last executing test programs: 5.139665522s ago: executing program 3 (id=1623): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x2}, 0x8) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x3fffffffc, 0x7ff80000}, 0x1000, 0x1, 0x0, 0x6, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', r5, 0x4, 0x6, 0x23, 0xd, 0x2d, @mcast2, @remote, 0x10, 0x7, 0x5, 0xfffffffa}}) prctl$PR_MCE_KILL(0x41555856, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, r0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r6 = fsmount(r1, 0x0, 0x2) fchdir(r6) r7 = open(&(0x7f0000000000)='.\x00', 0x0, 0x244) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0x9361, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000d00)={[{@noauto_da_alloc}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x4c4, &(0x7f0000000540)="$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") sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(0x0, &(0x7f0000000200)={0x200002, 0x3, 0x801, 0x4, 0x800006}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, &(0x7f00000000c0)={[{@journal_async_commit}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x101}}]}, 0x9, 0x60c, &(0x7f00000001c0)="$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") perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x3, 0x520, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x9, 0x3}, 0x0, 0x1224, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r8 = shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x2000) signalfd(0xffffffffffffffff, &(0x7f0000000240)={[0xc18]}, 0x8) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000012c0)=[{{&(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)="67bc07fa8ea6ee2b86d90b649f382e14695e2486689afd38184507455750dd13573d6190cf75ce3d03827c22fab15c67050c72e195dc62723d28de44a0eae974dc4034b696", 0x45}, {&(0x7f0000000300)="2c45b490b2175da9072bc62e93feed372ce7abeea84f7e04e0ca19c7650c949fb893c3e59184ebb774dfced6aa407d8f82fd35e8d188ff532a2c4f298a6b0f091d608ea6040bcc42039e615c023e967a04b18a9c38b30a4143387474d5c158328770e9e4ba07c82191c400c20474eb69e64182a90631f72d9593888ea9b8cf0d659f0309cc9116f5a21ab036f2d685d1798d9db4c82c534fc1dd32dbae1dba711c99a45d60358a731506040c5edad77fb916da1194f205505fc8e8484f65e51315f508b99445464b18f4242392", 0xcd}], 0x2, &(0x7f0000000a40)=ANY=[@ANYBLOB="b8000000000000000000000007000000890fd0ac1e0001e0000002ffffffff830b29000000000a010101443c8803ac1414aa00000fffac1414aa000000645d1742fcd2b7cd0e4efc6bfdb1ac1e0101000000080a010102000000096401010200000002ac1414aa000000edac1e01010000000386149b60fc8d000efe080ed7df53230dce2c815a940400"], 0xb8}}, {{&(0x7f0000000b40)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, &(0x7f0000000cc0)=[{&(0x7f0000000b80)='l', 0x1}, {&(0x7f0000000bc0)="9310cd774b6f615e6fab90", 0xb}, {&(0x7f0000000c00)="93daf7743a1f2ee480351ee4ddd3d1db7dba44c99d3a58c75efd5340d64548347feadacb53fa74bf87f89e2ffbaa0cb9dfbe7b34e5df8518ddc73953e0968c0c65b9822ea40c5a6530544a0f9d6b002e5f65465ddbaf912c3aeb5c5e1217548273231924318b14efd8f5077ceb3f3bbe8b42cc5c4c30612442c53aec4f15d571250b32fce851815e7cbf67c06ae15fdb19dba61c", 0x94}], 0x3, &(0x7f0000000d40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x30}}, {{&(0x7f0000000d80)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000001100)=[{&(0x7f0000000dc0)="6ed374aae54791ce4170798d36b84c16d656b6b8344d7db70599349e606d174b717203a59c5a450c3dd6e898f5dc1be8fa2b59d428080d6c33a2f929822b2ec0e5a4fe486fbeea31bd8cfb02cc0cc5c1b4d767fd3382a90dd302556fa46fe9798b7ff6ccc88583c9f1e9c7e437", 0x6d}, {&(0x7f0000000e40)="e9524deb818fb6b5f14745b406f7efab", 0x10}, {&(0x7f0000000e80)="e31633c158658a6d9e9b8cb95bc5135e9d702c886dec6b6a1a483aeb558d88cf92f818850ff795d6af63163b4ee60695f2d5d377206d8bdabd0648ff3092ed85266df379705f18b4e26e49988b27ac998f1fd79375dafe6cfaa252d751410ff413affb5f83706281818bcde1d102953bd4f920f0be9335fe7809bb3b82790682e87257879c47a27d1df91fb414c797d1498aa0bdaeada3951b0633525896843f7339209f5b94ea8c093377aaf42d003b1fd0e4c693bcaa163e02dd8ed3be8e27d623024f32b595564a09e457befc1b157018e5cdd33a62ddf9471bc18ab36d48b006001e5bfff0b9bc56", 0xea}, {&(0x7f0000000f80)="e9a88da75905b5f51286d4d66f0954124f0d45622269f2e0227d14a7b7738cd2cd05c1fbb08d7f31b9c3f9182fd1cd7cbcbe3b826ca680d1ac81fe4411bd750b83720804b1ddf559e1d31290f42cb476a7ad64934516a9bc69a10ac597d19cfaa552747dc49def237c18f8725da22e7710408a60c873b72a02e764267cd0f7e3aca740495ebf98cb839fc1e6c8e9a991632ed027315832081216a921912eedc69769df78efee43c7d7052dbfe9566be576ecd9978476f0d2841fc9a04d031ba4daf401ffdafa8a", 0xc7}, {&(0x7f0000001080)="0367b04f8d39fa3be02ec6673b3cfecda6fd987892838f33828054b072125baf81a7d29c51c69271c5fbb7a9b40f43b4f014b2933298e06a257dfe84b724f5338f192a6d44243aec4e2a029f11f2cbfb1fc9b28bf14f3ea9e26e6a2fd625821ba797d3e6347276cc4d30ba9abe3dbd", 0x6f}], 0x5, &(0x7f0000001280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @private=0xa010102}}}], 0x20}}], 0x3, 0x20000000) shmdt(r8) shmdt(r8) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x8640, 0x0) unshare(0x20000) 5.060295733s ago: executing program 3 (id=1625): unshare(0x22020600) r0 = syz_open_dev$evdev(0x0, 0xfffffffffffffffc, 0x822b01) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000000040)="d80000001c0081044e81f782db44b904021d080201000000000018a118000c000600142603600e1208000f0100810401a8001600200001400300600803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c11503c13223e3f52a98516277ce06bbace8017cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68a", 0xd2}], 0x1, 0x0, 0x0, 0x7400}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000100000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000100000000000000801800009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_ext={0x1a, 0xb, &(0x7f0000001a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc4f, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ee1}}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x18, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, r5, 0x0, 0x0, 0x0, 0x10, 0x4a6}, 0x94) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000003f0000440012800b00010067656e65766500003400028005000300030000000600", @ANYRES32], 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x0) socket(0x10, 0x803, 0x2) r6 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r6, 0x0, 0x0) 4.995005754s ago: executing program 3 (id=1627): syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x210000, &(0x7f0000002f40)={[{@nobarrier}, {@dioread_lock}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@errors_remount}, {@stripe={'stripe', 0x3d, 0x10}}, {@bh}, {@init_itable}]}, 0xfc, 0x56f, &(0x7f0000003780)="$eJzs3d9rW1UcAPDvTdPup66DMdQHGezByVy6tv6YIDgfRYcDfZ+hzcpouowmHWsduD24F19kCCIOxD/Adx+H/4B/xUAHQ0bRBxEiN73psjZp2i4z2fL5wG3Pyb23535z7vf2nNyEBDC0jqU/chEvR8Q3ScShlnX5yFYeW9tu9eH1mXRJol7/9M8kkuyx5vZJ9vtAVnkpIn79KuJkbnO71eWV+WK5XFrM6hO1hSsT1eWVU5cWinOludLlqenpM29NT737zts9i/X1839//8ndD898fXz1u5/vH76dxNk4mK1rjeMJ3GitHCv+m5VG4+yGDSd70NggSfp9AOzKSJbno5FeAw7FSJb1wPPvy4ioA0Mqkf8wpJrjgObcvkfz4GfGgw/WJkCN2Mda48+vvTYSextzo/2ryWMzo3S+O96D9tM2fvnjzu10ia1fh9jXpQ6wIzduRsTpfH7z9T/Jrn+7d7rx4vHWNrYxbP9/oJ/upuOfN9qN/3Lr459oM/450CZ3d6N7/ufu96CZjtLx33ttx7/rl67xkaz2QmPMN5pcvFQunY6IFyPiRNS73vo4s3qv3mld6/gvXdL2m2PB7Dju5/c8vs9ssVaMiLFdhvyYBzcjXsm3iz9Z7/+kTf+nz8f5bbZxtHTn1U7rusf/dNV/initbf8/6tZk6/uTE43zYaJ5Vmz2162jv3Vqv9/xp/2/f+v4x5PW+7XVnbfx495/Sp3W7fb8H0s+a5SbSXCtWKstTkaMJR9vfnzq0b7NenP7NP4Tx7e+/rU7/9PJ1+fbjP/WkVsdNx2E/p/dUf/vvHDvoy9+6NT+9vr/zUbpRPZIdv1rLztXtnuAT/r8AQAAAAAAwCDJRcTBSHKF9XIuVyisvb/jSOzPlSvV2smLlaXLs9H4rOx4jOaad7oPtbwfYjJ7P2yzPrWhPh0RhyPi25F9jXphplKe7XfwAAAAAAAAAAAAAAAAAAAAMCAOdPj8f+r3kX4fHfDUNb7YYE+/jwLoh65f+d+Lb3oCBlLX/AeeW/Ifhpf8h+El/2F4yX8YXvIfhpf8h+El/wEAAAAAAAAAAAAAAAAAAAAAAAAAAKCnzp87ly711YfXZ9L67NXlpfnK1VOzpep8YWFppjBTWbxSmKtU5sqlwkxlodvfK1cqVyanYunaRK1UrU1Ul1cuLFSWLtcuXFoozpUulEb/l6gAAAAAAAAAAAAAAAAAAADg2VJdXpkvlsulRYWOhfdjIA7jaQa4Zle75wclCoUOhZtZ9+5srz5elAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgg/8CAAD//4yLMZo=") perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x200, 0x3}, 0x102802, 0x3, 0x0, 0x0, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) writev(r0, &(0x7f0000000200)=[{0x0, 0xea}, {&(0x7f0000002500)="91", 0x1}], 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'bridge_slave_1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="5400000010000104000000000200000000000000", @ANYRES32=r3], 0x54}}, 0x0) 4.897606815s ago: executing program 3 (id=1629): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c72, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x400000, 0xfffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) socket$kcm(0x29, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000440)='hybla', 0x5) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x248, &(0x7f00000000c0), 0xfd, 0x4a4, &(0x7f0000001300)="$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") 4.663397108s ago: executing program 4 (id=1633): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x80000001, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002280)={0x14, 0x1e, 0x221, 0x0, 0x2, {0x7}}, 0x14}}, 0x0) splice(r1, 0x0, r3, 0x0, 0x25a5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth1_to_batadv\x00', 0x0}) sendto$packet(r0, &(0x7f0000000140)="280320000a00140000007ef506be00000000000000000000000000143baa111f1f858ce632f47042195eb3cf545a41b6d78839980700e67bee78895e16f37fe8", 0xffa9, 0x400c010, &(0x7f0000000080)={0x11, 0x3, r5, 0x1, 0xe5, 0x6, @random="76caa646ae4c"}, 0x14) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="1802008c137e4719be39f10003000c0085000000d00000009500"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x6}, 0x50) 4.600454648s ago: executing program 4 (id=1634): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$MRT6_INIT(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x40000007, 0x510, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x8a, 0x10001, 0xda, 0x4, 0xa, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002000)=@newtaction={0x60, 0x30, 0xb, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x80006}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x60}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x101}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$inet6(0xa, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) fstat(0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x20000, &(0x7f0000000cc0)=ANY=[@ANYBLOB="353ae4a19c5b1302000000616e943d66642c7266646e72f1", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',aname=(/%,cache=mmap,access=', @ANYRESDEC=0x0, @ANYBLOB=',noxattr,uname=,afid=0x0000000000000001,uid<', @ANYRESDEC, @ANYBLOB=',obj_user=GPL\x00,obj_role=\\,defcontext=root,fsuuid=9d35fa95-Q2b0-\f7fa-33bc-3c999cbf,\x00']) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000140)={'ipvlan0\x00', {0x2, 0x4e24, @multicast1}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r7, &(0x7f0000004200)='t', 0x1) sendfile(r7, r6, 0x0, 0x3ffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffff000) 3.752331638s ago: executing program 2 (id=1644): signalfd4(0xffffffffffffffff, &(0x7f0000000200)={[0xf9a]}, 0x8, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x4, 0x7ff}, 0x4, 0x8, 0x11000, 0x5, 0x2, 0x90000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ptrace$setopts(0x4200, r2, 0x8, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000840)=@newqdisc={0x78, 0x24, 0x3fe3aa0262d8c783, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0x0, 0xfff2}, {0xffff, 0xffff}, {0x0, 0x16747c6d2baaace}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x2, 0x7, 0x7f, 0x0, 0x2}, 0x609d, 0x1, 0x8, 0xfffffffa, 0x2, 0x2, 0x18, 0x1, 0x6, 0xe, {0x3, 0xffbffeff, 0x5, 0x0, 0x9, 0x2}}}}]}, 0x78}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip_vti0\x00', &(0x7f0000000580)={'gre0\x00', r5, 0x20, 0x80, 0x8, 0x1, {{0x13, 0x4, 0x3, 0x4, 0x4c, 0x65, 0x0, 0x8, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @rand_addr=0x64010100, {[@lsrr={0x83, 0x13, 0x21, [@multicast2, @broadcast, @local, @multicast2]}, @generic={0x86, 0xc, "8096eca02f4d400ce3d2"}, @end, @generic={0x88, 0x8, "c4c652c2d959"}, @lsrr={0x83, 0xf, 0xca, [@empty, @broadcast, @broadcast]}]}}}}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x1d, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000007a9800000001000000b708000000000000dbaaf8fff1000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb725615803132cfeff81ecf66ed3bc9b0256775a1e347ef8dd58834f0a00a8a76bcdae3659dce47c0eb4eeb4f3ab9ef57bd46cecf384af5b15eebbb20e218abef53444c72c787c73555632da165df22c5f188402004d18731181df316cb2f709448a38fbf43b19bc4bc6310a12995d3f77bad1944fee51cfa4a64a10cffb808c593adff0a3f64f07af068a907493b69fd33c62017d9e51833be4d8527bd9be02c29c12f7f836fde2d5b4848e60da9380c7ecc7f4dd1d740d2871c024a35091ba4426f7e9044b5866d046bebc7475ebf5f57fb0254b1fd1b38939a1d2f50c543e968f50726d2e4dccd68bdacc95e2f3b813b156fa6c5a5b1a37659d0f6c940e83b308e1132f8b23f932f821855e233055165b5de9c90568d89a674f3bb2c99b501f502d0e315691cf", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000006a000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r6}, 0xc) r7 = getpid() r8 = syz_pidfd_open(r7, 0x0) setns(r8, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, &(0x7f0000001dc0)={0x8c, 0x0, 0x20000}, 0x20) r9 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = syz_pidfd_open(r9, 0x0) setns(r10, 0x24020000) 3.59253299s ago: executing program 4 (id=1645): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x6, 0x9}, 0x106200, 0x10004, 0x20da, 0x9, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') semget$private(0x0, 0x20000000102, 0x200) r1 = socket(0x2b, 0x80801, 0x1) sendmsg$DEVLINK_CMD_SB_POOL_SET(r1, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x7fff, 0x80000) ioctl$BLKSSZGET(r2, 0x1268, &(0x7f0000000340)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000100000004"], 0x48) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)={0x20, 0x2d, 0x1, 0x70bd2a, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x1, 0x0, 0x1, [@generic="88"]}]}, 0x20}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2010008, &(0x7f0000000080)={[{@bh}, {@inlinecrypt}, {@nombcache}]}, 0xff, 0x548, &(0x7f0000001300)="$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") r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@newtaction={0x70, 0x30, 0xb, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_ct={0x58, 0x1, 0x0, 0x0, {{0x7}, {0x30, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xf, 0x0, 0x3}}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x604ff3648f564820}, 0x40014) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280)=0x8, 0x4) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) 2.789161149s ago: executing program 2 (id=1648): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x23, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000740)="1200", 0x2, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2040000, 0x0) bind$802154_dgram(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c0000f500000000000000862dfdff00000065"], 0x78) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) 2.65950798s ago: executing program 2 (id=1650): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x24, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, 0x0, {0x5, 0xfff3}, {0xffff, 0xffff}, {0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0xc004811}, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000800000000000000000000000000000002"]) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_timeval(r1, 0x1, 0x2, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x42, 0x4, 0x3e0, 0xffffffff, 0x110, 0x270, 0x0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x5, 0x0, {[{{@ip={@remote, @multicast2, 0x37d9281a700b31cd, 0xffffff00, 'veth0_vlan\x00', 'syzkaller0\x00', {}, {0xff}, 0xc, 0x0, 0x71}, 0x74000002, 0xe0, 0x110, 0x1ba, {0x46010000, 0x2c000000000000}, [@common=@unspec=@limit={{0x48}, {0x0, 0xdf6, 0x0, 0x0, 0x0, 0x9}}, @common=@ttl={{0x28}, {0x3, 0x2c}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x6, 0xb}, {0xffffffffffffffff, 0x2}, 0x101}}}, {{@ip={@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffff00, 0xff000000, 'veth1_to_batadv\x00', 'veth0_to_hsr\x00', {}, {}, 0x62, 0x2}, 0x287, 0x100, 0x160, 0x0, {}, [@common=@unspec=@ipvs={{0x48}, {@ipv4=@broadcast, [0xffffff00, 0xff000000, 0xffffff, 0xff000000], 0x4e32, 0x1, 0x5, 0x4e21, 0x10, 0xc}}, @common=@unspec=@limit={{0x48}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x5, 0x6, 0x1, 0x7, 0x3, 0x2], 0x1, 0xb}, {0x24, [0x2, 0x4, 0x7, 0x8e6edc646ec3eb3b, 0x8, 0x4], 0x4, 0x2}}}}, {{@ip={@private=0xa010100, @empty, 0xffffff00, 0x0, 'veth0_to_batadv\x00', 'vlan0\x00', {0x65e08edd16cfa99f}, {0xff}, 0x6, 0x2, 0x7249023ab4bcbe09}, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{}, {0x0, 0xa}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x0, 0x0, 0x0, 0x0, 0x4, 0x4]}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xfe2a) getsockopt$inet6_mptcp_buf(r1, 0x11c, 0x4, &(0x7f0000000000)=""/152, &(0x7f00000000c0)=0x98) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xff2e) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0xfffffff9, 0x7fff, 0x16, "0062ba7d82000000000000000000f7ffffff00"}) r3 = syz_open_pts(0xffffffffffffffff, 0xc0000) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f00000004c0)) 2.64683959s ago: executing program 4 (id=1651): syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x2b, 0x1, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x11, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, 0x0, 0x0) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x6) socket$kcm(0x29, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x4000001, 0x0) poll(0x0, 0x0, 0x9) syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), r3) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e1f, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3f9d00000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="60003080050002000000000014000400403a050c5bae9c544ef2b6d713459a7a1c0001"], 0x7c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 2.583913141s ago: executing program 0 (id=1652): syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x210000, &(0x7f0000002f40)={[{@nobarrier}, {@dioread_lock}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@errors_remount}, {@stripe={'stripe', 0x3d, 0x10}}, {@bh}, {@init_itable}]}, 0xfc, 0x56f, &(0x7f0000003780)="$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") perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x200, 0x3}, 0x102802, 0x3, 0x0, 0x0, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) writev(r0, &(0x7f0000000200)=[{0x0, 0xea}, {&(0x7f0000002500)="91", 0x1}], 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'bridge_slave_1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="5400000010000104000000000200000000000000", @ANYRES32=r3], 0x54}}, 0x0) 2.582946981s ago: executing program 2 (id=1653): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) prlimit64(r0, 0x3, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x800000, 0x0, 0x20002, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r6 = creat(&(0x7f0000000080)='./file0\x00', 0xc7) socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000240)=0x1, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)={0x28, 0x10, 0x1, 0x0, 0x0, "", [@nested={0xffffffffffffff85, 0x0, 0x0, 0x0, [@typed={0x3f, 0x0, 0x0, 0x0, @u64}, @typed={0x8, 0x1c, 0x0, 0x0, @u32=0xc9}]}]}, 0x28}], 0x1, 0x0, 0x0, 0xb305e06d8ab48277}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x64, 0x6, 0x0, 0x0, 0x0, 0xb, 0x22, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x3}, 0xd, 0x0, 0x11000, 0x4, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa7}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 2.512214032s ago: executing program 0 (id=1654): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x8, 0x401}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="6a0ac4ff00000000711093000000000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) io_uring_register$IORING_REGISTER_FILE_ALLOC_RANGE(0xffffffffffffffff, 0x19, &(0x7f0000000140)={0xbff7, 0x9, 0x5d}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x74) pwritev2(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5412, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000006c0)={'syztnl1\x00', &(0x7f0000000580)={'ip6gre0\x00', 0x0, 0x2f, 0xf6, 0x3, 0x3, 0x48, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, 0x7800, 0x8000, 0x9, 0x9}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0100000004000000e27f00000100000001000000", @ANYRES32, @ANYBLOB="ff0200"/20, @ANYRES32=0x0, @ANYRES64=r2, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r3}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{r3, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)='%ps \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x25, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000f00a0000000000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000095000000000000001800000000040000000000008a5f0000182a0000", @ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000440)='GPL\x00', 0x9, 0x77, &(0x7f0000000500)=""/119, 0x41100, 0x20, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x2, 0x9, 0x1}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r1, r3, r1, r1], &(0x7f0000000a40)=[{0x0, 0x2, 0xc, 0x4}, {0x4, 0x3, 0xe, 0x7}, {0x5, 0x2, 0x1, 0x8}, {0x4, 0x5, 0xe, 0x1}, {0x2, 0x1, 0x1, 0x4}, {0x4, 0x5, 0xb, 0xc}], 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2800001, 0xc3072, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f00000000c0)) mremap(&(0x7f000033e000/0x2000)=nil, 0x2000, 0x3000, 0x6, &(0x7f0000a3f000/0x3000)=nil) statx(0xffffffffffffffff, 0x0, 0x1000, 0x7ff, 0x0) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r8 = socket$unix(0x1, 0x5, 0x0) r9 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = socket(0x10, 0x3, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r12, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setresgid(r10, r12, r13) fchownat(r1, &(0x7f0000000000)='./file1\x00', r6, r13, 0x1000) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r14, 0x0, 0x0}, 0x20) 2.448133043s ago: executing program 0 (id=1655): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$MRT6_INIT(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x40000007, 0x510, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x8a, 0x10001, 0xda, 0x4, 0xa, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002000)=@newtaction={0x60, 0x30, 0xb, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x80006}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x60}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x101}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$eJzs3c9vFFUcAPDv7LalpWALMSoepIkxkCgtLWCI8QBXYxr8ES9erLQgoUDT1mjRhJLgxcR4McbEkwfxv1AiV0960YMXT4aEqOFo4prZ7vTnbH8s7Q4wn0+y7My8ebw3LN++t6/vzQRQWgPpH5WIAxExlUT0JfOLaR3RSBxYOO/ePx+fTV9J1Gpv/JVE0jiWnZ803nsbmbsj4ucfk9hfXVvuzNzVi2OTkxPTjf2h2UtTQzNzV49cuDR2fuL8xOWRF0dOnjh+4uTw0Zau69raQ2l1Puj7dPTtb7/+Nxn+7vfRJE7FK40Tl1/HdhmIgfq/SbI2qffkdhdWkGrj/8nyjzjpKLBCbEn2+XVGxJPRF9VY+vD64pPXCq0csKNqSUQNKKlE/ENJZf2A7Lv96u/BlUJ6JUA73D29MACwNv47FsYGo7s+NrD7XhLLh3WSiGhtZG6lPRHx0+3RG+duj96Y3rsz43BAvvnrEfHUsvjvylKSevz3R3f01+O/siL+037BmcZ7evz1FstfPVQs/qF9FuK/O6f9X4r/aBL/7yyL/3dbLH9gafO9nhXx39PqJQEAAAAAAEBp3TodES/kzf+pLM7/iZz5P70RcWobyh9Ytb/29/+VO9tQDJDj7umIl3Pn/1aiujD7t7/a+D3/3vp8gM7k3IXJiaMR8VhEHI7OXen+8DplHPls/1fN0gYa8/+yV1p++r50RuVOx66VecbHZsfu97qBiLvXI57Onf+bLLb/SU77n/48mNpkGfufu3mmWdrG8Q/slNo3EYdy2/+lu1Yk69+fY6jeHxjKegVrPfPR5983K7/V+HeLCbh/afu/e/3470+W369nZutlHJvrqDVLa7X/35W8Wb/lTLZc4cOx2dnp4Yie5NVqenTF8ZGt1xkeRVk8ZPGSxv/hZ9cf/8vr//dExPyqvzv5e+Wa4swT//X+0aw++v9QnDT+x7fU/jfdSOYjcpNGbvb/0Kz8zbX/x+tt/eHGEeN/sODLLEy7Vh7PCdCOvKR21xcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgWViNgTSWVwcbtSGRyM6I2Ix2N3ZfLKzOzz5668f3k8Tas//7+SPem3b2E/yZ7/379sf2TV/rGI2BcRX1R76vuDZ69Mjhd98QAAAAAAAAAAAAAAAAAAAPCA6G2y/j/1Z7Xo2gE7rqPoCgCFyYn/X4qoB9B+2n8oL/EP5SX+obzEP5SX+IfyEv9QXuIfykv8AwAAAADAI2XfwVu/JREx/1JP/ZXqaqR1FlozYKdViq4AUBi3+IHyMvUHyst3fCDZIL27aaaNcjbLnJo6u3FmAAAAAAAAAAAAACBz6ID1/1BW1v9DeVn/D+WVrf8/WHA9gPZr+Tt+0zW9wMNovZX8zcN9E+v/AQAAAAAAAAAAAIBtMTN39eLY5OTEdPs2fm089Cv3nJ6IaHN9so23iii02I1arXat/lE8IPV5yDeyqfCbz9WdHwU7s5Gt9dtcroJ+IAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGv8HwAA//+xpBxA") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$inet6(0xa, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) fstat(0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x20000, &(0x7f0000000cc0)=ANY=[@ANYBLOB="353ae4a19c5b1302000000616e943d66642c7266646e72f1", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',aname=(/%,cache=mmap,access=', @ANYRESDEC=0x0, @ANYBLOB=',noxattr,uname=,afid=0x0000000000000001,uid<', @ANYRESDEC, @ANYBLOB=',obj_user=GPL\x00,obj_role=\\,defcontext=root,fsuuid=9d35fa95-Q2b0-\f7fa-33bc-3c999cbf,\x00']) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000140)={'ipvlan0\x00', {0x2, 0x4e24, @multicast1}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r7, &(0x7f0000004200)='t', 0x1) sendfile(r7, r6, 0x0, 0x3ffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffff000) 1.550849123s ago: executing program 4 (id=1657): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0xbb6, @loopback, 0x5}, 0x28) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = fcntl$dupfd(r0, 0x406, r0) prlimit64(0x0, 0xe, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000600)={'erspan0\x00', &(0x7f0000000540)={'ip_vti0\x00', 0x0, 0x8, 0x8000, 0x7900, 0x5, {{0x28, 0x4, 0x0, 0x6, 0xa0, 0x66, 0x0, 0x9, 0x29, 0x0, @remote, @loopback, {[@cipso={0x86, 0x46, 0x3, [{0x6, 0x8, "b0da0b7e2e28"}, {0x6, 0xc, "c776e0cef352cf137a3c"}, {0x6, 0x12, "1585b15e2a346e26b137e1b42c3beaa2"}, {0x0, 0xe, "27fd60a068ffee7411388dd8"}, {0x7, 0xc, "5e800408bf893292e6ec"}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0xb1, 0x0, 0x4, [0x10001]}, @lsrr={0x83, 0x13, 0x85, [@remote, @loopback, @rand_addr=0x64010100, @multicast2]}, @timestamp_prespec={0x44, 0x24, 0xc9, 0x3, 0xd, [{@rand_addr=0x64010101, 0x71d}, {@multicast1, 0x3}, {@multicast1, 0x80000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@delneigh={0x48, 0x1d, 0xb1e1466165dae066, 0x70bd26, 0x25dfdbfc, {0x1c, 0x0, 0x0, r3, 0x10, 0x2, 0x8}, [@NDA_IFINDEX={0x8, 0x8, r4}, @NDA_LLADDR={0xa, 0x2, @multicast}, @NDA_FLAGS_EXT={0x8}, @NDA_SRC_VNI={0x8, 0xb, 0x2}, @NDA_PROBES={0x8, 0x4, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x51}, 0x4) r5 = getpid() quotactl_fd$Q_SYNC(0xffffffffffffffff, 0xffffffff80000101, 0x0, 0x0) sched_setscheduler(r5, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x400000000000159, 0x40840) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES16=0x0], 0x28}, 0x1, 0x0, 0x0, 0xc0}, 0x20040000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[], 0xfffffdcf) 1.517071903s ago: executing program 2 (id=1658): signalfd4(0xffffffffffffffff, &(0x7f0000000200)={[0xf9a]}, 0x8, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x4, 0x7ff}, 0x4, 0x8, 0x11000, 0x5, 0x2, 0x90000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ptrace$setopts(0x4200, r2, 0x8, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000840)=@newqdisc={0x78, 0x24, 0x3fe3aa0262d8c783, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0x0, 0xfff2}, {0xffff, 0xffff}, {0x0, 0x16747c6d2baaace}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x2, 0x7, 0x7f, 0x0, 0x2}, 0x609d, 0x1, 0x8, 0xfffffffa, 0x2, 0x2, 0x18, 0x1, 0x6, 0xe, {0x3, 0xffbffeff, 0x5, 0x0, 0x9, 0x2}}}}]}, 0x78}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000640)={'ip_vti0\x00', &(0x7f0000000580)={'gre0\x00', r5, 0x20, 0x80, 0x8, 0x1, {{0x13, 0x4, 0x3, 0x4, 0x4c, 0x65, 0x0, 0x8, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @rand_addr=0x64010100, {[@lsrr={0x83, 0x13, 0x21, [@multicast2, @broadcast, @local, @multicast2]}, @generic={0x86, 0xc, "8096eca02f4d400ce3d2"}, @end, @generic={0x88, 0x8, "c4c652c2d959"}, @lsrr={0x83, 0xf, 0xca, [@empty, @broadcast, @broadcast]}]}}}}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x1d, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000006a000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r6}, 0xc) r7 = getpid() r8 = syz_pidfd_open(r7, 0x0) setns(r8, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, &(0x7f0000001dc0)={0x8c, 0x0, 0x20000}, 0x20) r9 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = syz_pidfd_open(r9, 0x0) setns(r10, 0x24020000) 1.399927725s ago: executing program 1 (id=1660): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x23, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000740)="1200", 0x2, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2040000, 0x0) bind$802154_dgram(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c0000f500000000000000862dfdff00000065"], 0x78) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) 1.399380114s ago: executing program 0 (id=1661): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x6, 0x9}, 0x106200, 0x10004, 0x20da, 0x9, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') semget$private(0x0, 0x20000000102, 0x200) r1 = socket(0x2b, 0x80801, 0x1) sendmsg$DEVLINK_CMD_SB_POOL_SET(r1, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x7fff, 0x80000) ioctl$BLKSSZGET(r2, 0x1268, &(0x7f0000000340)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000100000004"], 0x48) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)={0x20, 0x2d, 0x1, 0x70bd2a, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x1, 0x0, 0x1, [@generic="88"]}]}, 0x20}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2010008, &(0x7f0000000080)={[{@bh}, {@inlinecrypt}, {@nombcache}]}, 0xff, 0x548, &(0x7f0000001300)="$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") r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@newtaction={0x70, 0x30, 0xb, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_ct={0x58, 0x1, 0x0, 0x0, {{0x7}, {0x30, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xf, 0x0, 0x3}}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x604ff3648f564820}, 0x40014) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280)=0x8, 0x4) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) 1.330019675s ago: executing program 1 (id=1662): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x3, 0x1, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xfffe, 0x4, @mcast2={0xff, 0x3}}, 0x1c) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000280)='./bus\x00', 0x1400c, &(0x7f0000000300)={[{@test_dummy_encryption}, {@init_itable}, {@journal_dev={'journal_dev', 0x3d, 0x2}}]}, 0x3, 0x470, &(0x7f0000000880)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000f40)={0x0, @in={{0x2, 0x4e22, @private=0xa010101}}, 0x8, 0x8, 0x40, 0x6, 0xb435}, &(0x7f0000001000)=0x98) bpf$MAP_CREATE(0x0, 0x0, 0x50) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) syz_io_uring_setup(0x645c, &(0x7f00000003c0)={0x0, 0x1226, 0x800, 0x3, 0x2c8}, &(0x7f0000000440), &(0x7f0000000480), 0x0) sendto$inet6(r0, &(0x7f0000000000)="836bb66f", 0xfdef, 0x0, 0x0, 0xfffffffffffffec8) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) getgroups(0x1, &(0x7f0000001080)=[0xee01]) sendmmsg$inet6(r0, &(0x7f0000006380)=[{{&(0x7f0000000d00)={0xa, 0x4e20, 0x4, @rand_addr=' \x01\x00', 0x2222472e}, 0x1c, &(0x7f0000000d40), 0x0, &(0x7f00000010c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0xed}}, @rthdr={{0xa8, 0x29, 0x39, {0x6c, 0x12, 0x2, 0xe, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @remote, @mcast2, @mcast1, @local, @empty]}}}, @rthdrdstopts={{0x1080, 0x29, 0x37, {0x89, 0x20c, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x8e, 0x1000, "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"}, @pad1, @ra={0x5, 0x2, 0x7ff}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x7}, @calipso={0x7, 0x48, {0x3, 0x10, 0x5a, 0x9, [0xd9f, 0x200, 0x2, 0xfffffffffffffff7, 0x0, 0x8b0d, 0x245, 0x19]}}]}}}, @rthdrdstopts={{0x60, 0x29, 0x37, {0x0, 0x9, '\x00', [@calipso={0x7, 0x20, {0x2, 0x6, 0x0, 0x1ff, [0xfffe000000000, 0xffffffff00000001, 0x2]}}, @generic={0x6, 0x24, "43aa0f11015dedbb69599333fb19aacab29378d5a4170158bf8554b8fb651a363cb94fa2"}]}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x89, 0x5, '\x00', [@ra={0x5, 0x2, 0x6}, @enc_lim={0x4, 0x1, 0x5}, @pad1, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x34}}, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts={{0xb8, 0x29, 0x36, {0x3b, 0x13, '\x00', [@jumbo={0xc2, 0x4, 0xffffffff}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @calipso={0x7, 0x58, {0x1, 0x14, 0x4e, 0x3, [0x400000000, 0x6, 0x9, 0xffffffffffff8000, 0x0, 0xda5, 0x5, 0x2, 0x2003, 0x3]}}, @calipso={0x7, 0x10, {0x0, 0x2, 0xd, 0x7fff, [0x9]}}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}}}], 0x1298}}, {{&(0x7f0000002380)={0xa, 0x4e21, 0x1219, @local, 0x9}, 0x1c, &(0x7f0000002540)=[{&(0x7f0000003b40)="afd79f51ff8d965de29937846239e3ed59e1c41cdfd6839a34a80565065c1dfc3c3c02c1679d2e57027ee5ff4f926755613e270465b13666461344df778438db06b098b0786d4d279b415d80efbd581939ee173a3f23e4e386eabc67e8340fbacf7b44ebae7bcff611d06c690086da4c40309be6450be6aca7a709b77bf36b76fecbb2066cdac7752d5943a9ea822508f58a8c", 0x93}, {&(0x7f0000002480)="f88d4ab8e0526320163cb76b6e013c3406ba461c385cc9cd9dd027c582c583d3f6f17251c7826aa6ed91cee1c788ce238d1f3fc27368b3fc7a65385bfe5d4bdd2aaee3b25fb72a88f6a3e4402d50baad89", 0x51}, {&(0x7f0000002500)="0e843826b2a50b8d766418a3f15592aaac90ab61b9707b4a1441d02cb516c8b418bd1a6994c314939733ffdabe2de47483c29cb623e02fe5131e4086", 0x3c}], 0x3, &(0x7f0000002580)=[@dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @rthdr={{0x88, 0x29, 0x39, {0x6c, 0xe, 0x1, 0x6, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @rand_addr=' \x01\x00', @remote, @local, @private1={0xfc, 0x1, '\x00', 0x1}]}}}, @rthdr_2292={{0xb8, 0x29, 0x39, {0x2, 0x14, 0x2, 0xc, 0x0, [@private2, @remote, @dev={0xfe, 0x80, '\x00', 0xb}, @empty, @empty, @dev={0xfe, 0x80, '\x00', 0x32}, @private1, @loopback, @empty, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xe}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}], 0x180}}, {{&(0x7f0000002700)={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c, &(0x7f0000003900)=[{&(0x7f0000002740)="64365948695c0b6789c6961c5bb1da079d6b5bb513fa057c4f6239bbd467e008e972208789a708cb0fd48ab2a5992f267903f8bd8892960ce76cc6f03b897bfb0ce239be62c71ec620ef6dc88e92e2498588ff193f78cd25d2cc9f7223772e8b10de7aada1978adbf6eb0c1a18f1b99e6fa8b113404c96bde965e84b8d47fb92e9138037e8119a5b9043bd12068ddbf9681e98fd93d3f70994814e34fb2829db5434653be663b261417c4fc745f12f10272fe5b28cf4f60cd0b4ee357a2cba12556006ceeae25891b0ccf900b1b0e1ff7c15359dd78af21f109b30b9a26270", 0xdf}, {&(0x7f0000002840)="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", 0x1000}, {&(0x7f0000003840)="032872db680c82427cf988a72ac9376aeb5c825e38496fbfc3b4864a07e7ba213c006a55b2f03bcb2486935f62ab0c286eac1d14997caeb637f4427b4e953ed51d170dd17915f8665339c13d3dec41ab66d0662adb879a532f1dadfe5e5846126342b365945950c39580e16d90604cdaf1c3fa667e55258ba969ad0e924b38eb2580f158b34403e4414a6fd092b9c4f2c40763689527", 0x96}], 0x3, &(0x7f0000003940)=[@tclass={{0x14, 0x29, 0x43, 0xeadf57d0}}, @hopopts={{0x20, 0x29, 0x36, {0x1d, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}}}, @hopopts={{0x88, 0x29, 0x36, {0x5c, 0xd, '\x00', [@enc_lim={0x4, 0x1, 0xb}, @calipso={0x7, 0x50, {0x2, 0x12, 0x6, 0xa6b3, [0xa96b, 0x51, 0x5, 0xd0, 0x3, 0x3, 0x7ff, 0xf6fc, 0x8]}}, @ra={0x5, 0x2, 0xd}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @enc_lim]}}}], 0xc0}}, {{&(0x7f0000003a00)={0xa, 0x4e23, 0x1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x1}, 0x1c, &(0x7f0000003b00)=[{&(0x7f0000003a40)="11f1bbf899e00e7d83a8867222f96c64bbd2731a4420e9a8236ac6f760dd847bff92a1aa9bf1633d0d", 0x29}, {&(0x7f0000003a80)="3cf4a9be3f3222b78ed2d80b8e5d58a8c3796c62b8178531776f2dd6", 0x1c}, {&(0x7f0000003ac0)}], 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/496], 0x1f0}}, {{0x0, 0x0, &(0x7f0000004d40)=[{&(0x7f0000003d00)="7622fb7b8212b3df9503d4d2219602a0f1c855d1aab48ba0758e75ab706f3cf89f733e899a95d4d4703d15f014ccc713715ad5b154e33b", 0x37}, {&(0x7f0000003d40)="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", 0x1000}], 0x2, &(0x7f0000006540)=ANY=[@ANYBLOB="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"], 0xb8}}, {{0x0, 0x0, &(0x7f0000006300)=[{&(0x7f0000006240)="5b54e191d3f3343e2c0d239359e64aa3376cc0b2f3b961173e6dd96ae6a8ca8001ac8abfc554e0ec0cdb7d4677746af57a851150136f5a5b618dfd7aae3ad80eba411366a2449fc402b99f64e67cd4c9e0b2be707d778ff117e7098930a3c8365130326f9547ee35fcad49bf3e32d389f36ba1595cc60f2f92d1afc89ab63e1bb64208f92cc35c7bbe0a730163967293f0213a7aaf42e99aa7a55bb91484064503ae9a97af807cef", 0xa8}], 0x1, &(0x7f0000006340)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}], 0x18}}], 0x6, 0x20000000) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000800)=ANY=[@ANYBLOB="02000000000000006162636465666768696a6b6c6d6e6f7018b0ba21f0ac69963c02ac89726502008abe33efe1c1c40ae2606a661687543e7c7297dbee4d788f116729d0b044901b8d695b49425d8d0d681803332473bd97815cce117391a99321123190d076246100"], 0x18, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x8001, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200000000000002000000090002"], 0x80}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000100010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380140001"], 0x110}}, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r2, 0x5b, 0x90}, &(0x7f0000000180)={'enc=', 'raw', ' hash=', {'nhpoly1305-sse2\x00'}}, &(0x7f0000000200)="5695c4922147f3465cc717027af7f23a8130fcbfcd3288da08553b1799386775263374856219dbd476078d6abbb68988ea006bf08aa8272f82181dd0d3a659ac825b2f78e163876b3fd5d530b48cf9114cb679296ca9acfbc5d7bc", &(0x7f0000000280)=""/144) keyctl$invalidate(0x15, 0x0) 1.255304426s ago: executing program 1 (id=1663): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) rmdir(&(0x7f00000002c0)='./cgroup/../file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x7, 0x7ffc0000}]}) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000280)=0x3, 0x6, 0x2) 1.147963037s ago: executing program 1 (id=1664): r0 = perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021ec0700000c0a01030000000000000000070000090900020073797a31000000000900010073797a3000000000c0070380bc0700800800034000000002b0070b802c0001800a0001006c696d69740000001c0002800c00024000000000000000000c0001400000000000000003200001800a00010071756f7461000000100002800c0001"], 0x870}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xb}, 0x102260, 0x10000, 0x0, 0x1, 0x4, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000340)={0x1d, r4, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) 1.124405988s ago: executing program 1 (id=1665): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x4040000) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x8008000000010, &(0x7f0000005e40), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DONE(r3, 0x0, 0xc9, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000900)={0x8000, 0x0, 0x2}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000008c0)={&(0x7f00000003c0), &(0x7f0000000600)=""/84, &(0x7f0000000680)="cac5872c63012bd46cb0ef7547e6963555c93fccc17ee0e0f48e993aa335bb389d7a5dcc42201cdd56f5b67c8b70cff7267096dfd8cc193d5690d7988ce5630d53ce410e97a52b43d89c26e1ae5d4f5dca138b055a0d0dc77f17f6f9e370609a011850157b81f662fb6f71fdbd3d7d30771e304a48310b7b274a32eaef4d1aad94a2b7ecc878ab0b8313ea1d76ad24b23745bdb0f332cc7a09387c1c3e384bd5f6f179fa389a79373a96f580c997259f7f7a45e2f7fcfc9c6d6c593319fa0e5b4ca2e1ea24986f8f7303e4f1b2bc4f30e4e6db0cefece7a6781f3c4650fc", &(0x7f0000000780)="0b5ac82e11fb732a8c7951ec5c8c849e6e544bede20589b311437377cff7043242306ce4058e58c5283cc226393691c516fbb4e370c9d903b64ea031aec48edc7cf9c8e9dac15f9bc96c843b35e17e674f29c2620a3ad9d82b953932de3941a9fc46febe73ea8ddf290376caf319c214f513b09e92b74e85978955516e54cdbc218937ce2a02d828e9270d139f12c99cd4dc19e160c3535a0154bfa606d4db1b1549a79c2d70556a90c4c0170a19fec52dbf", 0x1, r5}, 0x38) copy_file_range(r4, &(0x7f0000000340)=0x2, r2, &(0x7f0000000380)=0x880, 0x8, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000057c0)={r7, 0x7}, &(0x7f0000005800)=0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$eJzs3M1rXOUaAPDnnEy+c5v0crn3tggGpCqK07QpFbpqXYsKunDZmExKyPTDJIIJXaR1ry5EXBSkf4Lg3m5cCS7qQutfUMQiRTdtFyNnPtKxk5nGdGaOSX8/eHPe97wn8zxPTmfOe2BOA3hqTWc/0ohDEXE2iZis708jYqjaG4nYrB13/+7l+awlUam8/VsSSUTcu3t5vvFaSX07Xh+MRMTN15L490etcVfXN5bnyuXSSn18dO38paOr6xuvLJ2fO1c6V7pwYvbVE7MnZ2e7WOvtS+998cwPbzx/9frHM29+fuC7JE7HRH2uuY5umY7prb9Js0JEzHU7WE4G6vU015kUckwIAICO0qY13H9jMgbi4eJtMr79MdfkAAAAgK6oDERUAAAAgH0ucf8PAAAA+1zjewD37l6eb7R8v5HQX3fORMRUrf7G8821mUJsVrcjMRgRY78n0fxYa1L7tSc2nUX6+vtS1qJHzyF3snklIv6/3flPqvVPVZ/ibq0/jYiZLsSffmS8l+o/3YX4edcPwNPpxpnahaz1+pdurX9im+tfYZtr127kff1rrP/ut6z/HtY/0Gb999YOYxx+8NLNdnPN6793P/l5IYufbZ+oqL/hzpWIw4Xt6k+26k/a1H92hzHG529fazeX1Z/V22j9rr9yPeJIdTXXWn9D0un/Jzq6uFQuzdR+bvP66yc7x28+/1nL4jfuBfohO/9jsbvzf2mHMab+9+uhdnOPrz/9ZSh5p9obqu/5cG5tbeVYxFDyeuv+451zaRzTeI2s/hef6/z+367+7DNhs/53yP71XKlvs/HVR2KOHzn+1e7r762s/oVdnv9Pdxjjy2+uvd9uLu/6AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANgb0oiYiCQtbvXTtFiMGI+I/8RYWr64uvby4sUPLixkcxFTMZguLpVLMxExWRsn2fhYtf9wfPyR8WxEHIyIzyZHq+Pi/MXyQt7FAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsGU8IiYiSYsRkUbEH5NpWizmnRUAAADQdVN5JwAAAAD0nPt/AAAA2P9a7v8LfxmN9DMXAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9qWDz964lUTE5qnRassM1ecGc80M6LV0Z4eN9ToPoP8G8k4AyE2hqV+pVCo5pgL0mXt8IHnM/EjbmeGu5wIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAP9cLh27cSiJi89RotWWG6nODuWYG9FqadwJAbgY6TSaP3QHsYYW8EwBy4x4fqK3sH1RqWudH2v7m8BNHBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDvmKi2JC1GRFrtp2mxGPGviJiKwWRxqVyaiYgDEfHT5OBwNj6Wd9IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB03er6xvJcuVxa0dHR6WJnNPoWa7T+Zm5zzHD7qQ6dnD+YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIxer6xvJcuVxaWc07EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACBvq+sby3Plcmmlh528awQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID9/BgAA///GyAmy") perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0xf8c, 0x510, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2720df49, 0x5}, 0x0, 0x80000000, 0xfffffffd, 0x3, 0xabca, 0x85, 0x3ff, 0x0, 0x0, 0x0, 0x20000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f00000001c0)='./file0/file0\x00', 0xecb42, 0x83) pwritev2(r8, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x4001}], 0x14, 0x6400, 0x0, 0x3) 1.000976579s ago: executing program 1 (id=1666): r0 = getpid() syz_pidfd_open(r0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000008) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c72, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x400000, 0xfffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x8015, 0x0, 'dh\x00', 0x1, 0x4, 0x6d}, 0x2c) 988.145179ms ago: executing program 3 (id=1667): syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x2b, 0x1, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x11, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, 0x0, 0x0) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x6) socket$kcm(0x29, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x4000001, 0x0) poll(0x0, 0x0, 0x9) syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), r3) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e1f, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3f9d00000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="60003080050002000000000014000400403a050c5bae9c544ef2b6d713459a7a1c0001"], 0x7c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 619.218043ms ago: executing program 4 (id=1668): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) prlimit64(r0, 0x3, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x800000, 0x0, 0x20002, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r6 = creat(&(0x7f0000000080)='./file0\x00', 0xc7) socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000240)=0x1, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)={0x28, 0x10, 0x1, 0x0, 0x0, "", [@nested={0xffffffffffffff85, 0x0, 0x0, 0x0, [@typed={0x3f, 0x0, 0x0, 0x0, @u64}, @typed={0x8, 0x1c, 0x0, 0x0, @u32=0xc9}]}]}, 0x28}], 0x1, 0x0, 0x0, 0xb305e06d8ab48277}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x64, 0x6, 0x0, 0x0, 0x0, 0xb, 0x22, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x3}, 0xd, 0x0, 0x11000, 0x4, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa7}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 570.567594ms ago: executing program 2 (id=1669): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x6, 0x9}, 0x106200, 0x10004, 0x20da, 0x9, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') r1 = semget$private(0x0, 0x20000000102, 0x200) r2 = socket(0x2b, 0x80801, 0x1) sendmsg$DEVLINK_CMD_SB_POOL_SET(r2, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) r3 = syz_open_dev$loop(&(0x7f0000000000), 0x7fff, 0x80000) ioctl$BLKSSZGET(r3, 0x1268, &(0x7f0000000340)) listen(r2, 0x7e5a) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) sendmsg$netlink(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)={0x20, 0x2d, 0x1, 0x70bd2a, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=r5}, @nested={0x5, 0x1, 0x0, 0x1, [@generic="88"]}]}, 0x20}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2010008, &(0x7f0000000080)={[{@bh}, {@inlinecrypt}, {@nombcache}]}, 0xff, 0x548, &(0x7f0000001300)="$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") r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@newtaction={0x70, 0x30, 0xb, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_ct={0x58, 0x1, 0x0, 0x0, {{0x7}, {0x30, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xf, 0x0, 0x3}}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x604ff3648f564820}, 0x40014) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x8, 0x4) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) io_setup(0x8, &(0x7f0000004200)) semop(r1, &(0x7f0000000240)=[{0x1, 0x20, 0x800}, {0x0, 0xe65b}], 0x2) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r8, 0x4b67, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x1000, 0x9}]}) 491.934055ms ago: executing program 0 (id=1670): syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x48810) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) close(0x3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) process_vm_readv(r3, &(0x7f0000001900)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/66, 0x42}, {0x0}], 0x3, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x1) fchdir(r5) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x200000c, 0x32, 0xffffffffffffffff, 0x33ed0000) r6 = open(&(0x7f0000000040)='.\x00', 0x20000, 0x0) getdents64(r6, &(0x7f0000000fc0)=""/224, 0xe0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x571f68543cec8190) 261.522707ms ago: executing program 0 (id=1671): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$MRT6_INIT(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x40000007, 0x510, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x8a, 0x10001, 0xda, 0x4, 0xa, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002000)=@newtaction={0x60, 0x30, 0xb, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x80006}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x60}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x101}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$inet6(0xa, 0x1, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) fstat(0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x20000, &(0x7f0000000cc0)=ANY=[@ANYBLOB="353ae4a19c5b1302000000616e943d66642c7266646e72f1", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',aname=(/%,cache=mmap,access=', @ANYRESDEC=0x0, @ANYBLOB=',noxattr,uname=,afid=0x0000000000000001,uid<', @ANYRESDEC, @ANYBLOB=',obj_user=GPL\x00,obj_role=\\,defcontext=root,fsuuid=9d35fa95-Q2b0-\f7fa-33bc-3c999cbf,\x00']) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000140)={'ipvlan0\x00', {0x2, 0x4e24, @multicast1}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r7, &(0x7f0000004200)='t', 0x1) sendfile(r7, r6, 0x0, 0x3ffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffff000) 0s ago: executing program 3 (id=1672): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x23, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000740)="1200", 0x2, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2040000, 0x0) bind$802154_dgram(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000240)=0x9, 0x4) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, 0x0) write$tun(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c0000f500000000000000862dfdff00000065"], 0x78) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) kernel console output (not intermixed with test programs): 1][ T4060] RSP: 002b:00007f25b493f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.774737][ T4060] RAX: ffffffffffffffda RBX: 00007f25b6165fa0 RCX: 00007f25b5eecdd9 [ 59.774776][ T4060] RDX: 0000000024040084 RSI: 00002000000012c0 RDI: 0000000000000005 [ 59.774789][ T4060] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 59.774804][ T4060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 59.774822][ T4060] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 59.774848][ T4060] [ 60.158632][ T4082] FAULT_INJECTION: forcing a failure. [ 60.158632][ T4082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.173341][ T4083] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 60.182701][ T4082] CPU: 0 UID: 0 PID: 4082 Comm: syz.2.190 Not tainted syzkaller #0 PREEMPT(full) [ 60.182736][ T4082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 60.182801][ T4082] Call Trace: [ 60.182809][ T4082] [ 60.182819][ T4082] __dump_stack+0x1d/0x30 [ 60.182851][ T4082] dump_stack_lvl+0x95/0xd0 [ 60.182880][ T4082] dump_stack+0x15/0x1b [ 60.182907][ T4082] should_fail_ex+0x263/0x280 [ 60.183014][ T4082] should_fail+0xb/0x20 [ 60.183041][ T4082] should_fail_usercopy+0x1a/0x20 [ 60.183105][ T4082] strncpy_from_user+0x27/0x250 [ 60.183135][ T4082] ? kmem_cache_alloc_noprof+0x18c/0x3f0 [ 60.183213][ T4082] do_getname+0x59/0x1c0 [ 60.183268][ T4082] user_path_at+0x28/0x100 [ 60.183308][ T4082] __se_sys_mount+0x25b/0x2e0 [ 60.183354][ T4082] ? fput+0x8f/0xc0 [ 60.183383][ T4082] __x64_sys_mount+0x67/0x80 [ 60.183566][ T4082] x64_sys_call+0x2d61/0x3020 [ 60.183657][ T4082] do_syscall_64+0x12c/0x3b0 [ 60.183693][ T4082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.183716][ T4082] RIP: 0033:0x7fd71d03cdd9 [ 60.183733][ T4082] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 60.183753][ T4082] RSP: 002b:00007fd71ba8f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 60.183848][ T4082] RAX: ffffffffffffffda RBX: 00007fd71d2b5fa0 RCX: 00007fd71d03cdd9 [ 60.183862][ T4082] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000200000000000 [ 60.183955][ T4082] RBP: 00007fd71ba8f090 R08: 0000000000000000 R09: 0000000000000000 [ 60.183970][ T4082] R10: 00000000008b7840 R11: 0000000000000246 R12: 0000000000000001 [ 60.183983][ T4082] R13: 00007fd71d2b6038 R14: 00007fd71d2b5fa0 R15: 00007fffdc19e5c8 [ 60.184019][ T4082] [ 60.434042][ T4088] netlink: 32 bytes leftover after parsing attributes in process `syz.3.188'. [ 61.017897][ T4104] netlink: 4 bytes leftover after parsing attributes in process `syz.2.198'. [ 61.234851][ T4109] netlink: 28 bytes leftover after parsing attributes in process `syz.2.200'. [ 61.269998][ T4110] netlink: 28 bytes leftover after parsing attributes in process `syz.2.200'. [ 61.476115][ T4119] netlink: 8 bytes leftover after parsing attributes in process `syz.4.205'. [ 62.208507][ T4137] FAULT_INJECTION: forcing a failure. [ 62.208507][ T4137] name failslab, interval 1, probability 0, space 0, times 0 [ 62.259654][ T4137] CPU: 0 UID: 0 PID: 4137 Comm: syz.1.212 Not tainted syzkaller #0 PREEMPT(full) [ 62.259689][ T4137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 62.259706][ T4137] Call Trace: [ 62.259714][ T4137] [ 62.259723][ T4137] __dump_stack+0x1d/0x30 [ 62.259751][ T4137] dump_stack_lvl+0x95/0xd0 [ 62.259773][ T4137] dump_stack+0x15/0x1b [ 62.259793][ T4137] should_fail_ex+0x263/0x280 [ 62.259830][ T4137] should_failslab+0x8c/0xb0 [ 62.259882][ T4137] kmem_cache_alloc_noprof+0x66/0x3f0 [ 62.259923][ T4137] ? __mpol_dup+0x42/0x1b0 [ 62.259952][ T4137] __mpol_dup+0x42/0x1b0 [ 62.259984][ T4137] mbind_range+0x1e8/0x430 [ 62.260023][ T4137] __se_sys_mbind+0x8b1/0xdd0 [ 62.260061][ T4137] __x64_sys_mbind+0x78/0x90 [ 62.260090][ T4137] x64_sys_call+0x2b72/0x3020 [ 62.260123][ T4137] do_syscall_64+0x12c/0x3b0 [ 62.260155][ T4137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.260185][ T4137] RIP: 0033:0x7f3e3822cdd9 [ 62.260203][ T4137] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 62.260221][ T4137] RSP: 002b:00007f3e36c7f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 62.260241][ T4137] RAX: ffffffffffffffda RBX: 00007f3e384a5fa0 RCX: 00007f3e3822cdd9 [ 62.260255][ T4137] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 0000200000001000 [ 62.260271][ T4137] RBP: 00007f3e36c7f090 R08: 0800000000000056 R09: 0000000000000003 [ 62.260289][ T4137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.260305][ T4137] R13: 00007f3e384a6038 R14: 00007f3e384a5fa0 R15: 00007fff0378ed48 [ 62.260326][ T4137] [ 62.631651][ T4164] xt_hashlimit: overflow, try lower: 18446744073709551607/511 [ 63.008294][ T4175] mmap: syz.4.225 (4175) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 63.223803][ T4180] netlink: 32 bytes leftover after parsing attributes in process `syz.1.227'. [ 63.332153][ T4175] capability: warning: `syz.4.225' uses 32-bit capabilities (legacy support in use) [ 63.377115][ T28] kauditd_printk_skb: 10558 callbacks suppressed [ 63.377129][ T28] audit: type=1400 audit(1778265248.605:11282): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 63.408558][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.419965][ T4174] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.422173][ T3024] audit: audit_lost=25 audit_rate_limit=0 audit_backlog_limit=64 [ 63.436241][ T4174] audit: audit_lost=26 audit_rate_limit=0 audit_backlog_limit=64 [ 63.452039][ T3307] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.459482][ T3306] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.469324][ T4174] audit: backlog limit exceeded [ 63.476343][ T3306] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 63.484421][ T3307] audit: audit_lost=28 audit_rate_limit=0 audit_backlog_limit=64 [ 63.818430][ T4195] FAULT_INJECTION: forcing a failure. [ 63.818430][ T4195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.884300][ T4195] CPU: 0 UID: 0 PID: 4195 Comm: syz.1.234 Not tainted syzkaller #0 PREEMPT(full) [ 63.884410][ T4195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 63.884424][ T4195] Call Trace: [ 63.884431][ T4195] [ 63.884441][ T4195] __dump_stack+0x1d/0x30 [ 63.884474][ T4195] dump_stack_lvl+0x95/0xd0 [ 63.884503][ T4195] dump_stack+0x15/0x1b [ 63.884602][ T4195] should_fail_ex+0x263/0x280 [ 63.884635][ T4195] should_fail+0xb/0x20 [ 63.884662][ T4195] should_fail_usercopy+0x1a/0x20 [ 63.884701][ T4195] _copy_to_user+0x20/0xa0 [ 63.884809][ T4195] simple_read_from_buffer+0xb5/0x130 [ 63.884858][ T4195] proc_fail_nth_read+0x10e/0x150 [ 63.884901][ T4195] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 63.884943][ T4195] vfs_read+0x1ab/0x7f0 [ 63.885053][ T4195] ? __rcu_read_unlock+0x4e/0x70 [ 63.885084][ T4195] ? __fget_files+0x184/0x1c0 [ 63.885175][ T4195] ? mutex_lock+0x57/0x90 [ 63.885205][ T4195] ksys_read+0xdc/0x1a0 [ 63.885245][ T4195] __x64_sys_read+0x40/0x50 [ 63.885375][ T4195] x64_sys_call+0x2886/0x3020 [ 63.885410][ T4195] do_syscall_64+0x12c/0x3b0 [ 63.885445][ T4195] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.885475][ T4195] RIP: 0033:0x7f3e381ed60e [ 63.885496][ T4195] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 63.885545][ T4195] RSP: 002b:00007f3e36c7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.885571][ T4195] RAX: ffffffffffffffda RBX: 00007f3e36c7f6c0 RCX: 00007f3e381ed60e [ 63.885593][ T4195] RDX: 000000000000000f RSI: 00007f3e36c7f0a0 RDI: 0000000000000004 [ 63.885606][ T4195] RBP: 00007f3e36c7f090 R08: 0000000000000000 R09: 0000000000000000 [ 63.885620][ T4195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.885639][ T4195] R13: 00007f3e384a6038 R14: 00007f3e384a5fa0 R15: 00007fff0378ed48 [ 63.885665][ T4195] [ 64.626398][ T4204] netlink: 20 bytes leftover after parsing attributes in process `syz.1.238'. [ 64.648662][ T4204] netlink: 28 bytes leftover after parsing attributes in process `syz.1.238'. [ 64.684032][ T4204] netlink: 24 bytes leftover after parsing attributes in process `syz.1.238'. [ 64.712801][ T4205] netlink: 24 bytes leftover after parsing attributes in process `syz.1.238'. [ 66.204172][ T4241] netlink: 'syz.4.252': attribute type 8 has an invalid length. [ 66.561983][ T4249] __nla_validate_parse: 5 callbacks suppressed [ 66.562003][ T4249] netlink: 4 bytes leftover after parsing attributes in process `syz.4.255'. [ 66.692857][ T4252] FAULT_INJECTION: forcing a failure. [ 66.692857][ T4252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.740395][ T4252] CPU: 0 UID: 0 PID: 4252 Comm: syz.0.257 Not tainted syzkaller #0 PREEMPT(full) [ 66.740542][ T4252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 66.740594][ T4252] Call Trace: [ 66.740604][ T4252] [ 66.740615][ T4252] __dump_stack+0x1d/0x30 [ 66.740649][ T4252] dump_stack_lvl+0x95/0xd0 [ 66.740678][ T4252] dump_stack+0x15/0x1b [ 66.740698][ T4252] should_fail_ex+0x263/0x280 [ 66.740781][ T4252] should_fail+0xb/0x20 [ 66.740817][ T4252] should_fail_usercopy+0x1a/0x20 [ 66.740860][ T4252] _copy_to_user+0x20/0xa0 [ 66.740900][ T4252] simple_read_from_buffer+0xb5/0x130 [ 66.741016][ T4252] proc_fail_nth_read+0x10e/0x150 [ 66.741057][ T4252] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 66.741087][ T4252] vfs_read+0x1ab/0x7f0 [ 66.741183][ T4252] ? __rcu_read_unlock+0x4e/0x70 [ 66.741213][ T4252] ? __fget_files+0x184/0x1c0 [ 66.741240][ T4252] ? up_write+0x18/0x60 [ 66.741332][ T4252] ? mutex_lock+0x57/0x90 [ 66.741363][ T4252] ksys_read+0xdc/0x1a0 [ 66.741403][ T4252] __x64_sys_read+0x40/0x50 [ 66.741437][ T4252] x64_sys_call+0x2886/0x3020 [ 66.741463][ T4252] do_syscall_64+0x12c/0x3b0 [ 66.741577][ T4252] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.741630][ T4252] RIP: 0033:0x7f25b5ead60e [ 66.741704][ T4252] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 66.741728][ T4252] RSP: 002b:00007f25b493efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 66.741754][ T4252] RAX: ffffffffffffffda RBX: 00007f25b493f6c0 RCX: 00007f25b5ead60e [ 66.741806][ T4252] RDX: 000000000000000f RSI: 00007f25b493f0a0 RDI: 0000000000000003 [ 66.741820][ T4252] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 66.741832][ T4252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.741913][ T4252] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 66.741933][ T4252] [ 68.034147][ T4313] netlink: 4 bytes leftover after parsing attributes in process `syz.0.281'. [ 68.061558][ T4313] hsr_slave_1 (unregistering): left promiscuous mode [ 68.734720][ T28] kauditd_printk_skb: 24411 callbacks suppressed [ 68.734739][ T28] audit: type=1400 audit(1778265253.619:32493): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.770052][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.780146][ T3306] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.787345][ T3024] audit: audit_lost=1095 audit_rate_limit=0 audit_backlog_limit=64 [ 68.790066][ T3307] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.802152][ T3306] audit: audit_lost=1096 audit_rate_limit=0 audit_backlog_limit=64 [ 68.806680][ T3024] audit: backlog limit exceeded [ 68.818025][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.825507][ T4339] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.832404][ T3306] audit: backlog limit exceeded [ 68.854125][ T4341] netlink: 16 bytes leftover after parsing attributes in process `syz.1.292'. [ 69.113670][ T4364] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 69.662435][ T4377] netlink: 'syz.2.307': attribute type 27 has an invalid length. [ 69.680692][ T4377] lo: entered promiscuous mode [ 69.702943][ T4377] lo: entered allmulticast mode [ 69.709729][ T4377] tunl0: entered promiscuous mode [ 69.715004][ T4377] tunl0: entered allmulticast mode [ 69.721836][ T4377] gre0: entered promiscuous mode [ 69.728020][ T4377] gre0: entered allmulticast mode [ 69.734909][ T4377] gretap0: entered promiscuous mode [ 69.740792][ T4377] gretap0: entered allmulticast mode [ 69.748195][ T4377] erspan0: entered promiscuous mode [ 69.765423][ T4377] erspan0: entered allmulticast mode [ 69.782281][ T4377] ip_vti0: entered promiscuous mode [ 69.792201][ T4377] ip_vti0: entered allmulticast mode [ 69.805995][ T4377] ip6_vti0: entered promiscuous mode [ 69.820703][ T4377] ip6_vti0: entered allmulticast mode [ 69.834976][ T4377] sit0: entered promiscuous mode [ 69.855521][ T4377] sit0: entered allmulticast mode [ 69.870393][ T4377] ip6tnl0: entered promiscuous mode [ 69.883594][ T4377] ip6tnl0: entered allmulticast mode [ 69.900435][ T4377] ip6gre0: entered promiscuous mode [ 69.907324][ T4380] FAULT_INJECTION: forcing a failure. [ 69.907324][ T4380] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.920882][ T4377] ip6gre0: entered allmulticast mode [ 69.927673][ T4377] syz_tun: entered promiscuous mode [ 69.934771][ T4380] CPU: 0 UID: 0 PID: 4380 Comm: syz.0.308 Not tainted syzkaller #0 PREEMPT(full) [ 69.934806][ T4380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 69.934899][ T4380] Call Trace: [ 69.934908][ T4380] [ 69.934918][ T4380] __dump_stack+0x1d/0x30 [ 69.934954][ T4380] dump_stack_lvl+0x95/0xd0 [ 69.934978][ T4380] dump_stack+0x15/0x1b [ 69.935010][ T4380] should_fail_ex+0x263/0x280 [ 69.935067][ T4380] should_fail+0xb/0x20 [ 69.935102][ T4380] should_fail_usercopy+0x1a/0x20 [ 69.935142][ T4380] _copy_to_user+0x20/0xa0 [ 69.935181][ T4380] simple_read_from_buffer+0xb5/0x130 [ 69.935252][ T4380] proc_fail_nth_read+0x10e/0x150 [ 69.935285][ T4380] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 69.935314][ T4380] vfs_read+0x1ab/0x7f0 [ 69.935467][ T4380] ? __rcu_read_unlock+0x4e/0x70 [ 69.935576][ T4380] ? __fget_files+0x184/0x1c0 [ 69.935604][ T4380] ? mutex_lock+0x57/0x90 [ 69.935751][ T4380] ksys_read+0xdc/0x1a0 [ 69.935783][ T4380] __x64_sys_read+0x40/0x50 [ 69.935892][ T4380] x64_sys_call+0x2886/0x3020 [ 69.935922][ T4380] do_syscall_64+0x12c/0x3b0 [ 69.935963][ T4380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.935994][ T4380] RIP: 0033:0x7f25b5ead60e [ 69.936035][ T4380] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 69.936058][ T4380] RSP: 002b:00007f25b493efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 69.936084][ T4380] RAX: ffffffffffffffda RBX: 00007f25b493f6c0 RCX: 00007f25b5ead60e [ 69.936103][ T4380] RDX: 000000000000000f RSI: 00007f25b493f0a0 RDI: 0000000000000003 [ 69.936119][ T4380] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 69.936186][ T4380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.936250][ T4380] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 69.936285][ T4380] [ 69.938873][ T4377] syz_tun: entered allmulticast mode [ 70.141917][ T4377] ip6gretap0: entered promiscuous mode [ 70.147504][ T4377] ip6gretap0: entered allmulticast mode [ 70.154206][ T4377] bridge0: entered promiscuous mode [ 70.159534][ T4377] bridge0: entered allmulticast mode [ 70.166393][ T4377] vcan0: entered promiscuous mode [ 70.171545][ T4377] vcan0: entered allmulticast mode [ 70.180245][ T4377] bond0: entered promiscuous mode [ 70.185548][ T4377] bond_slave_0: entered promiscuous mode [ 70.191704][ T4377] bond_slave_1: entered promiscuous mode [ 70.209972][ T4377] bond0: entered allmulticast mode [ 70.228190][ T4377] bond_slave_0: entered allmulticast mode [ 70.246485][ T4377] bond_slave_1: entered allmulticast mode [ 70.271440][ T4377] team0: entered promiscuous mode [ 70.292093][ T4377] team_slave_0: entered promiscuous mode [ 70.320599][ T4377] team_slave_1: entered promiscuous mode [ 70.339884][ T4377] team0: entered allmulticast mode [ 70.351778][ T4377] team_slave_0: entered allmulticast mode [ 70.364919][ T4377] team_slave_1: entered allmulticast mode [ 70.384426][ T4377] dummy0: entered promiscuous mode [ 70.400664][ T4377] dummy0: entered allmulticast mode [ 70.413785][ T4377] nlmon0: entered promiscuous mode [ 70.429911][ T4377] nlmon0: entered allmulticast mode [ 70.441888][ T4377] batadv0: entered promiscuous mode [ 70.458225][ T4377] batadv0: entered allmulticast mode [ 70.474700][ T4377] vxcan0: entered promiscuous mode [ 70.488358][ T4377] vxcan0: entered allmulticast mode [ 70.502421][ T4377] vxcan1: entered promiscuous mode [ 70.516003][ T4377] vxcan1: entered allmulticast mode [ 70.529625][ T4377] veth0: entered promiscuous mode [ 70.541684][ T4377] veth0: entered allmulticast mode [ 70.563399][ T4377] veth1: entered promiscuous mode [ 70.574220][ T4377] veth1: entered allmulticast mode [ 70.588342][ T4377] wg0: entered promiscuous mode [ 70.598306][ T4377] wg0: entered allmulticast mode [ 70.611550][ T4377] wg1: entered promiscuous mode [ 70.622736][ T4377] wg1: entered allmulticast mode [ 70.636588][ T4377] wg2: entered promiscuous mode [ 70.647053][ T4377] wg2: entered allmulticast mode [ 70.659814][ T4377] veth0_to_bridge: entered promiscuous mode [ 70.672654][ T4377] veth0_to_bridge: entered allmulticast mode [ 70.692158][ T4377] veth1_to_bridge: entered promiscuous mode [ 70.705035][ T4377] veth1_to_bridge: entered allmulticast mode [ 70.725296][ T4377] veth0_to_bond: entered promiscuous mode [ 70.737622][ T4377] veth0_to_bond: entered allmulticast mode [ 70.755108][ T4377] veth1_to_bond: entered promiscuous mode [ 70.768040][ T4377] veth1_to_bond: entered allmulticast mode [ 70.786551][ T4377] veth0_to_team: entered promiscuous mode [ 70.798960][ T4377] veth0_to_team: entered allmulticast mode [ 70.819433][ T4377] veth1_to_team: entered promiscuous mode [ 70.832121][ T4377] veth1_to_team: entered allmulticast mode [ 70.852146][ T4377] veth0_to_batadv: entered promiscuous mode [ 70.865582][ T4377] veth0_to_batadv: entered allmulticast mode [ 70.885200][ T4377] batadv_slave_0: entered promiscuous mode [ 70.898036][ T4377] batadv_slave_0: entered allmulticast mode [ 70.914349][ T4377] veth1_to_batadv: entered promiscuous mode [ 70.927396][ T4377] veth1_to_batadv: entered allmulticast mode [ 70.944239][ T4377] batadv_slave_1: entered promiscuous mode [ 70.957311][ T4377] batadv_slave_1: entered allmulticast mode [ 70.973253][ T4377] xfrm0: entered promiscuous mode [ 70.984924][ T4377] xfrm0: entered allmulticast mode [ 70.998007][ T4377] veth0_to_hsr: entered promiscuous mode [ 71.012394][ T4377] veth0_to_hsr: entered allmulticast mode [ 71.027672][ T4377] hsr_slave_0: entered allmulticast mode [ 71.043481][ T4377] veth1_to_hsr: entered promiscuous mode [ 71.057162][ T4377] veth1_to_hsr: entered allmulticast mode [ 71.074397][ T4377] hsr_slave_1: entered allmulticast mode [ 71.089262][ T4377] hsr0: entered promiscuous mode [ 71.101700][ T4377] hsr0: entered allmulticast mode [ 71.115476][ T4377] veth1_vlan: entered allmulticast mode [ 71.130928][ T4377] veth0_vlan: entered allmulticast mode [ 71.168521][ T4377] vlan0: entered promiscuous mode [ 71.185890][ T4377] vlan0: entered allmulticast mode [ 71.205291][ T4377] vlan1: entered promiscuous mode [ 71.223375][ T4377] vlan1: entered allmulticast mode [ 71.241066][ T4377] macvlan0: entered promiscuous mode [ 71.261500][ T4377] macvlan0: entered allmulticast mode [ 71.278144][ T4377] macvlan1: entered promiscuous mode [ 71.287558][ T4377] macvlan1: entered allmulticast mode [ 71.299713][ T4377] ipvlan0: entered promiscuous mode [ 71.317401][ T4377] ipvlan0: entered allmulticast mode [ 71.326707][ T4377] ipvlan1: entered promiscuous mode [ 71.341140][ T4377] ipvlan1: entered allmulticast mode [ 71.354222][ T4377] veth1_macvtap: entered allmulticast mode [ 71.372210][ T4377] veth0_macvtap: entered allmulticast mode [ 71.383119][ T4377] macvtap0: entered promiscuous mode [ 71.398586][ T4377] macvtap0: entered allmulticast mode [ 71.416358][ T4377] macsec0: entered promiscuous mode [ 71.421785][ T4377] macsec0: entered allmulticast mode [ 71.436648][ T4377] geneve0: entered promiscuous mode [ 71.449829][ T4377] geneve0: entered allmulticast mode [ 71.463535][ T4377] geneve1: entered promiscuous mode [ 71.475538][ T4377] geneve1: entered allmulticast mode [ 71.491585][ T4377] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 71.507711][ T4377] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 71.529621][ T4377] netdevsim netdevsim2 netdevsim1: entered promiscuous mode [ 71.545390][ T4377] netdevsim netdevsim2 netdevsim1: entered allmulticast mode [ 71.565129][ T4377] netdevsim netdevsim2 netdevsim2: entered promiscuous mode [ 71.581158][ T4377] netdevsim netdevsim2 netdevsim2: entered allmulticast mode [ 71.602625][ T4377] netdevsim netdevsim2 netdevsim3: entered promiscuous mode [ 71.618862][ T4377] netdevsim netdevsim2 netdevsim3: entered allmulticast mode [ 71.664159][ T106] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.671324][ T106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.895843][ T4405] netlink: 80 bytes leftover after parsing attributes in process `syz.0.317'. [ 72.328692][ T4417] netlink: 8 bytes leftover after parsing attributes in process `syz.2.320'. [ 72.388048][ T4417] gtp0: entered promiscuous mode [ 72.417051][ T4417] gtp0: entered allmulticast mode [ 73.090435][ T4437] netlink: 65039 bytes leftover after parsing attributes in process `syz.0.329'. [ 73.563774][ T4482] FAULT_INJECTION: forcing a failure. [ 73.563774][ T4482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.577307][ T4482] CPU: 1 UID: 0 PID: 4482 Comm: syz.3.347 Not tainted syzkaller #0 PREEMPT(full) [ 73.577412][ T4482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 73.577429][ T4482] Call Trace: [ 73.577437][ T4482] [ 73.577444][ T4482] __dump_stack+0x1d/0x30 [ 73.577471][ T4482] dump_stack_lvl+0x95/0xd0 [ 73.577576][ T4482] dump_stack+0x15/0x1b [ 73.577603][ T4482] should_fail_ex+0x263/0x280 [ 73.577706][ T4482] should_fail+0xb/0x20 [ 73.577738][ T4482] should_fail_usercopy+0x1a/0x20 [ 73.577771][ T4482] _copy_from_user+0x1c/0xb0 [ 73.577844][ T4482] do_sock_getsockopt+0x122/0x570 [ 73.577880][ T4482] __x64_sys_getsockopt+0x11d/0x1a0 [ 73.577916][ T4482] x64_sys_call+0x2dcf/0x3020 [ 73.578083][ T4482] do_syscall_64+0x12c/0x3b0 [ 73.578133][ T4482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.578164][ T4482] RIP: 0033:0x7f5a1b1ccdd9 [ 73.578185][ T4482] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 73.578210][ T4482] RSP: 002b:00007f5a19c1f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 73.578236][ T4482] RAX: ffffffffffffffda RBX: 00007f5a1b445fa0 RCX: 00007f5a1b1ccdd9 [ 73.578302][ T4482] RDX: 0000000000000019 RSI: 0000000000000001 RDI: 0000000000000003 [ 73.578324][ T4482] RBP: 00007f5a19c1f090 R08: 0000200000000280 R09: 0000000000000000 [ 73.578341][ T4482] R10: 0000200000006080 R11: 0000000000000246 R12: 0000000000000001 [ 73.578357][ T4482] R13: 00007f5a1b446038 R14: 00007f5a1b445fa0 R15: 00007ffe98a59258 [ 73.578390][ T4482] [ 73.630830][ T4486] FAULT_INJECTION: forcing a failure. [ 73.630830][ T4486] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 73.776184][ T4486] CPU: 0 UID: 0 PID: 4486 Comm: syz.3.349 Not tainted syzkaller #0 PREEMPT(full) [ 73.776211][ T4486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 73.776224][ T4486] Call Trace: [ 73.776233][ T4486] [ 73.776321][ T4486] __dump_stack+0x1d/0x30 [ 73.776353][ T4486] dump_stack_lvl+0x95/0xd0 [ 73.776379][ T4486] dump_stack+0x15/0x1b [ 73.776399][ T4486] should_fail_ex+0x263/0x280 [ 73.776449][ T4486] should_fail_alloc_page+0xf2/0x100 [ 73.776530][ T4486] __alloc_frozen_pages_noprof+0x108/0x350 [ 73.776560][ T4486] alloc_pages_mpol+0xb3/0x260 [ 73.776609][ T4486] alloc_pages_noprof+0x8f/0x140 [ 73.776638][ T4486] __pud_alloc+0x47/0x460 [ 73.776666][ T4486] handle_mm_fault+0x1eac/0x2e70 [ 73.776709][ T4486] ? lock_mm_and_find_vma+0x8b/0x3d0 [ 73.776817][ T4486] do_user_addr_fault+0x3fd/0x1050 [ 73.776879][ T4486] ? lockref_put_return+0xf7/0x130 [ 73.776926][ T4486] exc_page_fault+0x62/0xa0 [ 73.777011][ T4486] asm_exc_page_fault+0x26/0x30 [ 73.777038][ T4486] RIP: 0010:rep_movs_alternative+0xf/0x90 [ 73.777094][ T4486] Code: c4 10 c3 cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 83 f9 40 73 44 83 f9 08 73 25 85 c9 74 0f <8a> 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 3d 1e 02 00 66 2e [ 73.777120][ T4486] RSP: 0018:ffffc900016a7c38 EFLAGS: 00050202 [ 73.777143][ T4486] RAX: ffff8881003f0af8 RBX: 0000000000000004 RCX: 0000000000000004 [ 73.777175][ T4486] RDX: 0000000000000001 RSI: 0000200000000080 RDI: ffffc900016a7cc4 [ 73.777193][ T4486] RBP: 0000000000000001 R08: 00000000000004b1 R09: 0000000000000000 [ 73.777210][ T4486] R10: 0001c900016a7cc4 R11: 0001c900016a7cc7 R12: 0000200000000080 [ 73.777228][ T4486] R13: 000000000000002a R14: ffffc900016a7cc4 R15: 0000200000000080 [ 73.777255][ T4486] _copy_from_user+0x6f/0xb0 [ 73.777319][ T4486] do_ipv6_setsockopt+0x124/0x2130 [ 73.777366][ T4486] ? kstrtoull+0x111/0x140 [ 73.777390][ T4486] ? avc_has_perm_noaudit+0xab/0x130 [ 73.777422][ T4486] ? selinux_netlbl_socket_setsockopt+0x20d/0x2f0 [ 73.777528][ T4486] ipv6_setsockopt+0x59/0x130 [ 73.777556][ T4486] udpv6_setsockopt+0x89/0xa0 [ 73.777623][ T4486] sock_common_setsockopt+0x69/0x80 [ 73.777685][ T4486] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 73.777785][ T4486] __sys_setsockopt+0x184/0x200 [ 73.777812][ T4486] __x64_sys_setsockopt+0x64/0x80 [ 73.777842][ T4486] x64_sys_call+0x2327/0x3020 [ 73.777894][ T4486] do_syscall_64+0x12c/0x3b0 [ 73.777928][ T4486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.777957][ T4486] RIP: 0033:0x7f5a1b1ccdd9 [ 73.778059][ T4486] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 73.778077][ T4486] RSP: 002b:00007f5a19c1f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 73.778097][ T4486] RAX: ffffffffffffffda RBX: 00007f5a1b445fa0 RCX: 00007f5a1b1ccdd9 [ 73.778163][ T4486] RDX: 000000000000002a RSI: 0000000000000029 RDI: 0000000000000003 [ 73.778180][ T4486] RBP: 00007f5a19c1f090 R08: 0000000000000108 R09: 0000000000000000 [ 73.778195][ T4486] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 73.778208][ T4486] R13: 00007f5a1b446038 R14: 00007f5a1b445fa0 R15: 00007ffe98a59258 [ 73.778227][ T4486] [ 74.098885][ T28] kauditd_printk_skb: 17845 callbacks suppressed [ 74.098902][ T28] audit: type=1400 audit(1778265258.595:50264): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.128576][ T28] audit: type=1400 audit(1778265258.642:50265): avc: denied { bpf } for pid=4489 comm="syz.1.351" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 74.152743][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.161148][ T4492] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.167958][ T3024] audit: audit_lost=1123 audit_rate_limit=0 audit_backlog_limit=64 [ 74.177146][ T3307] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.179019][ T4492] audit: audit_lost=1124 audit_rate_limit=0 audit_backlog_limit=64 [ 74.184305][ T28] audit: type=1400 audit(1778265258.660:50266): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.192938][ T3024] audit: backlog limit exceeded [ 74.213429][ T3307] audit: audit_lost=1125 audit_rate_limit=0 audit_backlog_limit=64 [ 74.253140][ T4494] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.424640][ T4516] netlink: 'syz.0.362': attribute type 10 has an invalid length. [ 74.434818][ T4516] netlink: 40 bytes leftover after parsing attributes in process `syz.0.362'. [ 74.455584][ T4516] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 74.573137][ T4532] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.933514][ T4547] FAULT_INJECTION: forcing a failure. [ 74.933514][ T4547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 74.950394][ T4547] CPU: 0 UID: 0 PID: 4547 Comm: syz.4.374 Not tainted syzkaller #0 PREEMPT(full) [ 74.950471][ T4547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 74.950484][ T4547] Call Trace: [ 74.950491][ T4547] [ 74.950499][ T4547] __dump_stack+0x1d/0x30 [ 74.950526][ T4547] dump_stack_lvl+0x95/0xd0 [ 74.950553][ T4547] dump_stack+0x15/0x1b [ 74.950580][ T4547] should_fail_ex+0x263/0x280 [ 74.950647][ T4547] should_fail+0xb/0x20 [ 74.950793][ T4547] should_fail_usercopy+0x1a/0x20 [ 74.950831][ T4547] _copy_to_user+0x20/0xa0 [ 74.950876][ T4547] simple_read_from_buffer+0xb5/0x130 [ 74.950962][ T4547] proc_fail_nth_read+0x10e/0x150 [ 74.951001][ T4547] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 74.951035][ T4547] vfs_read+0x1ab/0x7f0 [ 74.951108][ T4547] ? __rcu_read_unlock+0x4e/0x70 [ 74.951138][ T4547] ? __fget_files+0x184/0x1c0 [ 74.951166][ T4547] ? mutex_lock+0x57/0x90 [ 74.951196][ T4547] ksys_read+0xdc/0x1a0 [ 74.951280][ T4547] __x64_sys_read+0x40/0x50 [ 74.951361][ T4547] x64_sys_call+0x2886/0x3020 [ 74.951407][ T4547] do_syscall_64+0x12c/0x3b0 [ 74.951438][ T4547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.951477][ T4547] RIP: 0033:0x7f8fd5c1d60e [ 74.951499][ T4547] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 74.951523][ T4547] RSP: 002b:00007f8fd46b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 74.951549][ T4547] RAX: ffffffffffffffda RBX: 00007f8fd46b76c0 RCX: 00007f8fd5c1d60e [ 74.951564][ T4547] RDX: 000000000000000f RSI: 00007f8fd46b70a0 RDI: 0000000000000005 [ 74.951577][ T4547] RBP: 00007f8fd46b7090 R08: 0000000000000000 R09: 0000000000000000 [ 74.951593][ T4547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.951661][ T4547] R13: 00007f8fd5ed6038 R14: 00007f8fd5ed5fa0 R15: 00007ffc79a97e78 [ 74.951738][ T4547] [ 75.802644][ T4592] FAULT_INJECTION: forcing a failure. [ 75.802644][ T4592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.899579][ T4592] CPU: 1 UID: 0 PID: 4592 Comm: syz.4.387 Not tainted syzkaller #0 PREEMPT(full) [ 75.899621][ T4592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 75.899682][ T4592] Call Trace: [ 75.899691][ T4592] [ 75.899701][ T4592] __dump_stack+0x1d/0x30 [ 75.899735][ T4592] dump_stack_lvl+0x95/0xd0 [ 75.899814][ T4592] dump_stack+0x15/0x1b [ 75.899842][ T4592] should_fail_ex+0x263/0x280 [ 75.899881][ T4592] should_fail+0xb/0x20 [ 75.899915][ T4592] should_fail_usercopy+0x1a/0x20 [ 75.900029][ T4592] _copy_to_user+0x20/0xa0 [ 75.900127][ T4592] simple_read_from_buffer+0xb5/0x130 [ 75.900236][ T4592] proc_fail_nth_read+0x10e/0x150 [ 75.900279][ T4592] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 75.900318][ T4592] vfs_read+0x1ab/0x7f0 [ 75.900402][ T4592] ? __rcu_read_unlock+0x4e/0x70 [ 75.900430][ T4592] ? __fget_files+0x184/0x1c0 [ 75.900457][ T4592] ? mutex_lock+0x57/0x90 [ 75.900486][ T4592] ksys_read+0xdc/0x1a0 [ 75.900592][ T4592] __x64_sys_read+0x40/0x50 [ 75.900632][ T4592] x64_sys_call+0x2886/0x3020 [ 75.900665][ T4592] do_syscall_64+0x12c/0x3b0 [ 75.900761][ T4592] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.900825][ T4592] RIP: 0033:0x7f8fd5c1d60e [ 75.900846][ T4592] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 75.900866][ T4592] RSP: 002b:00007f8fd46b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 75.901005][ T4592] RAX: ffffffffffffffda RBX: 00007f8fd46b76c0 RCX: 00007f8fd5c1d60e [ 75.901102][ T4592] RDX: 000000000000000f RSI: 00007f8fd46b70a0 RDI: 0000000000000003 [ 75.901120][ T4592] RBP: 00007f8fd46b7090 R08: 0000000000000000 R09: 0000000000000000 [ 75.901136][ T4592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.901148][ T4592] R13: 00007f8fd5ed6038 R14: 00007f8fd5ed5fa0 R15: 00007ffc79a97e78 [ 75.901174][ T4592] [ 76.215030][ T35] IPVS: starting estimator thread 0... [ 76.322871][ T4605] IPVS: using max 2256 ests per chain, 112800 per kthread [ 76.484806][ T4614] netlink: 32 bytes leftover after parsing attributes in process `syz.4.398'. [ 77.588945][ T4646] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.192666][ T4661] netlink: 16 bytes leftover after parsing attributes in process `syz.4.415'. [ 78.493597][ T4677] netlink: 'syz.3.421': attribute type 17 has an invalid length. [ 78.952333][ T4699] netlink: 'syz.2.430': attribute type 21 has an invalid length. [ 79.431194][ T4723] FAULT_INJECTION: forcing a failure. [ 79.431194][ T4723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.446741][ T28] kauditd_printk_skb: 24048 callbacks suppressed [ 79.446759][ T28] audit: type=1400 audit(1778265263.618:73620): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.479968][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 79.487325][ T4723] CPU: 1 UID: 0 PID: 4723 Comm: syz.3.440 Not tainted syzkaller #0 PREEMPT(full) [ 79.487358][ T4723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 79.487447][ T4723] Call Trace: [ 79.487453][ T4723] [ 79.487460][ T4723] __dump_stack+0x1d/0x30 [ 79.487494][ T4723] dump_stack_lvl+0x95/0xd0 [ 79.487523][ T4723] dump_stack+0x15/0x1b [ 79.487608][ T4723] should_fail_ex+0x263/0x280 [ 79.487647][ T4723] should_fail+0xb/0x20 [ 79.487685][ T4723] should_fail_usercopy+0x1a/0x20 [ 79.487831][ T4723] _copy_from_iter+0xcf/0xea0 [ 79.487865][ T4723] ? alloc_pages_noprof+0xa8/0x140 [ 79.487891][ T4723] ? skb_page_frag_refill+0xbf/0x240 [ 79.487927][ T4723] tcp_sendmsg_locked+0x16ad/0x2cc0 [ 79.487985][ T4723] ? __pfx_tcp_sendmsg+0x10/0x10 [ 79.488063][ T4723] ? __pfx_inet_sendmsg+0x10/0x10 [ 79.488169][ T4723] tcp_sendmsg+0x2f/0x50 [ 79.488200][ T4723] inet_sendmsg+0x76/0xd0 [ 79.488233][ T4723] __sys_sendto+0x3db/0x490 [ 79.488266][ T4723] __x64_sys_sendto+0x76/0x90 [ 79.488326][ T4723] x64_sys_call+0x2d35/0x3020 [ 79.488411][ T4723] do_syscall_64+0x12c/0x3b0 [ 79.488445][ T4723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.488468][ T4723] RIP: 0033:0x7f5a1b1ccdd9 [ 79.488485][ T4723] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 79.488568][ T4723] RSP: 002b:00007f5a19c1f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 79.488594][ T4723] RAX: ffffffffffffffda RBX: 00007f5a1b445fa0 RCX: 00007f5a1b1ccdd9 [ 79.488612][ T4723] RDX: 0000000000000381 RSI: 00002000000004c0 RDI: 0000000000000003 [ 79.488630][ T4723] RBP: 00007f5a19c1f090 R08: 0000000000000000 R09: 0000000000000000 [ 79.488647][ T4723] R10: 0000000000000805 R11: 0000000000000246 R12: 0000000000000001 [ 79.488669][ T4723] R13: 00007f5a1b446038 R14: 00007f5a1b445fa0 R15: 00007ffe98a59258 [ 79.488728][ T4723] [ 79.489258][ T4685] audit: audit_backlog=65 > audit_backlog_limit=64 [ 79.524178][ T28] audit: type=1400 audit(1778265263.627:73621): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.531077][ T3024] audit: audit_lost=1357 audit_rate_limit=0 audit_backlog_limit=64 [ 79.553439][ T28] audit: type=1400 audit(1778265263.627:73622): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.583417][ T4685] audit: audit_lost=1358 audit_rate_limit=0 audit_backlog_limit=64 [ 79.610075][ T4725] audit: audit_backlog=65 > audit_backlog_limit=64 [ 79.630055][ T3024] audit: backlog limit exceeded [ 79.630189][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.326923][ T4745] netlink: 'syz.4.449': attribute type 8 has an invalid length. [ 80.507654][ T4751] FAULT_INJECTION: forcing a failure. [ 80.507654][ T4751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.543147][ T4751] CPU: 1 UID: 0 PID: 4751 Comm: syz.4.451 Not tainted syzkaller #0 PREEMPT(full) [ 80.543202][ T4751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 80.543218][ T4751] Call Trace: [ 80.543226][ T4751] [ 80.543235][ T4751] __dump_stack+0x1d/0x30 [ 80.543284][ T4751] dump_stack_lvl+0x95/0xd0 [ 80.543313][ T4751] dump_stack+0x15/0x1b [ 80.543340][ T4751] should_fail_ex+0x263/0x280 [ 80.543451][ T4751] should_fail+0xb/0x20 [ 80.543486][ T4751] should_fail_usercopy+0x1a/0x20 [ 80.543531][ T4751] _copy_to_user+0x20/0xa0 [ 80.543567][ T4751] simple_read_from_buffer+0xb5/0x130 [ 80.543621][ T4751] proc_fail_nth_read+0x10e/0x150 [ 80.543698][ T4751] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 80.543834][ T4751] vfs_read+0x1ab/0x7f0 [ 80.543897][ T4751] ? __rcu_read_unlock+0x4e/0x70 [ 80.543958][ T4751] ? __fget_files+0x184/0x1c0 [ 80.543986][ T4751] ? mutex_lock+0x57/0x90 [ 80.544015][ T4751] ksys_read+0xdc/0x1a0 [ 80.544061][ T4751] __x64_sys_read+0x40/0x50 [ 80.544094][ T4751] x64_sys_call+0x2886/0x3020 [ 80.544121][ T4751] do_syscall_64+0x12c/0x3b0 [ 80.544158][ T4751] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.544268][ T4751] RIP: 0033:0x7f8fd5c1d60e [ 80.544290][ T4751] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 80.544310][ T4751] RSP: 002b:00007f8fd46b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 80.544330][ T4751] RAX: ffffffffffffffda RBX: 00007f8fd46b76c0 RCX: 00007f8fd5c1d60e [ 80.544344][ T4751] RDX: 000000000000000f RSI: 00007f8fd46b70a0 RDI: 0000000000000003 [ 80.544411][ T4751] RBP: 00007f8fd46b7090 R08: 0000000000000000 R09: 0000000000000000 [ 80.544423][ T4751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 80.544461][ T4751] R13: 00007f8fd5ed6038 R14: 00007f8fd5ed5fa0 R15: 00007ffc79a97e78 [ 80.544497][ T4751] [ 80.787737][ T4755] netlink: 4 bytes leftover after parsing attributes in process `syz.4.453'. [ 81.320495][ T4775] netlink: 'syz.2.460': attribute type 8 has an invalid length. [ 81.725677][ T4787] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.471851][ T4851] netlink: 65055 bytes leftover after parsing attributes in process `syz.1.487'. [ 84.157826][ T4870] GUP no longer grows the stack in syz.4.495 (4870): 200000004000-2000003d5000 (200000003000) [ 84.181369][ T4870] CPU: 1 UID: 0 PID: 4870 Comm: syz.4.495 Not tainted syzkaller #0 PREEMPT(full) [ 84.181407][ T4870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 84.181424][ T4870] Call Trace: [ 84.181434][ T4870] [ 84.181445][ T4870] __dump_stack+0x1d/0x30 [ 84.181506][ T4870] dump_stack_lvl+0x95/0xd0 [ 84.181544][ T4870] dump_stack+0x15/0x1b [ 84.181573][ T4870] __get_user_pages+0x1b26/0x1f10 [ 84.181629][ T4870] ? __zap_vma_range+0x2b62/0x2c10 [ 84.181661][ T4870] ? free_pgd_range+0x109/0xdd0 [ 84.181682][ T4870] __gup_longterm_locked+0x8d7/0xe30 [ 84.181777][ T4870] ? unlink_file_vma_batch_add+0x151/0x1d0 [ 84.181813][ T4870] ? unlink_file_vma_batch_final+0x116/0x150 [ 84.181851][ T4870] gup_fast_fallback+0x1f2/0x1410 [ 84.181902][ T4870] get_user_pages_fast+0x5f/0x90 [ 84.182017][ T4870] get_futex_key+0x5fd/0xb50 [ 84.182062][ T4870] futex_requeue+0x16f/0x1400 [ 84.182090][ T4870] ? 0xffffffffff600000 [ 84.182106][ T4870] ? futex_hash_put+0xed/0x100 [ 84.182236][ T4870] do_futex+0x2ec/0x380 [ 84.182276][ T4870] ? 0xffffffffff600000 [ 84.182292][ T4870] ? 0xffffffffff600000 [ 84.182384][ T4870] __se_sys_futex+0x2f6/0x370 [ 84.182444][ T4870] ? xfd_validate_state+0x45/0xf0 [ 84.182557][ T4870] ? 0xffffffffff600000 [ 84.182576][ T4870] __x64_sys_futex+0x78/0x90 [ 84.182622][ T4870] x64_sys_call+0x24ab/0x3020 [ 84.182657][ T4870] do_syscall_64+0x12c/0x3b0 [ 84.182740][ T4870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.182771][ T4870] RIP: 0033:0x7f8fd5c5cdd9 [ 84.182792][ T4870] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.182821][ T4870] RSP: 002b:00007f8fd46b7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 84.182842][ T4870] RAX: ffffffffffffffda RBX: 00007f8fd5ed5fa0 RCX: 00007f8fd5c5cdd9 [ 84.182858][ T4870] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000200000003600 [ 84.182876][ T4870] RBP: 00007f8fd5cf2d69 R08: ffffffffff600000 R09: 0000000000000002 [ 84.182894][ T4870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 84.182911][ T4870] R13: 00007f8fd5ed6038 R14: 00007f8fd5ed5fa0 R15: 00007ffc79a97e78 [ 84.182990][ T4870] ? 0xffffffffff600000 [ 84.183011][ T4870] [ 84.801064][ T28] kauditd_printk_skb: 24141 callbacks suppressed [ 84.801082][ T28] audit: type=1400 audit(1778265268.650:95188): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.840195][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.843620][ T4887] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.856039][ T3024] audit: audit_lost=2218 audit_rate_limit=0 audit_backlog_limit=64 [ 84.871628][ T3024] audit: backlog limit exceeded [ 84.880403][ T4887] audit: audit_lost=2219 audit_rate_limit=0 audit_backlog_limit=64 [ 84.881411][ T28] audit: type=1400 audit(1778265268.679:95189): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.910716][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.924866][ T3024] audit: audit_lost=2220 audit_rate_limit=0 audit_backlog_limit=64 [ 84.927123][ T4887] audit: backlog limit exceeded [ 86.101091][ T4901] FAULT_INJECTION: forcing a failure. [ 86.101091][ T4901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.137011][ T4905] netlink: 20 bytes leftover after parsing attributes in process `syz.1.508'. [ 86.146166][ T4901] CPU: 0 UID: 0 PID: 4901 Comm: syz.2.506 Not tainted syzkaller #0 PREEMPT(full) [ 86.146201][ T4901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 86.146287][ T4901] Call Trace: [ 86.146295][ T4901] [ 86.146305][ T4901] __dump_stack+0x1d/0x30 [ 86.146429][ T4901] dump_stack_lvl+0x95/0xd0 [ 86.146452][ T4901] dump_stack+0x15/0x1b [ 86.146480][ T4901] should_fail_ex+0x263/0x280 [ 86.146519][ T4901] should_fail+0xb/0x20 [ 86.146552][ T4901] should_fail_usercopy+0x1a/0x20 [ 86.146600][ T4901] _copy_from_iter+0xcf/0xea0 [ 86.146636][ T4901] ? __alloc_skb+0x4f6/0x690 [ 86.146655][ T4901] ? __alloc_skb+0x200/0x690 [ 86.146675][ T4901] netlink_sendmsg+0x4ae/0x6f0 [ 86.146742][ T4901] ? __pfx_netlink_sendmsg+0x10/0x10 [ 86.146841][ T4901] ____sys_sendmsg+0x563/0x5b0 [ 86.146975][ T4901] ___sys_sendmsg+0x195/0x1e0 [ 86.147011][ T4901] __x64_sys_sendmsg+0xd4/0x160 [ 86.147055][ T4901] x64_sys_call+0x194c/0x3020 [ 86.147090][ T4901] do_syscall_64+0x12c/0x3b0 [ 86.147204][ T4901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.147296][ T4901] RIP: 0033:0x7fd71d03cdd9 [ 86.147312][ T4901] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 86.147331][ T4901] RSP: 002b:00007fd71ba8f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 86.147407][ T4901] RAX: ffffffffffffffda RBX: 00007fd71d2b5fa0 RCX: 00007fd71d03cdd9 [ 86.147433][ T4901] RDX: 0000000000004000 RSI: 0000200000000000 RDI: 0000000000000005 [ 86.147452][ T4901] RBP: 00007fd71ba8f090 R08: 0000000000000000 R09: 0000000000000000 [ 86.147465][ T4901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.147482][ T4901] R13: 00007fd71d2b6038 R14: 00007fd71d2b5fa0 R15: 00007fffdc19e5c8 [ 86.147505][ T4901] [ 86.555919][ T4928] capability: warning: `syz.1.517' uses deprecated v2 capabilities in a way that may be insecure [ 86.613089][ T4934] netlink: 28 bytes leftover after parsing attributes in process `syz.2.520'. [ 86.661537][ T4934] bond1 (unregistering): Released all slaves [ 86.693687][ T4938] netlink: 'syz.0.521': attribute type 29 has an invalid length. [ 86.730084][ T4938] netlink: 'syz.0.521': attribute type 29 has an invalid length. [ 87.003645][ T4960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=4960 comm=syz.2.527 [ 87.875795][ T4979] FAULT_INJECTION: forcing a failure. [ 87.875795][ T4979] name failslab, interval 1, probability 0, space 0, times 0 [ 87.944924][ T4979] CPU: 1 UID: 0 PID: 4979 Comm: syz.2.534 Not tainted syzkaller #0 PREEMPT(full) [ 87.944959][ T4979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 87.944976][ T4979] Call Trace: [ 87.944986][ T4979] [ 87.945014][ T4979] __dump_stack+0x1d/0x30 [ 87.945068][ T4979] dump_stack_lvl+0x95/0xd0 [ 87.945098][ T4979] dump_stack+0x15/0x1b [ 87.945125][ T4979] should_fail_ex+0x263/0x280 [ 87.945164][ T4979] should_failslab+0x8c/0xb0 [ 87.945206][ T4979] kmem_cache_alloc_node_noprof+0x6d/0x450 [ 87.945284][ T4979] ? __alloc_skb+0x2d6/0x690 [ 87.945306][ T4979] ? __rtnl_unlock+0x95/0xb0 [ 87.945330][ T4979] __alloc_skb+0x2d6/0x690 [ 87.945351][ T4979] ? __alloc_skb+0x200/0x690 [ 87.945424][ T4979] netlink_ack+0xfd/0x500 [ 87.945462][ T4979] netlink_rcv_skb+0x192/0x220 [ 87.945500][ T4979] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 87.945614][ T4979] rtnetlink_rcv+0x1c/0x30 [ 87.945697][ T4979] netlink_unicast+0x5a8/0x680 [ 87.945734][ T4979] netlink_sendmsg+0x5c8/0x6f0 [ 87.945772][ T4979] ? __pfx_netlink_sendmsg+0x10/0x10 [ 87.945865][ T4979] ____sys_sendmsg+0x563/0x5b0 [ 87.945895][ T4979] ___sys_sendmsg+0x195/0x1e0 [ 87.945932][ T4979] __x64_sys_sendmsg+0xd4/0x160 [ 87.945960][ T4979] x64_sys_call+0x194c/0x3020 [ 87.946043][ T4979] do_syscall_64+0x12c/0x3b0 [ 87.946074][ T4979] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.946100][ T4979] RIP: 0033:0x7fd71d03cdd9 [ 87.946153][ T4979] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 87.946178][ T4979] RSP: 002b:00007fd71ba8f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 87.946202][ T4979] RAX: ffffffffffffffda RBX: 00007fd71d2b5fa0 RCX: 00007fd71d03cdd9 [ 87.946216][ T4979] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 87.946229][ T4979] RBP: 00007fd71ba8f090 R08: 0000000000000000 R09: 0000000000000000 [ 87.946245][ T4979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.946261][ T4979] R13: 00007fd71d2b6038 R14: 00007fd71d2b5fa0 R15: 00007fffdc19e5c8 [ 87.946339][ T4979] [ 89.167477][ T5013] netlink: 8 bytes leftover after parsing attributes in process `syz.3.546'. [ 89.415020][ T5022] xt_TCPMSS: Only works on TCP SYN packets [ 90.157038][ T28] kauditd_printk_skb: 19531 callbacks suppressed [ 90.157058][ T28] audit: type=1400 audit(1778265273.664:113493): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.200046][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.224672][ T3024] audit: audit_lost=2630 audit_rate_limit=0 audit_backlog_limit=64 [ 90.234559][ T28] audit: type=1400 audit(1778265273.664:113494): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.252015][ T3024] audit: backlog limit exceeded [ 90.271787][ T5036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.277479][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.289541][ T5036] audit: audit_lost=2631 audit_rate_limit=0 audit_backlog_limit=64 [ 90.302771][ T3024] audit: audit_lost=2632 audit_rate_limit=0 audit_backlog_limit=64 [ 90.312377][ T28] audit: type=1400 audit(1778265273.664:113495): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.044482][ T5096] team0 (unregistering): Port device team_slave_0 removed [ 92.072067][ T5096] team0 (unregistering): Port device team_slave_1 removed [ 92.113916][ T5100] ipvlan2: entered promiscuous mode [ 92.131727][ T5100] bond0: (slave ipvlan2): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 92.176955][ T5100] bond0: (slave ipvlan2): The slave device specified does not support setting the MAC address [ 92.213513][ T5100] bond0: (slave ipvlan2): Error -95 calling set_mac_address [ 92.367252][ T5108] netlink: 'syz.4.580': attribute type 16 has an invalid length. [ 92.419715][ T5108] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.531350][ T5108] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 92.556610][ T5108] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 92.670551][ T814] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.704007][ T814] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.732136][ T814] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.764192][ T814] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.592753][ T5135] FAULT_INJECTION: forcing a failure. [ 93.592753][ T5135] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.657425][ T5135] CPU: 1 UID: 0 PID: 5135 Comm: syz.3.591 Not tainted syzkaller #0 PREEMPT(full) [ 93.657461][ T5135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 93.657478][ T5135] Call Trace: [ 93.657487][ T5135] [ 93.657497][ T5135] __dump_stack+0x1d/0x30 [ 93.657573][ T5135] dump_stack_lvl+0x95/0xd0 [ 93.657609][ T5135] dump_stack+0x15/0x1b [ 93.657636][ T5135] should_fail_ex+0x263/0x280 [ 93.657681][ T5135] should_fail+0xb/0x20 [ 93.657731][ T5135] should_fail_usercopy+0x1a/0x20 [ 93.657767][ T5135] _copy_to_user+0x20/0xa0 [ 93.657799][ T5135] simple_read_from_buffer+0xb5/0x130 [ 93.657913][ T5135] proc_fail_nth_read+0x10e/0x150 [ 93.658001][ T5135] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 93.658039][ T5135] vfs_read+0x1ab/0x7f0 [ 93.658077][ T5135] ? __rcu_read_unlock+0x4e/0x70 [ 93.658101][ T5135] ? __fget_files+0x184/0x1c0 [ 93.658126][ T5135] ? mutex_lock+0x57/0x90 [ 93.658232][ T5135] ksys_read+0xdc/0x1a0 [ 93.658270][ T5135] __x64_sys_read+0x40/0x50 [ 93.658309][ T5135] x64_sys_call+0x2886/0x3020 [ 93.658339][ T5135] do_syscall_64+0x12c/0x3b0 [ 93.658503][ T5135] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.658528][ T5135] RIP: 0033:0x7f5a1b18d60e [ 93.658548][ T5135] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 93.658572][ T5135] RSP: 002b:00007f5a19c1efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.658631][ T5135] RAX: ffffffffffffffda RBX: 00007f5a19c1f6c0 RCX: 00007f5a1b18d60e [ 93.658650][ T5135] RDX: 000000000000000f RSI: 00007f5a19c1f0a0 RDI: 0000000000000003 [ 93.658667][ T5135] RBP: 00007f5a19c1f090 R08: 0000000000000000 R09: 0000000000000000 [ 93.658689][ T5135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.658705][ T5135] R13: 00007f5a1b446038 R14: 00007f5a1b445fa0 R15: 00007ffe98a59258 [ 93.658789][ T5135] [ 94.007359][ T5152] netlink: 32 bytes leftover after parsing attributes in process `syz.4.596'. [ 95.513284][ T28] kauditd_printk_skb: 23506 callbacks suppressed [ 95.513299][ T28] audit: type=1400 audit(1778265278.669:135974): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.553298][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.569825][ T3306] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.571077][ T3024] audit: audit_lost=2975 audit_rate_limit=0 audit_backlog_limit=64 [ 95.587537][ T3306] audit: audit_lost=2976 audit_rate_limit=0 audit_backlog_limit=64 [ 95.595419][ T28] audit: type=1400 audit(1778265278.687:135975): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.609113][ T3306] audit: backlog limit exceeded [ 95.617187][ T3024] audit: backlog limit exceeded [ 95.640769][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.647394][ T3024] audit: audit_lost=2977 audit_rate_limit=0 audit_backlog_limit=64 [ 95.865057][ T5194] netlink: 32 bytes leftover after parsing attributes in process `syz.3.613'. [ 96.034793][ T5202] FAULT_INJECTION: forcing a failure. [ 96.034793][ T5202] name failslab, interval 1, probability 0, space 0, times 0 [ 96.101407][ T5202] CPU: 0 UID: 0 PID: 5202 Comm: syz.1.617 Not tainted syzkaller #0 PREEMPT(full) [ 96.101439][ T5202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 96.101455][ T5202] Call Trace: [ 96.101465][ T5202] [ 96.101475][ T5202] __dump_stack+0x1d/0x30 [ 96.101551][ T5202] dump_stack_lvl+0x95/0xd0 [ 96.101573][ T5202] dump_stack+0x15/0x1b [ 96.101593][ T5202] should_fail_ex+0x263/0x280 [ 96.101699][ T5202] ? alloc_netdev_mqs+0x801/0xa70 [ 96.101730][ T5202] should_failslab+0x8c/0xb0 [ 96.101771][ T5202] __kmalloc_cache_noprof+0x5f/0x400 [ 96.101821][ T5202] alloc_netdev_mqs+0x801/0xa70 [ 96.101898][ T5202] rtnl_create_link+0x239/0x720 [ 96.101928][ T5202] rtnl_newlink_create+0x174/0x650 [ 96.101989][ T5202] ? security_capable+0x7b/0x90 [ 96.102028][ T5202] ? netlink_ns_capable+0x86/0xa0 [ 96.102060][ T5202] rtnl_newlink+0x1185/0x1400 [ 96.102103][ T5202] ? __siphash_unaligned+0x197/0x2e0 [ 96.102168][ T5202] ? __memcg_slab_free_hook+0x10f/0x2c0 [ 96.102206][ T5202] ? __rcu_read_unlock+0x4e/0x70 [ 96.102313][ T5202] ? avc_has_perm_noaudit+0xab/0x130 [ 96.102356][ T5202] ? cred_has_capability+0x224/0x2a0 [ 96.102395][ T5202] ? selinux_capable+0x31/0x40 [ 96.102511][ T5202] ? security_capable+0x7b/0x90 [ 96.102576][ T5202] ? ns_capable+0x7c/0xb0 [ 96.102620][ T5202] ? __pfx_rtnl_newlink+0x10/0x10 [ 96.102658][ T5202] rtnetlink_rcv_msg+0x64b/0x720 [ 96.102708][ T5202] netlink_rcv_skb+0x123/0x220 [ 96.102816][ T5202] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 96.102924][ T5202] rtnetlink_rcv+0x1c/0x30 [ 96.102973][ T5202] netlink_unicast+0x5a8/0x680 [ 96.103009][ T5202] netlink_sendmsg+0x5c8/0x6f0 [ 96.103051][ T5202] ? __pfx_netlink_sendmsg+0x10/0x10 [ 96.103098][ T5202] ____sys_sendmsg+0x563/0x5b0 [ 96.103134][ T5202] ___sys_sendmsg+0x195/0x1e0 [ 96.103213][ T5202] __x64_sys_sendmsg+0xd4/0x160 [ 96.103242][ T5202] x64_sys_call+0x194c/0x3020 [ 96.103309][ T5202] do_syscall_64+0x12c/0x3b0 [ 96.103408][ T5202] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.103434][ T5202] RIP: 0033:0x7f3e3822cdd9 [ 96.103513][ T5202] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 96.103537][ T5202] RSP: 002b:00007f3e36c7f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 96.103559][ T5202] RAX: ffffffffffffffda RBX: 00007f3e384a5fa0 RCX: 00007f3e3822cdd9 [ 96.103573][ T5202] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 96.103608][ T5202] RBP: 00007f3e36c7f090 R08: 0000000000000000 R09: 0000000000000000 [ 96.103625][ T5202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 96.103641][ T5202] R13: 00007f3e384a6038 R14: 00007f3e384a5fa0 R15: 00007fff0378ed48 [ 96.103727][ T5202] [ 96.529396][ T5217] SET target dimension over the limit! [ 97.366934][ T5239] netlink: 'syz.4.630': attribute type 1 has an invalid length. [ 97.399605][ T5239] 8021q: adding VLAN 0 to HW filter on device bond1 [ 97.417532][ T5239] bond1: (slave geneve2): making interface the new active one [ 97.430027][ T5239] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 97.467956][ T814] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.489225][ T814] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.509164][ T814] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.535325][ T814] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.788848][ T5284] Cannot find set identified by id 0 to match [ 98.805530][ T5284] netlink: 'syz.4.645': attribute type 1 has an invalid length. [ 98.834909][ T5284] bond2: entered promiscuous mode [ 98.848351][ T5284] 8021q: adding VLAN 0 to HW filter on device bond2 [ 98.869250][ T5284] netlink: 28 bytes leftover after parsing attributes in process `syz.4.645'. [ 99.172614][ T5304] sctp: [Deprecated]: syz.4.652 (pid 5304) Use of struct sctp_assoc_value in delayed_ack socket option. [ 99.172614][ T5304] Use struct sctp_sack_info instead [ 99.834054][ T5340] FAULT_INJECTION: forcing a failure. [ 99.834054][ T5340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.872863][ T5340] CPU: 0 UID: 0 PID: 5340 Comm: syz.2.663 Not tainted syzkaller #0 PREEMPT(full) [ 99.872899][ T5340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 99.872916][ T5340] Call Trace: [ 99.872982][ T5340] [ 99.872991][ T5340] __dump_stack+0x1d/0x30 [ 99.873017][ T5340] dump_stack_lvl+0x95/0xd0 [ 99.873120][ T5340] dump_stack+0x15/0x1b [ 99.873148][ T5340] should_fail_ex+0x263/0x280 [ 99.873241][ T5340] should_fail+0xb/0x20 [ 99.873277][ T5340] should_fail_usercopy+0x1a/0x20 [ 99.873320][ T5340] _copy_from_user+0x1c/0xb0 [ 99.873368][ T5340] kstrtouint_from_user+0x69/0xf0 [ 99.873404][ T5340] ? 0xffffffff81000000 [ 99.873420][ T5340] ? selinux_file_permission+0x1e1/0x320 [ 99.873453][ T5340] proc_fail_nth_write+0x50/0x160 [ 99.873500][ T5340] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 99.873541][ T5340] vfs_write+0x269/0x9f0 [ 99.873581][ T5340] ? __rcu_read_unlock+0x4e/0x70 [ 99.873659][ T5340] ? __fget_files+0x184/0x1c0 [ 99.873680][ T5340] ? mutex_lock+0x57/0x90 [ 99.873703][ T5340] ksys_write+0xdc/0x1a0 [ 99.873757][ T5340] __x64_sys_write+0x40/0x50 [ 99.873797][ T5340] x64_sys_call+0x27e1/0x3020 [ 99.873832][ T5340] do_syscall_64+0x12c/0x3b0 [ 99.873895][ T5340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.873926][ T5340] RIP: 0033:0x7fd71cffd60e [ 99.873947][ T5340] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 99.873976][ T5340] RSP: 002b:00007fd71ba8efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 99.874014][ T5340] RAX: ffffffffffffffda RBX: 00007fd71ba8f6c0 RCX: 00007fd71cffd60e [ 99.874033][ T5340] RDX: 0000000000000001 RSI: 00007fd71ba8f0a0 RDI: 0000000000000003 [ 99.874050][ T5340] RBP: 00007fd71ba8f090 R08: 0000000000000000 R09: 0000000000000000 [ 99.874062][ T5340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.874075][ T5340] R13: 00007fd71d2b6038 R14: 00007fd71d2b5fa0 R15: 00007fffdc19e5c8 [ 99.874120][ T5340] [ 100.108612][ T5347] sctp: [Deprecated]: syz.0.668 (pid 5347) Use of struct sctp_assoc_value in delayed_ack socket option. [ 100.108612][ T5347] Use struct sctp_sack_info instead [ 100.868327][ T28] kauditd_printk_skb: 17115 callbacks suppressed [ 100.868345][ T28] audit: type=1400 audit(1778265283.673:153090): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.915460][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.932785][ T3024] audit: audit_lost=2978 audit_rate_limit=0 audit_backlog_limit=64 [ 100.951592][ T3024] audit: backlog limit exceeded [ 100.956640][ T28] audit: type=1400 audit(1778265283.673:153091): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.978214][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.990374][ T3024] audit: audit_lost=2979 audit_rate_limit=0 audit_backlog_limit=64 [ 101.007435][ T3024] audit: backlog limit exceeded [ 101.018180][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.024870][ T28] audit: type=1400 audit(1778265283.701:153092): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.188128][ T5368] netlink: 12 bytes leftover after parsing attributes in process `syz.4.675'. [ 101.257643][ T5371] batadv0: entered promiscuous mode [ 101.258024][ T5371] macsec1: entered promiscuous mode [ 101.258139][ T5371] macsec1: entered allmulticast mode [ 101.258181][ T5371] batadv0: entered allmulticast mode [ 101.270691][ T5371] 8021q: adding VLAN 0 to HW filter on device macsec1 [ 101.287101][ T5371] batadv0: left allmulticast mode [ 101.287173][ T5371] batadv0: left promiscuous mode [ 101.667721][ T5387] netlink: 32 bytes leftover after parsing attributes in process `syz.1.682'. [ 102.171937][ T5399] FAULT_INJECTION: forcing a failure. [ 102.171937][ T5399] name failslab, interval 1, probability 0, space 0, times 0 [ 102.215367][ T5399] CPU: 0 UID: 0 PID: 5399 Comm: syz.4.688 Not tainted syzkaller #0 PREEMPT(full) [ 102.215437][ T5399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 102.215451][ T5399] Call Trace: [ 102.215459][ T5399] [ 102.215468][ T5399] __dump_stack+0x1d/0x30 [ 102.215500][ T5399] dump_stack_lvl+0x95/0xd0 [ 102.215547][ T5399] dump_stack+0x15/0x1b [ 102.215573][ T5399] should_fail_ex+0x263/0x280 [ 102.215603][ T5399] ? alloc_pipe_info+0xad/0x340 [ 102.215634][ T5399] should_failslab+0x8c/0xb0 [ 102.215737][ T5399] __kmalloc_cache_noprof+0x5f/0x400 [ 102.215786][ T5399] alloc_pipe_info+0xad/0x340 [ 102.215850][ T5399] splice_direct_to_actor+0x591/0x670 [ 102.215948][ T5399] ? kstrtouint_from_user+0xa8/0xf0 [ 102.216019][ T5399] ? __pfx_direct_splice_actor+0x10/0x10 [ 102.216133][ T5399] ? __rcu_read_unlock+0x4e/0x70 [ 102.216161][ T5399] ? get_pid_task+0x96/0xd0 [ 102.216206][ T5399] ? avc_policy_seqno+0x15/0x30 [ 102.216243][ T5399] ? selinux_file_permission+0x1e1/0x320 [ 102.216334][ T5399] do_splice_direct+0x119/0x1a0 [ 102.216380][ T5399] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 102.216405][ T5399] do_sendfile+0x382/0x650 [ 102.216493][ T5399] __x64_sys_sendfile64+0x105/0x150 [ 102.216530][ T5399] x64_sys_call+0x2dc4/0x3020 [ 102.216558][ T5399] do_syscall_64+0x12c/0x3b0 [ 102.216656][ T5399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.216687][ T5399] RIP: 0033:0x7f8fd5c5cdd9 [ 102.216705][ T5399] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 102.216723][ T5399] RSP: 002b:00007f8fd46b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 102.216821][ T5399] RAX: ffffffffffffffda RBX: 00007f8fd5ed5fa0 RCX: 00007f8fd5c5cdd9 [ 102.216836][ T5399] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000007 [ 102.216849][ T5399] RBP: 00007f8fd46b7090 R08: 0000000000000000 R09: 0000000000000000 [ 102.216866][ T5399] R10: 000000000003ffff R11: 0000000000000246 R12: 0000000000000001 [ 102.216948][ T5399] R13: 00007f8fd5ed6038 R14: 00007f8fd5ed5fa0 R15: 00007ffc79a97e78 [ 102.216986][ T5399] [ 104.120044][ T5437] netlink: 32 bytes leftover after parsing attributes in process `syz.4.702'. [ 104.477920][ T5445] bond1: (slave bond_slave_1): Device is not our slave [ 104.497390][ T5445] bond1: option active_slave: invalid value (bond_slave_1) [ 104.519791][ T5445] bond1 (unregistering): Released all slaves [ 105.591934][ T5477] veth0_virt_wifi: entered allmulticast mode [ 105.799992][ T5489] netlink: 32 bytes leftover after parsing attributes in process `syz.3.722'. [ 106.224411][ T28] kauditd_printk_skb: 22825 callbacks suppressed [ 106.224430][ T28] audit: type=1400 audit(1778265288.677:172859): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.277612][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.284339][ T3024] audit: audit_lost=4000 audit_rate_limit=0 audit_backlog_limit=64 [ 106.292557][ T3024] audit: backlog limit exceeded [ 106.297520][ T28] audit: type=1400 audit(1778265288.715:172860): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.319399][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.326238][ T3024] audit: audit_lost=4001 audit_rate_limit=0 audit_backlog_limit=64 [ 106.345157][ T3024] audit: backlog limit exceeded [ 106.353627][ T28] audit: type=1400 audit(1778265288.715:172861): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.377347][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.338019][ T5509] netlink: 48 bytes leftover after parsing attributes in process `syz.2.731'. [ 107.522302][ T5518] x_tables: ip_tables: osf match: used from hooks POSTROUTING, but only valid from PREROUTING/INPUT/FORWARD [ 108.118537][ T5527] netlink: 32 bytes leftover after parsing attributes in process `syz.1.737'. [ 110.197173][ T5578] netlink: 32 bytes leftover after parsing attributes in process `syz.0.757'. [ 110.675279][ T5589] sctp: [Deprecated]: syz.3.761 (pid 5589) Use of struct sctp_assoc_value in delayed_ack socket option. [ 110.675279][ T5589] Use struct sctp_sack_info instead [ 111.580438][ T28] kauditd_printk_skb: 20466 callbacks suppressed [ 111.580456][ T28] audit: type=1400 audit(1778265293.700:192468): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.609768][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.621759][ T3024] audit: audit_lost=4289 audit_rate_limit=0 audit_backlog_limit=64 [ 111.630450][ T5619] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.637316][ T5620] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.644144][ T3024] audit: backlog limit exceeded [ 111.649214][ T5619] audit: audit_lost=4290 audit_rate_limit=0 audit_backlog_limit=64 [ 111.660408][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.668741][ T28] audit: type=1400 audit(1778265293.700:192469): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.670429][ T5619] audit: backlog limit exceeded [ 111.767827][ T5623] veth0_virt_wifi: entered allmulticast mode [ 112.296391][ T5639] netlink: 32 bytes leftover after parsing attributes in process `syz.1.780'. [ 112.572040][ T5649] xt_NFQUEUE: number of total queues is 0 [ 112.623004][ T5651] sctp: [Deprecated]: syz.4.787 (pid 5651) Use of struct sctp_assoc_value in delayed_ack socket option. [ 112.623004][ T5651] Use struct sctp_sack_info instead [ 114.261966][ T5709] netlink: 32 bytes leftover after parsing attributes in process `syz.4.810'. [ 116.207771][ T5760] netlink: 32 bytes leftover after parsing attributes in process `syz.0.831'. [ 116.936463][ T28] kauditd_printk_skb: 22894 callbacks suppressed [ 116.936500][ T28] audit: type=1400 audit(1778265298.705:214457): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.983871][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 116.996760][ T3024] audit: audit_lost=4594 audit_rate_limit=0 audit_backlog_limit=64 [ 117.006692][ T28] audit: type=1400 audit(1778265298.733:214458): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.039014][ T3024] audit: backlog limit exceeded [ 117.051555][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.063580][ T3024] audit: audit_lost=4595 audit_rate_limit=0 audit_backlog_limit=64 [ 117.074901][ T28] audit: type=1400 audit(1778265298.733:214459): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.107153][ T3024] audit: backlog limit exceeded [ 117.112427][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.812536][ T5828] netlink: 32 bytes leftover after parsing attributes in process `syz.4.856'. [ 119.320041][ T5852] netlink: 18 bytes leftover after parsing attributes in process `syz.1.866'. [ 120.716917][ T5883] netlink: 4 bytes leftover after parsing attributes in process `syz.4.877'. [ 121.189735][ T5909] netlink: 32 bytes leftover after parsing attributes in process `syz.0.883'. [ 122.292322][ T28] kauditd_printk_skb: 22133 callbacks suppressed [ 122.292340][ T28] audit: type=1400 audit(1778265303.709:236135): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.335219][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.347716][ T5927] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.350360][ T3024] audit: audit_lost=4749 audit_rate_limit=0 audit_backlog_limit=64 [ 122.377816][ T3024] audit: backlog limit exceeded [ 122.382786][ T28] audit: type=1400 audit(1778265303.709:236136): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.410263][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.418427][ T3024] audit: audit_lost=4750 audit_rate_limit=0 audit_backlog_limit=64 [ 122.421079][ T5927] audit: audit_lost=4751 audit_rate_limit=0 audit_backlog_limit=64 [ 122.434352][ T3024] audit: backlog limit exceeded [ 122.604799][ T5931] syzkaller0: entered promiscuous mode [ 122.635552][ T5931] syzkaller0: entered allmulticast mode [ 123.388430][ T5933] ip6gretap0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 123.959884][ T5962] netlink: 32 bytes leftover after parsing attributes in process `syz.3.906'. [ 125.787897][ T6007] netlink: 4 bytes leftover after parsing attributes in process `syz.2.926'. [ 125.868830][ T6012] netlink: 32 bytes leftover after parsing attributes in process `syz.1.923'. [ 127.446780][ T6059] netlink: 32 bytes leftover after parsing attributes in process `syz.4.943'. [ 127.505983][ T6061] FAULT_INJECTION: forcing a failure. [ 127.505983][ T6061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.543861][ T6061] CPU: 1 UID: 0 PID: 6061 Comm: syz.0.945 Not tainted syzkaller #0 PREEMPT(full) [ 127.543916][ T6061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 127.543975][ T6061] Call Trace: [ 127.543988][ T6061] [ 127.543998][ T6061] __dump_stack+0x1d/0x30 [ 127.544032][ T6061] dump_stack_lvl+0x95/0xd0 [ 127.544054][ T6061] dump_stack+0x15/0x1b [ 127.544076][ T6061] should_fail_ex+0x263/0x280 [ 127.544163][ T6061] should_fail+0xb/0x20 [ 127.544276][ T6061] should_fail_usercopy+0x1a/0x20 [ 127.544312][ T6061] _copy_to_user+0x20/0xa0 [ 127.544415][ T6061] simple_read_from_buffer+0xb5/0x130 [ 127.544463][ T6061] proc_fail_nth_read+0x10e/0x150 [ 127.544576][ T6061] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 127.544615][ T6061] vfs_read+0x1ab/0x7f0 [ 127.544688][ T6061] ? selinux_file_ioctl+0x338/0x3b0 [ 127.544725][ T6061] ksys_read+0xdc/0x1a0 [ 127.544765][ T6061] __x64_sys_read+0x40/0x50 [ 127.544799][ T6061] x64_sys_call+0x2886/0x3020 [ 127.544839][ T6061] do_syscall_64+0x12c/0x3b0 [ 127.544877][ T6061] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 127.544909][ T6061] RIP: 0033:0x7f25b5ead60e [ 127.544933][ T6061] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 127.545023][ T6061] RSP: 002b:00007f25b493efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 127.545081][ T6061] RAX: ffffffffffffffda RBX: 00007f25b493f6c0 RCX: 00007f25b5ead60e [ 127.545099][ T6061] RDX: 000000000000000f RSI: 00007f25b493f0a0 RDI: 0000000000000001 [ 127.545114][ T6061] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 127.545131][ T6061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.545146][ T6061] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 127.545168][ T6061] [ 127.741419][ T28] kauditd_printk_skb: 21105 callbacks suppressed [ 127.741438][ T28] audit: type=1400 audit(1778265308.629:257241): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.783721][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.790835][ T3024] audit: audit_lost=4752 audit_rate_limit=0 audit_backlog_limit=64 [ 127.796951][ T6063] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.805520][ T3306] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.814213][ T3024] audit: backlog limit exceeded [ 127.815212][ T6063] audit: audit_lost=4753 audit_rate_limit=0 audit_backlog_limit=64 [ 127.820904][ T3306] audit: audit_lost=4754 audit_rate_limit=0 audit_backlog_limit=64 [ 127.829529][ T28] audit: type=1400 audit(1778265308.807:257242): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.836426][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.875344][ T6065] geneve1: entered promiscuous mode [ 127.890048][ T6065] geneve1: left promiscuous mode [ 129.565374][ T6123] netlink: 32 bytes leftover after parsing attributes in process `syz.2.967'. [ 131.301850][ T6144] tc_dump_action: action bad kind [ 131.738022][ T6162] netlink: 32 bytes leftover after parsing attributes in process `syz.3.985'. [ 133.089931][ T28] kauditd_printk_skb: 19214 callbacks suppressed [ 133.089950][ T28] audit: type=1400 audit(1778265313.812:274920): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.126470][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.137328][ T3306] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.144076][ T3307] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.160937][ T3024] audit: audit_lost=5267 audit_rate_limit=0 audit_backlog_limit=64 [ 133.164707][ T3307] audit: audit_lost=5268 audit_rate_limit=0 audit_backlog_limit=64 [ 133.175409][ T3306] audit: audit_lost=5269 audit_rate_limit=0 audit_backlog_limit=64 [ 133.177911][ T28] audit: type=1400 audit(1778265313.821:274921): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.199436][ T3024] audit: backlog limit exceeded [ 133.208293][ T3307] audit: backlog limit exceeded [ 133.227393][ T6196] sctp: [Deprecated]: syz.3.999 (pid 6196) Use of struct sctp_assoc_value in delayed_ack socket option. [ 133.227393][ T6196] Use struct sctp_sack_info instead [ 133.540717][ T6220] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1008'. [ 134.275337][ T6233] sctp: [Deprecated]: syz.0.1014 (pid 6233) Use of struct sctp_assoc_value in delayed_ack socket option. [ 134.275337][ T6233] Use struct sctp_sack_info instead [ 135.348644][ T6260] sctp: [Deprecated]: syz.0.1026 (pid 6260) Use of struct sctp_assoc_value in delayed_ack socket option. [ 135.348644][ T6260] Use struct sctp_sack_info instead [ 135.841878][ T6269] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1029'. [ 136.708788][ T6289] sctp: [Deprecated]: syz.2.1039 (pid 6289) Use of struct sctp_assoc_value in delayed_ack socket option. [ 136.708788][ T6289] Use struct sctp_sack_info instead [ 137.948621][ T6324] sctp: [Deprecated]: syz.2.1051 (pid 6324) Use of struct sctp_assoc_value in delayed_ack socket option. [ 137.948621][ T6324] Use struct sctp_sack_info instead [ 138.265624][ T6331] sctp: [Deprecated]: syz.1.1062 (pid 6331) Use of struct sctp_assoc_value in delayed_ack socket option. [ 138.265624][ T6331] Use struct sctp_sack_info instead [ 138.419407][ T6341] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1055'. [ 138.445984][ T28] kauditd_printk_skb: 19150 callbacks suppressed [ 138.446004][ T28] audit: type=1400 audit(1778265318.835:293768): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.481531][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 138.499320][ T3306] audit: audit_backlog=65 > audit_backlog_limit=64 [ 138.507521][ T3306] audit: audit_lost=5371 audit_rate_limit=0 audit_backlog_limit=64 [ 138.508609][ T3024] audit: audit_lost=5372 audit_rate_limit=0 audit_backlog_limit=64 [ 138.525089][ T28] audit: type=1400 audit(1778265318.835:293769): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.551326][ T6345] audit: audit_backlog=65 > audit_backlog_limit=64 [ 138.558240][ T3306] audit: backlog limit exceeded [ 138.559952][ T3024] audit: backlog limit exceeded [ 138.574872][ T6345] audit: audit_lost=5373 audit_rate_limit=0 audit_backlog_limit=64 [ 139.078091][ T6370] sctp: [Deprecated]: syz.0.1068 (pid 6370) Use of struct sctp_assoc_value in delayed_ack socket option. [ 139.078091][ T6370] Use struct sctp_sack_info instead [ 139.863330][ T6405] sctp: [Deprecated]: syz.2.1083 (pid 6405) Use of struct sctp_assoc_value in delayed_ack socket option. [ 139.863330][ T6405] Use struct sctp_sack_info instead [ 139.960630][ T35] IPVS: starting estimator thread 0... [ 140.060147][ T6408] IPVS: using max 2400 ests per chain, 120000 per kthread [ 140.225515][ T6424] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1089'. [ 140.913076][ T6437] sctp: [Deprecated]: syz.3.1095 (pid 6437) Use of struct sctp_assoc_value in delayed_ack socket option. [ 140.913076][ T6437] Use struct sctp_sack_info instead [ 141.283292][ T6447] FAULT_INJECTION: forcing a failure. [ 141.283292][ T6447] name failslab, interval 1, probability 0, space 0, times 0 [ 141.339050][ T6447] CPU: 1 UID: 0 PID: 6447 Comm: syz.2.1099 Not tainted syzkaller #0 PREEMPT(full) [ 141.339140][ T6447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 141.339157][ T6447] Call Trace: [ 141.339164][ T6447] [ 141.339172][ T6447] __dump_stack+0x1d/0x30 [ 141.339262][ T6447] dump_stack_lvl+0x95/0xd0 [ 141.339318][ T6447] dump_stack+0x15/0x1b [ 141.339338][ T6447] should_fail_ex+0x263/0x280 [ 141.339373][ T6447] should_failslab+0x8c/0xb0 [ 141.339416][ T6447] kmem_cache_alloc_noprof+0x66/0x3f0 [ 141.339459][ T6447] ? skb_clone+0x151/0x1f0 [ 141.339494][ T6447] skb_clone+0x151/0x1f0 [ 141.339524][ T6447] __netlink_deliver_tap+0x2c9/0x500 [ 141.339560][ T6447] netlink_dump+0x806/0x870 [ 141.339598][ T6447] netlink_recvmsg+0x420/0x550 [ 141.339698][ T6447] ? __pfx_netlink_recvmsg+0x10/0x10 [ 141.339736][ T6447] sock_recvmsg_nosec+0xc2/0xf0 [ 141.339769][ T6447] ____sys_recvmsg+0x26f/0x280 [ 141.339801][ T6447] ___sys_recvmsg+0x11f/0x3b0 [ 141.339923][ T6447] ? set_normalized_timespec64+0xe0/0x110 [ 141.339995][ T6447] do_recvmmsg+0x1ef/0x560 [ 141.340114][ T6447] __x64_sys_recvmmsg+0xfb/0x170 [ 141.340145][ T6447] x64_sys_call+0x80f/0x3020 [ 141.340180][ T6447] do_syscall_64+0x12c/0x3b0 [ 141.340251][ T6447] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.340352][ T6447] RIP: 0033:0x7fd71d03cdd9 [ 141.340374][ T6447] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 141.340399][ T6447] RSP: 002b:00007fd71ba8f028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 141.340423][ T6447] RAX: ffffffffffffffda RBX: 00007fd71d2b5fa0 RCX: 00007fd71d03cdd9 [ 141.340437][ T6447] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 141.340450][ T6447] RBP: 00007fd71ba8f090 R08: 0000200000003700 R09: 0000000000000000 [ 141.340535][ T6447] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000002 [ 141.340553][ T6447] R13: 00007fd71d2b6038 R14: 00007fd71d2b5fa0 R15: 00007fffdc19e5c8 [ 141.340593][ T6447] [ 141.842036][ T6467] sctp: [Deprecated]: syz.0.1107 (pid 6467) Use of struct sctp_assoc_value in delayed_ack socket option. [ 141.842036][ T6467] Use struct sctp_sack_info instead [ 142.076806][ T6479] sctp: [Deprecated]: syz.0.1112 (pid 6479) Use of struct sctp_assoc_value in delayed_ack socket option. [ 142.076806][ T6479] Use struct sctp_sack_info instead [ 142.168833][ T6485] FAULT_INJECTION: forcing a failure. [ 142.168833][ T6485] name failslab, interval 1, probability 0, space 0, times 0 [ 142.187259][ T6488] FAULT_INJECTION: forcing a failure. [ 142.187259][ T6488] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.202223][ T6485] CPU: 0 UID: 0 PID: 6485 Comm: syz.3.1114 Not tainted syzkaller #0 PREEMPT(full) [ 142.202252][ T6485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 142.202323][ T6485] Call Trace: [ 142.202331][ T6485] [ 142.202340][ T6485] __dump_stack+0x1d/0x30 [ 142.202434][ T6485] dump_stack_lvl+0x95/0xd0 [ 142.202464][ T6485] dump_stack+0x15/0x1b [ 142.202488][ T6485] should_fail_ex+0x263/0x280 [ 142.202580][ T6485] should_failslab+0x8c/0xb0 [ 142.202623][ T6485] kmem_cache_alloc_noprof+0x66/0x3f0 [ 142.202660][ T6485] ? radix_tree_node_alloc+0x8a/0x1f0 [ 142.202715][ T6485] radix_tree_node_alloc+0x8a/0x1f0 [ 142.202744][ T6485] idr_get_free+0x1fa/0x550 [ 142.202770][ T6485] idr_alloc_u32+0xf2/0x1a0 [ 142.202807][ T6485] tcf_idr_check_alloc+0x1ff/0x2e0 [ 142.202853][ T6485] tunnel_key_init+0x1c4/0xf30 [ 142.202898][ T6485] ? __nla_validate_parse+0x1650/0x1cf0 [ 142.202950][ T6485] ? __pfx_tunnel_key_init+0x10/0x10 [ 142.203053][ T6485] tcf_action_init_1+0x395/0x4d0 [ 142.203103][ T6485] tcf_action_init+0x29c/0x700 [ 142.203220][ T6485] tc_ctl_action+0x29b/0x830 [ 142.203271][ T6485] ? __pfx_tc_ctl_action+0x10/0x10 [ 142.203353][ T6485] rtnetlink_rcv_msg+0x6a7/0x720 [ 142.203419][ T6485] netlink_rcv_skb+0x123/0x220 [ 142.203454][ T6485] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 142.203500][ T6485] rtnetlink_rcv+0x1c/0x30 [ 142.203552][ T6485] netlink_unicast+0x5a8/0x680 [ 142.203585][ T6485] netlink_sendmsg+0x5c8/0x6f0 [ 142.203662][ T6485] ? __pfx_netlink_sendmsg+0x10/0x10 [ 142.203701][ T6485] ____sys_sendmsg+0x563/0x5b0 [ 142.203763][ T6485] ___sys_sendmsg+0x195/0x1e0 [ 142.203839][ T6485] __x64_sys_sendmsg+0xd4/0x160 [ 142.203912][ T6485] x64_sys_call+0x194c/0x3020 [ 142.203946][ T6485] do_syscall_64+0x12c/0x3b0 [ 142.204031][ T6485] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.204060][ T6485] RIP: 0033:0x7f5a1b1ccdd9 [ 142.204081][ T6485] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 142.204106][ T6485] RSP: 002b:00007f5a19c1f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 142.204171][ T6485] RAX: ffffffffffffffda RBX: 00007f5a1b445fa0 RCX: 00007f5a1b1ccdd9 [ 142.204189][ T6485] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 142.204212][ T6485] RBP: 00007f5a19c1f090 R08: 0000000000000000 R09: 0000000000000000 [ 142.204309][ T6485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.204325][ T6485] R13: 00007f5a1b446038 R14: 00007f5a1b445fa0 R15: 00007ffe98a59258 [ 142.204346][ T6485] [ 142.248026][ T6488] CPU: 1 UID: 0 PID: 6488 Comm: syz.0.1115 Not tainted syzkaller #0 PREEMPT(full) [ 142.248134][ T6488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 142.248179][ T6488] Call Trace: [ 142.248206][ T6488] [ 142.248238][ T6488] __dump_stack+0x1d/0x30 [ 142.248381][ T6488] dump_stack_lvl+0x95/0xd0 [ 142.248468][ T6488] dump_stack+0x15/0x1b [ 142.248536][ T6488] should_fail_ex+0x263/0x280 [ 142.248645][ T6488] should_fail+0xb/0x20 [ 142.248816][ T6488] should_fail_usercopy+0x1a/0x20 [ 142.248933][ T6488] _copy_from_iter+0xcf/0xea0 [ 142.249064][ T6488] ? alloc_pages_mpol+0x217/0x260 [ 142.249184][ T6488] copy_page_from_iter+0x161/0x1f0 [ 142.249361][ T6488] tun_get_user+0xbe3/0x27e0 [ 142.249510][ T6488] ? ref_tracker_alloc+0x1eb/0x2f0 [ 142.249662][ T6488] tun_chr_write_iter+0x15e/0x210 [ 142.249794][ T6488] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 142.249966][ T6488] vfs_write+0x5a6/0x9f0 [ 142.250085][ T6488] ksys_write+0xdc/0x1a0 [ 142.250208][ T6488] __x64_sys_write+0x40/0x50 [ 142.250315][ T6488] x64_sys_call+0x27e1/0x3020 [ 142.250451][ T6488] do_syscall_64+0x12c/0x3b0 [ 142.250592][ T6488] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.250818][ T6488] RIP: 0033:0x7f25b5ead60e [ 142.250882][ T6488] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 142.250940][ T6488] RSP: 002b:00007f25b493efb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 142.251013][ T6488] RAX: ffffffffffffffda RBX: 00007f25b493f6c0 RCX: 00007f25b5ead60e [ 142.251058][ T6488] RDX: 0000000000000056 RSI: 0000200000000880 RDI: 00000000000000c8 [ 142.251110][ T6488] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 142.251153][ T6488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.251232][ T6488] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 142.251306][ T6488] [ 142.760296][ T6498] netlink: 32 bytes leftover after parsing attributes in process `syz.4.1116'. [ 143.048362][ T6505] FAULT_INJECTION: forcing a failure. [ 143.048362][ T6505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.082070][ T6505] CPU: 0 UID: 0 PID: 6505 Comm: syz.0.1122 Not tainted syzkaller #0 PREEMPT(full) [ 143.082166][ T6505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 143.082179][ T6505] Call Trace: [ 143.082186][ T6505] [ 143.082194][ T6505] __dump_stack+0x1d/0x30 [ 143.082281][ T6505] dump_stack_lvl+0x95/0xd0 [ 143.082310][ T6505] dump_stack+0x15/0x1b [ 143.082355][ T6505] should_fail_ex+0x263/0x280 [ 143.082417][ T6505] should_fail+0xb/0x20 [ 143.082443][ T6505] should_fail_usercopy+0x1a/0x20 [ 143.082476][ T6505] _copy_from_user+0x1c/0xb0 [ 143.082551][ T6505] kstrtouint_from_user+0x69/0xf0 [ 143.082581][ T6505] ? 0xffffffff81000000 [ 143.082601][ T6505] ? selinux_file_permission+0x1e1/0x320 [ 143.082637][ T6505] proc_fail_nth_write+0x50/0x160 [ 143.082694][ T6505] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 143.082724][ T6505] vfs_write+0x269/0x9f0 [ 143.082757][ T6505] ? __rcu_read_unlock+0x4e/0x70 [ 143.082864][ T6505] ? __fget_files+0x184/0x1c0 [ 143.082890][ T6505] ? mutex_lock+0x57/0x90 [ 143.082933][ T6505] ksys_write+0xdc/0x1a0 [ 143.082973][ T6505] __x64_sys_write+0x40/0x50 [ 143.083009][ T6505] x64_sys_call+0x27e1/0x3020 [ 143.083070][ T6505] do_syscall_64+0x12c/0x3b0 [ 143.083102][ T6505] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.083202][ T6505] RIP: 0033:0x7f25b5ead60e [ 143.083223][ T6505] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 143.083247][ T6505] RSP: 002b:00007f25b493efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 143.083347][ T6505] RAX: ffffffffffffffda RBX: 00007f25b493f6c0 RCX: 00007f25b5ead60e [ 143.083366][ T6505] RDX: 0000000000000001 RSI: 00007f25b493f0a0 RDI: 0000000000000006 [ 143.083383][ T6505] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 143.083406][ T6505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.083423][ T6505] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 143.083448][ T6505] [ 143.353186][ T6507] sctp: [Deprecated]: syz.3.1123 (pid 6507) Use of struct sctp_assoc_value in delayed_ack socket option. [ 143.353186][ T6507] Use struct sctp_sack_info instead [ 143.801996][ T28] kauditd_printk_skb: 13776 callbacks suppressed [ 143.802014][ T28] audit: type=1400 audit(1778265323.839:307305): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.839122][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 143.846038][ T28] audit: type=1400 audit(1778265323.867:307306): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.869433][ T3024] audit: audit_lost=5454 audit_rate_limit=0 audit_backlog_limit=64 [ 143.878105][ T3024] audit: backlog limit exceeded [ 143.883247][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 143.890095][ T28] audit: type=1400 audit(1778265323.867:307307): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.911715][ T3024] audit: audit_lost=5455 audit_rate_limit=0 audit_backlog_limit=64 [ 143.924803][ T3024] audit: backlog limit exceeded [ 143.933240][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 144.551932][ T6538] netlink: 2028 bytes leftover after parsing attributes in process `syz.4.1133'. [ 144.594563][ T6538] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1133'. [ 144.766260][ T6549] sctp: [Deprecated]: syz.1.1138 (pid 6549) Use of struct sctp_assoc_value in delayed_ack socket option. [ 144.766260][ T6549] Use struct sctp_sack_info instead [ 144.872603][ T6554] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1140'. [ 144.929555][ T6557] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 145.059922][ T6561] team0 (unregistering): Port device team_slave_0 removed [ 145.080039][ T6561] team0 (unregistering): Port device team_slave_1 removed [ 145.131650][ T6562] bond0: Device is already in use. [ 146.212254][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.256888][ T6589] sctp: [Deprecated]: syz.0.1153 (pid 6589) Use of struct sctp_assoc_value in delayed_ack socket option. [ 146.256888][ T6589] Use struct sctp_sack_info instead [ 146.277707][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.327273][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.404993][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.432310][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.528773][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.585948][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.631500][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.675076][ T6585] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 146.735756][ T6600] team0 (unregistering): Port device team_slave_0 removed [ 146.784341][ T6600] team0 (unregistering): Port device team_slave_1 removed [ 146.865200][ T6601] ipvlan3: entered promiscuous mode [ 146.894065][ T6601] bond0: (slave ipvlan3): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 146.945562][ T6601] bond0: (slave ipvlan3): The slave device specified does not support setting the MAC address [ 147.020426][ T6601] bond0: (slave ipvlan3): Error -95 calling set_mac_address [ 147.516027][ T6627] sctp: [Deprecated]: syz.4.1166 (pid 6627) Use of struct sctp_assoc_value in delayed_ack socket option. [ 147.516027][ T6627] Use struct sctp_sack_info instead [ 149.158000][ T28] kauditd_printk_skb: 18257 callbacks suppressed [ 149.158015][ T28] audit: type=1400 audit(1778265328.853:325563): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.198829][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 149.207251][ T6663] audit: audit_backlog=65 > audit_backlog_limit=64 [ 149.216430][ T3304] audit: audit_backlog=65 > audit_backlog_limit=64 [ 149.219315][ T3024] audit: audit_lost=5457 audit_rate_limit=0 audit_backlog_limit=64 [ 149.235216][ T6663] audit: audit_lost=5458 audit_rate_limit=0 audit_backlog_limit=64 [ 149.241992][ T3024] audit: backlog limit exceeded [ 149.243935][ T3304] audit: audit_lost=5459 audit_rate_limit=0 audit_backlog_limit=64 [ 149.248661][ T28] audit: type=1400 audit(1778265328.881:325564): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.267329][ T6663] audit: backlog limit exceeded [ 149.298796][ T6666] sctp: [Deprecated]: syz.2.1182 (pid 6666) Use of struct sctp_assoc_value in delayed_ack socket option. [ 149.298796][ T6666] Use struct sctp_sack_info instead [ 150.246298][ T6693] sctp: [Deprecated]: syz.0.1194 (pid 6693) Use of struct sctp_assoc_value in delayed_ack socket option. [ 150.246298][ T6693] Use struct sctp_sack_info instead [ 151.164160][ T6719] sctp: [Deprecated]: syz.0.1206 (pid 6719) Use of struct sctp_assoc_value in delayed_ack socket option. [ 151.164160][ T6719] Use struct sctp_sack_info instead [ 152.671745][ T6744] sctp: [Deprecated]: syz.4.1217 (pid 6744) Use of struct sctp_assoc_value in delayed_ack socket option. [ 152.671745][ T6744] Use struct sctp_sack_info instead [ 153.966388][ T6769] sctp: [Deprecated]: syz.4.1228 (pid 6769) Use of struct sctp_assoc_value in delayed_ack socket option. [ 153.966388][ T6769] Use struct sctp_sack_info instead [ 154.514596][ T28] kauditd_printk_skb: 20859 callbacks suppressed [ 154.514619][ T28] audit: type=1400 audit(1778265333.848:345388): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 154.556105][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 154.567262][ T3024] audit: audit_lost=5805 audit_rate_limit=0 audit_backlog_limit=64 [ 154.575293][ T3024] audit: backlog limit exceeded [ 154.580586][ T28] audit: type=1400 audit(1778265333.848:345389): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 154.602122][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 154.609064][ T3024] audit: audit_lost=5806 audit_rate_limit=0 audit_backlog_limit=64 [ 154.617273][ T6787] audit: audit_backlog=65 > audit_backlog_limit=64 [ 154.624106][ T3024] audit: backlog limit exceeded [ 154.629103][ T6787] audit: audit_lost=5807 audit_rate_limit=0 audit_backlog_limit=64 [ 155.503606][ T6804] sctp: [Deprecated]: syz.2.1243 (pid 6804) Use of struct sctp_assoc_value in delayed_ack socket option. [ 155.503606][ T6804] Use struct sctp_sack_info instead [ 157.127250][ T6834] sctp: [Deprecated]: syz.2.1256 (pid 6834) Use of struct sctp_assoc_value in delayed_ack socket option. [ 157.127250][ T6834] Use struct sctp_sack_info instead [ 158.086075][ T6850] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1263'. [ 159.499055][ T6887] sctp: [Deprecated]: syz.1.1274 (pid 6887) Use of struct sctp_assoc_value in delayed_ack socket option. [ 159.499055][ T6887] Use struct sctp_sack_info instead [ 159.869807][ T28] kauditd_printk_skb: 19671 callbacks suppressed [ 159.869826][ T28] audit: type=1400 audit(1778265338.862:365060): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.912621][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.931591][ T3024] audit: audit_lost=5808 audit_rate_limit=0 audit_backlog_limit=64 [ 159.935626][ T28] audit: type=1400 audit(1778265338.862:365061): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.955837][ T3024] audit: backlog limit exceeded [ 159.986664][ T28] audit: type=1400 audit(1778265338.862:365062): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.988192][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 160.033786][ T28] audit: type=1400 audit(1778265338.862:365063): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 160.066621][ T3024] audit: audit_lost=5809 audit_rate_limit=0 audit_backlog_limit=64 [ 160.079783][ T28] audit: type=1400 audit(1778265338.862:365064): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 161.821346][ T6917] sctp: [Deprecated]: syz.2.1286 (pid 6917) Use of struct sctp_assoc_value in delayed_ack socket option. [ 161.821346][ T6917] Use struct sctp_sack_info instead [ 165.149304][ T6948] sctp: [Deprecated]: syz.0.1299 (pid 6948) Use of struct sctp_assoc_value in delayed_ack socket option. [ 165.149304][ T6948] Use struct sctp_sack_info instead [ 165.226161][ T28] kauditd_printk_skb: 19011 callbacks suppressed [ 165.226176][ T28] audit: type=1400 audit(1778265343.866:382521): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 165.256089][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.257250][ T6948] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.269794][ T6950] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.270157][ T3024] audit: audit_lost=6328 audit_rate_limit=0 audit_backlog_limit=64 [ 165.284077][ T6950] audit: audit_lost=6329 audit_rate_limit=0 audit_backlog_limit=64 [ 165.291391][ T28] audit: type=1400 audit(1778265343.885:382522): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 165.295756][ T6948] audit: audit_lost=6330 audit_rate_limit=0 audit_backlog_limit=64 [ 165.324889][ T3024] audit: backlog limit exceeded [ 165.329801][ T6950] audit: backlog limit exceeded [ 167.008328][ T6983] sctp: [Deprecated]: syz.2.1313 (pid 6983) Use of struct sctp_assoc_value in delayed_ack socket option. [ 167.008328][ T6983] Use struct sctp_sack_info instead [ 170.184374][ T7018] sctp: [Deprecated]: syz.3.1326 (pid 7018) Use of struct sctp_assoc_value in delayed_ack socket option. [ 170.184374][ T7018] Use struct sctp_sack_info instead [ 170.581841][ T28] kauditd_printk_skb: 18469 callbacks suppressed [ 170.581860][ T28] audit: type=1400 audit(1778265348.880:400700): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.626380][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.642262][ T7029] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.652372][ T3024] audit: audit_lost=6428 audit_rate_limit=0 audit_backlog_limit=64 [ 170.666397][ T28] audit: type=1400 audit(1778265348.880:400701): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.672202][ T7029] audit: audit_lost=6429 audit_rate_limit=0 audit_backlog_limit=64 [ 170.698028][ T3024] audit: backlog limit exceeded [ 170.712306][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.718327][ T7031] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.731438][ T3024] audit: audit_lost=6430 audit_rate_limit=0 audit_backlog_limit=64 [ 172.442643][ T7056] sctp: [Deprecated]: syz.0.1339 (pid 7056) Use of struct sctp_assoc_value in delayed_ack socket option. [ 172.442643][ T7056] Use struct sctp_sack_info instead [ 174.018821][ T7094] sctp: [Deprecated]: syz.1.1351 (pid 7094) Use of struct sctp_assoc_value in delayed_ack socket option. [ 174.018821][ T7094] Use struct sctp_sack_info instead [ 175.939371][ T28] kauditd_printk_skb: 19327 callbacks suppressed [ 175.939391][ T28] audit: type=1400 audit(1778265353.893:420025): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.975382][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 175.993878][ T3024] audit: audit_lost=6432 audit_rate_limit=0 audit_backlog_limit=64 [ 176.016357][ T3024] audit: backlog limit exceeded [ 176.029145][ T28] audit: type=1400 audit(1778265353.903:420026): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.036135][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 176.092248][ T3024] audit: audit_lost=6433 audit_rate_limit=0 audit_backlog_limit=64 [ 176.094919][ T28] audit: type=1400 audit(1778265353.903:420027): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.114891][ T3024] audit: backlog limit exceeded [ 176.149809][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 181.294058][ T28] kauditd_printk_skb: 19804 callbacks suppressed [ 181.294091][ T28] audit: type=1400 audit(1778265358.907:439719): avc: denied { read } for pid=7227 comm="syz.3.1399" dev="nsfs" ino=4026532565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 181.330078][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 181.337769][ T7228] audit: audit_backlog=65 > audit_backlog_limit=64 [ 181.347447][ T7231] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1398'. [ 181.353999][ T3024] audit: audit_lost=6472 audit_rate_limit=0 audit_backlog_limit=64 [ 181.358098][ T28] audit: type=1400 audit(1778265358.907:439720): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 181.370490][ T7228] audit: audit_lost=6473 audit_rate_limit=0 audit_backlog_limit=64 [ 181.394547][ T3024] audit: backlog limit exceeded [ 181.399615][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 181.406650][ T3024] audit: audit_lost=6474 audit_rate_limit=0 audit_backlog_limit=64 [ 181.414742][ T3024] audit: backlog limit exceeded [ 181.438161][ T7231] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7231 comm=syz.0.1398 [ 181.490089][ T7236] net_ratelimit: 2 callbacks suppressed [ 181.490104][ T7236] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 181.504020][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 181.978345][ T35] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 182.947730][ T7271] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 182.956126][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 183.100774][ T1040] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 183.309158][ T7285] netlink: 'syz.2.1417': attribute type 21 has an invalid length. [ 183.330354][ T7285] netlink: 'syz.2.1417': attribute type 4 has an invalid length. [ 184.030961][ T3524] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 184.201882][ T35] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 185.313593][ T35] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 185.829415][ T7317] FAULT_INJECTION: forcing a failure. [ 185.829415][ T7317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.871184][ T7317] CPU: 1 UID: 0 PID: 7317 Comm: syz.1.1429 Not tainted syzkaller #0 PREEMPT(full) [ 185.871278][ T7317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 185.871349][ T7317] Call Trace: [ 185.871358][ T7317] [ 185.871367][ T7317] __dump_stack+0x1d/0x30 [ 185.871409][ T7317] dump_stack_lvl+0x95/0xd0 [ 185.871432][ T7317] dump_stack+0x15/0x1b [ 185.871451][ T7317] should_fail_ex+0x263/0x280 [ 185.871490][ T7317] should_fail+0xb/0x20 [ 185.871538][ T7317] should_fail_usercopy+0x1a/0x20 [ 185.871575][ T7317] _copy_to_user+0x20/0xa0 [ 185.871611][ T7317] simple_read_from_buffer+0xb5/0x130 [ 185.871727][ T7317] proc_fail_nth_read+0x10e/0x150 [ 185.871762][ T7317] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 185.871792][ T7317] vfs_read+0x1ab/0x7f0 [ 185.871905][ T7317] ? __rcu_read_unlock+0x4e/0x70 [ 185.871927][ T7317] ? __fget_files+0x184/0x1c0 [ 185.871954][ T7317] ? mutex_lock+0x57/0x90 [ 185.871983][ T7317] ksys_read+0xdc/0x1a0 [ 185.872098][ T7317] __x64_sys_read+0x40/0x50 [ 185.872193][ T7317] x64_sys_call+0x2886/0x3020 [ 185.872222][ T7317] do_syscall_64+0x12c/0x3b0 [ 185.872255][ T7317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 185.872352][ T7317] RIP: 0033:0x7f3e381ed60e [ 185.872375][ T7317] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 185.872394][ T7317] RSP: 002b:00007f3e36c7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 185.872422][ T7317] RAX: ffffffffffffffda RBX: 00007f3e36c7f6c0 RCX: 00007f3e381ed60e [ 185.872441][ T7317] RDX: 000000000000000f RSI: 00007f3e36c7f0a0 RDI: 0000000000000006 [ 185.872457][ T7317] RBP: 00007f3e36c7f090 R08: 0000000000000000 R09: 0000000000000000 [ 185.872536][ T7317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.872552][ T7317] R13: 00007f3e384a6038 R14: 00007f3e384a5fa0 R15: 00007fff0378ed48 [ 185.872578][ T7317] [ 186.084718][ T3524] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 186.650554][ T28] kauditd_printk_skb: 22348 callbacks suppressed [ 186.650574][ T28] audit: type=1400 audit(1778265363.912:459479): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.698501][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 186.728936][ T28] audit: type=1400 audit(1778265363.921:459480): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.733736][ T3024] audit: audit_lost=7338 audit_rate_limit=0 audit_backlog_limit=64 [ 186.799484][ T3024] audit: backlog limit exceeded [ 186.804739][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 186.806715][ T28] audit: type=1400 audit(1778265363.921:459481): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.818683][ T3024] audit: audit_lost=7339 audit_rate_limit=0 audit_backlog_limit=64 [ 186.879104][ T28] audit: type=1400 audit(1778265363.921:459482): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.883605][ T3024] audit: backlog limit exceeded [ 187.548170][ T1040] net_ratelimit: 2 callbacks suppressed [ 187.548186][ T1040] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 187.949745][ T7355] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7355 comm=syz.3.1442 [ 188.659825][ T1040] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 189.341799][ T3524] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 189.762039][ T35] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 190.604879][ T7413] sctp: [Deprecated]: syz.3.1462 (pid 7413) Use of struct sctp_assoc_value in delayed_ack socket option. [ 190.604879][ T7413] Use struct sctp_sack_info instead [ 190.872931][ T35] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 191.995315][ T35] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 192.006369][ T28] kauditd_printk_skb: 22327 callbacks suppressed [ 192.006388][ T28] audit: type=1400 audit(1778265368.916:481810): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.040656][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.051114][ T7439] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.061290][ T3024] audit: audit_lost=7340 audit_rate_limit=0 audit_backlog_limit=64 [ 192.073318][ T7439] audit: audit_lost=7341 audit_rate_limit=0 audit_backlog_limit=64 [ 192.086586][ T3024] audit: backlog limit exceeded [ 192.094060][ T7439] audit: backlog limit exceeded [ 192.094572][ T28] audit: type=1400 audit(1778265368.916:481811): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.103825][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.134731][ T3299] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.445311][ T7454] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1477'. [ 192.583652][ T2943] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 193.096531][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 194.208320][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 195.320029][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 195.833333][ T2943] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 196.346369][ T2943] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 196.434253][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 196.887919][ T7523] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 196.896231][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 197.030469][ T2943] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 197.038762][ T2943] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 197.361873][ T28] kauditd_printk_skb: 19477 callbacks suppressed [ 197.361914][ T28] audit: type=1400 audit(1778265373.930:501279): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 197.395581][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.411331][ T3024] audit: audit_lost=7346 audit_rate_limit=0 audit_backlog_limit=64 [ 197.432955][ T3024] audit: backlog limit exceeded [ 197.446992][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.458114][ T28] audit: type=1400 audit(1778265373.939:501280): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 197.468769][ T3024] audit: audit_lost=7347 audit_rate_limit=0 audit_backlog_limit=64 [ 197.514606][ T3024] audit: backlog limit exceeded [ 197.527741][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.528186][ T28] audit: type=1400 audit(1778265373.939:501281): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 198.002756][ T7544] netlink: 32 bytes leftover after parsing attributes in process `syz.3.1510'. [ 198.266586][ T7555] FAULT_INJECTION: forcing a failure. [ 198.266586][ T7555] name failslab, interval 1, probability 0, space 0, times 0 [ 198.321078][ T7555] CPU: 0 UID: 0 PID: 7555 Comm: syz.0.1516 Not tainted syzkaller #0 PREEMPT(full) [ 198.321107][ T7555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 198.321125][ T7555] Call Trace: [ 198.321134][ T7555] [ 198.321145][ T7555] __dump_stack+0x1d/0x30 [ 198.321179][ T7555] dump_stack_lvl+0x95/0xd0 [ 198.321259][ T7555] dump_stack+0x15/0x1b [ 198.321286][ T7555] should_fail_ex+0x263/0x280 [ 198.321366][ T7555] should_failslab+0x8c/0xb0 [ 198.321409][ T7555] __kmalloc_node_track_caller_noprof+0xc3/0x550 [ 198.321468][ T7555] ? sidtab_sid2str_get+0xa0/0x130 [ 198.321609][ T7555] kmemdup_noprof+0x2b/0x70 [ 198.321649][ T7555] sidtab_sid2str_get+0xa0/0x130 [ 198.321721][ T7555] security_sid_to_context_core+0x1eb/0x2e0 [ 198.321751][ T7555] security_sid_to_context+0x27/0x40 [ 198.321775][ T7555] selinux_lsmprop_to_secctx+0x67/0xf0 [ 198.321875][ T7555] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 198.321953][ T7555] audit_log_subj_ctx+0xa4/0x3e0 [ 198.321989][ T7555] ? skb_put+0xa9/0xf0 [ 198.322067][ T7555] audit_log_task_context+0x48/0x70 [ 198.322116][ T7555] audit_log_task+0xf3/0x250 [ 198.322146][ T7555] audit_seccomp+0x60/0x100 [ 198.322173][ T7555] ? __seccomp_filter+0x8db/0x1350 [ 198.322213][ T7555] __seccomp_filter+0x8ec/0x1350 [ 198.322286][ T7555] ? filename_linkat+0xd0/0x460 [ 198.322341][ T7555] ? do_getname+0x1af/0x1c0 [ 198.322359][ T7555] ? kmem_cache_free+0xca/0x380 [ 198.322383][ T7555] __secure_computing+0x81/0x150 [ 198.322501][ T7555] do_syscall_64+0xce/0x3b0 [ 198.322547][ T7555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 198.322577][ T7555] RIP: 0033:0x7f25b5ead60e [ 198.322599][ T7555] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 198.322681][ T7555] RSP: 002b:00007f25b493efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 198.322707][ T7555] RAX: ffffffffffffffda RBX: 00007f25b493f6c0 RCX: 00007f25b5ead60e [ 198.322726][ T7555] RDX: 000000000000000f RSI: 00007f25b493f0a0 RDI: 0000000000000003 [ 198.322743][ T7555] RBP: 00007f25b493f090 R08: 0000000000000000 R09: 0000000000000000 [ 198.322801][ T7555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.322817][ T7555] R13: 00007f25b6166038 R14: 00007f25b6165fa0 R15: 00007ffee0f98948 [ 198.322895][ T7555] [ 198.655440][ T23] net_ratelimit: 7 callbacks suppressed [ 198.655458][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 199.767445][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 199.940893][ T7586] sctp: [Deprecated]: syz.2.1528 (pid 7586) Use of struct sctp_assoc_value in delayed_ack socket option. [ 199.940893][ T7586] Use struct sctp_sack_info instead [ 200.211588][ T7591] sctp: [Deprecated]: syz.2.1530 (pid 7591) Use of struct sctp_assoc_value in delayed_ack socket option. [ 200.211588][ T7591] Use struct sctp_sack_info instead [ 200.280420][ T2943] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 200.879140][ T23] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 201.331856][ T7624] FAULT_INJECTION: forcing a failure. [ 201.331856][ T7624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.369461][ T7624] CPU: 1 UID: 0 PID: 7624 Comm: syz.3.1542 Not tainted syzkaller #0 PREEMPT(full) [ 201.369496][ T7624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 201.369513][ T7624] Call Trace: [ 201.369522][ T7624] [ 201.369532][ T7624] __dump_stack+0x1d/0x30 [ 201.369558][ T7624] dump_stack_lvl+0x95/0xd0 [ 201.369581][ T7624] dump_stack+0x15/0x1b [ 201.369627][ T7624] should_fail_ex+0x263/0x280 [ 201.369738][ T7624] should_fail+0xb/0x20 [ 201.369764][ T7624] should_fail_usercopy+0x1a/0x20 [ 201.369842][ T7624] _copy_to_user+0x20/0xa0 [ 201.369902][ T7624] simple_read_from_buffer+0xb5/0x130 [ 201.369949][ T7624] proc_fail_nth_read+0x10e/0x150 [ 201.369987][ T7624] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 201.370079][ T7624] vfs_read+0x1ab/0x7f0 [ 201.370121][ T7624] ? __rcu_read_unlock+0x4e/0x70 [ 201.370226][ T7624] ? __fget_files+0x184/0x1c0 [ 201.370252][ T7624] ? mutex_lock+0x57/0x90 [ 201.370282][ T7624] ksys_read+0xdc/0x1a0 [ 201.370332][ T7624] __x64_sys_read+0x40/0x50 [ 201.370428][ T7624] x64_sys_call+0x2886/0x3020 [ 201.370461][ T7624] do_syscall_64+0x12c/0x3b0 [ 201.370492][ T7624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 201.370516][ T7624] RIP: 0033:0x7f5a1b18d60e [ 201.370587][ T7624] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 201.370617][ T7624] RSP: 002b:00007f5a19c1efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 201.370644][ T7624] RAX: ffffffffffffffda RBX: 00007f5a19c1f6c0 RCX: 00007f5a1b18d60e [ 201.370664][ T7624] RDX: 000000000000000f RSI: 00007f5a19c1f0a0 RDI: 0000000000000003 [ 201.370738][ T7624] RBP: 00007f5a19c1f090 R08: 0000000000000000 R09: 0000000000000000 [ 201.370755][ T7624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.370771][ T7624] R13: 00007f5a1b446038 R14: 00007f5a1b445fa0 R15: 00007ffe98a59258 [ 201.370796][ T7624] [ 202.045181][ T7650] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1554'. [ 202.305031][ T7660] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1556'. [ 202.339659][ T7660] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1556'. [ 202.717850][ T28] kauditd_printk_skb: 22339 callbacks suppressed [ 202.717874][ T28] audit: type=1400 audit(1778265378.943:520699): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.749114][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.766705][ T3024] audit: audit_lost=8322 audit_rate_limit=0 audit_backlog_limit=64 [ 202.791621][ T3024] audit: backlog limit exceeded [ 202.795803][ T28] audit: type=1400 audit(1778265378.953:520700): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.809430][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.854538][ T28] audit: type=1400 audit(1778265378.953:520701): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.855904][ T3024] audit: audit_lost=8323 audit_rate_limit=0 audit_backlog_limit=64 [ 202.904287][ T7675] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.909151][ T28] audit: type=1400 audit(1778265378.953:520702): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 203.944999][ T7712] netlink: 'syz.4.1577': attribute type 28 has an invalid length. [ 203.962138][ T7712] netlink: 2 bytes leftover after parsing attributes in process `syz.4.1577'. [ 205.021697][ T7748] sctp: [Deprecated]: syz.3.1593 (pid 7748) Use of struct sctp_assoc_value in delayed_ack socket option. [ 205.021697][ T7748] Use struct sctp_sack_info instead [ 205.121696][ T7754] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1596'. [ 205.619661][ T7778] sctp: [Deprecated]: syz.3.1608 (pid 7778) Use of struct sctp_assoc_value in delayed_ack socket option. [ 205.619661][ T7778] Use struct sctp_sack_info instead [ 206.246536][ T7810] sctp: [Deprecated]: syz.3.1623 (pid 7810) Use of struct sctp_assoc_value in delayed_ack socket option. [ 206.246536][ T7810] Use struct sctp_sack_info instead [ 206.467531][ T7819] netlink: 52 bytes leftover after parsing attributes in process `syz.3.1627'. [ 206.981230][ T7840] sctp: [Deprecated]: syz.0.1636 (pid 7840) Use of struct sctp_assoc_value in delayed_ack socket option. [ 206.981230][ T7840] Use struct sctp_sack_info instead [ 207.446519][ T7849] netlink: 52 bytes leftover after parsing attributes in process `syz.0.1640'. [ 208.073803][ T28] kauditd_printk_skb: 21974 callbacks suppressed [ 208.073829][ T28] audit: type=1400 audit(1778265383.957:542476): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.103403][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 208.116552][ T3024] audit: audit_lost=8391 audit_rate_limit=0 audit_backlog_limit=64 [ 208.135014][ T3024] audit: backlog limit exceeded [ 208.143135][ T28] audit: type=1400 audit(1778265383.957:542477): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.149771][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 208.188648][ T28] audit: type=1400 audit(1778265383.957:542478): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.210119][ T3024] audit: audit_lost=8392 audit_rate_limit=0 audit_backlog_limit=64 [ 208.233039][ T28] audit: type=1400 audit(1778265383.957:542479): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.233222][ T3024] audit: backlog limit exceeded [ 208.574306][ T7867] bond0: (slave bond_slave_1): Device is not bonding slave [ 208.581778][ T7867] bond0: option active_slave: invalid value (bond_slave_1) [ 208.590454][ T7867] bond0 (unregistering): Released all slaves [ 208.835855][ T7877] netlink: 52 bytes leftover after parsing attributes in process `syz.0.1652'. [ 211.734460][ T7933] ================================================================== [ 211.742729][ T7933] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 211.750071][ T7933] [ 211.750081][ T7933] read to 0xffff8881060c6688 of 4 bytes by task 7934 on cpu 0: [ 211.750099][ T7933] atime_needs_update+0x25f/0x3e0 [ 211.765077][ T7933] touch_atime+0x4a/0x330 [ 211.769450][ T7933] shmem_file_read_iter+0x3f4/0x4b0 [ 211.774696][ T7933] copy_splice_read+0x471/0x6c0 [ 211.779592][ T7933] splice_direct_to_actor+0x28f/0x670 [ 211.785035][ T7933] do_splice_direct+0x119/0x1a0 [ 211.789936][ T7933] do_sendfile+0x382/0x650 [ 211.794389][ T7933] __x64_sys_sendfile64+0x105/0x150 [ 211.799652][ T7933] x64_sys_call+0x2dc4/0x3020 [ 211.804381][ T7933] do_syscall_64+0x12c/0x3b0 [ 211.809014][ T7933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.814941][ T7933] [ 211.817300][ T7933] write to 0xffff8881060c6688 of 4 bytes by task 7933 on cpu 1: [ 211.824962][ T7933] touch_atime+0x1d7/0x330 [ 211.829422][ T7933] shmem_file_read_iter+0x3f4/0x4b0 [ 211.834657][ T7933] copy_splice_read+0x471/0x6c0 [ 211.839574][ T7933] splice_direct_to_actor+0x28f/0x670 [ 211.845006][ T7933] do_splice_direct+0x119/0x1a0 [ 211.849917][ T7933] do_sendfile+0x382/0x650 [ 211.854368][ T7933] __x64_sys_sendfile64+0x105/0x150 [ 211.859689][ T7933] x64_sys_call+0x2dc4/0x3020 [ 211.864413][ T7933] do_syscall_64+0x12c/0x3b0 [ 211.869045][ T7933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.875079][ T7933] [ 211.877436][ T7933] value changed: 0x162b546c -> 0x16ba0f7b [ 211.883197][ T7933] [ 211.885552][ T7933] Reported by Kernel Concurrency Sanitizer on: [ 211.891719][ T7933] CPU: 1 UID: 0 PID: 7933 Comm: syz.0.1671 Not tainted syzkaller #0 PREEMPT(full) [ 211.901032][ T7933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 211.911119][ T7933] ================================================================== [ 213.429766][ T28] kauditd_printk_skb: 28812 callbacks suppressed [ 213.429784][ T28] audit: type=1400 audit(1778265388.962:570935): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.447208][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 213.458424][ T28] audit: type=1400 audit(1778265388.971:570936): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.464524][ T3024] audit: audit_lost=8512 audit_rate_limit=0 audit_backlog_limit=64 [ 213.489321][ T28] audit: type=1400 audit(1778265388.971:570937): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.493900][ T3024] audit: backlog limit exceeded [ 213.514748][ T28] audit: type=1400 audit(1778265388.971:570938): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.540906][ T28] audit: type=1400 audit(1778265388.971:570939): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.545005][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 213.562497][ T28] audit: type=1400 audit(1778265388.971:570940): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.785762][ T28] kauditd_printk_skb: 48399 callbacks suppressed [ 218.785777][ T28] audit: type=1400 audit(1778265393.966:618984): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.805365][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.814059][ T28] audit: type=1400 audit(1778265393.985:618985): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.820144][ T3024] audit: audit_lost=8632 audit_rate_limit=0 audit_backlog_limit=64 [ 218.842128][ T28] audit: type=1400 audit(1778265393.985:618986): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.849429][ T3024] audit: backlog limit exceeded [ 218.870712][ T28] audit: type=1400 audit(1778265393.985:618987): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.876832][ T3024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.897561][ T28] audit: type=1400 audit(1778265393.985:618988): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.903792][ T3024] audit: audit_lost=8633 audit_rate_limit=0 audit_backlog_limit=64