][ T7957] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 126.390564][ T7957] ? __alloc_skb+0x101/0x320 [ 126.390589][ T7957] __alloc_skb+0x101/0x320 [ 126.390621][ T7957] netlink_alloc_large_skb+0xbf/0xf0 [ 126.390722][ T7957] netlink_sendmsg+0x3cf/0x6b0 [ 126.390757][ T7957] ? __pfx_netlink_sendmsg+0x10/0x10 [ 126.390796][ T7957] __sock_sendmsg+0x145/0x180 [ 126.390870][ T7957] ____sys_sendmsg+0x345/0x4e0 [ 126.390902][ T7957] ___sys_sendmsg+0x17b/0x1d0 [ 126.391096][ T7957] __sys_sendmmsg+0x178/0x300 [ 126.391208][ T7957] __x64_sys_sendmmsg+0x57/0x70 [ 126.391240][ T7957] x64_sys_call+0x1c4a/0x3000 [ 126.391340][ T7957] do_syscall_64+0xd2/0x200 [ 126.391400][ T7957] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 126.391498][ T7957] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 126.391528][ T7957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.391620][ T7957] RIP: 0033:0x7f9dd933eec9 [ 126.391640][ T7957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.391665][ T7957] RSP: 002b:00007f9dd7d9f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 126.391691][ T7957] RAX: ffffffffffffffda RBX: 00007f9dd9595fa0 RCX: 00007f9dd933eec9 [ 126.391705][ T7957] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000003 [ 126.391780][ T7957] RBP: 00007f9dd7d9f090 R08: 0000000000000000 R09: 0000000000000000 [ 126.391871][ T7957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.391883][ T7957] R13: 00007f9dd9596038 R14: 00007f9dd9595fa0 R15: 00007ffc8e191d98 [ 126.391900][ T7957] [ 126.657249][ T297] Bluetooth: hci0: Frame reassembly failed (-84) [ 126.854663][ T7982] FAULT_INJECTION: forcing a failure. [ 126.854663][ T7982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.867796][ T7982] CPU: 1 UID: 0 PID: 7982 Comm: syz.1.1760 Not tainted syzkaller #0 PREEMPT(voluntary) [ 126.867824][ T7982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 126.867842][ T7982] Call Trace: [ 126.867852][ T7982] [ 126.867862][ T7982] __dump_stack+0x1d/0x30 [ 126.867947][ T7982] dump_stack_lvl+0xe8/0x140 [ 126.867973][ T7982] dump_stack+0x15/0x1b [ 126.867997][ T7982] should_fail_ex+0x265/0x280 [ 126.868045][ T7982] should_fail+0xb/0x20 [ 126.868114][ T7982] should_fail_usercopy+0x1a/0x20 [ 126.868143][ T7982] strncpy_from_user+0x25/0x230 [ 126.868204][ T7982] ? kmem_cache_alloc_noprof+0x242/0x480 [ 126.868236][ T7982] ? getname_flags+0x80/0x3b0 [ 126.868268][ T7982] getname_flags+0xae/0x3b0 [ 126.868334][ T7982] __x64_sys_lgetxattr+0xfd/0x140 [ 126.868370][ T7982] x64_sys_call+0x2fb3/0x3000 [ 126.868393][ T7982] do_syscall_64+0xd2/0x200 [ 126.868428][ T7982] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 126.868466][ T7982] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 126.868580][ T7982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.868611][ T7982] RIP: 0033:0x7fc59aedeec9 [ 126.868631][ T7982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.868657][ T7982] RSP: 002b:00007fc599947038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 126.868683][ T7982] RAX: ffffffffffffffda RBX: 00007fc59b135fa0 RCX: 00007fc59aedeec9 [ 126.868753][ T7982] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000000 [ 126.868768][ T7982] RBP: 00007fc599947090 R08: 0000000000000000 R09: 0000000000000000 [ 126.868780][ T7982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.868792][ T7982] R13: 00007fc59b136038 R14: 00007fc59b135fa0 R15: 00007ffdeef1ff08 [ 126.868813][ T7982] [ 128.010373][ T8013] FAULT_INJECTION: forcing a failure. [ 128.010373][ T8013] name failslab, interval 1, probability 0, space 0, times 0 [ 128.023047][ T8013] CPU: 1 UID: 0 PID: 8013 Comm: syz.4.1769 Not tainted syzkaller #0 PREEMPT(voluntary) [ 128.023136][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 128.023154][ T8013] Call Trace: [ 128.023163][ T8013] [ 128.023230][ T8013] __dump_stack+0x1d/0x30 [ 128.023254][ T8013] dump_stack_lvl+0xe8/0x140 [ 128.023273][ T8013] dump_stack+0x15/0x1b [ 128.023289][ T8013] should_fail_ex+0x265/0x280 [ 128.023333][ T8013] should_failslab+0x8c/0xb0 [ 128.023423][ T8013] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 128.023457][ T8013] ? __alloc_skb+0x101/0x320 [ 128.023496][ T8013] __alloc_skb+0x101/0x320 [ 128.023523][ T8013] ? audit_log_start+0x342/0x720 [ 128.023542][ T8013] audit_log_start+0x3a0/0x720 [ 128.023562][ T8013] ? kstrtouint+0x76/0xc0 [ 128.023649][ T8013] audit_seccomp+0x48/0x100 [ 128.023690][ T8013] ? __seccomp_filter+0x82d/0x1250 [ 128.023726][ T8013] __seccomp_filter+0x83e/0x1250 [ 128.023828][ T8013] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 128.023869][ T8013] ? vfs_write+0x7e8/0x960 [ 128.023936][ T8013] ? __rcu_read_unlock+0x4f/0x70 [ 128.024040][ T8013] ? __fget_files+0x184/0x1c0 [ 128.024077][ T8013] __secure_computing+0x82/0x150 [ 128.024113][ T8013] syscall_trace_enter+0xcf/0x1e0 [ 128.024194][ T8013] do_syscall_64+0xac/0x200 [ 128.024235][ T8013] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 128.024262][ T8013] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 128.024283][ T8013] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.024416][ T8013] RIP: 0033:0x7f943173eec9 [ 128.024432][ T8013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.024451][ T8013] RSP: 002b:00007f94301a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012f [ 128.024508][ T8013] RAX: ffffffffffffffda RBX: 00007f9431995fa0 RCX: 00007f943173eec9 [ 128.024526][ T8013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 128.024542][ T8013] RBP: 00007f94301a7090 R08: 0000000000000000 R09: 0000000000000000 [ 128.024559][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.024576][ T8013] R13: 00007f9431996038 R14: 00007f9431995fa0 R15: 00007fff0e8db838 [ 128.024665][ T8013] [ 128.318855][ T29] kauditd_printk_skb: 27585 callbacks suppressed [ 128.318875][ T29] audit: type=1326 audit(1760604333.155:104857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8021 comm="syz.2.1772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7b127eec9 code=0x7ffc0000 [ 128.328407][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 128.355719][ T3042] audit: audit_lost=8378 audit_rate_limit=0 audit_backlog_limit=64 [ 128.355816][ T3042] audit: backlog limit exceeded [ 128.356742][ T3319] audit: audit_backlog=65 > audit_backlog_limit=64 [ 128.367896][ T8024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 128.369055][ T3319] audit: audit_lost=8379 audit_rate_limit=0 audit_backlog_limit=64 [ 128.375506][ T8024] audit: audit_lost=8380 audit_rate_limit=0 audit_backlog_limit=64 [ 128.382067][ T3319] audit: backlog limit exceeded [ 128.390061][ T8024] audit: backlog limit exceeded [ 128.450683][ T8029] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8029 comm=syz.3.1775 [ 128.521943][ T8032] netlink: 'syz.2.1776': attribute type 4 has an invalid length. [ 128.637979][ T8039] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1780'. [ 128.653098][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 128.659311][ T3596] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 128.665948][ T7967] FAULT_INJECTION: forcing a failure. [ 128.665948][ T7967] name failslab, interval 1, probability 0, space 0, times 0 [ 128.678804][ T7967] CPU: 0 UID: 0 PID: 7967 Comm: syz.0.1754 Not tainted syzkaller #0 PREEMPT(voluntary) [ 128.678836][ T7967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 128.678858][ T7967] Call Trace: [ 128.678866][ T7967] [ 128.678876][ T7967] __dump_stack+0x1d/0x30 [ 128.678909][ T7967] dump_stack_lvl+0xe8/0x140 [ 128.678965][ T7967] dump_stack+0x15/0x1b [ 128.678982][ T7967] should_fail_ex+0x265/0x280 [ 128.679016][ T7967] ? kobject_uevent_env+0x1c0/0x570 [ 128.679060][ T7967] should_failslab+0x8c/0xb0 [ 128.679098][ T7967] __kmalloc_cache_noprof+0x4c/0x4a0 [ 128.679140][ T7967] kobject_uevent_env+0x1c0/0x570 [ 128.679177][ T7967] ? device_pm_check_callbacks+0x683/0x6a0 [ 128.679228][ T7967] kobject_uevent+0x1d/0x30 [ 128.679260][ T7967] device_del+0x710/0x790 [ 128.679333][ T7967] rfkill_unregister+0x80/0x170 [ 128.679370][ T7967] hci_unregister_dev+0x26c/0x2b0 [ 128.679395][ T7967] hci_uart_tty_close+0x115/0x170 [ 128.679427][ T7967] ? __pfx_hci_uart_tty_close+0x10/0x10 [ 128.679491][ T7967] tty_ldisc_kill+0x8d/0x140 [ 128.679513][ T7967] tty_ldisc_hangup+0x2fa/0x370 [ 128.679540][ T7967] __tty_hangup+0x3c2/0x540 [ 128.679587][ T7967] tty_ioctl+0x601/0xb80 [ 128.679640][ T7967] ? __pfx_tty_ioctl+0x10/0x10 [ 128.679661][ T7967] __se_sys_ioctl+0xce/0x140 [ 128.679682][ T7967] __x64_sys_ioctl+0x43/0x50 [ 128.679706][ T7967] x64_sys_call+0x1816/0x3000 [ 128.679735][ T7967] do_syscall_64+0xd2/0x200 [ 128.679787][ T7967] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 128.679817][ T7967] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 128.679847][ T7967] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 128.679877][ T7967] RIP: 0033:0x7fc98afbeec9 [ 128.679949][ T7967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.679968][ T7967] RSP: 002b:00007fc989a1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 128.679987][ T7967] RAX: ffffffffffffffda RBX: 00007fc98b215fa0 RCX: 00007fc98afbeec9 [ 128.679999][ T7967] RDX: 0000000000000000 RSI: 0000000000005437 RDI: 0000000000000003 [ 128.680016][ T7967] RBP: 00007fc989a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 128.680032][ T7967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.680114][ T7967] R13: 00007fc98b216038 R14: 00007fc98b215fa0 R15: 00007ffc8df7c7a8 [ 128.680169][ T7967] [ 128.956161][ T8039] netlink: 'syz.1.1780': attribute type 13 has an invalid length. [ 128.991316][ T1719] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 20004 - 0 [ 129.000941][ T1719] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 20004 - 0 [ 129.013601][ T1719] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 20004 - 0 [ 129.025266][ T1719] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 20004 - 0 [ 129.131398][ T8048] FAULT_INJECTION: forcing a failure. [ 129.131398][ T8048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.144653][ T8048] CPU: 1 UID: 0 PID: 8048 Comm: syz.1.1782 Not tainted syzkaller #0 PREEMPT(voluntary) [ 129.144682][ T8048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 129.144696][ T8048] Call Trace: [ 129.144705][ T8048] [ 129.144715][ T8048] __dump_stack+0x1d/0x30 [ 129.144742][ T8048] dump_stack_lvl+0xe8/0x140 [ 129.144784][ T8048] dump_stack+0x15/0x1b [ 129.144802][ T8048] should_fail_ex+0x265/0x280 [ 129.144851][ T8048] should_fail+0xb/0x20 [ 129.144898][ T8048] should_fail_usercopy+0x1a/0x20 [ 129.144919][ T8048] copy_fpstate_to_sigframe+0x628/0x7d0 [ 129.145086][ T8048] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 129.145132][ T8048] ? kmem_cache_free+0xe4/0x3d0 [ 129.145164][ T8048] ? x86_task_fpu+0x36/0x60 [ 129.145191][ T8048] get_sigframe+0x34d/0x490 [ 129.145263][ T8048] ? get_signal+0xdc7/0xf70 [ 129.145293][ T8048] x64_setup_rt_frame+0xa8/0x580 [ 129.145385][ T8048] arch_do_signal_or_restart+0x23e/0x440 [ 129.145412][ T8048] irqentry_exit_to_user_mode+0x5b/0xa0 [ 129.145442][ T8048] irqentry_exit+0x12/0x50 [ 129.145461][ T8048] exc_general_protection+0x15b/0x1f0 [ 129.145554][ T8048] asm_exc_general_protection+0x26/0x30 [ 129.145579][ T8048] RIP: 0033:0x7fc59aeb78f9 [ 129.145597][ T8048] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 129.145621][ T8048] RSP: 002b:00007fc5999467c8 EFLAGS: 00010283 [ 129.145642][ T8048] RAX: 0000000000000999 RBX: 00007fc599946d30 RCX: 00007fc59b0f8120 [ 129.145693][ T8048] RDX: 9999999999999999 RSI: 00007fc59af61ca9 RDI: 9999999999999999 [ 129.145709][ T8048] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 129.145721][ T8048] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 129.145736][ T8048] R13: 00007fc599946eb0 R14: 9999999999999999 R15: 0000000000000000 [ 129.145759][ T8048] [ 129.544253][ T8052] ================================================================== [ 129.552742][ T8052] BUG: KCSAN: data-race in mas_state_walk / mas_wr_store_entry [ 129.560321][ T8052] [ 129.562665][ T8052] write to 0xffff88810477ba28 of 8 bytes by task 8051 on cpu 1: [ 129.570313][ T8052] mas_wr_store_entry+0x1192/0x26e0 [ 129.575550][ T8052] mas_store_prealloc+0x74d/0xa80 [ 129.580611][ T8052] commit_merge+0x6a5/0x730 [ 129.585145][ T8052] vma_expand+0x220/0x320 [ 129.589506][ T8052] vma_merge_new_range+0x296/0x310 [ 129.594663][ T8052] mmap_region+0xa50/0x1620 [ 129.599210][ T8052] do_mmap+0x9b3/0xbe0 [ 129.603333][ T8052] vm_mmap_pgoff+0x17a/0x2e0 [ 129.607979][ T8052] ksys_mmap_pgoff+0xc2/0x310 [ 129.612704][ T8052] x64_sys_call+0x14a3/0x3000 [ 129.617412][ T8052] do_syscall_64+0xd2/0x200 [ 129.622020][ T8052] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 129.627973][ T8052] [ 129.630332][ T8052] read to 0xffff88810477ba28 of 8 bytes by task 8052 on cpu 0: [ 129.637908][ T8052] mas_state_walk+0x2f5/0x650 [ 129.642624][ T8052] mas_walk+0x60/0x150 [ 129.646803][ T8052] lock_vma_under_rcu+0x95/0x170 [ 129.651774][ T8052] do_user_addr_fault+0x233/0x1080 [ 129.657000][ T8052] exc_page_fault+0x62/0xa0 [ 129.661532][ T8052] asm_exc_page_fault+0x26/0x30 [ 129.666423][ T8052] [ 129.668767][ T8052] value changed: 0x00007fc9899fefff -> 0x00007fc9899ddfff [ 129.675902][ T8052] [ 129.678253][ T8052] Reported by Kernel Concurrency Sanitizer on: [ 129.684425][ T8052] CPU: 0 UID: 0 PID: 8052 Comm: syz.0.1784 Not tainted syzkaller #0 PREEMPT(voluntary) [ 129.694269][ T8052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 129.704355][ T8052] ================================================================== [ 133.090443][ T29] kauditd_printk_skb: 32504 callbacks suppressed [ 133.090462][ T29] audit: type=1400 audit(1760604338.163:136171): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.098872][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.118193][ T29] audit: type=1400 audit(1760604338.163:136172): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.124619][ T3042] audit: audit_lost=8778 audit_rate_limit=0 audit_backlog_limit=64 [ 133.146034][ T29] audit: type=1400 audit(1760604338.163:136173): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.154016][ T3042] audit: backlog limit exceeded [ 133.154449][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.175358][ T29] audit: type=1400 audit(1760604338.163:136174): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.180355][ T3042] audit: audit_lost=8779 audit_rate_limit=0 audit_backlog_limit=64 [ 133.186851][ T29] audit: type=1400 audit(1760604338.163:136175): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.862625][ T29] kauditd_printk_skb: 45139 callbacks suppressed [ 137.862644][ T29] audit: type=1400 audit(1760604343.161:181314): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.870683][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 137.890674][ T29] audit: type=1400 audit(1760604343.171:181315): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.896804][ T3042] audit: audit_lost=8780 audit_rate_limit=0 audit_backlog_limit=64 [ 137.918112][ T29] audit: type=1400 audit(1760604343.171:181316): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.918140][ T29] audit: type=1400 audit(1760604343.171:181317): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.926042][ T3042] audit: backlog limit exceeded [ 137.926728][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 137.947410][ T29] audit: type=1400 audit(1760604343.171:181318): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.968887][ T3042] audit: audit_lost=8781 audit_rate_limit=0 audit_backlog_limit=64