last executing test programs: 1m59.375880533s ago: executing program 0 (id=226): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="160000000000000004003128883c13cbf8", @ANYBLOB="562e616963edf2dc4a7cdb9f98eb45cf5ead2ca1d94472a539d9870aa85960477a4ec1133461ec470c196e02d458d887ee963b6f070caa32542af7a56721569edc563e7153ba0f2caac6c4f9fbffa247eebdb56e1d614eb5fc7a331fe83f31e6cf51f22cd3fb190b514130c1b0732b6df0ee2db56c15ec62cb042180d5e1d68e62c675a087b6308c25dfa66813acb26558d622fc198f38357108f0a3dae747252837ffd51d05511e5d6ee7166322c46cd29a42cda8dc32b72723218c089387fdf5b7053d506eb93b0ca3c0cfe24363060ad8f83bcf7caea7a75d4841397a693ce0f0a7", @ANYRESDEC], 0x50) socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0x1000000000000}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000004000000000000000a20000000000a01040000000000000000010000000900010073797a3100000000e8010000030a01020000000000000000010000000900030073797a3200000000280004800800024000000000080001400000000514000300626174616476300000000000000000000900010073797a31000000000900010073797a3100000000340008800c00024000000000000080010c00024000000000000000040c00014000000000000000000c00014000000000000000014c000480080002404c82f47c080001400000000008000140000000010800014000000003080002404f32945f080001400000000308000140000000020800024019885f270800014000000003fd000c00a03ac330bf11a2145946e6d945deece8485ee69dbc29a8dd5dbce127f829a3adf5c4171b4bedbbc9b913a67b9ee679020f0200000064419faae0136b893d91d95b1174f115798a1abfdc06983fb83f2116a85a00dd35cdf9d8f81683e5e2ebcca132a712e0be44c12c02ac92fbbb86ed717ce0cbd6a0134f899e23ca6d2f063d26be86555cc0e9c7a25d77e6c0f4217794be96b5d797e3116d874c3adfb096e0567ec28bd1e4d8d6713109695f1f3a877d89d20e19304501aeb851d14c4f9b2d769d554fe5308810d19bb040c1977bce50b894f2c45a1f0e80c8256b6dcb072f9d91d94a67bba9f62eb2f192fa4b3786d9a774b99aa332dfbb000000080007006e6174"], 0x25c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) sync() bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18010000400100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002240)=""/4096) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$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") r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000adc000000060a0b040000000000000000020000000900010073797a30000000000900020073797a320000000005000740c5000000a8000480a40001800e000100696d6d656469617465"], 0x104}, 0x1, 0x0, 0x0, 0x4800}, 0x40804) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r8 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x100) preadv2(r8, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x100000}], 0x2, 0x0, 0x0, 0x0) 1m59.195877437s ago: executing program 0 (id=230): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000bc0)=@delchain={0x1fc, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xd}, {0x0, 0xffea}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_route={{0xa}, {0x1c4, 0x2, [@TCA_ROUTE4_ACT={0x1c0, 0x6, [@m_vlan={0x38, 0x6, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1b6}]}, {0x4}, {0xc}, {0xc}}}, @m_bpf={0x184, 0xa, 0x0, 0x0, {{0x8}, {0x6c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x1c, 0x4, [{0x3, 0x0, 0x1, 0x9}, {0x8, 0x6, 0x6, 0x6}, {0x2, 0xf2, 0xc, 0x465e}]}, @TCA_ACT_BPF_OPS={0x4c, 0x4, [{0xfff9, 0x7, 0x80, 0x8b0}, {0xfffd, 0x8, 0x1, 0x81}, {0x7, 0xb, 0x9, 0x2}, {0x2, 0x4, 0x5, 0x8}, {0x0, 0x3, 0x4, 0xb}, {0x99a5, 0x6, 0x1, 0x4}, {0x9f25, 0x0, 0x1a}, {0x3, 0x8, 0x7, 0x7ff}, {0x1, 0x10, 0x7, 0x7}]}]}, {0xf1, 0x6, "8eb55930760aaf0b59772c5971036fba8994239acc2d66a896c98c740ca7d203000000000000002a326cef7c8ba136d0bce7d5be2f44c0f7df2af8b58cd15301925bdef87ac2e982db6d48439b06b9d7e9e88cb4d0262a5d0900461c33b2f76470602416519436d7f6f3d3dec1bf02a5ce6e83f8664d689fd77f1519cfac04b8ebd7ea20e82977ee8d8e46d44e8f8c8485af903929b1f3288322548d9e6a92389a03899eaaba97faeef8863180bc96804713e41b3d6d0032dc6414d0626a176725767c2a42131583a64bf3c2e43f64d02f9be090aa44978db670068ac547d4aa7dfb2219f8c926b7d6925ec910"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x4004}, 0x20008885) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) migrate_pages(0x0, 0xfc, &(0x7f0000000200)=0x7ffffffffffffffd, &(0x7f0000000240)=0x1) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) (fail_nth: 11) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000001fc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000040), 0x2000, &(0x7f0000000880)={'trans=unix,', {[{@cache_readahead}, {@noextend}, {@debug={'debug', 0x3d, 0x4}}, {@access_user}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@dont_hash}, {@measure}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '/['}}, {@pcr={'pcr', 0x3d, 0x32}}]}}) 1m59.00296416s ago: executing program 0 (id=233): openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x2000414, &(0x7f0000000340)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000540)="$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") syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) io_setup(0x58, &(0x7f00000001c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) write(r2, 0x0, 0x0) socket$qrtr(0x2a, 0x2, 0x0) recvmmsg$unix(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x180, 0x0) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 1m58.673258337s ago: executing program 0 (id=239): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000004c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@grpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x92) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x2, 0x0, 0x7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000001000030529bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="09840000000000003c0012800b00010062726964676500002c000280060027000300000006"], 0x64}}, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000080), 0x76, 0x0) poll(&(0x7f0000000080)=[{r5, 0x20}], 0x1, 0x1d) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r6, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x9737, 0x9}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r8 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(r8, &(0x7f0000000780)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000300)=""/53, 0x35, 0x0, 0x0, 0x0, 0x7fd}}, 0x120) write$UHID_DESTROY(r8, &(0x7f0000000080), 0x4) cachestat(r7, &(0x7f0000000140)={0x1, 0x7fc001}, &(0x7f0000000100), 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x5, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, r0, 0x2) syz_clone3(&(0x7f0000000680)={0x40004000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000001c0)=0x81) 1m57.740246255s ago: executing program 0 (id=251): rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() r1 = gettid() r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_int(r2, 0x29, 0x35, 0x0, 0x0) tkill(r0, 0x12) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/softnet_stat\x00') ftruncate(r5, 0x8000000000) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r8 = memfd_secret(0x0) futimesat(r8, 0x0, 0x0) tkill(r1, 0x14) 1m57.420343711s ago: executing program 0 (id=256): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x98142, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x4190, 0xaea}, 0x4105, 0x2e, 0x6, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40000000000a9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464617673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x2d, 0x2, 0x0) 1m57.397828622s ago: executing program 32 (id=256): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x98142, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x4190, 0xaea}, 0x4105, 0x2e, 0x6, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40000000000a9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464617673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x2d, 0x2, 0x0) 5.629888679s ago: executing program 4 (id=2005): bpf$MAP_CREATE(0x0, 0x0, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x4000006, 0x1, "42341f9b1000007e4f00"}) r2 = syz_open_pts(r1, 0x103100) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') epoll_create(0x4) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x101, 0xbf1, 0x1ff, 0x1000, 0x5, "ce5fdc00f7507fbf31b6b0fac913048ff7affd"}) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x0) 4.769877096s ago: executing program 4 (id=2014): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xffff7ffffffffffd}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x50441, 0x14a) fallocate(r2, 0x20, 0x0, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r3 = socket(0x2a, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c00000013000100"/18, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="1400350064756d6d7930"], 0x3c}}, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 4.641412818s ago: executing program 4 (id=2018): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rpc\x00') fchdir(r1) exit(0xffff) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) 3.776596535s ago: executing program 4 (id=2024): r0 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat$incfs(r1, &(0x7f00000001c0)='.log\x00', 0x46220, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r2, &(0x7f00000004c0)={&(0x7f0000000280)=@l2tp6={0xa, 0x0, 0x8, @mcast1, 0x4}, 0x80, &(0x7f0000000140)=[{0x0}, {&(0x7f00000000c0)="3eedac41ce31f8ee69f8283610b3612cdd7d355691de", 0x16}, {&(0x7f0000000240)="08f9c814738a2322d8e252576fe7a902121473d02458d511c17b2618950300c5f864824b8ab4ec3c13d5604d75f8848c960d205ac96047", 0x37}], 0x3}, 0x4040000) ioctl$sock_SIOCSIFBR(r2, 0x8941, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x21c91c, &(0x7f0000000900)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@noblock_validity}, {@mblk_io_submit}, {@jqfmt_vfsold}, {@nodelalloc}, {@nomblk_io_submit}, {@usrjquota}, {@minixdf}, {@resgid, 0x32}]}, 0x1e, 0x4ea, &(0x7f0000000ec0)="$eJzs3VFrW9cdAPD/la3MSZzZYXvIAsvCkmGHLZIdL4nZQ7bB2J4C27L3zLNlYyxbxpKT2ITNYR9gMMY22NOe9jLoByiUfIRSCLTvpS0tpU3ah0LbqOhKShxHip1GllLr94MjnXt0r/7nXKGje+49XAXQt05HxJmIeFitVs9FxEijPNNIsVVPtfUe3L89W0tJVKvXPkoiknpZbbXxbe95tLHZUET8/jcRf0qejlve2FyaKRYLa43lfGV5NV/e2Dy/uDyzUFgorExNTV6avjx9cXqiI+0cjogrv3rvn3/736+vvPaTm29f/2D8z0mjPOJxOzqt3vRsui+aBiNibT+C9chg2kIAAL4Jmsf5P4yIczESA+nRHAAAAHCQVH8+HF8kEVUAAADgwMqkc2CTTK4xD2A4Mplcrj6H97txJFMslSs/ni+tr8zV58qORjYzv1gsTDTmCo9GNqktT6b5x8sXdixPRcTxiPjHyOF0OTdbKs71+uQHAAAA9ImjO8b/n47Ux//bfN6zygEAAACdM9rrCgAAAAD7zvgfAAAADj7jfwAAADjQfnv1ai1Vm/9/PXdjY32pdOP8XKG8lFten83NltZWcwul0kJ6z77l3d6vWCqt/jRW1m/lK4VyJV/e2Ly+XFpfqVxffOIvsAEAAIAuOv6Du28lEbH1s8NpqjnU60oBXTH4PCu/u3/1ALpvoNcVAHrmuX7/gQMl2+sKAD2X7PJ628k7r3e+LgAAwP4Y+17r6/8Du54b2Mp0qYrAPnH+D/qX6//Qv1z/h/6VjYEwkIf+ttstQIfajRX2fP2/Wn3uSgEAAB01nKYkk4tIzwMMRyaTy0UcS8cE2WR+sViYiIhvR8SbI9lv1ZYn0y2TXecMAwAAAAAAAAAAAAAAAAAAAAAAAAB11WoSVQAAAOBAi8i8n6R3848YGzk7vPP8wKHks5H0OSJu/ufav27NVCprk7Xyjx+VV/7dKL/QizMYAAAAwE7NcXpzHA8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnfTg/u3ZZupm3A9/GRGjreIPxlD6PBTZiDjySRKD27ZLImKgA/G37kTEiVbxk1q1YrRRi1bxD/c4/tEOxId+drfW//yi1fcvE6fT59bfv0tpD/Xi2vd/mUf930CL+LWyY3uMcfLeK/m28e9EnBxs3f804ydt+p8ze4z/xz9sbrZ7rfrfiLGWvz/JE7HyleXVfHlj8/zi8sxCYaGwMjU1eWn68vTF6Yn8/GKx0HhsGePv33/14bPaf6RN/NFd2n92j+3/8t6t+9+pZ7OPNk8exx8/0/rzP9Emfqbx+f+oka+9PtbMb9Xz2536/xunntX+uTbt3+3zH99j+8/97q/v7HFVAKALyhubSzPFYmGtrzMvtDdqh0UvRStezkxtv379zYf2tYZ/2V6SdObrUDsyfzn2/ItletotAQAA++DpMTAAAAAAAAAAAAAAAAAAAADQbd24nVh2R8yt9LETd88HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOicrwIAAP///B/QPg==") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xb, &(0x7f0000000300)=@framed={{}, [@printk={@lu, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb7}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) r3 = socket$packet(0x11, 0x3, 0x300) bind$packet(r3, &(0x7f0000000200)={0x11, 0xf6, 0x0, 0x1, 0x55, 0x6, @multicast}, 0x14) r4 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000480), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007000000000000000000850000000700000045000000a000020095"], &(0x7f0000000380)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r5}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e000000000020000100050000000000000000000300000008000000f30000007f00000004"], 0x58) close(0xffffffffffffffff) sendmsg$tipc(r4, &(0x7f0000000200)={&(0x7f00000003c0)=@nameseq={0x1e, 0x1, 0x2, {0x1, 0x1, 0x4}}, 0x10, 0x0}, 0x4000001) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r7, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r7, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r7, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x6, 0x1, "42341f9b1000007e4f00"}) r8 = syz_open_pts(r7, 0x40000) dup3(r8, r7, 0x0) splice(r7, 0x0, r6, 0x0, 0x7ffff000, 0x0) 2.098983468s ago: executing program 3 (id=2043): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rpc\x00') fchdir(r2) exit(0xffff) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) 1.956910811s ago: executing program 2 (id=2046): bpf$MAP_CREATE(0x0, 0x0, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x4000006, 0x1, "42341f9b1000007e4f00"}) r2 = syz_open_pts(r1, 0x103100) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x101, 0xbf1, 0x1ff, 0x1000, 0x5, "ce5fdc00f7507fbf31b6b0fac913048ff7affd"}) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x0) 1.927149751s ago: executing program 1 (id=2047): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 1.870830573s ago: executing program 1 (id=2048): socket$nl_netfilter(0x10, 0x3, 0xc) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000080)="75a101010100188d9233a34871d6000000000003c1d6fe173ee8ed471cb5", 0x1e, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000440)=""/117, 0x75) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x3938700}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r3 = open(&(0x7f0000000180)='./bus\x00', 0x1c3bc2, 0x1c0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000008c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r4, 0x1, r3, 0x7, 0x80000}) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r5, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x12, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x9]}, 0x8, 0x80800) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1c, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)="fae0ca88958915f21bfa9c260bf76b5eab1fb020e6ac1d82f8e972ba7dec2521dddb7f11b790454a471c7dc41790261e98cc39cb7bb1e640b22c9da745c71988e334aed33983e65dc7c151b9730d4757db92c7c72db9bf02cf8e49dfdc160f5714a0e9b117c13a935f1ce5f9f6e191eb3ec7555e99e506422c03022d972461fefee9392f132fc43416e915a394366067de4a8a1f", 0x94, 0x1b46865ac35f676d, 0x1}) epoll_create(0x1) r6 = open(&(0x7f0000000280)='./file0\x00', 0x60842, 0x45) syz_io_uring_setup(0x891, &(0x7f0000000140)={0x0, 0x7a10, 0x80, 0x5, 0x323, 0x0, r6}, &(0x7f0000000000)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0xc, 0x0, r6, 0x0, 0x0, 0x0, 0x8000}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000700)='kfree\x00', r9}, 0x18) 1.243160545s ago: executing program 5 (id=2050): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg', 0x3) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e21, @dev}, 0x10) close(r0) 1.242521055s ago: executing program 5 (id=2051): getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) r0 = syz_open_dev$hiddev(0x0, 0x8, 0x80002) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x21c91c, &(0x7f0000000900)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000}}, {@noblock_validity}, {@mblk_io_submit}, {@jqfmt_vfsold}, {@nodelalloc}, {@nomblk_io_submit}, {@usrjquota}, {@minixdf}, {@resgid, 0x32}]}, 0x1e, 0x4ea, &(0x7f00000009c0)="$eJzs3VFrW9cdAPD/la3MSZzZYXvIAsvCkmGHLZIdL4nZQ7bB2J4C27L3zLNlYyxbxpKT2ITNYR9gMMY22NOe9jLoByiUfIRSCLTvpS0tpU3ah0LbqOhKShxHip1GllLr94MjnXt0r/7nXKGje+49XAXQt05HxJmIeFitVs9FxEijPNNIsVVPtfUe3L89W0tJVKvXPkoiknpZbbXxbe95tLHZUET8/jcRf0qejlve2FyaKRYLa43lfGV5NV/e2Dy/uDyzUFgorExNTV6avjx9cXqiI+0cjogrv3rvn3/736+vvPaTm29f/2D8z0mjPOJxOzqt3vRsui+aBiNibT+C9chg2kIAAL4Jmsf5P4yIczESA+nRHAAAAHCQVH8+HF8kEVUAAADgwMqkc2CTTK4xD2A4Mplcrj6H97txJFMslSs/ni+tr8zV58qORjYzv1gsTDTmCo9GNqktT6b5x8sXdixPRcTxiPjHyOF0OTdbKs71+uQHAAAA9ImjO8b/n47Ux//bfN6zygEAAACdM9rrCgAAAAD7zvgfAAAADj7jfwAAADjQfnv1ai1Vm/9/PXdjY32pdOP8XKG8lFten83NltZWcwul0kJ6z77l3d6vWCqt/jRW1m/lK4VyJV/e2Ly+XFpfqVxffOIvsAEAAIAuOv6Du28lEbH1s8NpqjnU60oBXTH4PCu/u3/1ALpvoNcVAHrmuX7/gQMl2+sKAD2X7PJ628k7r3e+LgAAwP4Y+17r6/8Du54b2Mp0qYrAPnH+D/qX6//Qv1z/h/6VjYEwkIf+ttstQIfajRX2fP2/Wn3uSgEAAB01nKYkk4tIzwMMRyaTy0UcS8cE2WR+sViYiIhvR8SbI9lv1ZYn0y2TXecMAwAAAAAAAAAAAAAAAAAAAAAAAAB11WoSVQAAAOBAi8i8n6R3848YGzk7vPP8wKHks5H0OSJu/ufav27NVCprk7Xyjx+VV/7dKL/QizMYAAAAwE7NcXpzHA8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnfTg/u3ZZupm3A9/GRGjreIPxlD6PBTZiDjySRKD27ZLImKgA/G37kTEiVbxk1q1YrRRi1bxD/c4/tEOxId+drfW//yi1fcvE6fT59bfv0tpD/Xi2vd/mUf930CL+LWyY3uMcfLeK/m28e9EnBxs3f804ydt+p8ze4z/xz9sbrZ7rfrfiLGWvz/JE7HyleXVfHlj8/zi8sxCYaGwMjU1eWn68vTF6Yn8/GKx0HhsGePv33/14bPaf6RN/NFd2n92j+3/8t6t+9+pZ7OPNk8exx8/0/rzP9Emfqbx+f+oka+9PtbMb9Xz2536/xunntX+uTbt3+3zH99j+8/97q/v7HFVAKALyhubSzPFYmGtrzMvtDdqh0UvRStezkxtv379zYf2tYZ/2V6SdObrUDsyfzn2/ItletotAQAA++DpMTAAAAAAAAAAAAAAAAAAAADQbd24nVh2R8yt9LETd88HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOicrwIAAP///B/QPg==") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x5c, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x5c}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x7a}]}]}, 0x5c}}, 0x4000003) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) r2 = io_uring_setup(0xd4d, &(0x7f0000001500)={0x0, 0xdb60, 0x40, 0x3, 0x211}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r2, 0xb, &(0x7f0000000480)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x11}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) quotactl_fd$Q_SYNC(r1, 0xffffffff80000100, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fcntl$getown(r0, 0x9) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) syz_emit_ethernet(0x62, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}, @void, {@ipv4={0x800, @icmp={{0xc, 0x4, 0x2, 0x0, 0x54, 0x65, 0x0, 0x81, 0x1, 0x0, @private=0xa010101, @remote, {[@noop, @timestamp={0x44, 0x14, 0x5d, 0x0, 0x0, [0x9, 0xffffffff, 0x10001, 0xfffffffc]}, @lsrr={0x83, 0x7, 0xec, [@broadcast]}]}}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x1, 0x0, 0x9, 0x65, 0x75, 0x11, 0x88, 0xe, @broadcast, @private=0xa010101}, "3b7e1ea7655955c2"}}}}}, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000080)) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6002, &(0x7f0000000000)=0x3, 0xf, 0x0) 1.240283495s ago: executing program 3 (id=2052): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="160000000000000004003128883c13cbf8", @ANYBLOB="562e616963edf2dc4a7cdb9f98eb45cf5ead2ca1d94472a539d9870aa85960477a4ec1133461ec470c196e02d458d887ee963b6f070caa32542af7a56721569edc563e7153ba0f2caac6c4f9fbffa247eebdb56e1d614eb5fc7a331fe83f31e6cf51f22cd3fb190b514130c1b0732b6df0ee2db56c15ec62cb042180d5e1d68e62c675a087b6308c25dfa66813acb26558d622fc198f38357108f0a3dae747252837ffd51d05511e5d6ee7166322c46cd29a42cda8dc32b72723218c089387fdf5b7053d506eb93b0ca3c0cfe24363060ad8f83bcf7caea7a75d4841397a693ce0f0a7", @ANYRESDEC], 0x50) socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18090000002300810000000000000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0x1000000000000}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000004000000000000000a20000000000a01040000000000000000010000000900010073797a3100000000e8010000030a01020000000000000000010000000900030073797a3200000000280004800800024000000000080001400000000514000300626174616476300000000000000000000900010073797a31000000000900010073797a3100000000340008800c00024000000000000080010c00024000000000000000040c00014000000000000000000c00014000000000000000014c000480080002404c82f47c080001400000000008000140000000010800014000000003080002404f32945f080001400000000308000140000000020800024019885f270800014000000003fd000c00a03ac330bf11a2145946e6d945deece8485ee69dbc29a8dd5dbce127f829a3adf5c4171b4bedbbc9b913a67b9ee679020f0200000064419faae0136b893d91d95b1174f115798a1abfdc06983fb83f2116a85a00dd35cdf9d8f81683e5e2ebcca132a712e0be44c12c02ac92fbbb86ed717ce0cbd6a0134f899e23ca6d"], 0x25c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) sync() bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18010000400100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002240)=""/4096) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$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") r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000adc000000060a0b040000000000000000020000000900010073797a30000000000900020073797a320000000005000740c5000000a8000480a40001800e000100696d6d656469617465"], 0x104}, 0x1, 0x0, 0x0, 0x4800}, 0x40804) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r9 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x100) preadv2(r9, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x100000}], 0x2, 0x0, 0x0, 0x0) 1.160348757s ago: executing program 5 (id=2053): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xff, 0x82, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x200000000000, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.151567087s ago: executing program 3 (id=2054): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES32=r3, @ANYBLOB="00000000000000627603fae400b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704006b000b000085000000485fa6ba0e5bb90d74427ab9fac3e296ac4463b991923f65a0ebbb03b757f6dc91dd1d33f6ddb1aec8d744ab8b8bdc5babedfbf251a4702838ef7282cd8698addc30925ff1fa9f274b96b7aecdaddae0414cd386959eedcf", @ANYBLOB="180000000000000000b2c9fccec3184618c2adef", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) unshare(0x2c020400) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2000, 0x0) msgrcv(r5, &(0x7f0000001080)={0x0, ""/1}, 0x2000, 0x2, 0x3000) 1.125594817s ago: executing program 3 (id=2055): ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000a00)={'syztnl1\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x2, 0xd7, 0x8c, 0x1ff, 0x61, @local, @mcast2, 0x40, 0x1, 0xfffffff9, 0x80000003}}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100"], 0x57) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0x8, &(0x7f0000000000)={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x0) getrlimit(0x5, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$MRT_INIT(r2, 0x0, 0xc8, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='sched_switch\x00', r1, 0x0, 0x2}, 0x18) r3 = creat(&(0x7f00000009c0)='./file0/file0\x00', 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0c0100001000130428bd700000000000e0000001000000000000000000000000000000000000000000000000000000014e2100004e2400000200202000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc020000000000000000000000000001000000003c0000000a0101000000000000000000000000000400000000000000060000000000000002000000000000000400000000004000ffffffffffffffff03000000000000007f00000000000000000000000000000000000000000000000800150000000000cc000000000000000000000000000000f600000000000000000000002abd7000000000000200010500000000000000001c00040002004e2100270000fe880000000000000000000000000101"], 0x10c}}, 0x804) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x60, 0x0, 0x8, 0x301, 0x0, 0x0, {0x0, 0x0, 0x6}, [@CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x384}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xde1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4254}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88b5}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @tcp}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xc}]}, 0x60}}, 0x8000) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[], 0x20) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r6, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a40)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x2, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7, 0x0, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x500, &(0x7f0000000380)={[{@errors_remount}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@jqfmt_vfsv1}, {@abort}, {@data_err_ignore}]}, 0x1, 0x476, &(0x7f0000000540)="$eJzs3M1vFOUfAPDvzLblx2v7Q3wBUavE2PjS0oLKwYtGEw8YTfSAN2tbCKFQQ2sihEg1Bi8mhkTP6tHEv8CbF6OeTLzq3ZAQ5QJ6qpnZmbK7dLctLLuF/XySoc8z88w+z7czz84z80wJoGcNZ/8kEdsi4veIGKxm6wsMR/RHxLUr56b+uXJuKomlpTf/SvJyV6+cmyqLlvttLTIjaUT6SVJUUm/+zNkTk7OzM6eL/NjCyffG5s+cfeb4ycljM8dmTk0cOnTwwPjzz00825Y4s7iu7vlwbu/uV9+++NrUkYvv/vxd1t5txfbaOBpsavi5ZsNZ4H8v5ZZXptUfj687go1te0066etiQ1iXSkRkh6s/7/+DUYnrB28wXvm4q40Dbqvs2tTiwra4BNzFkuh2C4DuKC/02f1vuXRo6LEhXH6xegOUxX2tWKpb+spb9fzeaPttqn84Io4s/vtVtkTr5xAAAG3x2dSXh+PplcZ/adxXU25HMYcyFBH/j4idEXFPROyKiHsj8rL3R8QDq1eZ1mYap4ZuHP+kl246uDXIxn8vFHNb9eO/5WYOVYrc9jz+/uTo8dmZ/cXvZCT6N2X58RZ1/PDyb58321Y7/suWrP5yLFi041JfwwO66cmFyXxQ2gaXP4rY07dS/MnyTEASEbsjYs/6PnpHmTj+5Ld7mxVaPf4W2jDPtPRNxBPV478YDfGXktbzk2P/i9mZ/WPlWXGjX3698Eaz+m8p/jbIjv+W+vO/schQUjtfO7/+Oi788WnTe5qbPf8HkrfyfQeKdR9MLiycHo8YSA7n+br1E9f3LfNl+Sz+kX0r9/+dxT5Z/A9GRHYSPxQRD0fEI0XbH42IxyJiX4v4f3qp+bb6+Ddv68bxn274/tucb1k+/xuO//oTlRM/fr9y7V+/s7bjfzBPjRRr8u+/Vay1gbf46wMAAIA7Qpq/A5+ko8vpNB0drb7Dvyu2pLNz8wtPHZ17/9R09V35oehPyyddgzXPQ8eTxeITq/mJ4llxuf1A8dz4i8rmPD86NTc73eXYoddtbdL/M39Wut064LZbaR5tYqALDQE6rrH/p/XZ8693sjFARzV9j2ZLZ9sBdN4q79GlnWoH0Hn+vxboXSv1//MNeXMBcHdy/Yfepf9D79L/oXfp/9CTVvsj+cot/u2/xB2XSNZWONLuN3VjJPojoi0fOLAhwikS3f5mAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaI//AgAA//8Ee+oW") r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x18) r9 = syz_io_uring_setup(0x3b52, &(0x7f0000000140)={0x0, 0x5883, 0x1000, 0x8003, 0x1c2}, &(0x7f0000000040)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r10, r11, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1}) io_uring_enter(r9, 0x10007b0f, 0x96f0, 0x20, 0x0, 0x0) 1.105079348s ago: executing program 5 (id=2056): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa44000008", @ANYRES32=r4, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 1.091756578s ago: executing program 2 (id=2057): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00000100ffff008000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x8, &(0x7f0000000400)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'tunl0\x00', &(0x7f00000008c0)={'syztnl2\x00', 0x0, 0x1, 0x17, 0x80, 0x3ff, {{0x20, 0x4, 0x3, 0x23, 0x80, 0x65, 0x0, 0x1, 0x0, 0x0, @multicast2, @empty, {[@end, @cipso={0x86, 0x55, 0xffffffffffffffff, [{0x6, 0x12, "6504191a17051e35db377f6075359cfa"}, {0x2, 0xa, "b340e44ee3e4cc4b"}, {0x7, 0x10, "091fc1cca8856f2a7656ec0ed253"}, {0x5, 0xc, "4a51173c70e5e1047590"}, {0x2, 0x9, "669e6fea6c08b5"}, {0x2, 0xe, "6a6d36eff248fb1c5f905992"}]}, @timestamp={0x44, 0x10, 0xab, 0x0, 0xd, [0x3, 0x2, 0x22cc]}, @ra={0x94, 0x4}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r4, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000a40)={&(0x7f0000000c40)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r1, @ANYBLOB="20002bbd7000ffdbdf250200000024000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="0c00018008000300060000002c00018014000200487372300000000000000000000000001400020076657468315f766c616e000000000000380001800800140002006970766c616e3200000000000000000008000300014f000008000100972fb031d950ac1dc77a5b0b1592bfb6917c7908ce", @ANYRES32=r4, @ANYBLOB="0800030003000000"], 0xa8}, 0x1, 0x0, 0x0, 0x4048000}, 0x89abc5999ee30133) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0xb, 0x100005, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000ac0)='virt_wifi0\x00') r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0600000004000000080000000a00000000000000", @ANYRES32], 0x50) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f00000005c0), 0x10) recvmmsg(r9, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/252, 0xfc}, {0x0}], 0x2}, 0x2}], 0x1, 0x10002, 0x0) sendmsg$can_bcm(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="050000007f0000000000010000000000", @ANYRES64=0x0, @ANYRES64=0x2710], 0x48}}, 0x0) ioctl$SIOCGSTAMPNS(r9, 0x8907, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000b80)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, 0x23, 0x4, 0x8, 0x6, 0x1, 0x9, 0x3}, 0x9c) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1, &(0x7f00000025c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x200000b, 0x204031, 0xffffffffffffffff, 0xffffb000) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000400)={0x53, 0xfffffffffffffffd, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)='\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0}) write$tun(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xa2) 1.009425039s ago: executing program 1 (id=2058): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 987.35839ms ago: executing program 5 (id=2059): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0500"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r1}, &(0x7f00000006c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xff}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) creat(&(0x7f00000000c0)='./bus\x00', 0xcb) 930.112841ms ago: executing program 2 (id=2060): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6002, &(0x7f0000000000)=0x3, 0xf, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r1, 0x0, 0x2}, 0x61) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000", @ANYRES32=0x1], 0x50) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000080)='_', 0x1}], 0x11}, 0x64) setsockopt$sock_attach_bpf(r3, 0x84, 0x1e, 0x0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8936, &(0x7f0000000000)={r4}) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x403f, 0x0, 0x0) r5 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$selinux_validatetrans(r5, 0x0, 0xa) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) r8 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_usb_connect$uac1(0x3, 0x71, 0x0, 0x0) close_range(r8, 0xffffffffffffffff, 0x200000000000000) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r9, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xf0, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x5a}, @void, @void}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x50d789ab}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xca2}, @NL80211_ATTR_VENDOR_DATA={0xc1, 0xc5, "86a82d98304681a6524408030029f3d2516177c1e4a5acd57bbe461004b91229002e1fbee9215e73f4d4f268fa3cc992cd802e998a22288bfc99acf7249d7f4dbc1dae3e1acd15dbf2c236e7e7a31b1f83947fec33ba148c9221b33ac135e12ae1ced1c7c1d8bccf6028d4ccc5b84a53e934240ef63f5d2fc8c0e94c3a893e213246ae451f96176a5b4b3a06c4d729ead754c390082de0c71d1639c25c1da0ba0d0ff4e83e9a45e31999b30f613b4ce462d7cd8d13f1ac00f8efa8a7b2"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x200000c0}, 0x24008045) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close_range(0xffffffffffffffff, r10, 0x2) r11 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x531, &(0x7f0000000640)="$eJzs3cFvI1cZAPBvnDib7GabFDhApZZCi7IVrJ00tI04lCIhOFVClPsSEieK4sRR7LSbqILsX4CEECBxggsXJP4AJLQSF44IqRKcQSoCIdiCBAfoINvjJDjjxFuceNf5/aTZeW/GM9/3vHnjGc/TOIAr69mIeC0i3k/T9IWImMmWF7IpDttT83XvPXh7pTklkaZv/DWJJFvW2VeSzW9km01GxFe/HPGN5HTc+v7B5nK1WtnN6uXG1k65vn9we2Nreb2yXtleXFx4eemVpZeW5gfSzpsR8eoX//i9b//kS6/+4jNv/eHOn299s5nWdLb+ZDse0vhZK9tNL16b7Npg9wMGexQ121PsVKb62+beBeYDAEBvzXP8D0XEJyPihZiJsbNPZwEAAIDHUPr56fh3EpHmm+ixHAAAAHiMFFpjYJNCKRsLMB2FQqnUHsP7kbheqNbqjU+v1fa2V9tjZWejWFjbqFbms7HCs1FMmvWFVvm4/mJXfTEinoyI785MteqllVp1ddhffgAAAMAVcaPr+v8fM+3rfwAAAGDEzA47AQAAAODCuf4HAACA0ef6HwAAAEbaV15/vTmlnd+/Xn1zf2+z9ubt1Up9s7S1t1Jaqe3ulNZrtfXWM/u2zttftVbb+Wxs790tNyr1Rrm+f3Bnq7a33bizEZOX0iAAAADglCc/fv93SUQcfm6qNTVNDDsp4FKMH5WSbJ7T+3//RHv+7iUlBVyKsT5e8+61/OXOE+DxNt69oEdfB0ZPcdgJAEOXnLO+5+CdX2fzTww2HwAAYPDmPpZ///+864GIw8IlpAdcIJ0Yrq6u+//pzLASAS5d6/5/vwN5nCzASCn2NQIQGGX/9/3/c6XpQyUEAAAM3HRrSgql7Ou96SgUSqWIm62fBSgmaxvVynxEPBERv50pXmvWF1pbJn2MEQAAAAAAAAAAAAAAAAAAAAAAAAAAovVU7iRSAAAAYKRFFP6U/LL9LP+5meenu78fmEj+1fpJ4ImIeOuHb3z/7nKjsbvQXP63o+WNH2TLXxzGNxgAAABAt851emv+z2FnAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCoee/B2yudqY+XTw0q7l++EBGzefHHY7I1n4xiRFz/exLjJ7ZLImJsAPEP70XER/PiJ820jkLmxR/Em3BO/JjN3oW8+DcGEB+usvvN489ref2vEM+25vn9bzzif+ofVO/jXxwd/8Z69P+bfcZ46p2flXvGvxfx1Hj+8acTP+kR/7k+43/9awcHvdalP4qY63z+tI54JyMcl8qNrZ1yff/g9sbW8nplvbK9uLjw8tIrSy8tzZfXNqqV7N/cGN95+ufvn9X+67mff0mWTe/2P5+zv7zPpP+8c/fBhzuVw9Pxbz2XE/9XP85ecTp+IYvzqazcXD/XKR+2yyc989PfPHNW+1eP2198mP//W7122u1UR3m63z8dAOAC1PcPNper1cruyBaaV+mPQBoKj2DhWwPdYZqmabNP5ay6HxH97CeJAbe0kJ/PcaHnEWDYRyYAAGDQjk/6h50JAAAAAAAAAAAAAAAAAAAAXF2X8ZS17pjHj0BOBvEIbQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAgfhvAAAA//89e9P5") sendmsg$key(r11, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) 896.579731ms ago: executing program 1 (id=2061): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6002, &(0x7f0000000000)=0x3, 0xf, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r1, 0x0, 0x2}, 0x61) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000"], 0x50) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000080)='_', 0x1}], 0x11}, 0x64) setsockopt$sock_attach_bpf(r3, 0x84, 0x1e, &(0x7f0000000240), 0x4) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8936, &(0x7f0000000000)={r4}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) r6 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_usb_connect$uac1(0x3, 0x71, 0x0, 0x0) close_range(r6, 0xffffffffffffffff, 0x200000000000000) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r7, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xf0, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x5a}, @void, @void}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x50d789ab}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xca2}, @NL80211_ATTR_VENDOR_DATA={0xc1, 0xc5, "86a82d98304681a6524408030029f3d2516177c1e4a5acd57bbe461004b91229002e1fbee9215e73f4d4f268fa3cc992cd802e998a22288bfc99acf7249d7f4dbc1dae3e1acd15dbf2c236e7e7a31b1f83947fec33ba148c9221b33ac135e12ae1ced1c7c1d8bccf6028d4ccc5b84a53e934240ef63f5d2fc8c0e94c3a893e213246ae451f96176a5b4b3a06c4d729ead754c390082de0c71d1639c25c1da0ba0d0ff4e83e9a45e31999b30f613b4ce462d7cd8d13f1ac00f8efa8a7b2"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x200000c0}, 0x24008045) r8 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x531, &(0x7f0000000640)="$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") sendmsg$key(r8, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) 878.335382ms ago: executing program 3 (id=2062): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rpc\x00') fchdir(r2) exit(0xffff) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) 757.610694ms ago: executing program 4 (id=2063): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6002, &(0x7f0000000000)=0x3, 0xf, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r1, 0x0, 0x2}, 0x61) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000", @ANYRES32=0x1], 0x50) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000080)='_', 0x1}], 0x11}, 0x64) setsockopt$sock_attach_bpf(r3, 0x84, 0x1e, &(0x7f0000000240), 0x4) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8936, &(0x7f0000000000)={r4}) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x403f, 0x0, 0x0) r5 = openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$selinux_validatetrans(r5, 0x0, 0xa) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) r8 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_usb_connect$uac1(0x3, 0x71, 0x0, 0x0) close_range(r8, 0xffffffffffffffff, 0x200000000000000) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r9, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xf0, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x5a}, @void, @void}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x50d789ab}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xca2}, @NL80211_ATTR_VENDOR_DATA={0xc1, 0xc5, "86a82d98304681a6524408030029f3d2516177c1e4a5acd57bbe461004b91229002e1fbee9215e73f4d4f268fa3cc992cd802e998a22288bfc99acf7249d7f4dbc1dae3e1acd15dbf2c236e7e7a31b1f83947fec33ba148c9221b33ac135e12ae1ced1c7c1d8bccf6028d4ccc5b84a53e934240ef63f5d2fc8c0e94c3a893e213246ae451f96176a5b4b3a06c4d729ead754c390082de0c71d1639c25c1da0ba0d0ff4e83e9a45e31999b30f613b4ce462d7cd8d13f1ac00f8efa8a7b2"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x200000c0}, 0x24008045) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close_range(0xffffffffffffffff, r10, 0x2) r11 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x531, &(0x7f0000000640)="$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") sendmsg$key(r11, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) 396.103831ms ago: executing program 2 (id=2064): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="160000000000000004003128883c13cbf8", @ANYBLOB="562e616963edf2dc4a7cdb9f98eb45cf5ead2ca1d94472a539d9870aa85960477a4ec1133461ec470c196e02d458d887ee963b6f070caa32542af7a56721569edc563e7153ba0f2caac6c4f9fbffa247eebdb56e1d614eb5fc7a331fe83f31e6cf51f22cd3fb190b514130c1b0732b6df0ee2db56c15ec62cb042180d5e1d68e62c675a087b6308c25dfa66813acb26558d622fc198f38357108f0a3dae747252837ffd51d05511e5d6ee7166322c46cd29a42cda8dc32b72723218c089387fdf5b7053d506eb93b0ca3c0cfe24363060ad8f83bcf7caea7a75d4841397a693ce0f0a7", @ANYRESDEC], 0x50) socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18090000002300810000000000000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0x1000000000000}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x25c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) sync() bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18010000400100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000002240)=""/4096) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$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") r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000adc000000060a0b040000000000000000020000000900010073797a30000000000900020073797a320000000005000740c5000000a8000480a40001800e000100696d6d656469617465"], 0x104}, 0x1, 0x0, 0x0, 0x4800}, 0x40804) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r9 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x100) preadv2(r9, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x100000}], 0x2, 0x0, 0x0, 0x0) 323.747963ms ago: executing program 1 (id=2065): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg', 0x3) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x9) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e21, @dev}, 0x10) close(r0) 311.133183ms ago: executing program 1 (id=2066): bpf$MAP_CREATE(0x0, 0x0, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x4000006, 0x1, "42341f9b1000007e4f00"}) r2 = syz_open_pts(r1, 0x103100) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') epoll_create(0x4) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x101, 0xbf1, 0x1ff, 0x1000, 0x5, "ce5fdc00f7507fbf31b6b0fac913048ff7affd"}) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$rds(0x15, 0x5, 0x0) bind$rds(r9, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r9, &(0x7f0000001d00)={&(0x7f00000017c0)={0x2, 0x0, @private=0xa010101}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0x3}, {0x0}, &(0x7f0000001b40)=[{&(0x7f0000000140)=""/86, 0x56}], 0x1}}], 0x48}, 0x0) setsockopt(r8, 0x7fff, 0x10000081, &(0x7f00000001c0)="3a104b450e000000000000", 0xb) 143.895677ms ago: executing program 4 (id=2067): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xff}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xffffdffffffffffe}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) 70.558598ms ago: executing program 5 (id=2068): socket$nl_netfilter(0x10, 0x3, 0xc) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = add_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000080)="75a101010100188d9233a34871d6000000000003c1d6fe173ee8ed471cb5", 0x1e, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000440)=""/117, 0x75) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x3938700}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r3 = open(&(0x7f0000000180)='./bus\x00', 0x1c3bc2, 0x1c0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000008c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r4, 0x1, r3, 0x7, 0x80000}) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r5, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x12, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x9]}, 0x8, 0x80800) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1c, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)="fae0ca88958915f21bfa9c260bf76b5eab1fb020e6ac1d82f8e972ba7dec2521dddb7f11b790454a471c7dc41790261e98cc39cb7bb1e640b22c9da745c71988e334aed33983e65dc7c151b9730d4757db92c7c72db9bf02cf8e49dfdc160f5714a0e9b117c13a935f1ce5f9f6e191eb3ec7555e99e506422c03022d972461fefee9392f132fc43416e915a394366067de4a8a1f", 0x94, 0x1b46865ac35f676d, 0x1}) epoll_create(0x1) r6 = open(&(0x7f0000000280)='./file0\x00', 0x60842, 0x45) syz_io_uring_setup(0x891, &(0x7f0000000140)={0x0, 0x7a10, 0x80, 0x5, 0x323, 0x0, r6}, &(0x7f0000000000)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0xc, 0x0, r6, 0x0, 0x0, 0x0, 0x8000}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000700)='kfree\x00', r9}, 0x18) 66.343338ms ago: executing program 2 (id=2069): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa44000008", @ANYRES32=r4, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 27.867199ms ago: executing program 3 (id=2070): bpf$MAP_CREATE(0x0, 0x0, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x4000006, 0x1, "42341f9b1000007e4f00"}) r2 = syz_open_pts(r1, 0x103100) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x101, 0xbf1, 0x1ff, 0x1000, 0x5, "ce5fdc00f7507fbf31b6b0fac913048ff7affd"}) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x0) 0s ago: executing program 2 (id=2071): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) kernel console output (not intermixed with test programs): ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6096 comm="syz.4.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 100.080735][ T6104] @0Ù: renamed from bond_slave_1 (while UP) [ 100.182984][ T6115] random: crng reseeded on system resumption [ 100.196546][ T6115] __nla_validate_parse: 6 callbacks suppressed [ 100.196565][ T6115] netlink: 464 bytes leftover after parsing attributes in process `syz.4.883'. [ 100.370048][ T6132] wg1 speed is unknown, defaulting to 1000 [ 100.704772][ T6149] netlink: 20 bytes leftover after parsing attributes in process `syz.1.894'. [ 101.036356][ T6166] netlink: 4 bytes leftover after parsing attributes in process `syz.1.900'. [ 101.138393][ T6173] netlink: 4 bytes leftover after parsing attributes in process `syz.1.902'. [ 101.148502][ T6173] netlink: 4 bytes leftover after parsing attributes in process `syz.1.902'. [ 101.205172][ T6175] wg1 speed is unknown, defaulting to 1000 [ 101.569181][ T6187] smc: net device bond0 applied user defined pnetid SYZ0 [ 101.830470][ T6201] netlink: 24 bytes leftover after parsing attributes in process `syz.1.910'. [ 102.006530][ T6206] syz.4.914 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 102.655460][ T6224] FAULT_INJECTION: forcing a failure. [ 102.655460][ T6224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.668856][ T6224] CPU: 1 UID: 0 PID: 6224 Comm: syz.4.919 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.668979][ T6224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.668992][ T6224] Call Trace: [ 102.668999][ T6224] [ 102.669007][ T6224] __dump_stack+0x1d/0x30 [ 102.669035][ T6224] dump_stack_lvl+0xe8/0x140 [ 102.669125][ T6224] dump_stack+0x15/0x1b [ 102.669214][ T6224] should_fail_ex+0x265/0x280 [ 102.669241][ T6224] should_fail_alloc_page+0xf2/0x100 [ 102.669272][ T6224] __alloc_frozen_pages_noprof+0xff/0x360 [ 102.669391][ T6224] alloc_pages_mpol+0xb3/0x250 [ 102.669480][ T6224] vma_alloc_folio_noprof+0x1aa/0x300 [ 102.669528][ T6224] handle_mm_fault+0xec2/0x2c20 [ 102.669673][ T6224] do_user_addr_fault+0x636/0x1090 [ 102.669721][ T6224] ? mem_cgroup_handle_over_high+0x2c/0x1e0 [ 102.669765][ T6224] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 102.669931][ T6224] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 102.669964][ T6224] exc_page_fault+0x62/0xa0 [ 102.670065][ T6224] asm_exc_page_fault+0x26/0x30 [ 102.670085][ T6224] RIP: 0033:0x7f06ee640cb0 [ 102.670100][ T6224] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 102.670121][ T6224] RSP: 002b:00007f06ed1a44a0 EFLAGS: 00010282 [ 102.670137][ T6224] RAX: 0000000000003004 RBX: 00007f06ed1a4540 RCX: 000000000000002f [ 102.670150][ T6224] RDX: 00000000000001ff RSI: 0000000000000400 RDI: 00007f06ed1a45e0 [ 102.670163][ T6224] RBP: 000000000000003c R08: 00007f06e4d85000 R09: 00000000000000f4 [ 102.670194][ T6224] R10: 0000200000000a02 R11: 0000000000000267 R12: 0000000000000301 [ 102.670351][ T6224] R13: 00007f06ee81db80 R14: 0000000000000013 R15: 00007f06ed1a45e0 [ 102.670376][ T6224] [ 102.670387][ T6224] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 102.963214][ T6232] netlink: 4 bytes leftover after parsing attributes in process `syz.3.924'. [ 102.974196][ T6232] netlink: 4 bytes leftover after parsing attributes in process `syz.3.924'. [ 103.012747][ T6235] netlink: 144 bytes leftover after parsing attributes in process `syz.5.923'. [ 103.021964][ T6235] netlink: 144 bytes leftover after parsing attributes in process `syz.5.923'. [ 103.290534][ T6264] FAULT_INJECTION: forcing a failure. [ 103.290534][ T6264] name failslab, interval 1, probability 0, space 0, times 0 [ 103.303307][ T6264] CPU: 0 UID: 0 PID: 6264 Comm: syz.1.935 Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.303336][ T6264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 103.303351][ T6264] Call Trace: [ 103.303360][ T6264] [ 103.303371][ T6264] __dump_stack+0x1d/0x30 [ 103.303396][ T6264] dump_stack_lvl+0xe8/0x140 [ 103.303440][ T6264] dump_stack+0x15/0x1b [ 103.303462][ T6264] should_fail_ex+0x265/0x280 [ 103.303563][ T6264] should_failslab+0x8c/0xb0 [ 103.303605][ T6264] kmem_cache_alloc_noprof+0x50/0x310 [ 103.303640][ T6264] ? audit_log_start+0x365/0x6c0 [ 103.303756][ T6264] audit_log_start+0x365/0x6c0 [ 103.303831][ T6264] audit_seccomp+0x48/0x100 [ 103.303865][ T6264] ? __seccomp_filter+0x68c/0x10d0 [ 103.303888][ T6264] __seccomp_filter+0x69d/0x10d0 [ 103.303970][ T6264] ? __list_add_valid_or_report+0x38/0xe0 [ 103.304004][ T6264] ? _raw_spin_unlock+0x26/0x50 [ 103.304030][ T6264] __secure_computing+0x82/0x150 [ 103.304058][ T6264] syscall_trace_enter+0xcf/0x1e0 [ 103.304117][ T6264] do_syscall_64+0xac/0x200 [ 103.304228][ T6264] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.304296][ T6264] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.304362][ T6264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.304387][ T6264] RIP: 0033:0x7fe62e55d8dc [ 103.304402][ T6264] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 103.304421][ T6264] RSP: 002b:00007fe62cfc7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 103.304491][ T6264] RAX: ffffffffffffffda RBX: 00007fe62e7b5fa0 RCX: 00007fe62e55d8dc [ 103.304504][ T6264] RDX: 000000000000000f RSI: 00007fe62cfc70a0 RDI: 0000000000000003 [ 103.304517][ T6264] RBP: 00007fe62cfc7090 R08: 0000000000000000 R09: 0000000000000000 [ 103.304532][ T6264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.304546][ T6264] R13: 00007fe62e7b6038 R14: 00007fe62e7b5fa0 R15: 00007ffe4eddbd98 [ 103.304566][ T6264] [ 103.529685][ T6268] netlink: 'syz.3.934': attribute type 10 has an invalid length. [ 103.541896][ T6268] team0: Port device dummy0 added [ 103.551707][ T6268] netlink: 'syz.3.934': attribute type 10 has an invalid length. [ 103.564375][ T6268] team0: Port device dummy0 removed [ 103.573791][ T6268] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 103.744756][ T6285] bridge0: entered promiscuous mode [ 103.750724][ T6285] bridge0: port 2(macvlan3) entered blocking state [ 103.757487][ T6285] bridge0: port 2(macvlan3) entered disabled state [ 103.764287][ T6285] macvlan3: entered allmulticast mode [ 103.770068][ T6285] bridge0: entered allmulticast mode [ 103.776815][ T6285] macvlan3: left allmulticast mode [ 103.782079][ T6285] bridge0: left allmulticast mode [ 103.787784][ T6285] bridge0: left promiscuous mode [ 104.126814][ T6305] SELinux: failed to load policy [ 104.331068][ T6314] netlink: 'syz.4.954': attribute type 10 has an invalid length. [ 104.339010][ T6314] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.346639][ T6314] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.387412][ T6314] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.394702][ T6314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.402066][ T6314] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.409183][ T6314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.420220][ T6314] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 104.493650][ T6314] bridge_slave_1: left allmulticast mode [ 104.499470][ T6314] bridge_slave_1: left promiscuous mode [ 104.505211][ T6314] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.523371][ T6314] bridge_slave_0: left allmulticast mode [ 104.529394][ T6314] bridge_slave_0: left promiscuous mode [ 104.535372][ T6314] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.679906][ T6314] bond0: (slave bridge0): Releasing backup interface [ 104.937262][ T6341] FAULT_INJECTION: forcing a failure. [ 104.937262][ T6341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 104.950463][ T6341] CPU: 1 UID: 0 PID: 6341 Comm: syz.4.963 Not tainted syzkaller #0 PREEMPT(voluntary) [ 104.950495][ T6341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 104.950512][ T6341] Call Trace: [ 104.950522][ T6341] [ 104.950531][ T6341] __dump_stack+0x1d/0x30 [ 104.950615][ T6341] dump_stack_lvl+0xe8/0x140 [ 104.950635][ T6341] dump_stack+0x15/0x1b [ 104.950651][ T6341] should_fail_ex+0x265/0x280 [ 104.950736][ T6341] should_fail+0xb/0x20 [ 104.950762][ T6341] should_fail_usercopy+0x1a/0x20 [ 104.950859][ T6341] _copy_from_user+0x1c/0xb0 [ 104.950952][ T6341] __se_sys_mount+0x10d/0x2e0 [ 104.950982][ T6341] ? fput+0x8f/0xc0 [ 104.951055][ T6341] ? ksys_write+0x192/0x1a0 [ 104.951086][ T6341] __x64_sys_mount+0x67/0x80 [ 104.951121][ T6341] x64_sys_call+0x2b4d/0x2ff0 [ 104.951218][ T6341] do_syscall_64+0xd2/0x200 [ 104.951256][ T6341] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 104.951331][ T6341] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 104.951367][ T6341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.951394][ T6341] RIP: 0033:0x7f06ee77eec9 [ 104.951412][ T6341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.951436][ T6341] RSP: 002b:00007f06ed1e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 104.951474][ T6341] RAX: ffffffffffffffda RBX: 00007f06ee9d5fa0 RCX: 00007f06ee77eec9 [ 104.951491][ T6341] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000000 [ 104.951546][ T6341] RBP: 00007f06ed1e7090 R08: 0000200000000300 R09: 0000000000000000 [ 104.951563][ T6341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.951575][ T6341] R13: 00007f06ee9d6038 R14: 00007f06ee9d5fa0 R15: 00007fff625a5b88 [ 104.951719][ T6341] [ 105.224795][ T29] kauditd_printk_skb: 295 callbacks suppressed [ 105.224812][ T29] audit: type=1400 audit(1759008119.505:3281): avc: denied { write } for pid=6348 comm="syz.1.967" name="file0" dev="tmpfs" ino=1082 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 105.227851][ T6353] __nla_validate_parse: 15 callbacks suppressed [ 105.227871][ T6353] netlink: 20 bytes leftover after parsing attributes in process `syz.4.969'. [ 105.231159][ T29] audit: type=1400 audit(1759008119.505:3282): avc: denied { open } for pid=6348 comm="syz.1.967" path="/201/file0" dev="tmpfs" ino=1082 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 105.377427][ T29] audit: type=1326 audit(1759008119.665:3283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.401854][ T29] audit: type=1326 audit(1759008119.665:3284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.425723][ T29] audit: type=1326 audit(1759008119.695:3285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.449645][ T29] audit: type=1326 audit(1759008119.695:3286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.473399][ T29] audit: type=1326 audit(1759008119.695:3287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.497104][ T29] audit: type=1326 audit(1759008119.695:3288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.520990][ T29] audit: type=1326 audit(1759008119.695:3289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.544908][ T29] audit: type=1326 audit(1759008119.765:3290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6361 comm="syz.1.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 105.546740][ T6327] block device autoloading is deprecated and will be removed. [ 105.604655][ T6362] netlink: 144 bytes leftover after parsing attributes in process `syz.1.972'. [ 105.613775][ T6362] netlink: 144 bytes leftover after parsing attributes in process `syz.1.972'. [ 105.819540][ T6378] wg1 speed is unknown, defaulting to 1000 [ 106.327177][ T6390] netlink: 8 bytes leftover after parsing attributes in process `syz.3.981'. [ 106.512024][ T6398] netlink: 'syz.3.985': attribute type 1 has an invalid length. [ 106.519854][ T6398] netlink: 224 bytes leftover after parsing attributes in process `syz.3.985'. [ 106.877107][ T6413] netlink: 144 bytes leftover after parsing attributes in process `syz.1.990'. [ 106.886343][ T6413] netlink: 144 bytes leftover after parsing attributes in process `syz.1.990'. [ 106.978888][ T6417] netlink: 8 bytes leftover after parsing attributes in process `syz.1.992'. [ 107.068484][ T6428] netlink: 4 bytes leftover after parsing attributes in process `syz.4.997'. [ 107.247866][ T6446] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1003'. [ 107.364936][ T6456] wireguard0: entered promiscuous mode [ 107.370664][ T6456] wireguard0: entered allmulticast mode [ 107.407331][ T6462] netlink: 'syz.2.1007': attribute type 3 has an invalid length. [ 107.419066][ T6462] siw: device registration error -23 [ 108.275272][ T6505] wg1 speed is unknown, defaulting to 1000 [ 108.628625][ T6527] FAULT_INJECTION: forcing a failure. [ 108.628625][ T6527] name failslab, interval 1, probability 0, space 0, times 0 [ 108.641678][ T6527] CPU: 1 UID: 0 PID: 6527 Comm: syz.3.1034 Not tainted syzkaller #0 PREEMPT(voluntary) [ 108.641770][ T6527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 108.641787][ T6527] Call Trace: [ 108.641796][ T6527] [ 108.641804][ T6527] __dump_stack+0x1d/0x30 [ 108.641826][ T6527] dump_stack_lvl+0xe8/0x140 [ 108.641889][ T6527] dump_stack+0x15/0x1b [ 108.641906][ T6527] should_fail_ex+0x265/0x280 [ 108.641973][ T6527] should_failslab+0x8c/0xb0 [ 108.641999][ T6527] kmem_cache_alloc_noprof+0x50/0x310 [ 108.642101][ T6527] ? getname_flags+0x80/0x3b0 [ 108.642199][ T6527] ? vfs_write+0x7e8/0x960 [ 108.642222][ T6527] getname_flags+0x80/0x3b0 [ 108.642254][ T6527] user_path_at+0x28/0x130 [ 108.642322][ T6527] vfs_open_tree+0xef/0x540 [ 108.642362][ T6527] __x64_sys_open_tree+0x45/0xc0 [ 108.642385][ T6527] x64_sys_call+0x2a87/0x2ff0 [ 108.642486][ T6527] do_syscall_64+0xd2/0x200 [ 108.642517][ T6527] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 108.642601][ T6527] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 108.642658][ T6527] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.642686][ T6527] RIP: 0033:0x7f183982eec9 [ 108.642705][ T6527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.642726][ T6527] RSP: 002b:00007f183828f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ac [ 108.642751][ T6527] RAX: ffffffffffffffda RBX: 00007f1839a85fa0 RCX: 00007f183982eec9 [ 108.642767][ T6527] RDX: 0000000000000000 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 108.642805][ T6527] RBP: 00007f183828f090 R08: 0000000000000000 R09: 0000000000000000 [ 108.642822][ T6527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.642838][ T6527] R13: 00007f1839a86038 R14: 00007f1839a85fa0 R15: 00007ffeca3431f8 [ 108.642864][ T6527] [ 108.827208][ T6537] bridge0: trying to set multicast startup query interval above maximum, setting to 8640000 (86400000ms) [ 109.085155][ T6547] wg1 speed is unknown, defaulting to 1000 [ 109.113556][ T6546] wg1 speed is unknown, defaulting to 1000 [ 110.470468][ T6635] __nla_validate_parse: 10 callbacks suppressed [ 110.470489][ T6635] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1073'. [ 110.585804][ T29] kauditd_printk_skb: 397 callbacks suppressed [ 110.585823][ T29] audit: type=1400 audit(1759008124.875:3686): avc: denied { cpu } for pid=6636 comm="syz.2.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 110.618778][ T6641] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1076'. [ 110.635710][ T6641] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1076'. [ 110.638138][ T6642] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1074'. [ 110.647355][ T29] audit: type=1326 audit(1759008124.905:3687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.678258][ T29] audit: type=1326 audit(1759008124.905:3688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.701847][ T29] audit: type=1326 audit(1759008124.905:3689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.725450][ T29] audit: type=1326 audit(1759008124.905:3690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.748982][ T29] audit: type=1326 audit(1759008124.905:3691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.773049][ T29] audit: type=1326 audit(1759008124.905:3692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.797043][ T29] audit: type=1326 audit(1759008124.905:3693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.867010][ T29] audit: type=1326 audit(1759008125.155:3694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.890956][ T29] audit: type=1326 audit(1759008125.155:3695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6638 comm="syz.1.1075" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 110.959903][ T6642] vxlan0: entered promiscuous mode [ 110.987245][ T3851] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 111.027093][ T6644] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.043766][ T6640] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1075'. [ 111.053010][ T6640] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1075'. [ 111.110205][ T3851] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 111.126292][ T3851] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 111.154924][ T6653] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1079'. [ 111.164502][ T6653] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1079'. [ 111.179149][ T6653] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1079'. [ 111.188266][ T6653] netlink: 6 bytes leftover after parsing attributes in process `syz.1.1079'. [ 111.257696][ T6661] wg1 speed is unknown, defaulting to 1000 [ 111.751685][ T6686] FAULT_INJECTION: forcing a failure. [ 111.751685][ T6686] name failslab, interval 1, probability 0, space 0, times 0 [ 111.764541][ T6686] CPU: 1 UID: 0 PID: 6686 Comm: syz.4.1092 Not tainted syzkaller #0 PREEMPT(voluntary) [ 111.764569][ T6686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 111.764586][ T6686] Call Trace: [ 111.764593][ T6686] [ 111.764603][ T6686] __dump_stack+0x1d/0x30 [ 111.764631][ T6686] dump_stack_lvl+0xe8/0x140 [ 111.764653][ T6686] dump_stack+0x15/0x1b [ 111.764669][ T6686] should_fail_ex+0x265/0x280 [ 111.764697][ T6686] should_failslab+0x8c/0xb0 [ 111.764729][ T6686] kmem_cache_alloc_noprof+0x50/0x310 [ 111.764841][ T6686] ? audit_log_start+0x365/0x6c0 [ 111.764892][ T6686] audit_log_start+0x365/0x6c0 [ 111.764931][ T6686] ? __list_add_valid_or_report+0x38/0xe0 [ 111.765049][ T6686] audit_seccomp+0x48/0x100 [ 111.765084][ T6686] ? __seccomp_filter+0x68c/0x10d0 [ 111.765119][ T6686] __seccomp_filter+0x69d/0x10d0 [ 111.765151][ T6686] ? __cond_resched+0x4e/0x90 [ 111.765205][ T6686] ? down_write_killable+0x3a/0x80 [ 111.765292][ T6686] ? up_write+0x18/0x60 [ 111.765318][ T6686] ? __se_sys_brk+0x72b/0x7f0 [ 111.765364][ T6686] __secure_computing+0x82/0x150 [ 111.765388][ T6686] syscall_trace_enter+0xcf/0x1e0 [ 111.765516][ T6686] do_syscall_64+0xac/0x200 [ 111.765553][ T6686] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 111.765584][ T6686] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 111.765682][ T6686] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 111.765708][ T6686] RIP: 0033:0x7f06ee77d8dc [ 111.765724][ T6686] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 111.765743][ T6686] RSP: 002b:00007f06ed1e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 111.765763][ T6686] RAX: ffffffffffffffda RBX: 00007f06ee9d5fa0 RCX: 00007f06ee77d8dc [ 111.765846][ T6686] RDX: 000000000000000f RSI: 00007f06ed1e70a0 RDI: 0000000000000006 [ 111.765862][ T6686] RBP: 00007f06ed1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 111.765878][ T6686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.765894][ T6686] R13: 00007f06ee9d6038 R14: 00007f06ee9d5fa0 R15: 00007fff625a5b88 [ 111.765921][ T6686] [ 112.538532][ T6644] netdevsim netdevsim2 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 112.548948][ T6644] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 112.629020][ T6644] netdevsim netdevsim2 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 112.639478][ T6644] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 112.718252][ T6644] netdevsim netdevsim2 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 112.729057][ T6644] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 112.806364][ T3851] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 112.814608][ T3851] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 112.847996][ T3844] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 112.856308][ T3844] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 112.882063][ T3844] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 112.890517][ T3844] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 112.918749][ T3844] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 112.927343][ T3844] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 112.987513][ T6730] wg1 speed is unknown, defaulting to 1000 [ 113.193968][ T6738] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 113.303559][ T6740] SELinux: failed to load policy [ 113.433211][ T6756] wg1 speed is unknown, defaulting to 1000 [ 113.536016][ T6768] wg1 speed is unknown, defaulting to 1000 [ 113.983097][ T6792] FAULT_INJECTION: forcing a failure. [ 113.983097][ T6792] name failslab, interval 1, probability 0, space 0, times 0 [ 113.995855][ T6792] CPU: 1 UID: 0 PID: 6792 Comm: syz.1.1126 Not tainted syzkaller #0 PREEMPT(voluntary) [ 113.995910][ T6792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 113.995927][ T6792] Call Trace: [ 113.995936][ T6792] [ 113.995947][ T6792] __dump_stack+0x1d/0x30 [ 113.995974][ T6792] dump_stack_lvl+0xe8/0x140 [ 113.996000][ T6792] dump_stack+0x15/0x1b [ 113.996019][ T6792] should_fail_ex+0x265/0x280 [ 113.996117][ T6792] should_failslab+0x8c/0xb0 [ 113.996182][ T6792] kmem_cache_alloc_noprof+0x50/0x310 [ 113.996219][ T6792] ? alloc_empty_file+0x76/0x200 [ 113.996351][ T6792] alloc_empty_file+0x76/0x200 [ 113.996393][ T6792] alloc_file_pseudo+0xc6/0x160 [ 113.996497][ T6792] __shmem_file_setup+0x1de/0x210 [ 113.996610][ T6792] shmem_file_setup+0x3b/0x50 [ 113.996651][ T6792] __se_sys_memfd_create+0x2c3/0x590 [ 113.996710][ T6792] __x64_sys_memfd_create+0x31/0x40 [ 113.996740][ T6792] x64_sys_call+0x2abe/0x2ff0 [ 113.996769][ T6792] do_syscall_64+0xd2/0x200 [ 113.996804][ T6792] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 113.996907][ T6792] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 113.996944][ T6792] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.996973][ T6792] RIP: 0033:0x7fe62e55eec9 [ 113.996994][ T6792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.997071][ T6792] RSP: 002b:00007fe62cfc6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 113.997091][ T6792] RAX: ffffffffffffffda RBX: 00000000000007c4 RCX: 00007fe62e55eec9 [ 113.997103][ T6792] RDX: 00007fe62cfc6ef0 RSI: 0000000000000000 RDI: 00007fe62e5e2960 [ 113.997118][ T6792] RBP: 0000200000002040 R08: 00007fe62cfc6bb7 R09: 00007fe62cfc6e40 [ 113.997167][ T6792] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000280 [ 113.997184][ T6792] R13: 00007fe62cfc6ef0 R14: 00007fe62cfc6eb0 R15: 0000200000000c40 [ 113.997209][ T6792] [ 114.314532][ T6804] wg1 speed is unknown, defaulting to 1000 [ 114.455538][ T6808] wg1 speed is unknown, defaulting to 1000 [ 115.062732][ T6851] wg1 speed is unknown, defaulting to 1000 [ 115.312747][ T6867] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 115.508979][ T6883] wg1 speed is unknown, defaulting to 1000 [ 115.594442][ T6885] SELinux: policydb version 0 does not match my version range 15-35 [ 115.622834][ T6885] SELinux: failed to load policy [ 115.650270][ T6887] wg1 speed is unknown, defaulting to 1000 [ 115.664930][ T29] kauditd_printk_skb: 387 callbacks suppressed [ 115.664950][ T29] audit: type=1326 audit(1759008129.945:4081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.705565][ T29] audit: type=1326 audit(1759008129.945:4082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.729167][ T29] audit: type=1326 audit(1759008129.985:4083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.753130][ T29] audit: type=1326 audit(1759008129.985:4084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.776998][ T29] audit: type=1326 audit(1759008129.985:4085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.806261][ T29] audit: type=1326 audit(1759008129.995:4086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.830456][ T29] audit: type=1326 audit(1759008129.995:4087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.854297][ T29] audit: type=1326 audit(1759008129.995:4088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.877841][ T29] audit: type=1326 audit(1759008129.995:4089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.901621][ T29] audit: type=1326 audit(1759008130.025:4090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.5.1165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 115.970813][ T6898] __nla_validate_parse: 12 callbacks suppressed [ 115.970982][ T6898] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1168'. [ 115.990091][ T6902] FAULT_INJECTION: forcing a failure. [ 115.990091][ T6902] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.003404][ T6902] CPU: 0 UID: 0 PID: 6902 Comm: syz.1.1170 Not tainted syzkaller #0 PREEMPT(voluntary) [ 116.003437][ T6902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 116.003452][ T6902] Call Trace: [ 116.003460][ T6902] [ 116.003470][ T6902] __dump_stack+0x1d/0x30 [ 116.003506][ T6902] dump_stack_lvl+0xe8/0x140 [ 116.003530][ T6902] dump_stack+0x15/0x1b [ 116.003551][ T6902] should_fail_ex+0x265/0x280 [ 116.003661][ T6902] should_fail+0xb/0x20 [ 116.003684][ T6902] should_fail_usercopy+0x1a/0x20 [ 116.003718][ T6902] _copy_from_user+0x1c/0xb0 [ 116.003759][ T6902] memdup_user+0x5e/0xd0 [ 116.003794][ T6902] strndup_user+0x68/0xb0 [ 116.003827][ T6902] bpf_uprobe_multi_link_attach+0x20a/0x910 [ 116.003865][ T6902] ? __rcu_read_unlock+0x4f/0x70 [ 116.003892][ T6902] ? __fget_files+0x184/0x1c0 [ 116.003954][ T6902] link_create+0x680/0x6e0 [ 116.003997][ T6902] __sys_bpf+0x61d/0x7b0 [ 116.004042][ T6902] __x64_sys_bpf+0x41/0x50 [ 116.004089][ T6902] x64_sys_call+0x2aea/0x2ff0 [ 116.004114][ T6902] do_syscall_64+0xd2/0x200 [ 116.004301][ T6902] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 116.004332][ T6902] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 116.004369][ T6902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 116.004452][ T6902] RIP: 0033:0x7fe62e55eec9 [ 116.004470][ T6902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.004541][ T6902] RSP: 002b:00007fe62cfc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.004619][ T6902] RAX: ffffffffffffffda RBX: 00007fe62e7b5fa0 RCX: 00007fe62e55eec9 [ 116.004636][ T6902] RDX: 0000000000000040 RSI: 00002000000005c0 RDI: 000000000000001c [ 116.004650][ T6902] RBP: 00007fe62cfc7090 R08: 0000000000000000 R09: 0000000000000000 [ 116.004663][ T6902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.004676][ T6902] R13: 00007fe62e7b6038 R14: 00007fe62e7b5fa0 R15: 00007ffe4eddbd98 [ 116.004773][ T6902] [ 116.347279][ T6921] wg1 speed is unknown, defaulting to 1000 [ 116.357522][ T6916] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1176'. [ 116.516824][ T6941] netlink: 'syz.5.1182': attribute type 4 has an invalid length. [ 116.931864][ T6948] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1186'. [ 117.350904][ T6969] wg1 speed is unknown, defaulting to 1000 [ 117.374697][ T6972] netlink: 'syz.1.1196': attribute type 21 has an invalid length. [ 117.405996][ T6972] netlink: 'syz.1.1196': attribute type 30 has an invalid length. [ 118.017676][ T6994] FAULT_INJECTION: forcing a failure. [ 118.017676][ T6994] name failslab, interval 1, probability 0, space 0, times 0 [ 118.030460][ T6994] CPU: 0 UID: 0 PID: 6994 Comm: syz.1.1204 Not tainted syzkaller #0 PREEMPT(voluntary) [ 118.030512][ T6994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 118.030595][ T6994] Call Trace: [ 118.030604][ T6994] [ 118.030616][ T6994] __dump_stack+0x1d/0x30 [ 118.030641][ T6994] dump_stack_lvl+0xe8/0x140 [ 118.030661][ T6994] dump_stack+0x15/0x1b [ 118.030678][ T6994] should_fail_ex+0x265/0x280 [ 118.030784][ T6994] should_failslab+0x8c/0xb0 [ 118.030813][ T6994] kmem_cache_alloc_noprof+0x50/0x310 [ 118.030853][ T6994] ? skb_clone+0x151/0x1f0 [ 118.030894][ T6994] skb_clone+0x151/0x1f0 [ 118.030930][ T6994] __netlink_deliver_tap+0x2c9/0x500 [ 118.030970][ T6994] netlink_unicast+0x66b/0x690 [ 118.031026][ T6994] netlink_sendmsg+0x58b/0x6b0 [ 118.031063][ T6994] ? __pfx_netlink_sendmsg+0x10/0x10 [ 118.031130][ T6994] __sock_sendmsg+0x145/0x180 [ 118.031181][ T6994] ____sys_sendmsg+0x31e/0x4e0 [ 118.031217][ T6994] ___sys_sendmsg+0x17b/0x1d0 [ 118.031275][ T6994] __x64_sys_sendmsg+0xd4/0x160 [ 118.031310][ T6994] x64_sys_call+0x191e/0x2ff0 [ 118.031340][ T6994] do_syscall_64+0xd2/0x200 [ 118.031436][ T6994] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 118.031464][ T6994] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 118.031504][ T6994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 118.031606][ T6994] RIP: 0033:0x7fe62e55eec9 [ 118.031626][ T6994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.031652][ T6994] RSP: 002b:00007fe62cfc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.031680][ T6994] RAX: ffffffffffffffda RBX: 00007fe62e7b5fa0 RCX: 00007fe62e55eec9 [ 118.031697][ T6994] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000007 [ 118.031714][ T6994] RBP: 00007fe62cfc7090 R08: 0000000000000000 R09: 0000000000000000 [ 118.031775][ T6994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.031787][ T6994] R13: 00007fe62e7b6038 R14: 00007fe62e7b5fa0 R15: 00007ffe4eddbd98 [ 118.031807][ T6994] [ 118.031922][ T6994] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1204'. [ 118.364680][ T7000] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1207'. [ 118.374023][ T7000] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1207'. [ 118.465129][ T7015] vlan2: entered allmulticast mode [ 118.470596][ T7015] dummy0: entered allmulticast mode [ 118.748761][ T7031] dummy0: entered promiscuous mode [ 118.760332][ T7031] vlan2: entered promiscuous mode [ 118.765540][ T7031] bond0: entered promiscuous mode [ 118.834268][ T7033] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1219'. [ 118.843513][ T7033] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1219'. [ 118.980458][ T7041] SELinux: security_context_str_to_sid (ÿÿÿÿ) failed with errno=-22 [ 119.033597][ T7037] wg1 speed is unknown, defaulting to 1000 [ 119.075566][ T7040] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7040 comm=syz.2.1221 [ 119.194386][ T7060] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 119.825489][ T7073] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1232'. [ 119.842695][ T7073] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1232'. [ 120.191563][ T7105] wg1 speed is unknown, defaulting to 1000 [ 120.198260][ T7099] FAULT_INJECTION: forcing a failure. [ 120.198260][ T7099] name failslab, interval 1, probability 0, space 0, times 0 [ 120.211470][ T7099] CPU: 0 UID: 0 PID: 7099 Comm: syz.2.1240 Not tainted syzkaller #0 PREEMPT(voluntary) [ 120.211497][ T7099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 120.211513][ T7099] Call Trace: [ 120.211521][ T7099] [ 120.211530][ T7099] __dump_stack+0x1d/0x30 [ 120.211557][ T7099] dump_stack_lvl+0xe8/0x140 [ 120.211582][ T7099] dump_stack+0x15/0x1b [ 120.211601][ T7099] should_fail_ex+0x265/0x280 [ 120.211626][ T7099] should_failslab+0x8c/0xb0 [ 120.211656][ T7099] kmem_cache_alloc_noprof+0x50/0x310 [ 120.211692][ T7099] ? mas_alloc_nodes+0x265/0x520 [ 120.211727][ T7099] mas_alloc_nodes+0x265/0x520 [ 120.211759][ T7099] mas_preallocate+0x33e/0x520 [ 120.211799][ T7099] __split_vma+0x240/0x650 [ 120.211840][ T7099] vms_gather_munmap_vmas+0x17a/0x7b0 [ 120.211877][ T7099] ? mas_find+0x608/0x700 [ 120.211916][ T7099] mmap_region+0x53f/0x1630 [ 120.211955][ T7099] ? __rcu_read_unlock+0x4f/0x70 [ 120.211981][ T7099] ? css_rstat_updated+0xb7/0x240 [ 120.212021][ T7099] ? __rcu_read_unlock+0x4f/0x70 [ 120.212074][ T7099] do_mmap+0x9b3/0xbe0 [ 120.212117][ T7099] __se_sys_remap_file_pages+0x55e/0x600 [ 120.212144][ T7099] ? fput+0x8f/0xc0 [ 120.212183][ T7099] __x64_sys_remap_file_pages+0x67/0x80 [ 120.212213][ T7099] x64_sys_call+0x23af/0x2ff0 [ 120.212240][ T7099] do_syscall_64+0xd2/0x200 [ 120.212271][ T7099] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 120.212301][ T7099] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 120.212338][ T7099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.212366][ T7099] RIP: 0033:0x7fae57e3eec9 [ 120.212387][ T7099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.212411][ T7099] RSP: 002b:00007fae5687e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d8 [ 120.212430][ T7099] RAX: ffffffffffffffda RBX: 00007fae58096090 RCX: 00007fae57e3eec9 [ 120.212443][ T7099] RDX: 0000000000000000 RSI: 0000000000400d00 RDI: 000020000051c000 [ 120.212455][ T7099] RBP: 00007fae5687e090 R08: 0000000000000000 R09: 0000000000000000 [ 120.212467][ T7099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.212481][ T7099] R13: 00007fae58096128 R14: 00007fae58096090 R15: 00007ffeb2c6db78 [ 120.212507][ T7099] [ 120.479378][ T7109] netlink: 'syz.5.1246': attribute type 1 has an invalid length. [ 120.676223][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 120.676241][ T29] audit: type=1326 audit(1759008134.965:4412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.706526][ T29] audit: type=1326 audit(1759008134.985:4413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.730061][ T29] audit: type=1326 audit(1759008134.985:4414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.753685][ T29] audit: type=1326 audit(1759008134.985:4415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.777307][ T29] audit: type=1326 audit(1759008134.985:4416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.800652][ T29] audit: type=1326 audit(1759008134.985:4417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.824156][ T29] audit: type=1326 audit(1759008134.985:4418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.848109][ T29] audit: type=1326 audit(1759008134.985:4419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.892936][ T29] audit: type=1326 audit(1759008134.995:4420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.916739][ T29] audit: type=1326 audit(1759008134.995:4421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7106 comm="syz.1.1245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 120.955553][ T7120] wg1 speed is unknown, defaulting to 1000 [ 121.106200][ T7146] netlink: 'syz.4.1257': attribute type 4 has an invalid length. [ 121.113973][ T7146] __nla_validate_parse: 7 callbacks suppressed [ 121.114067][ T7146] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1257'. [ 121.148783][ T7150] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1256'. [ 121.208094][ T7157] kernel profiling enabled (shift: 17) [ 121.208255][ T7146] .`: renamed from bond0 (while UP) [ 121.293647][ T7160] wg1 speed is unknown, defaulting to 1000 [ 121.353909][ T7168] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1264'. [ 121.447252][ T7179] FAULT_INJECTION: forcing a failure. [ 121.447252][ T7179] name failslab, interval 1, probability 0, space 0, times 0 [ 121.460233][ T7179] CPU: 1 UID: 0 PID: 7179 Comm: syz.2.1266 Not tainted syzkaller #0 PREEMPT(voluntary) [ 121.460274][ T7179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 121.460292][ T7179] Call Trace: [ 121.460301][ T7179] [ 121.460333][ T7179] __dump_stack+0x1d/0x30 [ 121.460361][ T7179] dump_stack_lvl+0xe8/0x140 [ 121.460388][ T7179] dump_stack+0x15/0x1b [ 121.460409][ T7179] should_fail_ex+0x265/0x280 [ 121.460441][ T7179] should_failslab+0x8c/0xb0 [ 121.460501][ T7179] kmem_cache_alloc_noprof+0x50/0x310 [ 121.460540][ T7179] ? skb_clone+0x151/0x1f0 [ 121.460574][ T7179] skb_clone+0x151/0x1f0 [ 121.460606][ T7179] __netlink_deliver_tap+0x2c9/0x500 [ 121.460644][ T7179] netlink_unicast+0x66b/0x690 [ 121.460708][ T7179] netlink_sendmsg+0x58b/0x6b0 [ 121.460743][ T7179] ? __pfx_netlink_sendmsg+0x10/0x10 [ 121.460788][ T7179] __sock_sendmsg+0x145/0x180 [ 121.460828][ T7179] ____sys_sendmsg+0x31e/0x4e0 [ 121.460869][ T7179] ___sys_sendmsg+0x17b/0x1d0 [ 121.460910][ T7179] __x64_sys_sendmsg+0xd4/0x160 [ 121.460960][ T7179] x64_sys_call+0x191e/0x2ff0 [ 121.461041][ T7179] do_syscall_64+0xd2/0x200 [ 121.461082][ T7179] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 121.461115][ T7179] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 121.461227][ T7179] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 121.461256][ T7179] RIP: 0033:0x7fae57e3eec9 [ 121.461276][ T7179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.461301][ T7179] RSP: 002b:00007fae5689f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 121.461326][ T7179] RAX: ffffffffffffffda RBX: 00007fae58095fa0 RCX: 00007fae57e3eec9 [ 121.461358][ T7179] RDX: 0000000000040010 RSI: 0000200000006040 RDI: 0000000000000004 [ 121.461375][ T7179] RBP: 00007fae5689f090 R08: 0000000000000000 R09: 0000000000000000 [ 121.461428][ T7179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.461445][ T7179] R13: 00007fae58096038 R14: 00007fae58095fa0 R15: 00007ffeb2c6db78 [ 121.461483][ T7179] [ 121.717944][ T7195] wg1 speed is unknown, defaulting to 1000 [ 121.847216][ T7197] netlink: 76 bytes leftover after parsing attributes in process `syz.3.1262'. [ 121.893737][ T7203] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1270'. [ 121.965648][ T7164] bond0: (slave dummy0): Releasing backup interface [ 121.995673][ T7218] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1272'. [ 122.028507][ T7164] dummy0: left promiscuous mode [ 122.029040][ T7220] tmpfs: Unknown parameter 'contextù' [ 122.083937][ T7221] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1272'. [ 122.187913][ T7230] delete_channel: no stack [ 122.192895][ T7233] netlink: 20 bytes leftover after parsing attributes in process `syz.5.1275'. [ 122.205751][ T7231] FAULT_INJECTION: forcing a failure. [ 122.205751][ T7231] name failslab, interval 1, probability 0, space 0, times 0 [ 122.218563][ T7231] CPU: 1 UID: 0 PID: 7231 Comm: syz.3.1278 Not tainted syzkaller #0 PREEMPT(voluntary) [ 122.218599][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 122.218616][ T7231] Call Trace: [ 122.218624][ T7231] [ 122.218633][ T7231] __dump_stack+0x1d/0x30 [ 122.218668][ T7231] dump_stack_lvl+0xe8/0x140 [ 122.218759][ T7231] dump_stack+0x15/0x1b [ 122.218781][ T7231] should_fail_ex+0x265/0x280 [ 122.218814][ T7231] should_failslab+0x8c/0xb0 [ 122.218917][ T7231] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 122.218956][ T7231] ? rpc_alloc_inode+0x34/0x40 [ 122.218986][ T7231] ? __pfx_rpc_alloc_inode+0x10/0x10 [ 122.219089][ T7231] rpc_alloc_inode+0x34/0x40 [ 122.219116][ T7231] alloc_inode+0x40/0x170 [ 122.219145][ T7231] new_inode+0x1d/0xe0 [ 122.219195][ T7231] rpc_new_dir+0x5b/0x260 [ 122.219245][ T7231] rpc_fill_super+0x1c9/0x3e0 [ 122.219271][ T7231] ? __pfx_rpc_fill_super+0x10/0x10 [ 122.219326][ T7231] get_tree_keyed+0x9e/0x120 [ 122.219375][ T7231] rpc_fs_get_tree+0x63/0xa0 [ 122.219475][ T7231] vfs_get_tree+0x57/0x1d0 [ 122.219538][ T7231] vfs_cmd_create+0x8a/0x140 [ 122.219629][ T7231] vfs_fsconfig_locked+0x6f/0x210 [ 122.219666][ T7231] __se_sys_fsconfig+0x648/0x770 [ 122.219711][ T7231] __x64_sys_fsconfig+0x67/0x80 [ 122.219748][ T7231] x64_sys_call+0x1f83/0x2ff0 [ 122.219819][ T7231] do_syscall_64+0xd2/0x200 [ 122.219857][ T7231] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 122.219888][ T7231] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 122.219968][ T7231] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.220021][ T7231] RIP: 0033:0x7f183982eec9 [ 122.220042][ T7231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.220066][ T7231] RSP: 002b:00007f183828f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 122.220096][ T7231] RAX: ffffffffffffffda RBX: 00007f1839a85fa0 RCX: 00007f183982eec9 [ 122.220113][ T7231] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 122.220128][ T7231] RBP: 00007f183828f090 R08: 0000000000000000 R09: 0000000000000000 [ 122.220145][ T7231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.220164][ T7231] R13: 00007f1839a86038 R14: 00007f1839a85fa0 R15: 00007ffeca3431f8 [ 122.220191][ T7231] [ 122.221035][ T7230] delete_channel: no stack [ 122.268481][ T7240] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1282'. [ 122.270631][ T7231] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 122.329870][ T7243] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1283'. [ 122.519773][ T7254] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 122.703906][ T7277] wg1 speed is unknown, defaulting to 1000 [ 122.840581][ T7293] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 123.235138][ T7327] netlink: 'syz.5.1312': attribute type 1 has an invalid length. [ 123.844399][ T7348] FAULT_INJECTION: forcing a failure. [ 123.844399][ T7348] name failslab, interval 1, probability 0, space 0, times 0 [ 123.857262][ T7348] CPU: 0 UID: 0 PID: 7348 Comm: syz.5.1321 Not tainted syzkaller #0 PREEMPT(voluntary) [ 123.857365][ T7348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 123.857383][ T7348] Call Trace: [ 123.857392][ T7348] [ 123.857403][ T7348] __dump_stack+0x1d/0x30 [ 123.857468][ T7348] dump_stack_lvl+0xe8/0x140 [ 123.857558][ T7348] dump_stack+0x15/0x1b [ 123.857640][ T7348] should_fail_ex+0x265/0x280 [ 123.857667][ T7348] should_failslab+0x8c/0xb0 [ 123.857727][ T7348] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 123.857772][ T7348] ? v9fs_session_init+0x78/0xde0 [ 123.857881][ T7348] kstrdup+0x3e/0xd0 [ 123.857923][ T7348] v9fs_session_init+0x78/0xde0 [ 123.857954][ T7348] ? __rcu_read_unlock+0x4f/0x70 [ 123.858078][ T7348] ? avc_has_perm_noaudit+0x1b1/0x200 [ 123.858116][ T7348] ? should_fail_ex+0xdb/0x280 [ 123.858147][ T7348] ? v9fs_mount+0x51/0x5c0 [ 123.858231][ T7348] ? should_failslab+0x8c/0xb0 [ 123.858266][ T7348] ? __kmalloc_cache_noprof+0x189/0x320 [ 123.858339][ T7348] v9fs_mount+0x67/0x5c0 [ 123.858375][ T7348] ? selinux_capable+0x31/0x40 [ 123.858430][ T7348] ? __pfx_v9fs_mount+0x10/0x10 [ 123.858469][ T7348] legacy_get_tree+0x78/0xd0 [ 123.858502][ T7348] vfs_get_tree+0x57/0x1d0 [ 123.858535][ T7348] do_new_mount+0x207/0x5e0 [ 123.858566][ T7348] ? security_capable+0x83/0x90 [ 123.858672][ T7348] path_mount+0x4a4/0xb20 [ 123.858702][ T7348] ? user_path_at+0x109/0x130 [ 123.858749][ T7348] __se_sys_mount+0x28f/0x2e0 [ 123.858792][ T7348] ? fput+0x8f/0xc0 [ 123.858838][ T7348] __x64_sys_mount+0x67/0x80 [ 123.858886][ T7348] x64_sys_call+0x2b4d/0x2ff0 [ 123.858972][ T7348] do_syscall_64+0xd2/0x200 [ 123.859032][ T7348] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 123.859067][ T7348] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 123.859102][ T7348] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.859208][ T7348] RIP: 0033:0x7f35bf5feec9 [ 123.859230][ T7348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.859256][ T7348] RSP: 002b:00007f35be067038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 123.859282][ T7348] RAX: ffffffffffffffda RBX: 00007f35bf855fa0 RCX: 00007f35bf5feec9 [ 123.859296][ T7348] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 123.859312][ T7348] RBP: 00007f35be067090 R08: 0000200000000240 R09: 0000000000000000 [ 123.859329][ T7348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.859410][ T7348] R13: 00007f35bf856038 R14: 00007f35bf855fa0 R15: 00007ffe85f7ce48 [ 123.859438][ T7348] [ 124.148018][ T7351] block device autoloading is deprecated and will be removed. [ 124.242226][ T7365] netlink: 'syz.2.1326': attribute type 30 has an invalid length. [ 124.412474][ T7352] net_ratelimit: 32 callbacks suppressed [ 124.412500][ T10] IPVS: starting estimator thread 0... [ 124.412495][ T7352] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 124.515393][ T7367] IPVS: using max 1872 ests per chain, 93600 per kthread [ 124.999775][ T7379] loop3: detected capacity change from 0 to 512 [ 125.033327][ T7379] EXT4-fs warning (device loop3): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 125.055817][ T7386] FAULT_INJECTION: forcing a failure. [ 125.055817][ T7386] name failslab, interval 1, probability 0, space 0, times 0 [ 125.068574][ T7386] CPU: 1 UID: 0 PID: 7386 Comm: syz.1.1333 Not tainted syzkaller #0 PREEMPT(voluntary) [ 125.068622][ T7386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 125.068640][ T7386] Call Trace: [ 125.068649][ T7386] [ 125.068660][ T7386] __dump_stack+0x1d/0x30 [ 125.068684][ T7386] dump_stack_lvl+0xe8/0x140 [ 125.068724][ T7386] dump_stack+0x15/0x1b [ 125.068745][ T7386] should_fail_ex+0x265/0x280 [ 125.068817][ T7386] should_failslab+0x8c/0xb0 [ 125.068843][ T7386] kmem_cache_alloc_node_noprof+0x57/0x320 [ 125.068882][ T7386] ? __alloc_skb+0x101/0x320 [ 125.068956][ T7386] __alloc_skb+0x101/0x320 [ 125.068977][ T7386] netlink_alloc_large_skb+0xba/0xf0 [ 125.069005][ T7386] netlink_sendmsg+0x3cf/0x6b0 [ 125.069039][ T7386] ? __pfx_netlink_sendmsg+0x10/0x10 [ 125.069106][ T7386] __sock_sendmsg+0x145/0x180 [ 125.069145][ T7386] ____sys_sendmsg+0x345/0x4e0 [ 125.069211][ T7386] ___sys_sendmsg+0x17b/0x1d0 [ 125.069264][ T7386] __sys_sendmmsg+0x178/0x300 [ 125.069311][ T7386] __x64_sys_sendmmsg+0x57/0x70 [ 125.069392][ T7386] x64_sys_call+0x1c4a/0x2ff0 [ 125.069477][ T7386] do_syscall_64+0xd2/0x200 [ 125.069583][ T7386] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 125.069677][ T7386] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 125.069779][ T7386] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.069801][ T7386] RIP: 0033:0x7fe62e55eec9 [ 125.069816][ T7386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.069891][ T7386] RSP: 002b:00007fe62cfa6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 125.069910][ T7386] RAX: ffffffffffffffda RBX: 00007fe62e7b6090 RCX: 00007fe62e55eec9 [ 125.069923][ T7386] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000009 [ 125.069939][ T7386] RBP: 00007fe62cfa6090 R08: 0000000000000000 R09: 0000000000000000 [ 125.069951][ T7386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.070009][ T7386] R13: 00007fe62e7b6128 R14: 00007fe62e7b6090 R15: 00007ffe4eddbd98 [ 125.070029][ T7386] [ 125.287298][ T7379] EXT4-fs (loop3): mount failed [ 125.329138][ T7391] netlink: 'syz.5.1336': attribute type 1 has an invalid length. [ 125.838643][ T29] kauditd_printk_skb: 465 callbacks suppressed [ 125.838662][ T29] audit: type=1326 audit(1759008140.125:4886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 125.928671][ T7412] loop3: detected capacity change from 0 to 2048 [ 125.945352][ T29] audit: type=1326 audit(1759008140.165:4887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 125.970697][ T29] audit: type=1326 audit(1759008140.165:4888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 125.994745][ T29] audit: type=1326 audit(1759008140.165:4889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.018760][ T29] audit: type=1326 audit(1759008140.165:4890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.042663][ T29] audit: type=1326 audit(1759008140.165:4891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.066693][ T29] audit: type=1326 audit(1759008140.175:4892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.090399][ T29] audit: type=1326 audit(1759008140.175:4893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.097142][ T7412] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 126.114429][ T29] audit: type=1326 audit(1759008140.175:4894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.149968][ T29] audit: type=1326 audit(1759008140.175:4895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7411 comm="syz.3.1343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 126.188653][ T7423] tipc: Started in network mode [ 126.193578][ T7423] tipc: Node identity ac14140f, cluster identity 4711 [ 126.201048][ T7423] tipc: New replicast peer: 255.255.255.255 [ 126.207492][ T7423] tipc: Enabled bearer , priority 10 [ 126.214679][ T7412] __nla_validate_parse: 23 callbacks suppressed [ 126.214695][ T7412] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1343'. [ 126.227744][ T7419] tipc: New replicast peer: 255.255.255.255 [ 126.230234][ T7412] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1343'. [ 126.236254][ T7419] tipc: Enabled bearer , priority 10 [ 126.420381][ T3310] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor: bg 0: block 234: padding at end of block bitmap is not set [ 126.443684][ T3310] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 126.463319][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 126.537436][ T7441] netlink: 'syz.1.1348': attribute type 1 has an invalid length. [ 126.545375][ T7441] netlink: 224 bytes leftover after parsing attributes in process `syz.1.1348'. [ 126.594388][ T7436] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1349'. [ 126.603630][ T7436] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1349'. [ 126.811468][ T7449] netlink: 52 bytes leftover after parsing attributes in process `+}[@'. [ 127.321256][ T7480] netlink: 'syz.5.1363': attribute type 1 has an invalid length. [ 127.329105][ T7480] netlink: 224 bytes leftover after parsing attributes in process `syz.5.1363'. [ 127.345583][ T36] tipc: Node number set to 2886997007 [ 127.442524][ T10] tipc: Node number set to 2350412405 [ 127.569273][ T7487] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1366'. [ 127.579014][ T7487] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1366'. [ 128.164043][ T7506] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 128.233351][ T7509] netlink: 'syz.5.1374': attribute type 1 has an invalid length. [ 128.241254][ T7509] netlink: 224 bytes leftover after parsing attributes in process `syz.5.1374'. [ 129.183458][ T7538] netlink: 'syz.2.1386': attribute type 1 has an invalid length. [ 129.557102][ T7560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48388 sclass=netlink_route_socket pid=7560 comm=syz.1.1394 [ 129.961092][ T7572] netlink: 'syz.3.1399': attribute type 1 has an invalid length. [ 130.478193][ T7602] netlink: 'syz.4.1410': attribute type 1 has an invalid length. [ 131.337935][ T29] kauditd_printk_skb: 451 callbacks suppressed [ 131.337954][ T29] audit: type=1326 audit(1759008145.625:5347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 131.338205][ T7639] audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 [ 131.344213][ T29] audit: type=1326 audit(1759008145.625:5348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 131.368120][ T7639] audit: out of memory in audit_log_start [ 131.375942][ T29] audit: type=1326 audit(1759008145.625:5349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f35bf5fd710 code=0x7ffc0000 [ 131.429031][ T29] audit: type=1326 audit(1759008145.625:5350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f35bf5fd97f code=0x7ffc0000 [ 131.469762][ T29] audit: type=1326 audit(1759008145.745:5351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f35bf5fd8dc code=0x7ffc0000 [ 131.493475][ T29] audit: type=1326 audit(1759008145.745:5352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f35bf5fd97f code=0x7ffc0000 [ 131.517180][ T29] audit: type=1326 audit(1759008145.745:5353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f35bf5fdb2a code=0x7ffc0000 [ 131.540569][ T29] audit: type=1326 audit(1759008145.745:5354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7638 comm="syz.5.1424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 131.661455][ T7646] netlink: 'syz.1.1427': attribute type 1 has an invalid length. [ 131.669322][ T7646] __nla_validate_parse: 7 callbacks suppressed [ 131.669339][ T7646] netlink: 224 bytes leftover after parsing attributes in process `syz.1.1427'. [ 131.707730][ T7641] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1426'. [ 131.716895][ T7641] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1426'. [ 132.149154][ T7674] netlink: 'syz.4.1439': attribute type 1 has an invalid length. [ 132.157142][ T7674] netlink: 224 bytes leftover after parsing attributes in process `syz.4.1439'. [ 132.339815][ T7677] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1440'. [ 132.349145][ T7677] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1440'. [ 133.162376][ T7714] netlink: 'syz.3.1452': attribute type 1 has an invalid length. [ 133.170391][ T7714] netlink: 224 bytes leftover after parsing attributes in process `syz.3.1452'. [ 133.415246][ T7719] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1454'. [ 133.424944][ T7719] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1454'. [ 134.039624][ T7742] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1461'. [ 134.348274][ T7753] netlink: 'syz.5.1464': attribute type 1 has an invalid length. [ 135.530441][ T7790] netlink: 'syz.4.1476': attribute type 1 has an invalid length. [ 135.540548][ T7792] FAULT_INJECTION: forcing a failure. [ 135.540548][ T7792] name failslab, interval 1, probability 0, space 0, times 0 [ 135.553428][ T7792] CPU: 1 UID: 0 PID: 7792 Comm: syz.2.1477 Not tainted syzkaller #0 PREEMPT(voluntary) [ 135.553498][ T7792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 135.553516][ T7792] Call Trace: [ 135.553525][ T7792] [ 135.553536][ T7792] __dump_stack+0x1d/0x30 [ 135.553565][ T7792] dump_stack_lvl+0xe8/0x140 [ 135.553592][ T7792] dump_stack+0x15/0x1b [ 135.553649][ T7792] should_fail_ex+0x265/0x280 [ 135.553684][ T7792] should_failslab+0x8c/0xb0 [ 135.553746][ T7792] kmem_cache_alloc_node_noprof+0x57/0x320 [ 135.553787][ T7792] ? __alloc_skb+0x101/0x320 [ 135.553813][ T7792] __alloc_skb+0x101/0x320 [ 135.553994][ T7792] netlink_alloc_large_skb+0xba/0xf0 [ 135.554025][ T7792] netlink_sendmsg+0x3cf/0x6b0 [ 135.554062][ T7792] ? __pfx_netlink_sendmsg+0x10/0x10 [ 135.554097][ T7792] __sock_sendmsg+0x145/0x180 [ 135.554159][ T7792] ____sys_sendmsg+0x31e/0x4e0 [ 135.554240][ T7792] ___sys_sendmsg+0x17b/0x1d0 [ 135.554342][ T7792] __x64_sys_sendmsg+0xd4/0x160 [ 135.554395][ T7792] x64_sys_call+0x191e/0x2ff0 [ 135.554448][ T7792] do_syscall_64+0xd2/0x200 [ 135.554490][ T7792] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 135.554536][ T7792] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 135.554575][ T7792] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.554654][ T7792] RIP: 0033:0x7fae57e3eec9 [ 135.554748][ T7792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.554774][ T7792] RSP: 002b:00007fae5689f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 135.554800][ T7792] RAX: ffffffffffffffda RBX: 00007fae58095fa0 RCX: 00007fae57e3eec9 [ 135.554817][ T7792] RDX: 0000000000048090 RSI: 0000200000000100 RDI: 0000000000000003 [ 135.554835][ T7792] RBP: 00007fae5689f090 R08: 0000000000000000 R09: 0000000000000000 [ 135.554881][ T7792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.554899][ T7792] R13: 00007fae58096038 R14: 00007fae58095fa0 R15: 00007ffeb2c6db78 [ 135.554994][ T7792] [ 135.960471][ T7800] bridge0: port 3(gretap0) entered blocking state [ 135.967322][ T7800] bridge0: port 3(gretap0) entered disabled state [ 135.984759][ T7800] gretap0: entered allmulticast mode [ 135.996938][ T7800] gretap0: entered promiscuous mode [ 136.089382][ T7800] gretap0: left allmulticast mode [ 136.094567][ T7800] gretap0: left promiscuous mode [ 136.099810][ T7800] bridge0: port 3(gretap0) entered disabled state [ 136.107326][ T7813] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 136.761481][ T29] kauditd_printk_skb: 428 callbacks suppressed [ 136.761500][ T29] audit: type=1326 audit(1759008151.045:5783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.799777][ T29] audit: type=1326 audit(1759008151.075:5784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.823444][ T29] audit: type=1326 audit(1759008151.075:5785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.847702][ T29] audit: type=1326 audit(1759008151.075:5786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.871579][ T29] audit: type=1326 audit(1759008151.075:5787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.895500][ T29] audit: type=1326 audit(1759008151.075:5788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.919239][ T29] audit: type=1326 audit(1759008151.075:5789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.942882][ T29] audit: type=1326 audit(1759008151.075:5790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 136.988551][ T29] audit: type=1326 audit(1759008151.275:5791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 137.012254][ T29] audit: type=1326 audit(1759008151.275:5792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7838 comm="syz.5.1492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35bf5feec9 code=0x7ffc0000 [ 137.047504][ T7839] __nla_validate_parse: 10 callbacks suppressed [ 137.047526][ T7839] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1492'. [ 137.047552][ T7839] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1492'. [ 137.134367][ T7852] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1495'. [ 137.146313][ T7858] FAULT_INJECTION: forcing a failure. [ 137.146313][ T7858] name failslab, interval 1, probability 0, space 0, times 0 [ 137.159426][ T7858] CPU: 0 UID: 0 PID: 7858 Comm: syz.2.1497 Not tainted syzkaller #0 PREEMPT(voluntary) [ 137.159546][ T7858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 137.159568][ T7858] Call Trace: [ 137.159576][ T7858] [ 137.159586][ T7858] __dump_stack+0x1d/0x30 [ 137.159614][ T7858] dump_stack_lvl+0xe8/0x140 [ 137.159685][ T7858] dump_stack+0x15/0x1b [ 137.159708][ T7858] should_fail_ex+0x265/0x280 [ 137.159777][ T7858] should_failslab+0x8c/0xb0 [ 137.159809][ T7858] kmem_cache_alloc_noprof+0x50/0x310 [ 137.159847][ T7858] ? audit_log_start+0x365/0x6c0 [ 137.159889][ T7858] audit_log_start+0x365/0x6c0 [ 137.160009][ T7858] audit_seccomp+0x48/0x100 [ 137.160044][ T7858] ? __seccomp_filter+0x68c/0x10d0 [ 137.160079][ T7858] __seccomp_filter+0x69d/0x10d0 [ 137.160158][ T7858] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 137.160196][ T7858] ? vfs_write+0x7e8/0x960 [ 137.160230][ T7858] ? __rcu_read_unlock+0x4f/0x70 [ 137.160334][ T7858] ? __fget_files+0x184/0x1c0 [ 137.160365][ T7858] __secure_computing+0x82/0x150 [ 137.160388][ T7858] syscall_trace_enter+0xcf/0x1e0 [ 137.160481][ T7858] do_syscall_64+0xac/0x200 [ 137.160585][ T7858] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 137.160611][ T7858] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 137.160686][ T7858] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.160710][ T7858] RIP: 0033:0x7fae57e3eec9 [ 137.160727][ T7858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.160782][ T7858] RSP: 002b:00007fae5689f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 137.160802][ T7858] RAX: ffffffffffffffda RBX: 00007fae58095fa0 RCX: 00007fae57e3eec9 [ 137.160889][ T7858] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 137.160902][ T7858] RBP: 00007fae5689f090 R08: 0000000000001000 R09: 0000000000000000 [ 137.161032][ T7858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.161045][ T7858] R13: 00007fae58096038 R14: 00007fae58095fa0 R15: 00007ffeb2c6db78 [ 137.161077][ T7858] [ 137.438564][ T7864] wg1 speed is unknown, defaulting to 1000 [ 137.710847][ T7877] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1504'. [ 137.816108][ T7877] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1504'. [ 137.913690][ T7885] netlink: 'syz.2.1506': attribute type 1 has an invalid length. [ 137.921626][ T7885] netlink: 224 bytes leftover after parsing attributes in process `syz.2.1506'. [ 138.048090][ T7893] FAULT_INJECTION: forcing a failure. [ 138.048090][ T7893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 138.061520][ T7893] CPU: 0 UID: 0 PID: 7893 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 138.061548][ T7893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 138.061561][ T7893] Call Trace: [ 138.061603][ T7893] [ 138.061614][ T7893] __dump_stack+0x1d/0x30 [ 138.061637][ T7893] dump_stack_lvl+0xe8/0x140 [ 138.061658][ T7893] dump_stack+0x15/0x1b [ 138.061680][ T7893] should_fail_ex+0x265/0x280 [ 138.061770][ T7893] should_fail+0xb/0x20 [ 138.061793][ T7893] should_fail_usercopy+0x1a/0x20 [ 138.061828][ T7893] strncpy_from_user+0x25/0x230 [ 138.061863][ T7893] ? kmem_cache_alloc_noprof+0x186/0x310 [ 138.061937][ T7893] ? getname_flags+0x80/0x3b0 [ 138.061969][ T7893] getname_flags+0xae/0x3b0 [ 138.062008][ T7893] do_sys_openat2+0x60/0x110 [ 138.062088][ T7893] __x64_sys_openat+0xf2/0x120 [ 138.062128][ T7893] x64_sys_call+0x2e9c/0x2ff0 [ 138.062156][ T7893] do_syscall_64+0xd2/0x200 [ 138.062205][ T7893] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 138.062245][ T7893] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 138.062277][ T7893] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 138.062300][ T7893] RIP: 0033:0x7f06ee77eec9 [ 138.062320][ T7893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.062345][ T7893] RSP: 002b:00007f06ed1a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 138.062407][ T7893] RAX: ffffffffffffffda RBX: 00007f06ee9d6180 RCX: 00007f06ee77eec9 [ 138.062424][ T7893] RDX: 0000000000005400 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 138.062442][ T7893] RBP: 00007f06ed1a5090 R08: 0000000000000000 R09: 0000000000000000 [ 138.062475][ T7893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 138.062487][ T7893] R13: 00007f06ee9d6218 R14: 00007f06ee9d6180 R15: 00007fff625a5b88 [ 138.062546][ T7893] [ 139.327315][ T7910] wg1 speed is unknown, defaulting to 1000 [ 139.689842][ T7931] vhci_hcd: invalid port number 236 [ 139.909645][ T7939] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1523'. [ 140.254877][ T7946] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 140.322038][ T7952] wg1 speed is unknown, defaulting to 1000 [ 140.410681][ T7958] SELinux: Context system_u:object is not valid (left unmapped). [ 140.495637][ T7960] SELinux: Context  is not valid (left unmapped). [ 140.733820][ T7974] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1537'. [ 140.957626][ T7995] wg1 speed is unknown, defaulting to 1000 [ 140.964783][ T7999] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1547'. [ 140.974173][ T7999] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1547'. [ 141.376322][ T8014] IPv6: Can't replace route, no match found [ 141.480825][ T8023] FAULT_INJECTION: forcing a failure. [ 141.480825][ T8023] name failslab, interval 1, probability 0, space 0, times 0 [ 141.493818][ T8023] CPU: 0 UID: 0 PID: 8023 Comm: syz.5.1554 Not tainted syzkaller #0 PREEMPT(voluntary) [ 141.493852][ T8023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 141.493874][ T8023] Call Trace: [ 141.493883][ T8023] [ 141.493894][ T8023] __dump_stack+0x1d/0x30 [ 141.493916][ T8023] dump_stack_lvl+0xe8/0x140 [ 141.493936][ T8023] dump_stack+0x15/0x1b [ 141.493952][ T8023] should_fail_ex+0x265/0x280 [ 141.494005][ T8023] should_failslab+0x8c/0xb0 [ 141.494035][ T8023] kmem_cache_alloc_noprof+0x50/0x310 [ 141.494148][ T8023] ? getname_flags+0x80/0x3b0 [ 141.494188][ T8023] getname_flags+0x80/0x3b0 [ 141.494228][ T8023] __se_sys_quotactl+0x16a/0x670 [ 141.494288][ T8023] ? fput+0x8f/0xc0 [ 141.494333][ T8023] __x64_sys_quotactl+0x55/0x70 [ 141.494361][ T8023] x64_sys_call+0x15d6/0x2ff0 [ 141.494384][ T8023] do_syscall_64+0xd2/0x200 [ 141.494415][ T8023] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 141.494457][ T8023] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 141.494496][ T8023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.494525][ T8023] RIP: 0033:0x7f35bf5feec9 [ 141.494596][ T8023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.494621][ T8023] RSP: 002b:00007f35be067038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 141.494645][ T8023] RAX: ffffffffffffffda RBX: 00007f35bf855fa0 RCX: 00007f35bf5feec9 [ 141.494658][ T8023] RDX: 0000000000000000 RSI: 0000200000000100 RDI: ffffffff80000800 [ 141.494676][ T8023] RBP: 00007f35be067090 R08: 0000000000000000 R09: 0000000000000000 [ 141.494693][ T8023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.494749][ T8023] R13: 00007f35bf856038 R14: 00007f35bf855fa0 R15: 00007ffe85f7ce48 [ 141.494771][ T8023] [ 141.798871][ T8029] 9pnet: Could not find request transport: fd [ 142.380592][ T8053] __dump_stack+0x1d/0x30 [ 142.380614][ T8053] dump_stack_lvl+0xe8/0x140 [ 142.380641][ T8053] dump_stack+0x15/0x1b [ 142.380657][ T8053] should_fail_ex+0x265/0x280 [ 142.380687][ T8053] should_fail+0xb/0x20 [ 142.380722][ T8053] should_fail_usercopy+0x1a/0x20 [ 142.380851][ T8053] _copy_to_user+0x20/0xa0 [ 142.380890][ T8053] rng_dev_read+0x3ef/0x740 [ 142.380917][ T8053] ? trace_reschedule_exit+0xd/0xc0 [ 142.381022][ T8053] ? __pfx_rng_dev_read+0x10/0x10 [ 142.381118][ T8053] vfs_readv+0x3f8/0x690 [ 142.381170][ T8053] __x64_sys_preadv+0xfd/0x1c0 [ 142.381205][ T8053] x64_sys_call+0x282a/0x2ff0 [ 142.381232][ T8053] do_syscall_64+0xd2/0x200 [ 142.381375][ T8053] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 142.381447][ T8053] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 142.381480][ T8053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.381603][ T8053] RIP: 0033:0x7f183982eec9 [ 142.381623][ T8053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.381657][ T8053] RSP: 002b:00007f183828f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 142.381683][ T8053] RAX: ffffffffffffffda RBX: 00007f1839a85fa0 RCX: 00007f183982eec9 [ 142.381770][ T8053] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000005 [ 142.381783][ T8053] RBP: 00007f183828f090 R08: 0000000000000000 R09: 0000000000000000 [ 142.381796][ T8053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.381888][ T8053] R13: 00007f1839a86038 R14: 00007f1839a85fa0 R15: 00007ffeca3431f8 [ 142.381908][ T8053] [ 142.598174][ T8045] vhci_hcd: connection closed [ 142.598343][ T8033] vhci_hcd: connection closed [ 142.598424][ T3857] vhci_hcd: stop threads [ 142.603535][ T8034] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 142.607788][ T3857] vhci_hcd: release socket [ 142.607806][ T3857] vhci_hcd: disconnect device [ 142.657879][ T3857] vhci_hcd: stop threads [ 142.662188][ T3857] vhci_hcd: release socket [ 142.667016][ T3857] vhci_hcd: disconnect device [ 142.674941][ T8056] wg1 speed is unknown, defaulting to 1000 [ 142.755405][ T8064] 9pnet_fd: Insufficient options for proto=fd [ 142.906324][ T29] audit: type=1400 audit(1759008157.185:6171): avc: denied { ioctl } for pid=8065 comm="+}[@" path="socket:[22423]" dev="sockfs" ino=22423 ioctlcmd=0x8906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 142.945463][ T29] audit: type=1400 audit(1759008157.225:6172): avc: denied { name_connect } for pid=8065 comm="+}[@" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 142.990502][ T29] audit: type=1326 audit(1759008157.235:6173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.3.1572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 143.014158][ T29] audit: type=1326 audit(1759008157.235:6174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.3.1572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 143.037677][ T29] audit: type=1326 audit(1759008157.235:6175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.3.1572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 143.061456][ T29] audit: type=1326 audit(1759008157.235:6176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.3.1572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 143.085171][ T29] audit: type=1326 audit(1759008157.235:6177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.3.1572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f183982eec9 code=0x7ffc0000 [ 143.109289][ T29] audit: type=1326 audit(1759008157.235:6178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.3.1572" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f183982ef03 code=0x7ffc0000 [ 143.244470][ T8093] __nla_validate_parse: 3 callbacks suppressed [ 143.244486][ T8093] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1578'. [ 143.268933][ T8093] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1578'. [ 143.852566][ T8110] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1583'. [ 143.861937][ T8110] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1583'. [ 143.889076][ T8112] random: crng reseeded on system resumption [ 143.945994][ T8114] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1585'. [ 143.959074][ T8114] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1585'. [ 144.006128][ T8116] FAULT_INJECTION: forcing a failure. [ 144.006128][ T8116] name failslab, interval 1, probability 0, space 0, times 0 [ 144.019051][ T8116] CPU: 0 UID: 0 PID: 8116 Comm: syz.4.1586 Not tainted syzkaller #0 PREEMPT(voluntary) [ 144.019086][ T8116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 144.019145][ T8116] Call Trace: [ 144.019155][ T8116] [ 144.019165][ T8116] __dump_stack+0x1d/0x30 [ 144.019192][ T8116] dump_stack_lvl+0xe8/0x140 [ 144.019216][ T8116] dump_stack+0x15/0x1b [ 144.019233][ T8116] should_fail_ex+0x265/0x280 [ 144.019258][ T8116] should_failslab+0x8c/0xb0 [ 144.019283][ T8116] __kmalloc_noprof+0xa5/0x3e0 [ 144.019327][ T8116] ? usb_alloc_urb+0x42/0xc0 [ 144.019371][ T8116] usb_alloc_urb+0x42/0xc0 [ 144.019505][ T8116] do_proc_control+0x1a8/0x8b0 [ 144.019531][ T8116] ? should_fail_ex+0xdb/0x280 [ 144.019575][ T8116] proc_control+0x71/0xa0 [ 144.019615][ T8116] usbdev_ioctl+0x948/0x1710 [ 144.019696][ T8116] ? __pfx_usbdev_ioctl+0x10/0x10 [ 144.019729][ T8116] __se_sys_ioctl+0xce/0x140 [ 144.019755][ T8116] __x64_sys_ioctl+0x43/0x50 [ 144.019778][ T8116] x64_sys_call+0x1816/0x2ff0 [ 144.019876][ T8116] do_syscall_64+0xd2/0x200 [ 144.019909][ T8116] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 144.019942][ T8116] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 144.019981][ T8116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.020085][ T8116] RIP: 0033:0x7f06ee77eec9 [ 144.020104][ T8116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.020128][ T8116] RSP: 002b:00007f06ed1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.020150][ T8116] RAX: ffffffffffffffda RBX: 00007f06ee9d5fa0 RCX: 00007f06ee77eec9 [ 144.020166][ T8116] RDX: 0000200000000000 RSI: 00000000c0185500 RDI: 0000000000000003 [ 144.020183][ T8116] RBP: 00007f06ed1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 144.020218][ T8116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.020234][ T8116] R13: 00007f06ee9d6038 R14: 00007f06ee9d5fa0 R15: 00007fff625a5b88 [ 144.020261][ T8116] [ 144.415144][ T8135] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1594'. [ 144.446284][ T8138] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1595'. [ 144.447246][ T8135] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1594'. [ 144.756730][ T8165] can0: slcan on ttyS3. [ 144.795476][ T8165] can0 (unregistered): slcan off ttyS3. [ 144.923116][ T8168] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1605'. [ 145.254792][ T8181] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 146.018178][ T8216] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 146.500107][ T8238] sctp: [Deprecated]: syz.5.1630 (pid 8238) Use of int in max_burst socket option deprecated. [ 146.500107][ T8238] Use struct sctp_assoc_value instead [ 146.808774][ T8255] IPv6: Can't replace route, no match found [ 147.360658][ T29] kauditd_printk_skb: 138 callbacks suppressed [ 147.360678][ T29] audit: type=1400 audit(1759008161.645:6317): avc: denied { name_bind } for pid=8275 comm="syz.2.1643" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 147.585347][ T3467] usb 11-2: enqueue for inactive port 1 [ 147.591227][ T3467] usb 11-2: enqueue for inactive port 1 [ 147.675346][ T3467] vhci_hcd: vhci_device speed not set [ 147.842671][ T29] audit: type=1326 audit(1759008162.125:6318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 147.866410][ T29] audit: type=1326 audit(1759008162.125:6319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 147.892086][ T29] audit: type=1326 audit(1759008162.175:6320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 147.915870][ T29] audit: type=1326 audit(1759008162.175:6321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 147.940116][ T29] audit: type=1326 audit(1759008162.175:6322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=99 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 147.964176][ T29] audit: type=1326 audit(1759008162.175:6323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 147.987827][ T29] audit: type=1326 audit(1759008162.175:6324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 148.011291][ T29] audit: type=1326 audit(1759008162.175:6325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8300 comm="syz.4.1652" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 148.024352][ T8301] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 148.177490][ T8314] wg1 speed is unknown, defaulting to 1000 [ 148.299146][ T8327] netlink: 'syz.3.1662': attribute type 1 has an invalid length. [ 148.306986][ T8327] __nla_validate_parse: 14 callbacks suppressed [ 148.307005][ T8327] netlink: 224 bytes leftover after parsing attributes in process `syz.3.1662'. [ 148.537221][ T8341] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1665'. [ 148.549270][ T8341] IPv6: Can't replace route, no match found [ 148.825708][ T8352] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1671'. [ 148.835129][ T8352] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1671'. [ 149.130939][ T8360] netlink: 'syz.4.1675': attribute type 1 has an invalid length. [ 149.138865][ T8360] netlink: 224 bytes leftover after parsing attributes in process `syz.4.1675'. [ 149.307083][ T8363] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1676'. [ 149.370299][ T8363] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1676'. [ 149.856528][ T8382] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1682'. [ 149.873564][ T8382] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1682'. [ 150.059243][ T8390] netlink: 'syz.3.1686': attribute type 1 has an invalid length. [ 150.067229][ T8390] netlink: 224 bytes leftover after parsing attributes in process `syz.3.1686'. [ 151.346865][ T8421] netlink: 'syz.4.1697': attribute type 1 has an invalid length. [ 152.381686][ T8446] netlink: 'syz.1.1705': attribute type 1 has an invalid length. [ 152.626352][ T8459] netlink: 'syz.4.1710': attribute type 1 has an invalid length. [ 153.243646][ T8488] netlink: 'syz.2.1721': attribute type 1 has an invalid length. [ 153.582086][ T8497] __nla_validate_parse: 16 callbacks suppressed [ 153.582102][ T8497] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1724'. [ 153.684500][ T8497] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1724'. [ 153.777605][ T8508] wg1 speed is unknown, defaulting to 1000 [ 154.030023][ T8518] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1731'. [ 154.086777][ T8518] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1731'. [ 154.108727][ T8522] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1732'. [ 154.122607][ T8522] IPv6: Can't replace route, no match found [ 154.492226][ T8533] wg1 speed is unknown, defaulting to 1000 [ 154.898508][ T8536] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1737'. [ 154.952742][ T8538] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1737'. [ 154.981701][ T8540] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1738'. [ 155.015855][ T8540] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1738'. [ 155.115061][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 155.115082][ T29] audit: type=1326 audit(1759008169.395:6393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 155.145143][ T29] audit: type=1326 audit(1759008169.395:6394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 155.168941][ T29] audit: type=1326 audit(1759008169.395:6395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe62e55d710 code=0x7ffc0000 [ 155.192775][ T29] audit: type=1326 audit(1759008169.395:6396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fe62e5606f7 code=0x7ffc0000 [ 155.216498][ T29] audit: type=1326 audit(1759008169.395:6397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 155.239843][ T29] audit: type=1326 audit(1759008169.395:6398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fe62e5606f7 code=0x7ffc0000 [ 155.263499][ T29] audit: type=1326 audit(1759008169.395:6399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fe62e55db2a code=0x7ffc0000 [ 155.287177][ T29] audit: type=1326 audit(1759008169.395:6400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 155.310845][ T29] audit: type=1326 audit(1759008169.395:6401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=189 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 155.334533][ T29] audit: type=1326 audit(1759008169.395:6402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8547 comm="syz.1.1742" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 155.604061][ T8549] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1742'. [ 155.782344][ T8562] wg1 speed is unknown, defaulting to 1000 [ 156.478506][ T8584] FAULT_INJECTION: forcing a failure. [ 156.478506][ T8584] name failslab, interval 1, probability 0, space 0, times 0 [ 156.491532][ T8584] CPU: 0 UID: 0 PID: 8584 Comm: syz.3.1754 Not tainted syzkaller #0 PREEMPT(voluntary) [ 156.491561][ T8584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.491575][ T8584] Call Trace: [ 156.491637][ T8584] [ 156.491647][ T8584] __dump_stack+0x1d/0x30 [ 156.491674][ T8584] dump_stack_lvl+0xe8/0x140 [ 156.491749][ T8584] dump_stack+0x15/0x1b [ 156.491765][ T8584] should_fail_ex+0x265/0x280 [ 156.491797][ T8584] should_failslab+0x8c/0xb0 [ 156.491847][ T8584] kmem_cache_alloc_node_noprof+0x57/0x320 [ 156.491887][ T8584] ? __alloc_skb+0x101/0x320 [ 156.491913][ T8584] __alloc_skb+0x101/0x320 [ 156.491934][ T8584] ? audit_log_start+0x365/0x6c0 [ 156.492007][ T8584] audit_log_start+0x380/0x6c0 [ 156.492040][ T8584] ? __rcu_read_unlock+0x4f/0x70 [ 156.492067][ T8584] ? xfd_validate_state+0x45/0xf0 [ 156.492155][ T8584] audit_seccomp+0x48/0x100 [ 156.492208][ T8584] ? __seccomp_filter+0x68c/0x10d0 [ 156.492233][ T8584] __seccomp_filter+0x69d/0x10d0 [ 156.492265][ T8584] ? proc_id_connector+0x114/0x270 [ 156.492295][ T8584] ? set_dumpable+0xb5/0x150 [ 156.492321][ T8584] ? key_fsgid_changed+0x80/0x90 [ 156.492489][ T8584] __secure_computing+0x82/0x150 [ 156.492516][ T8584] syscall_trace_enter+0xcf/0x1e0 [ 156.492542][ T8584] do_syscall_64+0xac/0x200 [ 156.492611][ T8584] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.492693][ T8584] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 156.492728][ T8584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.492835][ T8584] RIP: 0033:0x7f183982d8dc [ 156.492852][ T8584] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 156.492871][ T8584] RSP: 002b:00007f183828f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 156.492890][ T8584] RAX: ffffffffffffffda RBX: 00007f1839a85fa0 RCX: 00007f183982d8dc [ 156.492902][ T8584] RDX: 000000000000000f RSI: 00007f183828f0a0 RDI: 0000000000000006 [ 156.492916][ T8584] RBP: 00007f183828f090 R08: 0000000000000000 R09: 0000000000000000 [ 156.492961][ T8584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.492973][ T8584] R13: 00007f1839a86038 R14: 00007f1839a85fa0 R15: 00007ffeca3431f8 [ 156.492994][ T8584] [ 156.824006][ T8593] wg1 speed is unknown, defaulting to 1000 [ 156.995719][ T8601] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 157.133573][ T8615] wg1 speed is unknown, defaulting to 1000 [ 157.304225][ T8629] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 158.047456][ T8659] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 158.125176][ T8669] IPv6: Can't replace route, no match found [ 158.178449][ T8675] netlink: 'syz.5.1791': attribute type 4 has an invalid length. [ 158.211198][ T8677] wg1 speed is unknown, defaulting to 1000 [ 158.444049][ T8693] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 158.611206][ T8716] wg1 speed is unknown, defaulting to 1000 [ 158.641607][ T8720] __nla_validate_parse: 2 callbacks suppressed [ 158.641624][ T8720] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1805'. [ 158.663550][ T8720] IPv6: Can't replace route, no match found [ 158.843942][ T8727] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 159.366204][ T8750] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 159.375101][ T8750] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 159.972161][ T8769] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1823'. [ 159.981388][ T8769] netlink: 144 bytes leftover after parsing attributes in process `syz.2.1823'. [ 160.164661][ T8785] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1831'. [ 160.179804][ T8785] IPv6: Can't replace route, no match found [ 160.288425][ T8789] hub 9-0:1.0: USB hub found [ 160.293349][ T8789] hub 9-0:1.0: 8 ports detected [ 160.486296][ T8798] SELinux: Context system_u:object_r:inetd_exec_t:s0 is not valid (left unmapped). [ 160.496266][ T29] kauditd_printk_skb: 440 callbacks suppressed [ 160.496283][ T29] audit: type=1400 audit(2000000003.630:6841): avc: denied { relabelto } for pid=8797 comm="syz.3.1836" name="370" dev="tmpfs" ino=1966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_exec_t:s0" [ 160.529708][ T29] audit: type=1400 audit(2000000003.630:6842): avc: denied { associate } for pid=8797 comm="syz.3.1836" name="370" dev="tmpfs" ino=1966 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:inetd_exec_t:s0" [ 160.569925][ T29] audit: type=1400 audit(2000000003.700:6843): avc: denied { remove_name } for pid=3310 comm="syz-executor" name="binderfs" dev="tmpfs" ino=1970 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_exec_t:s0" [ 160.601005][ T29] audit: type=1400 audit(2000000003.700:6844): avc: denied { rmdir } for pid=3310 comm="syz-executor" name="370" dev="tmpfs" ino=1966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_exec_t:s0" [ 160.642716][ T8804] wg1 speed is unknown, defaulting to 1000 [ 160.867117][ T8816] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1842'. [ 160.888750][ T8816] IPv6: Can't replace route, no match found [ 161.027459][ T29] audit: type=1400 audit(2000000004.160:6845): avc: denied { write } for pid=8823 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 161.067291][ T29] audit: type=1400 audit(2000000004.200:6846): avc: denied { write } for pid=8823 comm="syz.1.1844" path="socket:[25580]" dev="sockfs" ino=25580 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 161.099283][ T29] audit: type=1400 audit(2000000004.230:6847): avc: denied { bind } for pid=8823 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 161.119495][ T29] audit: type=1400 audit(2000000004.230:6848): avc: denied { setopt } for pid=8823 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 161.172640][ T29] audit: type=1326 audit(2000000004.300:6849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.1.1845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 161.225513][ T29] audit: type=1326 audit(2000000004.330:6850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8828 comm="syz.1.1845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7fe62e55eec9 code=0x7ffc0000 [ 161.678847][ T8842] wg1 speed is unknown, defaulting to 1000 [ 161.792980][ T8851] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1854'. [ 161.838655][ T8853] netlink: 3 bytes leftover after parsing attributes in process `syz.3.1855'. [ 161.858162][ T8855] netlink: 3 bytes leftover after parsing attributes in process `syz.1.1856'. [ 161.872907][ T8855] batadv0: entered promiscuous mode [ 161.878276][ T8855] batadv0: entered allmulticast mode [ 161.884807][ T8851] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1854'. [ 161.899586][ T8853] batadv0: entered promiscuous mode [ 161.904857][ T8853] batadv0: entered allmulticast mode [ 161.999980][ T8865] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 162.082499][ T8874] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1862'. [ 162.092816][ T8873] wg1 speed is unknown, defaulting to 1000 [ 162.348306][ T8889] wg1 speed is unknown, defaulting to 1000 [ 162.454024][ T8901] wg1 speed is unknown, defaulting to 1000 [ 162.631606][ T8909] IPv6: Can't replace route, no match found [ 162.716016][ T8917] FAULT_INJECTION: forcing a failure. [ 162.716016][ T8917] name failslab, interval 1, probability 0, space 0, times 0 [ 162.728808][ T8917] CPU: 1 UID: 0 PID: 8917 Comm: syz.3.1882 Not tainted syzkaller #0 PREEMPT(voluntary) [ 162.728850][ T8917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 162.728867][ T8917] Call Trace: [ 162.728876][ T8917] [ 162.728886][ T8917] __dump_stack+0x1d/0x30 [ 162.728913][ T8917] dump_stack_lvl+0xe8/0x140 [ 162.728936][ T8917] dump_stack+0x15/0x1b [ 162.729023][ T8917] should_fail_ex+0x265/0x280 [ 162.729067][ T8917] should_failslab+0x8c/0xb0 [ 162.729101][ T8917] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 162.729139][ T8917] ? debugfs_alloc_inode+0x34/0x40 [ 162.729177][ T8917] ? lookup_noperm+0xc9/0x180 [ 162.729341][ T8917] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 162.729379][ T8917] debugfs_alloc_inode+0x34/0x40 [ 162.729416][ T8917] alloc_inode+0x40/0x170 [ 162.729487][ T8917] new_inode+0x1d/0xe0 [ 162.729596][ T8917] __debugfs_create_file+0x109/0x330 [ 162.729632][ T8917] debugfs_create_file_full+0x3f/0x60 [ 162.729668][ T8917] ? __pfx_wg_setup+0x10/0x10 [ 162.729713][ T8917] ref_tracker_dir_debugfs+0x100/0x1e0 [ 162.729761][ T8917] alloc_netdev_mqs+0x1a2/0xa30 [ 162.729798][ T8917] rtnl_create_link+0x239/0x710 [ 162.729881][ T8917] rtnl_newlink_create+0x14c/0x620 [ 162.729926][ T8917] ? security_capable+0x83/0x90 [ 162.729987][ T8917] ? netlink_ns_capable+0x86/0xa0 [ 162.730033][ T8917] rtnl_newlink+0xf29/0x12d0 [ 162.730081][ T8917] ? perf_swevent_event+0x1e8/0x450 [ 162.730173][ T8917] ? __memcg_slab_free_hook+0x135/0x230 [ 162.730217][ T8917] ? __rcu_read_unlock+0x4f/0x70 [ 162.730245][ T8917] ? avc_has_perm_noaudit+0x1b1/0x200 [ 162.730349][ T8917] ? cred_has_capability+0x210/0x280 [ 162.730385][ T8917] ? selinux_capable+0x31/0x40 [ 162.730422][ T8917] ? security_capable+0x83/0x90 [ 162.730455][ T8917] ? ns_capable+0x7d/0xb0 [ 162.730557][ T8917] ? __pfx_rtnl_newlink+0x10/0x10 [ 162.730668][ T8917] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 162.730714][ T8917] netlink_rcv_skb+0x123/0x220 [ 162.730742][ T8917] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 162.730797][ T8917] rtnetlink_rcv+0x1c/0x30 [ 162.730900][ T8917] netlink_unicast+0x5bd/0x690 [ 162.730969][ T8917] netlink_sendmsg+0x58b/0x6b0 [ 162.731004][ T8917] ? __pfx_netlink_sendmsg+0x10/0x10 [ 162.731037][ T8917] __sock_sendmsg+0x145/0x180 [ 162.731158][ T8917] ____sys_sendmsg+0x31e/0x4e0 [ 162.731273][ T8917] ___sys_sendmsg+0x17b/0x1d0 [ 162.731328][ T8917] __x64_sys_sendmsg+0xd4/0x160 [ 162.731367][ T8917] x64_sys_call+0x191e/0x2ff0 [ 162.731396][ T8917] do_syscall_64+0xd2/0x200 [ 162.731464][ T8917] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 162.731506][ T8917] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 162.731544][ T8917] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.731645][ T8917] RIP: 0033:0x7f183982eec9 [ 162.731704][ T8917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.731727][ T8917] RSP: 002b:00007f183828f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 162.731753][ T8917] RAX: ffffffffffffffda RBX: 00007f1839a85fa0 RCX: 00007f183982eec9 [ 162.731770][ T8917] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 162.731807][ T8917] RBP: 00007f183828f090 R08: 0000000000000000 R09: 0000000000000000 [ 162.731823][ T8917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.731842][ T8917] R13: 00007f1839a86038 R14: 00007f1839a85fa0 R15: 00007ffeca3431f8 [ 162.731867][ T8917] [ 162.731877][ T8917] debugfs: out of free dentries, can not create file 'netdev@ffff888119fa0550' [ 163.107113][ T8935] wg1 speed is unknown, defaulting to 1000 [ 163.222052][ T8951] wg1 speed is unknown, defaulting to 1000 [ 163.562471][ T8974] FAULT_INJECTION: forcing a failure. [ 163.562471][ T8974] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 163.575797][ T8974] CPU: 0 UID: 0 PID: 8974 Comm: syz.3.1903 Not tainted syzkaller #0 PREEMPT(voluntary) [ 163.575874][ T8974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 163.575886][ T8974] Call Trace: [ 163.575892][ T8974] [ 163.575956][ T8974] __dump_stack+0x1d/0x30 [ 163.575975][ T8974] dump_stack_lvl+0xe8/0x140 [ 163.575992][ T8974] dump_stack+0x15/0x1b [ 163.576007][ T8974] should_fail_ex+0x265/0x280 [ 163.576100][ T8974] should_fail+0xb/0x20 [ 163.576180][ T8974] should_fail_usercopy+0x1a/0x20 [ 163.576204][ T8974] _copy_to_user+0x20/0xa0 [ 163.576234][ T8974] simple_read_from_buffer+0xb5/0x130 [ 163.576256][ T8974] proc_fail_nth_read+0x10e/0x150 [ 163.576477][ T8974] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 163.576502][ T8974] vfs_read+0x1a5/0x770 [ 163.576521][ T8974] ? __rcu_read_unlock+0x4f/0x70 [ 163.576621][ T8974] ? __fget_files+0x184/0x1c0 [ 163.576662][ T8974] ksys_read+0xda/0x1a0 [ 163.576686][ T8974] __x64_sys_read+0x40/0x50 [ 163.576709][ T8974] x64_sys_call+0x27bc/0x2ff0 [ 163.576728][ T8974] do_syscall_64+0xd2/0x200 [ 163.576830][ T8974] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 163.576852][ T8974] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 163.576877][ T8974] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 163.576970][ T8974] RIP: 0033:0x7f183982d8dc [ 163.576984][ T8974] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 163.577000][ T8974] RSP: 002b:00007f183828f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 163.577017][ T8974] RAX: ffffffffffffffda RBX: 00007f1839a85fa0 RCX: 00007f183982d8dc [ 163.577028][ T8974] RDX: 000000000000000f RSI: 00007f183828f0a0 RDI: 0000000000000005 [ 163.577077][ T8974] RBP: 00007f183828f090 R08: 0000000000000000 R09: 0000000000000000 [ 163.577089][ T8974] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000002 [ 163.577099][ T8974] R13: 00007f1839a86038 R14: 00007f1839a85fa0 R15: 00007ffeca3431f8 [ 163.577118][ T8974] [ 163.912270][ T8981] wg1 speed is unknown, defaulting to 1000 [ 164.012174][ T8989] wg1 speed is unknown, defaulting to 1000 [ 164.204272][ T8998] FAULT_INJECTION: forcing a failure. [ 164.204272][ T8998] name failslab, interval 1, probability 0, space 0, times 0 [ 164.217241][ T8998] CPU: 0 UID: 0 PID: 8998 Comm: syz.2.1912 Not tainted syzkaller #0 PREEMPT(voluntary) [ 164.217310][ T8998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 164.217327][ T8998] Call Trace: [ 164.217336][ T8998] [ 164.217344][ T8998] __dump_stack+0x1d/0x30 [ 164.217366][ T8998] dump_stack_lvl+0xe8/0x140 [ 164.217390][ T8998] dump_stack+0x15/0x1b [ 164.217440][ T8998] should_fail_ex+0x265/0x280 [ 164.217472][ T8998] should_failslab+0x8c/0xb0 [ 164.217504][ T8998] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 164.217541][ T8998] ? __d_alloc+0x3d/0x340 [ 164.217596][ T8998] ? perf_swevent_read+0x9/0x10 [ 164.217622][ T8998] __d_alloc+0x3d/0x340 [ 164.217739][ T8998] d_alloc_parallel+0x53/0xc60 [ 164.217770][ T8998] ? __rcu_read_unlock+0x34/0x70 [ 164.217796][ T8998] ? bpf_trace_run2+0x124/0x1c0 [ 164.217823][ T8998] ? lockref_get_not_dead+0x120/0x1c0 [ 164.217985][ T8998] ? __rcu_read_unlock+0x4f/0x70 [ 164.218008][ T8998] __lookup_slow+0x8c/0x250 [ 164.218081][ T8998] lookup_slow+0x3c/0x60 [ 164.218113][ T8998] link_path_walk+0x753/0x900 [ 164.218165][ T8998] path_openat+0x1de/0x2170 [ 164.218202][ T8998] ? _parse_integer_limit+0x170/0x190 [ 164.218237][ T8998] do_filp_open+0x109/0x230 [ 164.218331][ T8998] ? __pfx_kfree_link+0x10/0x10 [ 164.218368][ T8998] do_sys_openat2+0xa6/0x110 [ 164.218459][ T8998] __x64_sys_openat+0xf2/0x120 [ 164.218498][ T8998] x64_sys_call+0x2e9c/0x2ff0 [ 164.218522][ T8998] do_syscall_64+0xd2/0x200 [ 164.218628][ T8998] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 164.218664][ T8998] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 164.218692][ T8998] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 164.218730][ T8998] RIP: 0033:0x7fae57e3eec9 [ 164.218750][ T8998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.218774][ T8998] RSP: 002b:00007fae5689f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 164.218795][ T8998] RAX: ffffffffffffffda RBX: 00007fae58095fa0 RCX: 00007fae57e3eec9 [ 164.218807][ T8998] RDX: 0000000000004000 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 164.218820][ T8998] RBP: 00007fae5689f090 R08: 0000000000000000 R09: 0000000000000000 [ 164.218832][ T8998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.218878][ T8998] R13: 00007fae58096038 R14: 00007fae58095fa0 R15: 00007ffeb2c6db78 [ 164.218900][ T8998] [ 165.084564][ T9039] wg1 speed is unknown, defaulting to 1000 [ 165.173437][ T9055] FAULT_INJECTION: forcing a failure. [ 165.173437][ T9055] name failslab, interval 1, probability 0, space 0, times 0 [ 165.186213][ T9055] CPU: 1 UID: 0 PID: 9055 Comm: syz.5.1935 Not tainted syzkaller #0 PREEMPT(voluntary) [ 165.186286][ T9055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 165.186301][ T9055] Call Trace: [ 165.186310][ T9055] [ 165.186320][ T9055] __dump_stack+0x1d/0x30 [ 165.186411][ T9055] dump_stack_lvl+0xe8/0x140 [ 165.186438][ T9055] dump_stack+0x15/0x1b [ 165.186461][ T9055] should_fail_ex+0x265/0x280 [ 165.186487][ T9055] ? audit_log_d_path+0x8d/0x150 [ 165.186592][ T9055] should_failslab+0x8c/0xb0 [ 165.186622][ T9055] __kmalloc_cache_noprof+0x4c/0x320 [ 165.186666][ T9055] audit_log_d_path+0x8d/0x150 [ 165.186720][ T9055] audit_log_d_path_exe+0x42/0x70 [ 165.186803][ T9055] audit_log_task+0x1e9/0x250 [ 165.186839][ T9055] audit_seccomp+0x61/0x100 [ 165.186864][ T9055] ? __seccomp_filter+0x68c/0x10d0 [ 165.186932][ T9055] __seccomp_filter+0x69d/0x10d0 [ 165.186962][ T9055] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 165.186995][ T9055] ? vfs_write+0x7e8/0x960 [ 165.187053][ T9055] ? __rcu_read_unlock+0x4f/0x70 [ 165.187101][ T9055] ? __fget_files+0x184/0x1c0 [ 165.187139][ T9055] __secure_computing+0x82/0x150 [ 165.187161][ T9055] syscall_trace_enter+0xcf/0x1e0 [ 165.187194][ T9055] do_syscall_64+0xac/0x200 [ 165.187235][ T9055] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 165.187305][ T9055] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 165.187342][ T9055] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 165.187370][ T9055] RIP: 0033:0x7f35bf5feec9 [ 165.187389][ T9055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.187444][ T9055] RSP: 002b:00007f35be046038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ae [ 165.187469][ T9055] RAX: ffffffffffffffda RBX: 00007f35bf856090 RCX: 00007f35bf5feec9 [ 165.187485][ T9055] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000200000000100 [ 165.187502][ T9055] RBP: 00007f35be046090 R08: 0000000000000000 R09: 0000000000000000 [ 165.187518][ T9055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.187535][ T9055] R13: 00007f35bf856128 R14: 00007f35bf856090 R15: 00007ffe85f7ce48 [ 165.187560][ T9055] [ 165.590279][ T29] kauditd_printk_skb: 210 callbacks suppressed [ 165.590298][ T29] audit: type=1400 audit(2000000008.720:7061): avc: denied { module_request } for pid=9068 comm="syz.4.1941" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 165.704225][ T29] audit: type=1400 audit(2000000008.830:7062): avc: denied { mount } for pid=9068 comm="syz.4.1941" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 165.726088][ T29] audit: type=1400 audit(2000000008.830:7063): avc: denied { write } for pid=9068 comm="syz.4.1941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.746675][ T29] audit: type=1400 audit(2000000008.830:7064): avc: denied { ioctl } for pid=9068 comm="syz.4.1941" path="socket:[27188]" dev="sockfs" ino=27188 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.772848][ T29] audit: type=1400 audit(2000000008.830:7065): avc: denied { create } for pid=9068 comm="syz.4.1941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 165.792815][ T29] audit: type=1400 audit(2000000008.830:7066): avc: denied { bind } for pid=9068 comm="syz.4.1941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 165.812615][ T29] audit: type=1400 audit(2000000008.830:7067): avc: denied { create } for pid=9068 comm="syz.4.1941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 165.832326][ T29] audit: type=1400 audit(2000000008.830:7068): avc: denied { setopt } for pid=9068 comm="syz.4.1941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 165.896215][ T29] audit: type=1400 audit(2000000008.910:7069): avc: denied { write } for pid=9068 comm="syz.4.1941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 165.916110][ T29] audit: type=1400 audit(2000000009.000:7070): avc: denied { create } for pid=9074 comm="syz.3.1942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 165.976992][ T9079] netlink: 'syz.3.1943': attribute type 1 has an invalid length. [ 165.984800][ T9079] __nla_validate_parse: 2 callbacks suppressed [ 165.984817][ T9079] netlink: 224 bytes leftover after parsing attributes in process `syz.3.1943'. [ 166.187925][ T9088] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1945'. [ 166.222855][ T9088] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1945'. [ 166.492138][ T9094] wg1 speed is unknown, defaulting to 1000 [ 166.689724][ T9105] wg1 speed is unknown, defaulting to 1000 [ 166.855430][ T9108] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1953'. [ 166.864538][ T9108] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1953'. [ 166.878592][ T9115] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1957'. [ 166.909146][ T9115] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1957'. [ 167.840856][ T9152] wg1 speed is unknown, defaulting to 1000 [ 168.953219][ T9177] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1975'. [ 168.962553][ T9177] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1975'. [ 169.197042][ T9193] wg1 speed is unknown, defaulting to 1000 [ 169.455811][ T9205] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1983'. [ 170.583221][ T9230] wg1 speed is unknown, defaulting to 1000 [ 170.987759][ T29] kauditd_printk_skb: 235 callbacks suppressed [ 170.987800][ T29] audit: type=1326 audit(2000000014.120:7306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.017561][ T29] audit: type=1326 audit(2000000014.120:7307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.041796][ T29] audit: type=1326 audit(2000000014.120:7308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.065729][ T29] audit: type=1326 audit(2000000014.120:7309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.089158][ T29] audit: type=1326 audit(2000000014.120:7310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.113156][ T29] audit: type=1326 audit(2000000014.120:7311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.178823][ T29] audit: type=1326 audit(2000000014.310:7312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.202431][ T29] audit: type=1326 audit(2000000014.310:7313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.231630][ T9251] __nla_validate_parse: 4 callbacks suppressed [ 171.231645][ T9251] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1998'. [ 171.247006][ T9251] netlink: 144 bytes leftover after parsing attributes in process `syz.4.1998'. [ 171.293351][ T29] audit: type=1326 audit(2000000014.360:7314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.316905][ T29] audit: type=1326 audit(2000000014.360:7315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9249 comm="syz.4.1998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f06ee77eec9 code=0x7ffc0000 [ 171.899676][ T9284] wg1 speed is unknown, defaulting to 1000 [ 172.191350][ T9292] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2010'. [ 172.415375][ T9299] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2014'. [ 172.545114][ T9314] wg1 speed is unknown, defaulting to 1000 [ 173.455822][ T9337] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2026'. [ 173.773963][ T9348] wg1 speed is unknown, defaulting to 1000 [ 173.922466][ T9351] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2032'. [ 174.883786][ T9373] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2040'. [ 174.933527][ T9373] netlink: 144 bytes leftover after parsing attributes in process `syz.2.2040'. [ 174.942811][ T9373] netlink: 144 bytes leftover after parsing attributes in process `syz.2.2040'. [ 174.982132][ T9378] wg1 speed is unknown, defaulting to 1000 [ 175.110670][ T9384] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2044'. [ 176.060993][ T9412] wg1 speed is unknown, defaulting to 1000 [ 176.734413][ T9437] __nla_validate_parse: 6 callbacks suppressed [ 176.734427][ T9437] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2064'. [ 176.755903][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 176.755920][ T29] audit: type=1326 audit(2000000019.890:7437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.789408][ T29] audit: type=1326 audit(2000000019.890:7438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.813402][ T29] audit: type=1326 audit(2000000019.890:7439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.837573][ T29] audit: type=1326 audit(2000000019.890:7440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.861051][ T29] audit: type=1326 audit(2000000019.890:7441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.884597][ T29] audit: type=1326 audit(2000000019.890:7442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.893699][ T9440] netlink: 144 bytes leftover after parsing attributes in process `syz.2.2064'. [ 176.917359][ T9440] netlink: 144 bytes leftover after parsing attributes in process `syz.2.2064'. [ 176.931865][ T29] audit: type=1326 audit(2000000020.060:7443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 176.955789][ T29] audit: type=1326 audit(2000000020.060:7444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9436 comm="syz.2.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae57e3eec9 code=0x7ffc0000 [ 177.034312][ T29] audit: type=1400 audit(2000000020.160:7445): avc: denied { create } for pid=9441 comm="syz.1.2066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 177.063264][ T29] audit: type=1400 audit(2000000020.170:7446): avc: denied { bind } for pid=9441 comm="syz.1.2066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 177.104555][ T9450] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2069'. [ 177.173028][ T3890] ================================================================== [ 177.181200][ T3890] BUG: KCSAN: data-race in n_tty_receive_char_flow_ctrl / tty_set_termios [ 177.189759][ T3890] [ 177.192090][ T3890] write to 0xffff88811fb7ad08 of 44 bytes by task 9458 on cpu 1: [ 177.200238][ T3890] tty_set_termios+0xc0/0x8c0 [ 177.204935][ T3890] set_termios+0x496/0x4e0 [ 177.209396][ T3890] tty_mode_ioctl+0x379/0x5c0 [ 177.214103][ T3890] n_tty_ioctl_helper+0x91/0x210 [ 177.219071][ T3890] n_tty_ioctl+0x101/0x200 [ 177.223520][ T3890] tty_ioctl+0x842/0xb80 [ 177.227851][ T3890] __se_sys_ioctl+0xce/0x140 [ 177.232441][ T3890] __x64_sys_ioctl+0x43/0x50 [ 177.237032][ T3890] x64_sys_call+0x1816/0x2ff0 [ 177.241720][ T3890] do_syscall_64+0xd2/0x200 [ 177.246239][ T3890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 177.252339][ T3890] [ 177.254749][ T3890] read to 0xffff88811fb7ad22 of 1 bytes by task 3890 on cpu 0: [ 177.262446][ T3890] n_tty_receive_char_flow_ctrl+0x59/0x1a0 [ 177.268608][ T3890] n_tty_lookahead_flow_ctrl+0xed/0x130 [ 177.274388][ T3890] tty_port_default_lookahead_buf+0x8e/0xc0 [ 177.280512][ T3890] flush_to_ldisc+0x288/0x340 [ 177.285295][ T3890] process_scheduled_works+0x4ce/0x9d0 [ 177.290790][ T3890] worker_thread+0x582/0x770 [ 177.295400][ T3890] kthread+0x486/0x510 [ 177.299484][ T3890] ret_from_fork+0x11f/0x1b0 [ 177.304181][ T3890] ret_from_fork_asm+0x1a/0x30 [ 177.309086][ T3890] [ 177.311423][ T3890] value changed: 0x13 -> 0xb6 [ 177.316268][ T3890] [ 177.318675][ T3890] Reported by Kernel Concurrency Sanitizer on: [ 177.325097][ T3890] CPU: 0 UID: 0 PID: 3890 Comm: kworker/u8:59 Not tainted syzkaller #0 PREEMPT(voluntary) [ 177.335349][ T3890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 177.345413][ T3890] Workqueue: events_unbound flush_to_ldisc [ 177.351318][ T3890] ================================================================== [ 182.777193][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 182.777212][ T29] audit: type=1400 audit(2000000025.910:7448): avc: denied { egress } for pid=3857 comm="kworker/u8:28" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 182.807240][ T29] audit: type=1400 audit(2000000025.910:7449): avc: denied { sendto } for pid=3857 comm="kworker/u8:28" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1