last executing test programs: 1.075074954s ago: executing program 0 (id=10101): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) unshare(0x8000000) r2 = mq_open(&(0x7f00000000c0)='${ \x00', 0x840, 0x8, 0x0) getpid() close_range(r2, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0xc0bc5310, &(0x7f0000000040)={0x187, @time={0xbc, 0x3142b719}, 0x0, {0x71, 0x6}, 0x6, 0x1, 0x1}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000bc0)="0100000200373a4541062101a59ea940d2cb0b36b8f5020000a00000050000000000eb000000a5e5be21c44e328e68f3922af831e4e51bfb30f7788fd57e51bc464355bd646d037ccc16ddb08a7b3a697aedb66ddd793acf37119e61f502d8bbb016f701890700000068d945af468c1c9090c76906b94e0f27761c75e58c82da54d010078660684a4106855beaf5e813ed18aa4acabb5bee7f082d24a16b01fc91471eba59152e716af8776ab90ac48bcbee6570df22513808ecab7a9680aa613a56aa11bfa73af4c4e94b5cfc855f0e910186d7e68ac24f8b125140ac5f7f4819168ce1c25550c6773b41011999d8d9827757d96c5e8aa4617cc54c5e67060a92661f84e698d1fe3cee10a85882cbecb29f2a22535ac50e64d95ecbab66f54373b94475e05b79a0a61bc2ae1e", 0x12d, r8) socket$inet6_udp(0xa, 0x2, 0x0) 1.074129604s ago: executing program 0 (id=10102): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000008"], 0x48) pread64(r0, &(0x7f0000000300)=""/21, 0x15, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x1a120}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305828, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001100)=@migrate={0x50, 0x28, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x4, 0x2}}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup(r6) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x2, @remote, 0x1}, 0xfffffd4f) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x4, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x83, '\x00', r5, r7, 0x5, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r3}, 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r8, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback, 0xa77}, 0x1c) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x1001) r9 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r10 = timerfd_create(0x0, 0x0) readv(r10, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/33, 0x21}], 0x1) 1.052267784s ago: executing program 3 (id=10103): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000000101010200000000000000000a0000000c00198008000200150200001800028014000180080003"], 0x38}}, 0x0) 1.018529954s ago: executing program 3 (id=10104): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sctp\x00') r4 = open_tree(r3, &(0x7f0000000640)='\x00', 0x89901) move_mount(r4, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x20}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}]}, &(0x7f0000000280)='GPL\x00', 0xa8c, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1c, r3, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x28bfc, r4, 0xa, 0x0, &(0x7f0000000800)=[{0x4, 0x2, 0x9}, {0x0, 0x2, 0x8, 0x2}, {0x3, 0x1, 0xc, 0x1}, {0x2, 0x3, 0x7, 0xa}, {0x2, 0x1, 0x10, 0x6}, {0x1, 0x1, 0x1, 0x3}, {0x2, 0x2, 0xf}, {0x0, 0x5, 0xa, 0xb}, {0x1, 0x4, 0xd}, {0x5, 0x5, 0xc, 0x1}], 0x10, 0xb, @void, @value}, 0x94) mkdirat(r4, &(0x7f0000000340)='./file0\x00', 0x40) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000017000000950000000000000060bda108010da26a15544b2a4c738e0fa0f897aa278b325764f2dcd6b865984f599ffe6cad199d36bc80e98b17249acf845992d69cc4a092d0655f0e225d2f568bd76a618d10b49d26440819e5f1e36c54"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r5, r2, 0x25, 0x0, @void}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r8 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_misc(r8, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpcb_getport\x00', r9}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b'], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) brk(0x20001000) 982.591395ms ago: executing program 3 (id=10105): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0xc, &(0x7f0000000800)=ANY=[@ANYRES8=0xffffffffffffffff, @ANYRESOCT=0x0, @ANYRESHEX=0x0, @ANYRES64], 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, @cgroup_device=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0xfffffffffffffdc5, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="93f2fd9e0000000000000000060000fc0bbe1b7a", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x286ca06bbee933dc, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1000}}, 0x1c}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)=r7}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0x18) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r10 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r12 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) 893.990007ms ago: executing program 2 (id=10107): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x8, 0x6, 0x801, 0x0, 0x0, {0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 893.698027ms ago: executing program 3 (id=10108): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) close_range(r0, 0xffffffffffffffff, 0x0) 877.512296ms ago: executing program 2 (id=10109): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(0x0, 0x0, 0x6, r2, 0x9) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) r4 = dup(r0) r5 = memfd_secret(0x80000) write$selinux_attr(r5, 0x0, 0x0) r6 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r7, &(0x7f0000000140)='./file0\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r1, 0x20, &(0x7f0000000240)={&(0x7f00000006c0)=""/4096, 0x1000, 0x0, &(0x7f00000016c0)=""/245, 0xf5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x16, 0x1f, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000003000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181b0000", @ANYRES32=r5, @ANYBLOB="0000000c86421694821dd00005000000000000000000000018160000", @ANYRES32=r5, @ANYBLOB="00000000000000007d8603009ea30000184200000000000000000000000000001833000005000000000000000000000018280000", @ANYRES32=r4, @ANYBLOB="0000000000000000376af8ff0000000018160000", @ANYRES32=r7, @ANYBLOB="0000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0xee, &(0x7f00000005c0)=""/238, 0x41000, 0x1, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x4, 0x2, 0x8f7f}, 0x10, r8, r3, 0x0, &(0x7f0000000380)=[r0, r0], 0x0, 0x10, 0xffff, @void, @value}, 0x94) 838.147247ms ago: executing program 2 (id=10110): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) io_setup(0x81, &(0x7f0000001440)=0x0) r2 = syz_io_uring_setup(0x6853, &(0x7f0000000380)={0x0, 0x0, 0x2}, &(0x7f0000000340), &(0x7f0000000080)) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) socket(0x400000000010, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000290000000400000039e235"], 0x18}, 0x20008800) socket$unix(0x1, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x29, 0xf0, 0x5, 0x0, 0xa, @remote, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x10, 0x80, 0x5, 0x10000}}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r4, &(0x7f0000000040)}, 0x20) 837.314667ms ago: executing program 4 (id=10111): r0 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x2) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0'}, 0xb) r1 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) listen(r3, 0x2) connect$bt_sco(r3, &(0x7f0000001500)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r4 = socket(0x28, 0x5, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) socket(0x25, 0xa, 0x0) connect$vsock_stream(r4, &(0x7f0000000080), 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000f80)=@newtaction={0x1910, 0x30, 0x12f, 0x0, 0x0, {}, [{0x18fc, 0x1, [@m_police={0x18f8, 0x1, 0x0, 0x0, {{0xb}, {0x18cc, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x6, 0x0, 0x0, 0xfffffffd, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x80000001, 0x4000000}}], [], [@TCA_POLICE_RATE64={0xc, 0x8, 0x7}, @TCA_POLICE_RATE={0x404, 0x2, [0xa3, 0x5, 0x4, 0x8, 0x2, 0x7, 0x1, 0x0, 0x8, 0xfffffffc, 0x4, 0x2, 0x55, 0x1, 0x4, 0x9, 0x8f729a78, 0x8, 0x5, 0x10001, 0x3, 0x40, 0x7, 0x3, 0x8, 0x8, 0x6, 0x9, 0x3, 0x251, 0xb, 0x3, 0x3, 0x0, 0x5, 0x7ff, 0x8, 0x6a4, 0x9, 0x8001, 0x84e, 0x0, 0x5, 0x1, 0xffffff7f, 0x4, 0x2, 0x9, 0x2, 0x7fff, 0x6, 0x80000001, 0x6, 0x4, 0x8, 0x9, 0x3, 0x294, 0x401, 0x26, 0x3e2, 0x5d0, 0x0, 0x14c9, 0xff, 0x1ff, 0x7, 0xffff, 0x4e6, 0x0, 0x800, 0x3, 0x8, 0x2, 0x800, 0x2596, 0x8, 0x2, 0x7f, 0x1, 0xfffffffe, 0x400, 0x7f, 0x7ff, 0x10000, 0x7, 0x9, 0x9, 0xd, 0x3, 0x0, 0x2, 0xdc2d, 0x1, 0x3, 0x3, 0x1ff, 0x5628, 0x678, 0x0, 0xffffffff, 0x0, 0x5, 0x6, 0xc0, 0x20d, 0x6, 0x7fff, 0x0, 0x5, 0x895, 0x3, 0x3, 0xc22, 0x5, 0x62, 0x9, 0x477, 0x4, 0xe, 0x1c1df941, 0x40, 0x141, 0xc, 0x9, 0x7ff, 0x7, 0x7, 0x8c7, 0x1, 0x5, 0x8, 0x8, 0x41d, 0x8, 0x7, 0x5, 0x7fffffff, 0x0, 0x2, 0x30, 0x80000001, 0x3, 0x1e4a, 0xa4, 0x30, 0x1395, 0x3, 0x7fff, 0x3d, 0x0, 0x11, 0x7fff, 0x7, 0xfffffffb, 0x7, 0x3, 0x401, 0xb1a1, 0x8, 0x8, 0xfffffffa, 0x508f57a5, 0xfffffffc, 0x1, 0x719b1140, 0x8, 0x2, 0x7a56, 0xfffffa8b, 0x4, 0x8, 0x200, 0x680, 0x10, 0x5, 0x82a4, 0x3, 0x3, 0x6, 0xa, 0x10000, 0x9, 0x3508, 0x81, 0x0, 0x81, 0x4, 0x1, 0x5a5, 0x1000, 0x8, 0x12, 0x5, 0x8, 0xff, 0x6, 0x9bb, 0x7fff, 0x1000, 0x3, 0x0, 0x9, 0x5, 0x5, 0x800, 0x1, 0x9, 0x2, 0xe99, 0x3, 0x2, 0x71, 0x8001, 0xbf5, 0x3, 0x1, 0x24, 0x2, 0xcf2, 0x3, 0x81, 0x0, 0x6, 0x2f4, 0x7, 0x9, 0x400, 0x7f, 0x4, 0x4, 0x1000, 0x1, 0x6, 0x9, 0x0, 0x346, 0xcaf, 0xfe, 0x10000, 0x1, 0x3ff, 0xfffffff8, 0x5, 0x8, 0x638f, 0x8, 0x7, 0x6, 0x9, 0x3, 0x8, 0x5, 0x0, 0x0, 0xff]}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0xf, 0x4, 0x65d7, 0x1, 0x0, 0xfffffffb, 0xdf51, 0x3542, 0x3, 0x7b09, 0xc72, 0xca, 0x2, 0x23ff, 0x1, 0x2, 0x2, 0x400000, 0x3, 0xb630, 0x6, 0x4, 0x1, 0x8, 0xe3, 0x8, 0x67c, 0x8, 0x0, 0x0, 0x5, 0xc, 0x9, 0xff, 0xfffffffe, 0x4, 0x401, 0xac5, 0x2, 0x4, 0x80, 0x7, 0x30, 0x4, 0x7, 0x200, 0x3, 0x0, 0xfffffffe, 0x7, 0x437, 0xfff, 0x4, 0x3, 0x85, 0xa, 0x6, 0x4, 0x7, 0x10001, 0x7, 0x3, 0xe, 0xdd94, 0x93, 0x1, 0x0, 0x2, 0x2, 0x9, 0xa, 0x1, 0xd57, 0x8, 0x1, 0xc4, 0x5, 0x6, 0x0, 0x0, 0x2, 0xf371, 0x9, 0xb, 0x7, 0xf0, 0xd398, 0x10000, 0x80000000, 0x3, 0x4, 0x1, 0xfffffffb, 0x2, 0x7, 0xa, 0x6, 0xff, 0x0, 0x8, 0x8, 0x9f2, 0xec86, 0xa, 0x0, 0x7, 0x5f1, 0xc7, 0x1, 0x8, 0x80000001, 0x5, 0x8001, 0x9, 0x1, 0x7, 0x2, 0x5, 0x9, 0x9, 0x4, 0x1, 0x7, 0x4, 0x80000000, 0x9, 0x4, 0x8000, 0x1, 0x6, 0xdf03, 0x9, 0x6, 0x3, 0x4, 0xd5, 0xa, 0xe, 0x6, 0x1000, 0x10000, 0x5, 0x5, 0x0, 0x6, 0xc, 0xd8f, 0xfff, 0x6, 0x200, 0x9, 0xee2, 0x8, 0xcd8, 0x8, 0x0, 0x9, 0x2, 0x2, 0x1, 0x0, 0x7fffffff, 0x26, 0x7df7, 0x10000, 0x1, 0x1, 0x8001, 0x3e2147c, 0x6, 0x401, 0xc, 0x5, 0x0, 0x40, 0x8, 0x401, 0x1, 0x8, 0x4, 0xec4, 0x1, 0x4, 0xc, 0x8, 0xfffffff7, 0x7, 0x2, 0xd, 0x6, 0x1, 0x5, 0x5, 0x6, 0x9, 0xfffffffe, 0x4f8a, 0x9, 0x2, 0xfffffffb, 0x4, 0x1d5f, 0x10001, 0x4, 0xae, 0xffffff3d, 0x39, 0x2, 0x1, 0x6, 0x1, 0x8, 0x2400, 0x101, 0x5, 0x8, 0x6, 0x3, 0x80000, 0x3, 0x2, 0xb, 0x1, 0x4, 0x9466, 0x8, 0x6, 0x2, 0x26a3, 0xc, 0x9, 0x996, 0x7, 0x1, 0x1, 0xff, 0x8, 0x8, 0x10000, 0x18, 0x8000, 0x5, 0x1, 0x0, 0x1, 0xd46, 0x3be3, 0x80, 0x1, 0xffff8001, 0x1, 0x17600000, 0x40000000, 0x4, 0x7fff]}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x6, 0x3, 0x6, 0x7, 0x8ab, 0x2, 0x400, 0xfffffff9, 0x6, 0x200, 0x8, 0x3ff, 0x10000, 0x9, 0xb4b4, 0x0, 0x3, 0x7, 0x0, 0x0, 0x7fff, 0x4, 0x7, 0x3ff, 0x9, 0xffff0001, 0x3, 0x8f0, 0x7, 0x80000001, 0xffffff7d, 0x9, 0x3, 0x3, 0x1, 0x1, 0x10, 0x8f, 0xffffffff, 0xb, 0x40, 0x5, 0x3, 0x1, 0x7c77, 0x5, 0x975, 0x2, 0x65, 0x8, 0xb9c2, 0x43ef, 0x10, 0x6df, 0x200, 0x4, 0x4, 0x2f, 0x93, 0x0, 0x1f, 0x11e, 0x2, 0x7f, 0x444, 0x1, 0x7, 0x87c, 0x1e90, 0x7, 0x4, 0xe72, 0x80, 0x5, 0x6, 0x0, 0xfffff63d, 0x8, 0x7, 0x5, 0xc, 0x9, 0x63, 0x6, 0x5, 0x6, 0x655, 0x0, 0x400, 0x57d, 0xc, 0xfff, 0x7fffffff, 0xb030, 0x5, 0xcb, 0x5, 0x9, 0x0, 0x4, 0x1bc, 0x6506, 0x1, 0x3, 0x1, 0x6, 0xea, 0x1, 0x2, 0x3, 0xffffffb5, 0x5, 0x9, 0x8001, 0xc, 0x9000, 0x8001, 0x3, 0x6, 0x5, 0x1, 0xa, 0x101, 0x5, 0xc655, 0x2, 0x2, 0x6, 0x10000, 0x9, 0xfffffffb, 0x3, 0x4, 0x7ff, 0x4, 0x2, 0x2, 0x0, 0x2, 0x1, 0x2, 0x1000, 0x1, 0x6, 0x8001, 0x0, 0xd85, 0x800, 0x81, 0x6, 0xd0, 0x2, 0xb33f, 0xa, 0x3, 0x7, 0xffffffff, 0x2, 0x1, 0x9, 0xd, 0xb, 0x4, 0xfffffff8, 0x0, 0xffffffff, 0x2, 0xfff, 0x6, 0x3c, 0x2, 0xa, 0x59, 0x80000001, 0x6, 0x0, 0x9, 0x7, 0x6, 0xa, 0x2ce, 0x9, 0x2, 0x57, 0x5, 0x1, 0x8, 0x2e2, 0x2, 0x5, 0x3, 0x10, 0x8, 0x2, 0x5, 0xfffffffe, 0x10, 0x7, 0x39d8, 0x3, 0xb, 0x9, 0x6, 0x2, 0x0, 0x137, 0x80, 0x7, 0x13e5, 0x3e8, 0x5, 0xfffffff7, 0xfbac, 0x8, 0x826a, 0x0, 0xa, 0x269, 0x5, 0x2, 0x7fffffff, 0xff, 0xfffffffd, 0x3a3f, 0x200, 0x1, 0x8, 0x7, 0x38d7, 0x0, 0xffff0000, 0x3, 0xfffffffb, 0x3, 0xe48, 0x8, 0x1, 0x7, 0x97, 0x7, 0x8, 0x1, 0x7, 0x7, 0x0, 0x8000, 0x800, 0xf7e, 0xba5, 0x2, 0x20, 0x0, 0x7, 0x4a, 0x2]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x2b5, 0x3, 0x7, 0xe, 0x6, {0x4, 0x2, 0x8000, 0x9, 0xca, 0x4}, {0x1, 0x0, 0x2e, 0xff, 0x1, 0x4}, 0x8, 0x910, 0x99}}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xdb}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0xfff, 0x6, 0xc, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x9, 0x7, 0x6, 0xfa8, 0x3, 0x7, 0x3, 0x10001, 0x4, 0x1, 0x3ff, 0x9d5, 0x1, 0x8, 0x6, 0x4, 0x7, 0x3, 0x7fffffff, 0x10000, 0xffff, 0x6534, 0x565f38a5, 0x4f, 0xf, 0x5, 0x6, 0x2, 0x9, 0x3, 0x5, 0xde1, 0x80, 0x4, 0x3, 0x5, 0x5, 0x1, 0x7, 0x4, 0xc, 0xe, 0x1, 0x3, 0x9e, 0x2, 0x1, 0x8, 0x8, 0x5, 0x1ff, 0x2f6, 0x8000, 0x0, 0x0, 0x80000001, 0x1, 0x2, 0xffffffff, 0x7, 0x813, 0x6, 0xd3d, 0x5, 0x9, 0xc99, 0x2d64, 0x4, 0x5, 0x800, 0x9, 0xb, 0x3, 0x4, 0x5, 0x0, 0xa, 0x6, 0xc, 0xfffffff8, 0x8001, 0x7fffffff, 0x8, 0xa6c, 0x9, 0x9, 0x400, 0x6, 0x2, 0x2, 0x9, 0x9, 0x0, 0x6, 0x0, 0xe941, 0x1, 0x7fffffff, 0x18000000, 0xf, 0x8, 0x1, 0x2, 0x8, 0x8264, 0x17, 0x600, 0x1, 0x3, 0x7fffffff, 0xfffff26f, 0xfffffff8, 0x1, 0x8, 0x4, 0xfff, 0x7f, 0x2, 0x6, 0xb1d, 0x85d3, 0x2, 0x4, 0xffffffff, 0x1, 0xb, 0x400, 0x7, 0x81, 0x6, 0x9, 0x5a93, 0x8000, 0x4, 0x400, 0xfffffff8, 0x7fffffff, 0x1, 0x1, 0x1, 0x4, 0xff, 0x6, 0x5, 0x7, 0x3, 0x1, 0x7, 0x0, 0x2, 0x7, 0x5, 0xffff, 0x9971, 0x6, 0xffffffff, 0x2, 0x1, 0x80, 0xffffff80, 0x4, 0xff, 0x6, 0x7fff, 0x7fff, 0x1ff, 0x6e, 0x5, 0x2, 0x7, 0x9, 0x8, 0x101, 0x7, 0xfffffffb, 0x6, 0x5, 0x6, 0xfffffff8, 0x42, 0x6, 0xad0, 0x0, 0x9, 0xe000, 0x9, 0x6, 0xff, 0x2, 0x4ad, 0x0, 0xe6, 0x2, 0x4, 0x2, 0x80000000, 0x18, 0x4, 0x8, 0x8, 0x3, 0x6, 0x437, 0x3, 0x8, 0x5, 0x5, 0x7, 0x8000, 0x80000001, 0x5, 0x6, 0x3, 0xe5e, 0x2, 0x5, 0x3, 0x2, 0x503, 0x3f21, 0xa, 0xc, 0x2, 0x10, 0x3, 0xd0, 0x1, 0x1, 0x101, 0x9, 0x10000, 0x6, 0xe, 0xc3, 0x6, 0xd0, 0x81, 0x1, 0x4, 0x8000, 0x0, 0x1, 0x0, 0x6, 0x8, 0x6, 0x2]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x1}], [@TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x3, 0x5e61ebb1, 0x2, 0x5, 0x15f60000, 0x5, 0x1, 0x2ad, 0x0, 0x4, 0x5, 0x0, 0x2, 0x8, 0x5, 0x1, 0x200, 0x4, 0x10, 0xc, 0x32c, 0x8001, 0x9, 0x2, 0x7fff, 0x6cb7, 0x40ff, 0x10, 0x5, 0x4, 0x430, 0x5, 0x3, 0x1ff, 0x2, 0x1e, 0x73, 0x6, 0x8, 0x9, 0x3ff, 0x3ff, 0x1c, 0x533, 0x6, 0x4, 0x5cd, 0x720, 0x6, 0x9, 0x10001, 0x4, 0xfffffffd, 0x7, 0x0, 0x8000, 0x0, 0x3, 0x8, 0xf, 0xfffffffb, 0x8000, 0x80000001, 0xbefb, 0xd18, 0xff, 0x7, 0x5, 0x7, 0x8, 0x65, 0xffff7fff, 0x88, 0x6, 0x1, 0xa, 0x10001, 0x9, 0x1, 0x2, 0xb, 0xb0f, 0x9, 0x8, 0xf, 0x10, 0x7, 0x10000, 0xd, 0xfff, 0x80, 0x4, 0x59, 0x0, 0x7fffffff, 0x4, 0x5, 0x4, 0x7, 0x3, 0x0, 0x800, 0x3, 0x415, 0x100, 0xfff, 0xffffffff, 0x7, 0x8, 0x9, 0x1, 0x1, 0x1, 0x0, 0x2, 0x7, 0x3, 0xffffffff, 0x10, 0x7, 0x5, 0x0, 0x1, 0x3ff, 0x3, 0x8, 0x0, 0x0, 0xfffffff7, 0x1, 0x1000, 0x10001, 0x776, 0xffffffff, 0x5, 0x100, 0x7, 0x80, 0x9, 0xffffffff, 0x2, 0x2, 0x2, 0x1, 0x3, 0xfffffffb, 0x8, 0x8, 0xb, 0x2, 0x9, 0x0, 0x1d, 0x7, 0xffffffff, 0x7, 0xecd, 0x1, 0xff, 0x101, 0x1ff, 0x9, 0x48, 0x7, 0xe7, 0x1, 0x3, 0x7fff, 0x4, 0x7, 0x57f, 0x1, 0x0, 0x7fff, 0x8, 0x5, 0x5901, 0x6, 0x6, 0x340000, 0x8, 0x3, 0x80000001, 0x8000, 0x7fffffff, 0xfff, 0x8, 0xffffff0e, 0x9, 0x7, 0x800, 0x88, 0x3, 0x8, 0x4, 0x247, 0x9, 0xf, 0xfffffff5, 0xa, 0x9, 0x5, 0x65cf, 0x10000, 0x54, 0x4, 0x1, 0x7, 0x3ff, 0xb, 0x2, 0x16a, 0xe0, 0x7fffffff, 0xc041, 0x8, 0x7, 0xfffffffc, 0x7fa, 0xc, 0x800, 0x4, 0x800, 0xfffffffe, 0xfffff000, 0x5, 0x6020, 0x5a5, 0xcbf, 0x33ba, 0x2, 0x800, 0x3, 0x5, 0x80, 0x0, 0x8, 0x4, 0x80, 0x1, 0x5, 0x9, 0x4739, 0x6, 0x5, 0xfffffff9, 0x8, 0x1, 0x68, 0x4, 0x8, 0xb, 0x2, 0x14000, 0x6]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x7d3, 0x2, 0x7, 0xf, 0x7f, 0xfffffff8, 0x400000, 0x7fffffff, 0x0, 0x80000001, 0x80, 0x5, 0x6, 0x6, 0x4, 0x6, 0x4, 0x6, 0x9, 0xb979, 0x517, 0x4bd, 0xe, 0x1, 0x9, 0x2, 0x7, 0x3ff, 0xfffffff8, 0x2, 0x9, 0x2, 0x1000, 0x812, 0x8, 0xff, 0x8, 0x3, 0x9, 0x5, 0x7, 0x4, 0x8, 0x70, 0x80000000, 0xe, 0xc5f, 0x40, 0x6, 0x8, 0x5f44, 0x70, 0x4, 0x3, 0x98, 0x0, 0x8, 0xfff, 0xd, 0xbb7, 0x41, 0x6, 0x5, 0x2, 0xfffff3e3, 0x7f, 0x4, 0x400, 0x101, 0x6, 0x0, 0x9, 0x400, 0x1, 0x37, 0x8, 0x3, 0xbcb4, 0x0, 0x49, 0x3, 0xffffffff, 0x6, 0x6, 0x101, 0x4, 0xc7, 0x2, 0xce, 0x7, 0x400, 0x49, 0x0, 0x2, 0xb, 0x3, 0x8, 0x2, 0x7f, 0x800, 0x5, 0x3, 0x2, 0x9, 0x0, 0x0, 0x5, 0x6, 0x5, 0x40000000, 0x7, 0x2, 0x5, 0xc1, 0x8000, 0xb, 0x329, 0xc, 0x1, 0x1, 0x9, 0x2000, 0x101, 0xc72e, 0x0, 0x3, 0x4, 0x7, 0x6, 0x80000000, 0x8, 0x72, 0x95a, 0x4, 0xfffffff8, 0x3, 0x1, 0x3, 0x80000001, 0x10001, 0x9, 0xe000000, 0x1, 0x40, 0x5, 0x8, 0x200000, 0x5a76, 0x6, 0x1, 0xfffffffe, 0x1ff, 0x8, 0x7ff, 0x8, 0x1, 0x7, 0x3, 0x1, 0x443, 0x6, 0x5, 0x1, 0xffffff80, 0x6, 0x7fffffff, 0x0, 0x8, 0xffffff24, 0x0, 0x1, 0x4, 0x8001, 0x6, 0x8, 0x15, 0x5, 0xfffffffd, 0x5a9a, 0xd020, 0xfffff000, 0x1, 0x9, 0x8c, 0x7ff, 0x6, 0xfffffffb, 0x986, 0x9, 0x13c8f99b, 0x2, 0x80000001, 0xfffffffd, 0x75, 0x26, 0x0, 0x3, 0x0, 0x1000, 0x557, 0xff, 0x6, 0x2, 0x609f, 0x1, 0xd0, 0x9, 0xf1a, 0xfff, 0x2, 0x69, 0x0, 0xffff, 0x7, 0x1800, 0xc, 0x8, 0x4, 0x12e, 0x5, 0xa61, 0x1, 0x8001, 0x0, 0x4, 0x0, 0xd, 0x8, 0x16, 0x0, 0x4, 0x6d6a, 0x9, 0x1, 0x9, 0x1000, 0xba, 0x4, 0x0, 0x5, 0xffffe930, 0x1, 0x4, 0x10000, 0x6, 0x3, 0x2, 0x4, 0x9, 0x101, 0x9, 0x3, 0x6, 0x1, 0xfffffe00]}, @TCA_POLICE_RESULT={0x8, 0x5, 0xe}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x1910}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) close(r4) fsmount(r1, 0x0, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6, 0x0, 0xfffffffffffffffd}, 0x18) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000b00)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1}}], 0x48}, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) 802.672158ms ago: executing program 4 (id=10112): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) unshare(0x8000000) r2 = mq_open(&(0x7f00000000c0)='${ \x00', 0x840, 0x8, 0x0) getpid() close_range(r2, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0xc0bc5310, &(0x7f0000000040)={0x187, @time={0xbc, 0x3142b719}, 0x0, {0x71, 0x6}, 0x6, 0x1, 0x1}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000bc0)="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", 0x12d, r8) socket$inet6_udp(0xa, 0x2, 0x0) 802.411308ms ago: executing program 4 (id=10113): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x7fff}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) 748.902019ms ago: executing program 4 (id=10114): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000000101010200000000000000000a0000000c00198008000200150200001800028014000180080003"], 0x38}}, 0x0) 732.636789ms ago: executing program 4 (id=10115): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sctp\x00') r4 = open_tree(r3, &(0x7f0000000640)='\x00', 0x89901) move_mount(r4, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x20}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}]}, &(0x7f0000000280)='GPL\x00', 0xa8c, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1c, r3, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x28bfc, r4, 0xa, 0x0, &(0x7f0000000800)=[{0x4, 0x2, 0x9}, {0x0, 0x2, 0x8, 0x2}, {0x3, 0x1, 0xc, 0x1}, {0x2, 0x3, 0x7, 0xa}, {0x2, 0x1, 0x10, 0x6}, {0x1, 0x1, 0x1, 0x3}, {0x2, 0x2, 0xf}, {0x0, 0x5, 0xa, 0xb}, {0x1, 0x4, 0xd}, {0x5, 0x5, 0xc, 0x1}], 0x10, 0xb, @void, @value}, 0x94) mkdirat(r4, &(0x7f0000000340)='./file0\x00', 0x40) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000017000000950000000000000060bda108010da26a15544b2a4c738e0fa0f897aa278b325764f2dcd6b865984f599ffe6cad199d36bc80e98b17249acf845992d69cc4a092d0655f0e225d2f568bd76a618d10b49d26440819e5f1e36c54"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r5, r2, 0x25, 0x0, @void}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r8 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_misc(r8, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpcb_getport\x00', r9}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b'], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) brk(0x20001000) 711.798949ms ago: executing program 4 (id=10116): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x401, 0x3ff, 0xfffffffb, 0x8001, 0x1a, "08400000c38eaad6a4540ad9455fb5031af800"}) ioctl$TIOCPKT(r0, 0x5420, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000480)={0x8, 0x3, 0x0, 0x10000, 0x1a, "4415264a88b82c521113fb235902af2556c6b6"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x6) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) syz_open_procfs(r1, &(0x7f0000000040)='net/snmp6\x00') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x1f, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) sendto$unix(r5, 0x0, 0xfffffffffffffef6, 0x20044840, 0x0, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r6, 0x0, 0x8}, 0x18) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, 0x0, 0x40004) recvmmsg(r7, &(0x7f00000017c0)=[{{0x0, 0x51, &(0x7f0000000200)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f00000052c0)=""/223, 0xeb}, {&(0x7f0000003080)=""/4096, 0x1000}], 0x3}, 0x3}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000540)=""/129}, {&(0x7f0000000740)=""/82}, {&(0x7f00000007c0)=""/4096}, {&(0x7f0000000080)=""/34}]}}], 0x1b00, 0x40000000, 0x0) 656.60459ms ago: executing program 2 (id=10117): gettid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='kfree\x00', r0}, 0x18) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$selinux_validatetrans(r1, 0x0, 0x79) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x36, 0x1, 0x1c, 0x0, 0x0, 0x7, 0x1410, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x5, 0x2}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x3, 0x0, 0x200000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000240)=@ethtool_wolinfo={0x0, 0x3d11, 0x800, "d624fdac276e"}}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000"], 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=") pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8080c61) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x1b, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a0300000000f5ffffff00010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001500000000000800000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x18) r7 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x8001, 0xfc, 0x1, 0x3, 0x6, 0xc7, 0x4}, 0x1c) dup3(r7, 0xffffffffffffffff, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000440)="2e9b3d0007e03dd65193dfb6c575963f8864", 0x12}, {&(0x7f0000000380)="0f0f0000f4d4d2", 0x7}, {&(0x7f00000001c0)="99", 0xffffffffffffff98}, {&(0x7f0000000840)="15e92cda69a69f9f05f87f7dd924f1bb6338843d493a7a1b6550fbd4fac88305bd82babe7040ef9c3462536c8d53e6d1bfac20054c8c6d9c99fb2c72a141e0ac697b7d6831db4abbe1e3dd0be3845b15f8f319e14e415db8622272b317b5652a3ffb0e288a0cbd8718dc79e0395b22e545ad1512388cb5abe11b4131d2be56fa852f1c6ac92dbe232e2fe6ba0e7f866d663dec40948b30bbb2e2b94074ac0f709b27ea82264c5176053a9d5fab1ba46173d1b4cac3fddd7172f40912ea93b566f238eea55815b9aa4ffd87f983e03340af87", 0xd2}], 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r8}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 578.153891ms ago: executing program 2 (id=10118): gettid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='kfree\x00', r0}, 0x18) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$selinux_validatetrans(r1, 0x0, 0x79) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x36, 0x1, 0x1c, 0x0, 0x0, 0x7, 0x1410, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x5, 0x2}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x3, 0x0, 0x200000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000240)=@ethtool_wolinfo={0x0, 0x3d11, 0x800, "d624fdac276e"}}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000"], 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$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") pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8080c61) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x1b, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a0300000000f5ffffff00010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001500000000000800000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x18) r7 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x8001, 0xfc, 0x1, 0x3, 0x6, 0xc7, 0x4}, 0x1c) dup3(r7, 0xffffffffffffffff, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000440)="2e9b3d0007e03dd65193dfb6c575963f8864", 0x12}, {&(0x7f0000000380)="0f0f0000f4d4d2", 0x7}, {&(0x7f00000001c0)="99", 0xffffffffffffff98}, {&(0x7f0000000840)="15e92cda69a69f9f05f87f7dd924f1bb6338843d493a7a1b6550fbd4fac88305bd82babe7040ef9c3462536c8d53e6d1bfac20054c8c6d9c99fb2c72a141e0ac697b7d6831db4abbe1e3dd0be3845b15f8f319e14e415db8622272b317b5652a3ffb0e288a0cbd8718dc79e0395b22e545ad1512388cb5abe11b4131d2be56fa852f1c6ac92dbe232e2fe6ba0e7f866d663dec40948b30bbb2e2b94074ac0f709b27ea82264c5176053a9d5fab1ba46173d1b4cac3fddd7172f40912ea93b566f238eea55815b9aa4ffd87f983e03340af87", 0xd2}], 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r8}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 509.298162ms ago: executing program 2 (id=10119): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x401, 0x3ff, 0xfffffffb, 0x8001, 0x1a, "08400000c38eaad6a4540ad9455fb5031af800"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x9) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000480)={0x8, 0x3, 0x0, 0x10000, 0x1a, "4415264a88b82c521113fb235902af2556c6b6"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x6) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r3 = syz_open_procfs(r1, &(0x7f0000000040)='net/snmp6\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x1f, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendto$unix(0xffffffffffffffff, 0x0, 0xfffffffffffffef6, 0x20044840, 0x0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40004) ioctl$TIOCCBRK(r3, 0x5428) recvmmsg(r4, &(0x7f00000017c0)=[{{0x0, 0x51, &(0x7f0000000200)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f00000052c0)=""/223, 0xeb}, {&(0x7f0000003080)=""/4096, 0x1000}], 0x3}, 0x3}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000540)=""/129}, {&(0x7f0000000740)=""/82}, {&(0x7f00000007c0)=""/4096}, {&(0x7f0000000080)=""/34}]}}], 0x1b00, 0x40000000, 0x0) 318.138855ms ago: executing program 1 (id=10121): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x400, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x4, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$igmp(0x2, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x200000, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="dc0100002000000018000000000000000000000000000000950000000000000038720a013653e84c584fdd38a199f6b2df9e19f1574da4512902e83640d72226cbc0c89b926a"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xdd, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e21, @broadcast}, {}, 0x8, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}, 'lo\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 228.228476ms ago: executing program 1 (id=10122): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(0x0, 0x0, 0x6, r2, 0x9) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) r4 = dup(r0) r5 = memfd_secret(0x80000) write$selinux_attr(r5, 0x0, 0x0) r6 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r7, &(0x7f0000000140)='./file0\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r1, 0x20, &(0x7f0000000240)={&(0x7f00000006c0)=""/4096, 0x1000, 0x0, &(0x7f00000016c0)=""/245, 0xf5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x16, 0x1f, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000003000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181b0000", @ANYRES32=r5, @ANYBLOB="0000000c86421694821dd00005000000000000000000000018160000", @ANYRES32=r5, @ANYBLOB="00000000000000007d8603009ea30000184200000000000000000000000000001833000005000000000000000000000018280000", @ANYRES32=r4, @ANYBLOB="0000000000000000376af8ff0000000018160000", @ANYRES32=r7, @ANYBLOB="0000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0xee, &(0x7f00000005c0)=""/238, 0x41000, 0x1, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x4, 0x2, 0x8f7f}, 0x10, r8, r3, 0x0, &(0x7f0000000380)=[r0, r0], 0x0, 0x10, 0xffff, @void, @value}, 0x94) 192.755547ms ago: executing program 1 (id=10123): r0 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x2) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0'}, 0xb) r1 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) listen(r3, 0x2) connect$bt_sco(r3, &(0x7f0000001500)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r4 = socket(0x28, 0x5, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) socket(0x25, 0xa, 0x0) connect$vsock_stream(r4, &(0x7f0000000080), 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000f80)=@newtaction={0x1910, 0x30, 0x12f, 0x0, 0x0, {}, [{0x18fc, 0x1, [@m_police={0x18f8, 0x1, 0x0, 0x0, {{0xb}, {0x18cc, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x6, 0x0, 0x0, 0xfffffffd, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x80000001, 0x4000000}}], [], [@TCA_POLICE_RATE64={0xc, 0x8, 0x7}, @TCA_POLICE_RATE={0x404, 0x2, [0xa3, 0x5, 0x4, 0x8, 0x2, 0x7, 0x1, 0x0, 0x8, 0xfffffffc, 0x4, 0x2, 0x55, 0x1, 0x4, 0x9, 0x8f729a78, 0x8, 0x5, 0x10001, 0x3, 0x40, 0x7, 0x3, 0x8, 0x8, 0x6, 0x9, 0x3, 0x251, 0xb, 0x3, 0x3, 0x0, 0x5, 0x7ff, 0x8, 0x6a4, 0x9, 0x8001, 0x84e, 0x0, 0x5, 0x1, 0xffffff7f, 0x4, 0x2, 0x9, 0x2, 0x7fff, 0x6, 0x80000001, 0x6, 0x4, 0x8, 0x9, 0x3, 0x294, 0x401, 0x26, 0x3e2, 0x5d0, 0x0, 0x14c9, 0xff, 0x1ff, 0x7, 0xffff, 0x4e6, 0x0, 0x800, 0x3, 0x8, 0x2, 0x800, 0x2596, 0x8, 0x2, 0x7f, 0x1, 0xfffffffe, 0x400, 0x7f, 0x7ff, 0x10000, 0x7, 0x9, 0x9, 0xd, 0x3, 0x0, 0x2, 0xdc2d, 0x1, 0x3, 0x3, 0x1ff, 0x5628, 0x678, 0x0, 0xffffffff, 0x0, 0x5, 0x6, 0xc0, 0x20d, 0x6, 0x7fff, 0x0, 0x5, 0x895, 0x3, 0x3, 0xc22, 0x5, 0x62, 0x9, 0x477, 0x4, 0xe, 0x1c1df941, 0x40, 0x141, 0xc, 0x9, 0x7ff, 0x7, 0x7, 0x8c7, 0x1, 0x5, 0x8, 0x8, 0x41d, 0x8, 0x7, 0x5, 0x7fffffff, 0x0, 0x2, 0x30, 0x80000001, 0x3, 0x1e4a, 0xa4, 0x30, 0x1395, 0x3, 0x7fff, 0x3d, 0x0, 0x11, 0x7fff, 0x7, 0xfffffffb, 0x7, 0x3, 0x401, 0xb1a1, 0x8, 0x8, 0xfffffffa, 0x508f57a5, 0xfffffffc, 0x1, 0x719b1140, 0x8, 0x2, 0x7a56, 0xfffffa8b, 0x4, 0x8, 0x200, 0x680, 0x10, 0x5, 0x82a4, 0x3, 0x3, 0x6, 0xa, 0x10000, 0x9, 0x3508, 0x81, 0x0, 0x81, 0x4, 0x1, 0x5a5, 0x1000, 0x8, 0x12, 0x5, 0x8, 0xff, 0x6, 0x9bb, 0x7fff, 0x1000, 0x3, 0x0, 0x9, 0x5, 0x5, 0x800, 0x1, 0x9, 0x2, 0xe99, 0x3, 0x2, 0x71, 0x8001, 0xbf5, 0x3, 0x1, 0x24, 0x2, 0xcf2, 0x3, 0x81, 0x0, 0x6, 0x2f4, 0x7, 0x9, 0x400, 0x7f, 0x4, 0x4, 0x1000, 0x1, 0x6, 0x9, 0x0, 0x346, 0xcaf, 0xfe, 0x10000, 0x1, 0x3ff, 0xfffffff8, 0x5, 0x8, 0x638f, 0x8, 0x7, 0x6, 0x9, 0x3, 0x8, 0x5, 0x0, 0x0, 0xff]}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0xf, 0x4, 0x65d7, 0x1, 0x0, 0xfffffffb, 0xdf51, 0x3542, 0x3, 0x7b09, 0xc72, 0xca, 0x2, 0x23ff, 0x1, 0x2, 0x2, 0x400000, 0x3, 0xb630, 0x6, 0x4, 0x1, 0x8, 0xe3, 0x8, 0x67c, 0x8, 0x0, 0x0, 0x5, 0xc, 0x9, 0xff, 0xfffffffe, 0x4, 0x401, 0xac5, 0x2, 0x4, 0x80, 0x7, 0x30, 0x4, 0x7, 0x200, 0x3, 0x0, 0xfffffffe, 0x7, 0x437, 0xfff, 0x4, 0x3, 0x85, 0xa, 0x6, 0x4, 0x7, 0x10001, 0x7, 0x3, 0xe, 0xdd94, 0x93, 0x1, 0x0, 0x2, 0x2, 0x9, 0xa, 0x1, 0xd57, 0x8, 0x1, 0xc4, 0x5, 0x6, 0x0, 0x0, 0x2, 0xf371, 0x9, 0xb, 0x7, 0xf0, 0xd398, 0x10000, 0x80000000, 0x3, 0x4, 0x1, 0xfffffffb, 0x2, 0x7, 0xa, 0x6, 0xff, 0x0, 0x8, 0x8, 0x9f2, 0xec86, 0xa, 0x0, 0x7, 0x5f1, 0xc7, 0x1, 0x8, 0x80000001, 0x5, 0x8001, 0x9, 0x1, 0x7, 0x2, 0x5, 0x9, 0x9, 0x4, 0x1, 0x7, 0x4, 0x80000000, 0x9, 0x4, 0x8000, 0x1, 0x6, 0xdf03, 0x9, 0x6, 0x3, 0x4, 0xd5, 0xa, 0xe, 0x6, 0x1000, 0x10000, 0x5, 0x5, 0x0, 0x6, 0xc, 0xd8f, 0xfff, 0x6, 0x200, 0x9, 0xee2, 0x8, 0xcd8, 0x8, 0x0, 0x9, 0x2, 0x2, 0x1, 0x0, 0x7fffffff, 0x26, 0x7df7, 0x10000, 0x1, 0x1, 0x8001, 0x3e2147c, 0x6, 0x401, 0xc, 0x5, 0x0, 0x40, 0x8, 0x401, 0x1, 0x8, 0x4, 0xec4, 0x1, 0x4, 0xc, 0x8, 0xfffffff7, 0x7, 0x2, 0xd, 0x6, 0x1, 0x5, 0x5, 0x6, 0x9, 0xfffffffe, 0x4f8a, 0x9, 0x2, 0xfffffffb, 0x4, 0x1d5f, 0x10001, 0x4, 0xae, 0xffffff3d, 0x39, 0x2, 0x1, 0x6, 0x1, 0x8, 0x2400, 0x101, 0x5, 0x8, 0x6, 0x3, 0x80000, 0x3, 0x2, 0xb, 0x1, 0x4, 0x9466, 0x8, 0x6, 0x2, 0x26a3, 0xc, 0x9, 0x996, 0x7, 0x1, 0x1, 0xff, 0x8, 0x8, 0x10000, 0x18, 0x8000, 0x5, 0x1, 0x0, 0x1, 0xd46, 0x3be3, 0x80, 0x1, 0xffff8001, 0x1, 0x17600000, 0x40000000, 0x4, 0x7fff]}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x6, 0x3, 0x6, 0x7, 0x8ab, 0x2, 0x400, 0xfffffff9, 0x6, 0x200, 0x8, 0x3ff, 0x10000, 0x9, 0xb4b4, 0x0, 0x3, 0x7, 0x0, 0x0, 0x7fff, 0x4, 0x7, 0x3ff, 0x9, 0xffff0001, 0x3, 0x8f0, 0x7, 0x80000001, 0xffffff7d, 0x9, 0x3, 0x3, 0x1, 0x1, 0x10, 0x8f, 0xffffffff, 0xb, 0x40, 0x5, 0x3, 0x1, 0x7c77, 0x5, 0x975, 0x2, 0x65, 0x8, 0xb9c2, 0x43ef, 0x10, 0x6df, 0x200, 0x4, 0x4, 0x2f, 0x93, 0x0, 0x1f, 0x11e, 0x2, 0x7f, 0x444, 0x1, 0x7, 0x87c, 0x1e90, 0x7, 0x4, 0xe72, 0x80, 0x5, 0x6, 0x0, 0xfffff63d, 0x8, 0x7, 0x5, 0xc, 0x9, 0x63, 0x6, 0x5, 0x6, 0x655, 0x0, 0x400, 0x57d, 0xc, 0xfff, 0x7fffffff, 0xb030, 0x5, 0xcb, 0x5, 0x9, 0x0, 0x4, 0x1bc, 0x6506, 0x1, 0x3, 0x1, 0x6, 0xea, 0x1, 0x2, 0x3, 0xffffffb5, 0x5, 0x9, 0x8001, 0xc, 0x9000, 0x8001, 0x3, 0x6, 0x5, 0x1, 0xa, 0x101, 0x5, 0xc655, 0x2, 0x2, 0x6, 0x10000, 0x9, 0xfffffffb, 0x3, 0x4, 0x7ff, 0x4, 0x2, 0x2, 0x0, 0x2, 0x1, 0x2, 0x1000, 0x1, 0x6, 0x8001, 0x0, 0xd85, 0x800, 0x81, 0x6, 0xd0, 0x2, 0xb33f, 0xa, 0x3, 0x7, 0xffffffff, 0x2, 0x1, 0x9, 0xd, 0xb, 0x4, 0xfffffff8, 0x0, 0xffffffff, 0x2, 0xfff, 0x6, 0x3c, 0x2, 0xa, 0x59, 0x80000001, 0x6, 0x0, 0x9, 0x7, 0x6, 0xa, 0x2ce, 0x9, 0x2, 0x57, 0x5, 0x1, 0x8, 0x2e2, 0x2, 0x5, 0x3, 0x10, 0x8, 0x2, 0x5, 0xfffffffe, 0x10, 0x7, 0x39d8, 0x3, 0xb, 0x9, 0x6, 0x2, 0x0, 0x137, 0x80, 0x7, 0x13e5, 0x3e8, 0x5, 0xfffffff7, 0xfbac, 0x8, 0x826a, 0x0, 0xa, 0x269, 0x5, 0x2, 0x7fffffff, 0xff, 0xfffffffd, 0x3a3f, 0x200, 0x1, 0x8, 0x7, 0x38d7, 0x0, 0xffff0000, 0x3, 0xfffffffb, 0x3, 0xe48, 0x8, 0x1, 0x7, 0x97, 0x7, 0x8, 0x1, 0x7, 0x7, 0x0, 0x8000, 0x800, 0xf7e, 0xba5, 0x2, 0x20, 0x0, 0x7, 0x4a, 0x2]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x2b5, 0x3, 0x7, 0xe, 0x6, {0x4, 0x2, 0x8000, 0x9, 0xca, 0x4}, {0x1, 0x0, 0x2e, 0xff, 0x1, 0x4}, 0x8, 0x910, 0x99}}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xdb}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0xfff, 0x6, 0xc, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x9, 0x7, 0x6, 0xfa8, 0x3, 0x7, 0x3, 0x10001, 0x4, 0x1, 0x3ff, 0x9d5, 0x1, 0x8, 0x6, 0x4, 0x7, 0x3, 0x7fffffff, 0x10000, 0xffff, 0x6534, 0x565f38a5, 0x4f, 0xf, 0x5, 0x6, 0x2, 0x9, 0x3, 0x5, 0xde1, 0x80, 0x4, 0x3, 0x5, 0x5, 0x1, 0x7, 0x4, 0xc, 0xe, 0x1, 0x3, 0x9e, 0x2, 0x1, 0x8, 0x8, 0x5, 0x1ff, 0x2f6, 0x8000, 0x0, 0x0, 0x80000001, 0x1, 0x2, 0xffffffff, 0x7, 0x813, 0x6, 0xd3d, 0x5, 0x9, 0xc99, 0x2d64, 0x4, 0x5, 0x800, 0x9, 0xb, 0x3, 0x4, 0x5, 0x0, 0xa, 0x6, 0xc, 0xfffffff8, 0x8001, 0x7fffffff, 0x8, 0xa6c, 0x9, 0x9, 0x400, 0x6, 0x2, 0x2, 0x9, 0x9, 0x0, 0x6, 0x0, 0xe941, 0x1, 0x7fffffff, 0x18000000, 0xf, 0x8, 0x1, 0x2, 0x8, 0x8264, 0x17, 0x600, 0x1, 0x3, 0x7fffffff, 0xfffff26f, 0xfffffff8, 0x1, 0x8, 0x4, 0xfff, 0x7f, 0x2, 0x6, 0xb1d, 0x85d3, 0x2, 0x4, 0xffffffff, 0x1, 0xb, 0x400, 0x7, 0x81, 0x6, 0x9, 0x5a93, 0x8000, 0x4, 0x400, 0xfffffff8, 0x7fffffff, 0x1, 0x1, 0x1, 0x4, 0xff, 0x6, 0x5, 0x7, 0x3, 0x1, 0x7, 0x0, 0x2, 0x7, 0x5, 0xffff, 0x9971, 0x6, 0xffffffff, 0x2, 0x1, 0x80, 0xffffff80, 0x4, 0xff, 0x6, 0x7fff, 0x7fff, 0x1ff, 0x6e, 0x5, 0x2, 0x7, 0x9, 0x8, 0x101, 0x7, 0xfffffffb, 0x6, 0x5, 0x6, 0xfffffff8, 0x42, 0x6, 0xad0, 0x0, 0x9, 0xe000, 0x9, 0x6, 0xff, 0x2, 0x4ad, 0x0, 0xe6, 0x2, 0x4, 0x2, 0x80000000, 0x18, 0x4, 0x8, 0x8, 0x3, 0x6, 0x437, 0x3, 0x8, 0x5, 0x5, 0x7, 0x8000, 0x80000001, 0x5, 0x6, 0x3, 0xe5e, 0x2, 0x5, 0x3, 0x2, 0x503, 0x3f21, 0xa, 0xc, 0x2, 0x10, 0x3, 0xd0, 0x1, 0x1, 0x101, 0x9, 0x10000, 0x6, 0xe, 0xc3, 0x6, 0xd0, 0x81, 0x1, 0x4, 0x8000, 0x0, 0x1, 0x0, 0x6, 0x8, 0x6, 0x2]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x1}], [@TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x3, 0x5e61ebb1, 0x2, 0x5, 0x15f60000, 0x5, 0x1, 0x2ad, 0x0, 0x4, 0x5, 0x0, 0x2, 0x8, 0x5, 0x1, 0x200, 0x4, 0x10, 0xc, 0x32c, 0x8001, 0x9, 0x2, 0x7fff, 0x6cb7, 0x40ff, 0x10, 0x5, 0x4, 0x430, 0x5, 0x3, 0x1ff, 0x2, 0x1e, 0x73, 0x6, 0x8, 0x9, 0x3ff, 0x3ff, 0x1c, 0x533, 0x6, 0x4, 0x5cd, 0x720, 0x6, 0x9, 0x10001, 0x4, 0xfffffffd, 0x7, 0x0, 0x8000, 0x0, 0x3, 0x8, 0xf, 0xfffffffb, 0x8000, 0x80000001, 0xbefb, 0xd18, 0xff, 0x7, 0x5, 0x7, 0x8, 0x65, 0xffff7fff, 0x88, 0x6, 0x1, 0xa, 0x10001, 0x9, 0x1, 0x2, 0xb, 0xb0f, 0x9, 0x8, 0xf, 0x10, 0x7, 0x10000, 0xd, 0xfff, 0x80, 0x4, 0x59, 0x0, 0x7fffffff, 0x4, 0x5, 0x4, 0x7, 0x3, 0x0, 0x800, 0x3, 0x415, 0x100, 0xfff, 0xffffffff, 0x7, 0x8, 0x9, 0x1, 0x1, 0x1, 0x0, 0x2, 0x7, 0x3, 0xffffffff, 0x10, 0x7, 0x5, 0x0, 0x1, 0x3ff, 0x3, 0x8, 0x0, 0x0, 0xfffffff7, 0x1, 0x1000, 0x10001, 0x776, 0xffffffff, 0x5, 0x100, 0x7, 0x80, 0x9, 0xffffffff, 0x2, 0x2, 0x2, 0x1, 0x3, 0xfffffffb, 0x8, 0x8, 0xb, 0x2, 0x9, 0x0, 0x1d, 0x7, 0xffffffff, 0x7, 0xecd, 0x1, 0xff, 0x101, 0x1ff, 0x9, 0x48, 0x7, 0xe7, 0x1, 0x3, 0x7fff, 0x4, 0x7, 0x57f, 0x1, 0x0, 0x7fff, 0x8, 0x5, 0x5901, 0x6, 0x6, 0x340000, 0x8, 0x3, 0x80000001, 0x8000, 0x7fffffff, 0xfff, 0x8, 0xffffff0e, 0x9, 0x7, 0x800, 0x88, 0x3, 0x8, 0x4, 0x247, 0x9, 0xf, 0xfffffff5, 0xa, 0x9, 0x5, 0x65cf, 0x10000, 0x54, 0x4, 0x1, 0x7, 0x3ff, 0xb, 0x2, 0x16a, 0xe0, 0x7fffffff, 0xc041, 0x8, 0x7, 0xfffffffc, 0x7fa, 0xc, 0x800, 0x4, 0x800, 0xfffffffe, 0xfffff000, 0x5, 0x6020, 0x5a5, 0xcbf, 0x33ba, 0x2, 0x800, 0x3, 0x5, 0x80, 0x0, 0x8, 0x4, 0x80, 0x1, 0x5, 0x9, 0x4739, 0x6, 0x5, 0xfffffff9, 0x8, 0x1, 0x68, 0x4, 0x8, 0xb, 0x2, 0x14000, 0x6]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x7d3, 0x2, 0x7, 0xf, 0x7f, 0xfffffff8, 0x400000, 0x7fffffff, 0x0, 0x80000001, 0x80, 0x5, 0x6, 0x6, 0x4, 0x6, 0x4, 0x6, 0x9, 0xb979, 0x517, 0x4bd, 0xe, 0x1, 0x9, 0x2, 0x7, 0x3ff, 0xfffffff8, 0x2, 0x9, 0x2, 0x1000, 0x812, 0x8, 0xff, 0x8, 0x3, 0x9, 0x5, 0x7, 0x4, 0x8, 0x70, 0x80000000, 0xe, 0xc5f, 0x40, 0x6, 0x8, 0x5f44, 0x70, 0x4, 0x3, 0x98, 0x0, 0x8, 0xfff, 0xd, 0xbb7, 0x41, 0x6, 0x5, 0x2, 0xfffff3e3, 0x7f, 0x4, 0x400, 0x101, 0x6, 0x0, 0x9, 0x400, 0x1, 0x37, 0x8, 0x3, 0xbcb4, 0x0, 0x49, 0x3, 0xffffffff, 0x6, 0x6, 0x101, 0x4, 0xc7, 0x2, 0xce, 0x7, 0x400, 0x49, 0x0, 0x2, 0xb, 0x3, 0x8, 0x2, 0x7f, 0x800, 0x5, 0x3, 0x2, 0x9, 0x0, 0x0, 0x5, 0x6, 0x5, 0x40000000, 0x7, 0x2, 0x5, 0xc1, 0x8000, 0xb, 0x329, 0xc, 0x1, 0x1, 0x9, 0x2000, 0x101, 0xc72e, 0x0, 0x3, 0x4, 0x7, 0x6, 0x80000000, 0x8, 0x72, 0x95a, 0x4, 0xfffffff8, 0x3, 0x1, 0x3, 0x80000001, 0x10001, 0x9, 0xe000000, 0x1, 0x40, 0x5, 0x8, 0x200000, 0x5a76, 0x6, 0x1, 0xfffffffe, 0x1ff, 0x8, 0x7ff, 0x8, 0x1, 0x7, 0x3, 0x1, 0x443, 0x6, 0x5, 0x1, 0xffffff80, 0x6, 0x7fffffff, 0x0, 0x8, 0xffffff24, 0x0, 0x1, 0x4, 0x8001, 0x6, 0x8, 0x15, 0x5, 0xfffffffd, 0x5a9a, 0xd020, 0xfffff000, 0x1, 0x9, 0x8c, 0x7ff, 0x6, 0xfffffffb, 0x986, 0x9, 0x13c8f99b, 0x2, 0x80000001, 0xfffffffd, 0x75, 0x26, 0x0, 0x3, 0x0, 0x1000, 0x557, 0xff, 0x6, 0x2, 0x609f, 0x1, 0xd0, 0x9, 0xf1a, 0xfff, 0x2, 0x69, 0x0, 0xffff, 0x7, 0x1800, 0xc, 0x8, 0x4, 0x12e, 0x5, 0xa61, 0x1, 0x8001, 0x0, 0x4, 0x0, 0xd, 0x8, 0x16, 0x0, 0x4, 0x6d6a, 0x9, 0x1, 0x9, 0x1000, 0xba, 0x4, 0x0, 0x5, 0xffffe930, 0x1, 0x4, 0x10000, 0x6, 0x3, 0x2, 0x4, 0x9, 0x101, 0x9, 0x3, 0x6, 0x1, 0xfffffe00]}, @TCA_POLICE_RESULT={0x8, 0x5, 0xe}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x1910}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) close(r4) fsmount(r1, 0x0, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6, 0x0, 0xfffffffffffffffd}, 0x18) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r8 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r8, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) connect$vsock_stream(r8, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) 192.337157ms ago: executing program 1 (id=10124): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500"], 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x4000, 0x4000) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) syz_mount_image$ext4(&(0x7f0000001540)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000001600)={[], [{@pcr={'pcr', 0x3d, 0xd}}, {@uid_eq}]}, 0x2, 0xbb8, &(0x7f00000017c0)="$eJzs3M1rXFUbAPDn3kymaZv3nfTlRawbIyItiNOkkmKLYCsVNy4E3QoN6aSETD9IIjVpFhP9B0RdC24EtSgu7LobRbdutN0qLoQisVEQ0cidjyQ2mTS1M70x/f3gzD3nnpl5nmcuM/cemJkA7luD2U0asT8iTiURpeb+NCKK9V5fRK1xv6XF+bFfF+fHklhefumnJJKIuLk4P9Z6rqS53dsc9EXE188m8b831sednp2bHK1WK1PN8aGZsxcOTc/OPTFxdvRM5Uzl3PCRp0YOjxwZOjrSsVp/++74lV8eef6H2u8f/nH557ffT+J49Dfn1tbRKYMxuPKarFWIiNFOB8tJT7OetXUmhds8KO1yUgAAtJWuuYZ7IErRE6sXb6X4/JtckwMAAAA6YrknYhkAAADY4RLrfwAAANjhWt8DuLk4P9Zq+X4j4d66cSIiBhr1LzVbY6YQtfq2L3ojYs/NJNb+rDVpPOyuDUbE99ePfpK16NLvkDdTW4iIBzc6/km9/oH6r7jX159GxFAH4g/eMv431X+8A/Hzrh+A+9PVE40T2frzX7py/RMbnP8KG5y7/om8z3+t67+lddd/q/X3tLn+e3GLMS598O7FdnNZ/U9fee7jVsviZ9u7KuoO3FiIeKiwUf3JSv1Jm/pPbTFG6c+LlXZzede//F7Egdi4/pZk8/8nOjQ+Ua0MNW43jLHw1chH7eLnXX92/Pe0qb/1/0/tjv+FLcZ45eTJT9ftvL7a3bz+9Mdi8nK9V2zueW10ZmZqOKKYvLB+/+HNc2ndp/UcWf0HH938/b9R/dlnQq35OmRrgYXmNhu/fkvMZy5f+qxdPq31X57H/3Sb47+2/i8L64//m1uM8dgXbx1sN7d2/Zu1LH5rLQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALWlE9EeSllf6aVouR+yNiP/HnrR6fnrm8fHzr547nc1FDERvOj5RrQxFRKkxTrLxcL2/Oj58y/jJiNgXEe+UdtfH5bHz1dN5Fw8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCKvRHRH0lajog0IpZKaVou550VAAAA0HEDeScAAAAAdJ31PwAAAOx81v8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB02b6Hr15LIqJ2bHe9ZYrNud5cMwO6Lc07ASA3PXknAOSmkHcCQG7ucI3vcgF2oOQ2831tZ3Z1PBcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAtq8D+69eSyKidmx3vWWKzbneXDMDui3NOwEgNz2bTRbuXR7AvectDvcva3wguc183+p9an+f2dW1nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYfvrrLUnLEVFs7iuXI/4TEQPRm4xPVCtDEfHfiPi21LsrGw/nnDMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACdNz07NzlarVamsk4azc7KHp3VTtJ4xWrbJR+du+wUY1uksU07eX8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACQh+nZucnRarUyNZ13JgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDepmfnJker1cpUFzt51wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH7+CgAA//9gfgp0") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000008850000007600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=@newtaction={0x64, 0x30, 0xffffffffffffffff, 0x0, 0x0, {}, [{0x50, 0x1, [@m_bpf={0x4c, 0x1, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1}}, @TCA_ACT_BPF_FD={0x8, 0x5, r2}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), r0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[@ANYBLOB="e4020000", @ANYRES16=r3, @ANYBLOB="000429bd7000ffdbdf250a0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030002000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800"], 0xd4}, 0x1, 0x0, 0x0, 0x20040885}, 0x20000800) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b402000000000000791100000000000085000000520000009500000000000000359bb9f43d86b136000000008762000000f33ad18fa9b151092e9172d8ca80be3fd2fe548fa036cf6151d76a8b71e51807e420da77440079a86cdda66fedd4922a95cd42662d9dafae9602325ef1a30b8aba9c271a51a56f7f73de45084cd90fa9ac55778d6c272c473383785c34c5b372e52138cf7f6c081c29a5eec551cd928f1f289175a9ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0xffffffffffffff35, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x54) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000180)=[0xffffffffffffffff], 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x45, 0x40000141, 0x0) 178.309657ms ago: executing program 0 (id=10125): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x20, &(0x7f00000000c0), 0x0) 133.902988ms ago: executing program 0 (id=10126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000000101010200000000000000000a0000000c00198008000200150200001800028014000180080003"], 0x38}}, 0x0) 133.490168ms ago: executing program 0 (id=10127): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) io_setup(0x81, &(0x7f0000001440)=0x0) r2 = syz_io_uring_setup(0x6853, &(0x7f0000000380)={0x0, 0x0, 0x2}, &(0x7f0000000340), &(0x7f0000000080)) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) socket(0x400000000010, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000290000000400000039e235"], 0x18}, 0x20008800) socket$unix(0x1, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12000000010000000400000002"], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r4, &(0x7f0000000040)}, 0x20) 83.697549ms ago: executing program 1 (id=10128): gettid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='kfree\x00', r0}, 0x18) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$selinux_validatetrans(r1, 0x0, 0x79) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x36, 0x1, 0x1c, 0x0, 0x0, 0x7, 0x1410, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x5, 0x2}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x3, 0x0, 0x200000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000240)=@ethtool_wolinfo={0x0, 0x3d11, 0x800, "d624fdac276e"}}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000"], 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$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") pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8080c61) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) socket$kcm(0x29, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x1b, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a0300000000f5ffffff00010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001500000000000800000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x18) r8 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x8001, 0xfc, 0x1, 0x3, 0x6, 0xc7, 0x4}, 0x1c) dup3(r8, 0xffffffffffffffff, 0x0) writev(r8, &(0x7f00000003c0)=[{&(0x7f0000000440)="2e9b3d0007e03dd65193dfb6c575963f8864", 0x12}, {&(0x7f0000000380)="0f0f0000f4d4d2", 0x7}, {&(0x7f00000001c0)="99", 0xffffffffffffff98}, {&(0x7f0000000840)="15e92cda69a69f9f05f87f7dd924f1bb6338843d493a7a1b6550fbd4fac88305bd82babe7040ef9c3462536c8d53e6d1bfac20054c8c6d9c99fb2c72a141e0ac697b7d6831db4abbe1e3dd0be3845b15f8f319e14e415db8622272b317b5652a3ffb0e288a0cbd8718dc79e0395b22e545ad1512388cb5abe11b4131d2be56fa852f1c6ac92dbe232e2fe6ba0e7f866d663dec40948b30bbb2e2b94074ac0f709b27ea82264c5176053a9d5fab1ba46173d1b4cac3fddd7172f40912ea93b566f238eea55815b9aa4ffd87f983e03340af87", 0xd2}], 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r9}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20.94185ms ago: executing program 3 (id=10129): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sctp\x00') r4 = open_tree(r3, &(0x7f0000000640)='\x00', 0x89901) move_mount(r4, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x20}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}]}, &(0x7f0000000280)='GPL\x00', 0xa8c, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1c, r3, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x28bfc, r4, 0xa, 0x0, &(0x7f0000000800)=[{0x4, 0x2, 0x9}, {0x0, 0x2, 0x8, 0x2}, {0x3, 0x1, 0xc, 0x1}, {0x2, 0x3, 0x7, 0xa}, {0x2, 0x1, 0x10, 0x6}, {0x1, 0x1, 0x1, 0x3}, {0x2, 0x2, 0xf}, {0x0, 0x5, 0xa, 0xb}, {0x1, 0x4, 0xd}, {0x5, 0x5, 0xc, 0x1}], 0x10, 0xb, @void, @value}, 0x94) mkdirat(r4, &(0x7f0000000340)='./file0\x00', 0x40) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000017000000950000000000000060bda108010da26a15544b2a4c738e0fa0f897aa278b325764f2dcd6b865984f599ffe6cad199d36bc80e98b17249acf845992d69cc4a092d0655f0e225d2f568bd76a618d10b49d26440819e5f1e36c54"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r5, r2, 0x25, 0x0, @void}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r8 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_misc(r8, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpcb_getport\x00', r9}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b'], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) brk(0x20001000) 20.57514ms ago: executing program 3 (id=10130): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) sigaltstack(0x0, 0x0) syz_emit_ethernet(0xca, &(0x7f00000002c0)={@link_local, @dev, @void, {@ipv4={0x800, @icmp={{0x2a, 0x4, 0x0, 0x0, 0xbc, 0x64, 0x0, 0x0, 0x2, 0x0, @local, @multicast2, {[@generic={0x7, 0xf, "96748a5f1972994d6ccdc1e68e"}, @timestamp_addr={0x44, 0x44, 0xc, 0x1, 0x3, [{@private=0xa010101, 0x6}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xa}, {@rand_addr=0x64010101, 0xa0fd}, {@remote, 0xc1e4}, {@multicast1, 0xa}, {@private=0xa010100, 0x2}, {@multicast1, 0x62b0}]}, @rr={0x7, 0x1b, 0x5a, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010102, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010101]}, @ra={0x94, 0x4}, @generic={0x88, 0xa, "5b81afa9643bd65c"}, @lsrr={0x83, 0x17, 0x16, [@remote, @multicast2, @multicast2, @loopback, @multicast1]}, @end]}}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x2, 0x1000000}}}}}, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000001c0)={'caif0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'gretap0\x00', r5, 0x20, 0x8000, 0xfffffff4, 0xb, {{0x8, 0x4, 0x3, 0x2, 0x20, 0x67, 0x0, 0x80, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2, {[@timestamp_prespec={0x44, 0xc, 0x85, 0x3, 0x3, [{@private=0xa010102, 0xf}]}]}}}}}) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000180)={@multicast2, @local, @remote}, 0xc) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e0000002ac1414aa"], 0x1c) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@link_local, @dev, @val={@void, {0x8100, 0x0, 0x0, 0x1}}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x64, 0x0, 0x0, 0x2, 0x0, @empty, @multicast2}, @address_request={0x11, 0x0, 0x0, 0xfffffff9}}}}}, 0x0) 600.8µs ago: executing program 0 (id=10131): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0xc, &(0x7f0000000800)=ANY=[@ANYRES8=0xffffffffffffffff, @ANYRESOCT=0x0, @ANYRESHEX=0x0, @ANYRES64], 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, @cgroup_device=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0xfffffffffffffdc5, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="93f2fd9e0000000000000000060000fc0bbe1b7a", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x286ca06bbee933dc, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1000}}, 0x1c}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)=r7}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0x18) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r10 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r12 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) 0s ago: executing program 1 (id=10132): r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c5, 0x24) (async, rerun: 32) r1 = perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (rerun: 32) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r1, 0x3) r2 = syz_io_uring_setup(0xd6, &(0x7f0000000480)={0x0, 0xd814, 0x8, 0x2, 0xfffffffc, 0x0, r0}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='signal_generate\x00', r5}, 0x10) (async) r6 = gettid() tkill(r6, 0x21) (async, rerun: 64) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) (rerun: 64) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0xfffffffffffffffd, 0x0}) (async) io_uring_enter(r2, 0x47ba, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = creat(&(0x7f00000021c0)='./cgroup.net/devices.allow\x00', 0xc1) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r9, 0x1, &(0x7f0000000c80)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x5, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x2}]) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000004000000000000008100d00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r10}, 0x10) r11 = epoll_create1(0x0) epoll_wait(r11, &(0x7f0000002a80)=[{}], 0x1, 0xfffeffff) (async) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r13 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r13, &(0x7f0000000100)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @empty}}, 0x24) listen(r13, 0xf4) (async, rerun: 32) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r12, &(0x7f0000000080)={0x9d32f4b220c65367}) (async, rerun: 32) dup(r7) (async) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r14}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}], 0x1, 0x0) kernel console output (not intermixed with test programs): Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.401620][T28548] RSP: 002b:00007fbfba0e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 539.401720][T28548] RAX: ffffffffffffffda RBX: 00007fbfbbca5fa0 RCX: 00007fbfbba7e929 [ 539.401735][T28548] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000003 [ 539.401747][T28548] RBP: 00007fbfba0e7090 R08: 0000000000000000 R09: 0000000000000000 [ 539.401760][T28548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.401776][T28548] R13: 0000000000000000 R14: 00007fbfbbca5fa0 R15: 00007ffea2186338 [ 539.401801][T28548] [ 540.478539][T28578] __nla_validate_parse: 5 callbacks suppressed [ 540.478576][T28578] netlink: 60 bytes leftover after parsing attributes in process `syz.4.9250'. [ 540.741213][T28582] serio: Serial port ptm1 [ 541.068484][T28593] netlink: 'syz.3.9254': attribute type 10 has an invalid length. [ 541.076425][T28593] netlink: 'syz.3.9254': attribute type 19 has an invalid length. [ 541.084312][T28593] netlink: 156 bytes leftover after parsing attributes in process `syz.3.9254'. [ 541.487304][T28603] vhci_hcd: default hub control req: c607 vfffe i0000 l0 [ 541.494716][T28614] vhci_hcd: default hub control req: c607 vfffe i0000 l0 [ 541.666263][T28621] serio: Serial port ptm0 [ 542.087164][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 542.087183][ T29] audit: type=1326 audit(1750148580.895:59312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.117743][ T29] audit: type=1326 audit(1750148580.895:59313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.141540][ T29] audit: type=1326 audit(1750148580.895:59314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.165289][ T29] audit: type=1326 audit(1750148580.895:59315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.241210][ T29] audit: type=1326 audit(1750148580.905:59316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.265028][ T29] audit: type=1326 audit(1750148580.905:59317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.288736][ T29] audit: type=1326 audit(1750148580.905:59318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.312400][ T29] audit: type=1326 audit(1750148580.905:59319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.336111][ T29] audit: type=1326 audit(1750148580.905:59320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.359997][ T29] audit: type=1326 audit(1750148580.905:59321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28627 comm="syz.1.9268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 542.491357][T28644] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9274'. [ 542.535288][T28648] serio: Serial port ptm1 [ 542.574238][T28650] netlink: 2028 bytes leftover after parsing attributes in process `syz.2.9275'. [ 542.583814][T28650] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9275'. [ 542.918178][T28658] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 542.926424][T28658] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 542.973297][T28663] FAULT_INJECTION: forcing a failure. [ 542.973297][T28663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 542.986969][T28663] CPU: 0 UID: 0 PID: 28663 Comm: syz.4.9281 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 542.987101][T28663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 542.987121][T28663] Call Trace: [ 542.987128][T28663] [ 542.987136][T28663] __dump_stack+0x1d/0x30 [ 542.987158][T28663] dump_stack_lvl+0xe8/0x140 [ 542.987177][T28663] dump_stack+0x15/0x1b [ 542.987194][T28663] should_fail_ex+0x265/0x280 [ 542.987235][T28663] should_fail_alloc_page+0xf2/0x100 [ 542.987300][T28663] __alloc_frozen_pages_noprof+0xff/0x360 [ 542.987409][T28663] alloc_pages_mpol+0xb3/0x250 [ 542.987501][T28663] alloc_migration_target_by_mpol+0x11b/0x280 [ 542.987525][T28663] migrate_pages_batch+0x2e4/0x17d0 [ 542.987557][T28663] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 542.987585][T28663] ? vma_modify+0xa37/0xc80 [ 542.987616][T28663] migrate_pages+0xf5f/0x1770 [ 542.987715][T28663] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 542.987798][T28663] __se_sys_mbind+0x975/0xac0 [ 542.987834][T28663] __x64_sys_mbind+0x78/0x90 [ 542.987872][T28663] x64_sys_call+0x14af/0x2fb0 [ 542.987921][T28663] do_syscall_64+0xd2/0x200 [ 542.987941][T28663] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 542.987968][T28663] ? clear_bhb_loop+0x40/0x90 [ 542.987990][T28663] ? clear_bhb_loop+0x40/0x90 [ 542.988012][T28663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.988097][T28663] RIP: 0033:0x7fb860eee929 [ 542.988112][T28663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.988131][T28663] RSP: 002b:00007fb85f557038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 542.988212][T28663] RAX: ffffffffffffffda RBX: 00007fb861115fa0 RCX: 00007fb860eee929 [ 542.988225][T28663] RDX: 0000000000000001 RSI: 0000000000600000 RDI: 0000200000000000 [ 542.988238][T28663] RBP: 00007fb85f557090 R08: 0000000000000000 R09: 0000000000000002 [ 542.988295][T28663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.988308][T28663] R13: 0000000000000000 R14: 00007fb861115fa0 R15: 00007ffe63a3f868 [ 542.988347][T28663] [ 543.393557][T28679] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9289'. [ 543.485439][T28691] 9pnet_fd: Insufficient options for proto=fd [ 543.615450][T28712] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9295'. [ 543.618199][T28714] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9296'. [ 543.726393][T28728] FAULT_INJECTION: forcing a failure. [ 543.726393][T28728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 543.739910][T28728] CPU: 1 UID: 0 PID: 28728 Comm: syz.3.9298 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 543.739938][T28728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 543.739951][T28728] Call Trace: [ 543.739956][T28728] [ 543.739964][T28728] __dump_stack+0x1d/0x30 [ 543.739986][T28728] dump_stack_lvl+0xe8/0x140 [ 543.740010][T28728] dump_stack+0x15/0x1b [ 543.740085][T28728] should_fail_ex+0x265/0x280 [ 543.740177][T28728] should_fail+0xb/0x20 [ 543.740205][T28728] should_fail_usercopy+0x1a/0x20 [ 543.740354][T28728] _copy_from_user+0x1c/0xb0 [ 543.740375][T28728] kstrtouint_from_user+0x69/0xf0 [ 543.740412][T28728] ? 0xffffffff81000000 [ 543.740507][T28728] ? selinux_file_permission+0x1e4/0x320 [ 543.740542][T28728] proc_fail_nth_write+0x50/0x160 [ 543.740567][T28728] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 543.740591][T28728] vfs_write+0x269/0x8e0 [ 543.740707][T28728] ? vfs_read+0x47f/0x6f0 [ 543.740735][T28728] ? __rcu_read_unlock+0x4f/0x70 [ 543.740817][T28728] ? __fget_files+0x184/0x1c0 [ 543.740901][T28728] ksys_write+0xda/0x1a0 [ 543.740925][T28728] __x64_sys_write+0x40/0x50 [ 543.740947][T28728] x64_sys_call+0x2cdd/0x2fb0 [ 543.740975][T28728] do_syscall_64+0xd2/0x200 [ 543.740998][T28728] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 543.741053][T28728] ? clear_bhb_loop+0x40/0x90 [ 543.741074][T28728] ? clear_bhb_loop+0x40/0x90 [ 543.741098][T28728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.741179][T28728] RIP: 0033:0x7fbfbba7d3df [ 543.741198][T28728] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 543.741222][T28728] RSP: 002b:00007fbfba0e7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 543.741245][T28728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbfbba7d3df [ 543.741262][T28728] RDX: 0000000000000001 RSI: 00007fbfba0e70a0 RDI: 0000000000000005 [ 543.741274][T28728] RBP: 00007fbfba0e7090 R08: 0000000000000000 R09: 0000000000000000 [ 543.741303][T28728] R10: 0000000000002000 R11: 0000000000000293 R12: 0000000000000001 [ 543.741314][T28728] R13: 0000000000000000 R14: 00007fbfbbca5fa0 R15: 00007ffea2186338 [ 543.741336][T28728] [ 544.041991][T28736] netlink: 132 bytes leftover after parsing attributes in process `syz.3.9300'. [ 544.097138][T28746] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 544.315427][T28763] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 544.319299][T28764] tmpfs: Bad value for 'mpol' [ 544.323741][T28763] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 544.507554][T28771] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 544.511382][T28767] FAULT_INJECTION: forcing a failure. [ 544.511382][T28767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 544.528264][T28767] CPU: 0 UID: 0 PID: 28767 Comm: syz.4.9311 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 544.528299][T28767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 544.528312][T28767] Call Trace: [ 544.528320][T28767] [ 544.528337][T28767] __dump_stack+0x1d/0x30 [ 544.528511][T28767] dump_stack_lvl+0xe8/0x140 [ 544.528600][T28767] dump_stack+0x15/0x1b [ 544.528622][T28767] should_fail_ex+0x265/0x280 [ 544.528663][T28767] should_fail+0xb/0x20 [ 544.528815][T28767] should_fail_usercopy+0x1a/0x20 [ 544.528856][T28767] copy_folio_from_iter_atomic+0x278/0x1170 [ 544.528884][T28767] ? shmem_write_begin+0xa8/0x190 [ 544.528938][T28767] ? shmem_write_begin+0xe1/0x190 [ 544.529105][T28767] generic_perform_write+0x2c2/0x490 [ 544.529140][T28767] shmem_file_write_iter+0xc5/0xf0 [ 544.529169][T28767] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 544.529272][T28767] vfs_write+0x4a0/0x8e0 [ 544.529321][T28767] ksys_write+0xda/0x1a0 [ 544.529344][T28767] __x64_sys_write+0x40/0x50 [ 544.529364][T28767] x64_sys_call+0x2cdd/0x2fb0 [ 544.529385][T28767] do_syscall_64+0xd2/0x200 [ 544.529405][T28767] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 544.529437][T28767] ? clear_bhb_loop+0x40/0x90 [ 544.529526][T28767] ? clear_bhb_loop+0x40/0x90 [ 544.529617][T28767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.529646][T28767] RIP: 0033:0x7fb860eee929 [ 544.529668][T28767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.529695][T28767] RSP: 002b:00007fb85f557038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 544.529720][T28767] RAX: ffffffffffffffda RBX: 00007fb861115fa0 RCX: 00007fb860eee929 [ 544.529746][T28767] RDX: 000000000208e24b RSI: 0000200000000000 RDI: 0000000000000003 [ 544.529763][T28767] RBP: 00007fb85f557090 R08: 0000000000000000 R09: 0000000000000000 [ 544.529775][T28767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 544.529788][T28767] R13: 0000000000000000 R14: 00007fb861115fa0 R15: 00007ffe63a3f868 [ 544.529897][T28767] [ 544.958223][T28777] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 545.208530][T28793] serio: Serial port ptm2 [ 545.227012][T28788] syzkaller0: entered promiscuous mode [ 545.227044][T28796] netlink: 136 bytes leftover after parsing attributes in process `syz.4.9323'. [ 545.232526][T28788] syzkaller0: entered allmulticast mode [ 545.252052][T28784] bridge0: port 3(team0) entered blocking state [ 545.259374][T28784] bridge0: port 3(team0) entered disabled state [ 545.270719][T28784] team0: entered allmulticast mode [ 545.276523][T28784] team_slave_0: entered allmulticast mode [ 545.285500][T28784] team_slave_1: entered allmulticast mode [ 545.310590][T28784] team0: entered promiscuous mode [ 545.317046][T28784] team_slave_0: entered promiscuous mode [ 545.324297][T28784] team_slave_1: entered promiscuous mode [ 545.334397][T28784] bridge0: port 3(team0) entered blocking state [ 545.341497][T28784] bridge0: port 3(team0) entered forwarding state [ 545.379477][T28805] FAULT_INJECTION: forcing a failure. [ 545.379477][T28805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 545.392936][T28805] CPU: 0 UID: 0 PID: 28805 Comm: syz.2.9325 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 545.393000][T28805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 545.393017][T28805] Call Trace: [ 545.393025][T28805] [ 545.393035][T28805] __dump_stack+0x1d/0x30 [ 545.393062][T28805] dump_stack_lvl+0xe8/0x140 [ 545.393087][T28805] dump_stack+0x15/0x1b [ 545.393138][T28805] should_fail_ex+0x265/0x280 [ 545.393178][T28805] should_fail_alloc_page+0xf2/0x100 [ 545.393230][T28805] __alloc_frozen_pages_noprof+0xff/0x360 [ 545.393342][T28805] alloc_pages_mpol+0xb3/0x250 [ 545.393390][T28805] vma_alloc_folio_noprof+0x1aa/0x300 [ 545.393495][T28805] handle_mm_fault+0xec2/0x2be0 [ 545.393524][T28805] ? mas_walk+0xf2/0x120 [ 545.393565][T28805] do_user_addr_fault+0x636/0x1090 [ 545.393655][T28805] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 545.393695][T28805] exc_page_fault+0x62/0xa0 [ 545.393726][T28805] asm_exc_page_fault+0x26/0x30 [ 545.393835][T28805] RIP: 0033:0x7fbb42f70ca3 [ 545.393852][T28805] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 545.393873][T28805] RSP: 002b:00007fbb417164a0 EFLAGS: 00010202 [ 545.393892][T28805] RAX: 000000000000a000 RBX: 00007fbb41716540 RCX: 00007fbb392f7000 [ 545.393908][T28805] RDX: 00007fbb417166e0 RSI: 000000000000000f RDI: 00007fbb417165e0 [ 545.393925][T28805] RBP: 0000000000000004 R08: 0000000000000008 R09: 00000000000000d3 [ 545.393940][T28805] R10: 00000000000000dc R11: 00007fbb41716540 R12: 0000000000000001 [ 545.394012][T28805] R13: 00007fbb4314c120 R14: 0000000000000073 R15: 00007fbb417165e0 [ 545.394035][T28805] [ 545.394045][T28805] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 545.605663][T28810] netlink: 'syz.4.9327': attribute type 4 has an invalid length. [ 545.931088][T28855] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 545.939400][T28855] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 546.000715][T28862] FAULT_INJECTION: forcing a failure. [ 546.000715][T28862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 546.013900][T28862] CPU: 0 UID: 0 PID: 28862 Comm: syz.2.9336 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 546.013979][T28862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 546.013992][T28862] Call Trace: [ 546.014000][T28862] [ 546.014009][T28862] __dump_stack+0x1d/0x30 [ 546.014035][T28862] dump_stack_lvl+0xe8/0x140 [ 546.014087][T28862] dump_stack+0x15/0x1b [ 546.014108][T28862] should_fail_ex+0x265/0x280 [ 546.014150][T28862] should_fail+0xb/0x20 [ 546.014185][T28862] should_fail_usercopy+0x1a/0x20 [ 546.014294][T28862] _copy_from_user+0x1c/0xb0 [ 546.014321][T28862] memdup_user+0x5e/0xd0 [ 546.014392][T28862] strndup_user+0x68/0xb0 [ 546.014444][T28862] __se_sys_mount+0x4d/0x2e0 [ 546.014468][T28862] ? fput+0x8f/0xc0 [ 546.014547][T28862] ? ksys_write+0x192/0x1a0 [ 546.014571][T28862] __x64_sys_mount+0x67/0x80 [ 546.014644][T28862] x64_sys_call+0xd36/0x2fb0 [ 546.014669][T28862] do_syscall_64+0xd2/0x200 [ 546.014689][T28862] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 546.014720][T28862] ? clear_bhb_loop+0x40/0x90 [ 546.014745][T28862] ? clear_bhb_loop+0x40/0x90 [ 546.014854][T28862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.014945][T28862] RIP: 0033:0x7fbb430ae929 [ 546.014964][T28862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.015015][T28862] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 546.015034][T28862] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 546.015046][T28862] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 546.015058][T28862] RBP: 00007fbb41717090 R08: 0000200000000240 R09: 0000000000000000 [ 546.015074][T28862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.015088][T28862] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 546.015122][T28862] [ 546.275618][T28872] 9pnet_fd: Insufficient options for proto=fd [ 546.313840][T28876] SELinux: failed to load policy [ 546.325178][T28876] netlink: 'syz.0.9342': attribute type 4 has an invalid length. [ 546.385069][T28887] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 546.540077][T28909] FAULT_INJECTION: forcing a failure. [ 546.540077][T28909] name failslab, interval 1, probability 0, space 0, times 0 [ 546.552879][T28909] CPU: 1 UID: 0 PID: 28909 Comm: syz.3.9350 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 546.552972][T28909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 546.552989][T28909] Call Trace: [ 546.552998][T28909] [ 546.553008][T28909] __dump_stack+0x1d/0x30 [ 546.553029][T28909] dump_stack_lvl+0xe8/0x140 [ 546.553055][T28909] dump_stack+0x15/0x1b [ 546.553071][T28909] should_fail_ex+0x265/0x280 [ 546.553102][T28909] should_failslab+0x8c/0xb0 [ 546.553210][T28909] kmem_cache_alloc_node_noprof+0x57/0x320 [ 546.553353][T28909] ? __alloc_skb+0x101/0x320 [ 546.553383][T28909] __alloc_skb+0x101/0x320 [ 546.553418][T28909] ? audit_log_start+0x365/0x6c0 [ 546.553498][T28909] audit_log_start+0x380/0x6c0 [ 546.553579][T28909] audit_seccomp+0x48/0x100 [ 546.553606][T28909] ? __seccomp_filter+0x68c/0x10d0 [ 546.553636][T28909] __seccomp_filter+0x69d/0x10d0 [ 546.553668][T28909] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 546.553752][T28909] ? vfs_write+0x75e/0x8e0 [ 546.553791][T28909] ? __rcu_read_unlock+0x4f/0x70 [ 546.553819][T28909] ? __fget_files+0x184/0x1c0 [ 546.553849][T28909] __secure_computing+0x82/0x150 [ 546.553879][T28909] syscall_trace_enter+0xcf/0x1e0 [ 546.553943][T28909] do_syscall_64+0xac/0x200 [ 546.553964][T28909] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 546.554010][T28909] ? clear_bhb_loop+0x40/0x90 [ 546.554108][T28909] ? clear_bhb_loop+0x40/0x90 [ 546.554136][T28909] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.554161][T28909] RIP: 0033:0x7fbfbba7e929 [ 546.554179][T28909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.554202][T28909] RSP: 002b:00007fbfba0e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000009a [ 546.554224][T28909] RAX: ffffffffffffffda RBX: 00007fbfbbca5fa0 RCX: 00007fbfbba7e929 [ 546.554298][T28909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 546.554313][T28909] RBP: 00007fbfba0e7090 R08: 0000000000000000 R09: 0000000000000000 [ 546.554385][T28909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.554397][T28909] R13: 0000000000000000 R14: 00007fbfbbca5fa0 R15: 00007ffea2186338 [ 546.554417][T28909] [ 546.821714][T28917] 9pnet_fd: Insufficient options for proto=fd [ 546.875596][T28923] syz!: rxe_newlink: already configured on team_slave_0 [ 546.980746][T28936] netdevsim netdevsim2: Direct firmware load for ..€ failed with error -2 [ 547.094035][T28950] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 547.102453][T28950] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 547.209056][ T29] kauditd_printk_skb: 357 callbacks suppressed [ 547.209073][ T29] audit: type=1400 audit(1750148586.025:59677): avc: denied { bind } for pid=28955 comm="syz.1.9365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 547.236874][ T29] audit: type=1400 audit(1750148586.055:59678): avc: denied { listen } for pid=28955 comm="syz.1.9365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 547.257541][ T29] audit: type=1400 audit(1750148586.055:59679): avc: denied { read } for pid=28955 comm="syz.1.9365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 547.288684][T28959] __nla_validate_parse: 1 callbacks suppressed [ 547.288701][T28959] netlink: 28 bytes leftover after parsing attributes in process `syz.1.9365'. [ 547.375244][T28964] 9pnet_fd: Insufficient options for proto=fd [ 547.421468][ T29] audit: type=1326 audit(1750148586.235:59680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.449464][ T29] audit: type=1326 audit(1750148586.235:59681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.473704][ T29] audit: type=1326 audit(1750148586.235:59682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.497585][ T29] audit: type=1326 audit(1750148586.235:59683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.521295][ T29] audit: type=1326 audit(1750148586.235:59684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.545587][ T29] audit: type=1326 audit(1750148586.235:59685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.569234][ T29] audit: type=1326 audit(1750148586.235:59686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28967 comm="syz.3.9369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 547.679589][T28977] vhci_hcd: invalid port number 96 [ 547.685030][T28977] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 548.463573][T29007] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9384'. [ 548.767576][T29031] netlink: 60 bytes leftover after parsing attributes in process `syz.2.9391'. [ 548.793083][T29033] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 548.801361][T29033] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 548.860257][T29037] serio: Serial port ptm0 [ 548.929204][T29043] netlink: 3 bytes leftover after parsing attributes in process `+}[@'. [ 548.938226][T29043] 0ªX¹¦À: renamed from caif0 [ 548.944845][T29043] 0ªX¹¦À: entered allmulticast mode [ 548.950314][T29043] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 549.611283][T29054] serio: Serial port ptm0 [ 549.684789][T29071] SELinux: failed to load policy [ 549.704387][T29072] FAULT_INJECTION: forcing a failure. [ 549.704387][T29072] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.705366][T29071] netlink: 'syz.1.9402': attribute type 4 has an invalid length. [ 549.717796][T29072] CPU: 1 UID: 0 PID: 29072 Comm: syz.2.9400 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 549.717836][T29072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 549.717923][T29072] Call Trace: [ 549.717931][T29072] [ 549.717942][T29072] __dump_stack+0x1d/0x30 [ 549.717971][T29072] dump_stack_lvl+0xe8/0x140 [ 549.718001][T29072] dump_stack+0x15/0x1b [ 549.718025][T29072] should_fail_ex+0x265/0x280 [ 549.718121][T29072] should_fail+0xb/0x20 [ 549.718159][T29072] should_fail_usercopy+0x1a/0x20 [ 549.718204][T29072] _copy_from_iter+0xcf/0xe40 [ 549.718252][T29072] ? __kmalloc_noprof+0x364/0x3e0 [ 549.718428][T29072] ? kernfs_fop_write_iter+0xe1/0x2d0 [ 549.718474][T29072] kernfs_fop_write_iter+0x129/0x2d0 [ 549.718565][T29072] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 549.718598][T29072] vfs_write+0x4a0/0x8e0 [ 549.718694][T29072] ksys_write+0xda/0x1a0 [ 549.718720][T29072] __x64_sys_write+0x40/0x50 [ 549.718745][T29072] x64_sys_call+0x2cdd/0x2fb0 [ 549.718774][T29072] do_syscall_64+0xd2/0x200 [ 549.718867][T29072] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 549.718904][T29072] ? clear_bhb_loop+0x40/0x90 [ 549.718954][T29072] ? clear_bhb_loop+0x40/0x90 [ 549.718984][T29072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.719014][T29072] RIP: 0033:0x7fbb430ae929 [ 549.719035][T29072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.719061][T29072] RSP: 002b:00007fbb416f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 549.719136][T29072] RAX: ffffffffffffffda RBX: 00007fbb432d6080 RCX: 00007fbb430ae929 [ 549.719154][T29072] RDX: 0000000000000008 RSI: 0000200000000080 RDI: 000000000000000a [ 549.719172][T29072] RBP: 00007fbb416f6090 R08: 0000000000000000 R09: 0000000000000000 [ 549.719237][T29072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.719300][T29072] R13: 0000000000000000 R14: 00007fbb432d6080 R15: 00007ffd8e51cb28 [ 549.719326][T29072] [ 549.971477][T29088] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9404'. [ 549.984576][T29091] netlink: 60 bytes leftover after parsing attributes in process `syz.4.9405'. [ 550.020492][T29095] lo speed is unknown, defaulting to 1000 [ 550.026603][T29095] lo speed is unknown, defaulting to 1000 [ 550.032686][T29095] lo speed is unknown, defaulting to 1000 [ 550.040408][T29095] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 550.057231][T29095] lo speed is unknown, defaulting to 1000 [ 550.065714][T29095] lo speed is unknown, defaulting to 1000 [ 550.099353][T29095] lo speed is unknown, defaulting to 1000 [ 550.105876][T29095] lo speed is unknown, defaulting to 1000 [ 550.138146][T29095] lo speed is unknown, defaulting to 1000 [ 550.144102][T29097] SELinux: failed to load policy [ 550.145079][T29095] lo speed is unknown, defaulting to 1000 [ 550.156890][T29095] lo speed is unknown, defaulting to 1000 [ 550.163525][T29102] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 550.164387][T29095] lo speed is unknown, defaulting to 1000 [ 550.171800][T29102] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 550.181997][T29095] lo speed is unknown, defaulting to 1000 [ 550.193522][T29095] lo speed is unknown, defaulting to 1000 [ 550.202754][T29095] lo speed is unknown, defaulting to 1000 [ 550.229381][T29095] lo speed is unknown, defaulting to 1000 [ 550.472809][T29126] syz!: rxe_newlink: already configured on team_slave_0 [ 550.790268][T29159] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9427'. [ 550.803008][T29161] FAULT_INJECTION: forcing a failure. [ 550.803008][T29161] name failslab, interval 1, probability 0, space 0, times 0 [ 550.816013][T29161] CPU: 1 UID: 0 PID: 29161 Comm: syz.2.9431 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 550.816049][T29161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 550.816111][T29161] Call Trace: [ 550.816119][T29161] [ 550.816127][T29161] __dump_stack+0x1d/0x30 [ 550.816195][T29161] dump_stack_lvl+0xe8/0x140 [ 550.816215][T29161] dump_stack+0x15/0x1b [ 550.816236][T29161] should_fail_ex+0x265/0x280 [ 550.816282][T29161] should_failslab+0x8c/0xb0 [ 550.816312][T29161] __kvmalloc_node_noprof+0x123/0x4e0 [ 550.816437][T29161] ? alloc_fdtable+0xf8/0x1b0 [ 550.816523][T29161] alloc_fdtable+0xf8/0x1b0 [ 550.816565][T29161] dup_fd+0x4c7/0x540 [ 550.816607][T29161] ksys_unshare+0x346/0x6d0 [ 550.816659][T29161] __x64_sys_unshare+0x1f/0x30 [ 550.816738][T29161] x64_sys_call+0x2d4b/0x2fb0 [ 550.816766][T29161] do_syscall_64+0xd2/0x200 [ 550.816789][T29161] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 550.816819][T29161] ? clear_bhb_loop+0x40/0x90 [ 550.816891][T29161] ? clear_bhb_loop+0x40/0x90 [ 550.816945][T29161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 550.817050][T29161] RIP: 0033:0x7fbb430ae929 [ 550.817069][T29161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.817146][T29161] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 550.817164][T29161] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 550.817178][T29161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c020400 [ 550.817193][T29161] RBP: 00007fbb41717090 R08: 0000000000000000 R09: 0000000000000000 [ 550.817208][T29161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.817224][T29161] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 550.817243][T29161] [ 551.033609][T29163] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 551.051367][T29165] serio: Serial port ptm1 [ 551.065957][T29168] netlink: 12 bytes leftover after parsing attributes in process `'. [ 551.280731][T29189] serio: Serial port ptm0 [ 551.340147][T29200] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 551.348453][T29200] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 551.453613][T29204] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9447'. [ 551.515293][T29211] netlink: 'syz.4.9450': attribute type 1 has an invalid length. [ 551.523126][T29211] netlink: 224 bytes leftover after parsing attributes in process `syz.4.9450'. [ 551.744613][T29211] 9pnet: Could not find request transport: 0xffffffffffffffff [ 552.303498][ T29] kauditd_printk_skb: 410 callbacks suppressed [ 552.303514][ T29] audit: type=1326 audit(1750148591.116:60097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29224 comm="syz.4.9454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 552.334557][ T29] audit: type=1326 audit(1750148591.146:60098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29224 comm="syz.4.9454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 552.359158][ T29] audit: type=1326 audit(1750148591.146:60099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29224 comm="syz.4.9454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 552.383077][ T29] audit: type=1326 audit(1750148591.146:60100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29224 comm="syz.4.9454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 552.506496][T29227] SELinux: failed to load policy [ 552.553931][T29231] 9pnet: Could not find request transport: fd0x0000000000000005 [ 552.620100][T29234] vhci_hcd: invalid port number 96 [ 552.625347][T29234] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 552.717925][T29241] FAULT_INJECTION: forcing a failure. [ 552.717925][T29241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 552.731174][T29241] CPU: 1 UID: 0 PID: 29241 Comm: syz.0.9461 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 552.731210][T29241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 552.731228][T29241] Call Trace: [ 552.731238][T29241] [ 552.731250][T29241] __dump_stack+0x1d/0x30 [ 552.731350][T29241] dump_stack_lvl+0xe8/0x140 [ 552.731376][T29241] dump_stack+0x15/0x1b [ 552.731397][T29241] should_fail_ex+0x265/0x280 [ 552.731448][T29241] should_fail+0xb/0x20 [ 552.731474][T29241] should_fail_usercopy+0x1a/0x20 [ 552.731506][T29241] _copy_from_user+0x1c/0xb0 [ 552.731532][T29241] ___sys_sendmsg+0xc1/0x1d0 [ 552.731597][T29241] __x64_sys_sendmsg+0xd4/0x160 [ 552.731626][T29241] x64_sys_call+0x2999/0x2fb0 [ 552.731656][T29241] do_syscall_64+0xd2/0x200 [ 552.731674][T29241] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 552.731708][T29241] ? clear_bhb_loop+0x40/0x90 [ 552.731814][T29241] ? clear_bhb_loop+0x40/0x90 [ 552.731842][T29241] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 552.731876][T29241] RIP: 0033:0x7ff0d92ee929 [ 552.731897][T29241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 552.731920][T29241] RSP: 002b:00007ff0d7957038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 552.731940][T29241] RAX: ffffffffffffffda RBX: 00007ff0d9515fa0 RCX: 00007ff0d92ee929 [ 552.732014][T29241] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000005 [ 552.732079][T29241] RBP: 00007ff0d7957090 R08: 0000000000000000 R09: 0000000000000000 [ 552.732095][T29241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 552.732111][T29241] R13: 0000000000000000 R14: 00007ff0d9515fa0 R15: 00007ffd25adedd8 [ 552.732144][T29241] [ 553.017462][T29247] FAULT_INJECTION: forcing a failure. [ 553.017462][T29247] name failslab, interval 1, probability 0, space 0, times 0 [ 553.017998][T29245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29245 comm=syz.2.9463 [ 553.030187][T29247] CPU: 1 UID: 0 PID: 29247 Comm: syz.0.9464 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 553.030300][T29247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 553.030318][T29247] Call Trace: [ 553.030329][T29247] [ 553.030383][T29247] __dump_stack+0x1d/0x30 [ 553.030456][T29247] dump_stack_lvl+0xe8/0x140 [ 553.030484][T29247] dump_stack+0x15/0x1b [ 553.030507][T29247] should_fail_ex+0x265/0x280 [ 553.030558][T29247] should_failslab+0x8c/0xb0 [ 553.030592][T29247] kmem_cache_alloc_node_noprof+0x57/0x320 [ 553.030635][T29247] ? __alloc_skb+0x101/0x320 [ 553.030674][T29247] ? __rtnl_unlock+0x95/0xb0 [ 553.030713][T29247] __alloc_skb+0x101/0x320 [ 553.030820][T29247] netlink_ack+0xfd/0x500 [ 553.030870][T29247] netlink_rcv_skb+0x192/0x220 [ 553.030914][T29247] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 553.031034][T29247] rtnetlink_rcv+0x1c/0x30 [ 553.031062][T29247] netlink_unicast+0x59e/0x670 [ 553.031165][T29247] netlink_sendmsg+0x58b/0x6b0 [ 553.031236][T29247] ? __pfx_netlink_sendmsg+0x10/0x10 [ 553.031264][T29247] __sock_sendmsg+0x142/0x180 [ 553.031298][T29247] ____sys_sendmsg+0x31e/0x4e0 [ 553.031391][T29247] ___sys_sendmsg+0x17b/0x1d0 [ 553.031495][T29247] __x64_sys_sendmsg+0xd4/0x160 [ 553.031527][T29247] x64_sys_call+0x2999/0x2fb0 [ 553.031557][T29247] do_syscall_64+0xd2/0x200 [ 553.031589][T29247] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 553.031691][T29247] ? clear_bhb_loop+0x40/0x90 [ 553.031719][T29247] ? clear_bhb_loop+0x40/0x90 [ 553.031798][T29247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.031828][T29247] RIP: 0033:0x7ff0d92ee929 [ 553.031852][T29247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 553.031877][T29247] RSP: 002b:00007ff0d7957038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 553.031904][T29247] RAX: ffffffffffffffda RBX: 00007ff0d9515fa0 RCX: 00007ff0d92ee929 [ 553.031922][T29247] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000008 [ 553.031939][T29247] RBP: 00007ff0d7957090 R08: 0000000000000000 R09: 0000000000000000 [ 553.032014][T29247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 553.032031][T29247] R13: 0000000000000000 R14: 00007ff0d9515fa0 R15: 00007ffd25adedd8 [ 553.032058][T29247] [ 553.211230][T29250] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9465'. [ 553.346204][T29257] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9469'. [ 553.364739][T29255] 9pnet: Could not find request transport: fd0x0000000000000005 [ 553.458698][ T29] audit: type=1400 audit(1750148592.256:60101): avc: denied { setopt } for pid=29269 comm="syz.2.9474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 553.522990][T29275] serio: Serial port ptm0 [ 553.538892][T29268] syz.1.9466 (29268): /proc/29265/oom_adj is deprecated, please use /proc/29265/oom_score_adj instead. [ 553.550947][ T29] audit: type=1400 audit(1750148592.366:60102): avc: denied { setcurrent } for pid=29265 comm="syz.1.9466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 553.570982][ T29] audit: type=1401 audit(1750148592.366:60103): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 553.957919][T29287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29287 comm=syz.1.9478 [ 554.009791][T29291] netlink: 20 bytes leftover after parsing attributes in process `syz.3.9480'. [ 554.059154][T29291] netlink: 'syz.3.9480': attribute type 1 has an invalid length. [ 554.059201][T29294] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 554.076898][T29294] SELinux: failed to load policy [ 554.119185][T29302] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=29302 comm=syz.0.9483 [ 554.180247][T29306] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9480'. [ 554.192861][ T29] audit: type=1326 audit(1750148593.016:60104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29301 comm="syz.0.9483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 554.244293][ T29] audit: type=1326 audit(1750148593.016:60105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29301 comm="syz.0.9483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 554.268801][ T29] audit: type=1326 audit(1750148593.036:60106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29301 comm="syz.0.9483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=99 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 554.310598][T29312] netlink: 60 bytes leftover after parsing attributes in process `syz.1.9486'. [ 554.386599][T29314] vhci_hcd: invalid port number 96 [ 554.391868][T29314] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 554.550211][T29336] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29336 comm=syz.2.9491 [ 554.687063][T29347] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9493'. [ 555.328449][T29377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29377 comm=syz.3.9505 [ 555.333734][T29380] FAULT_INJECTION: forcing a failure. [ 555.333734][T29380] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.354663][T29380] CPU: 0 UID: 0 PID: 29380 Comm: syz.1.9506 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 555.354702][T29380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 555.354720][T29380] Call Trace: [ 555.354761][T29380] [ 555.354773][T29380] __dump_stack+0x1d/0x30 [ 555.354802][T29380] dump_stack_lvl+0xe8/0x140 [ 555.354895][T29380] dump_stack+0x15/0x1b [ 555.354916][T29380] should_fail_ex+0x265/0x280 [ 555.355032][T29380] should_fail+0xb/0x20 [ 555.355061][T29380] should_fail_usercopy+0x1a/0x20 [ 555.355098][T29380] _copy_from_user+0x1c/0xb0 [ 555.355125][T29380] io_submit_one+0x52/0x11d0 [ 555.355181][T29380] __se_sys_io_submit+0xfb/0x280 [ 555.355241][T29380] __x64_sys_io_submit+0x43/0x50 [ 555.355272][T29380] x64_sys_call+0xfc4/0x2fb0 [ 555.355297][T29380] do_syscall_64+0xd2/0x200 [ 555.355386][T29380] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 555.355416][T29380] ? clear_bhb_loop+0x40/0x90 [ 555.355471][T29380] ? clear_bhb_loop+0x40/0x90 [ 555.355500][T29380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 555.355574][T29380] RIP: 0033:0x7f22ef27e929 [ 555.355593][T29380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.355615][T29380] RSP: 002b:00007f22ed8e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 555.355637][T29380] RAX: ffffffffffffffda RBX: 00007f22ef4a5fa0 RCX: 00007f22ef27e929 [ 555.355649][T29380] RDX: 00002000000001c0 RSI: 0000000000000001 RDI: 00007f22effdf000 [ 555.355661][T29380] RBP: 00007f22ed8e7090 R08: 0000000000000000 R09: 0000000000000000 [ 555.355716][T29380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.355732][T29380] R13: 0000000000000000 R14: 00007f22ef4a5fa0 R15: 00007ffd2e5a0fd8 [ 555.355757][T29380] [ 555.581977][T29387] FAULT_INJECTION: forcing a failure. [ 555.581977][T29387] name failslab, interval 1, probability 0, space 0, times 0 [ 555.594979][T29387] CPU: 0 UID: 0 PID: 29387 Comm: syz.3.9508 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 555.595018][T29387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 555.595034][T29387] Call Trace: [ 555.595043][T29387] [ 555.595054][T29387] __dump_stack+0x1d/0x30 [ 555.595081][T29387] dump_stack_lvl+0xe8/0x140 [ 555.595102][T29387] dump_stack+0x15/0x1b [ 555.595137][T29387] should_fail_ex+0x265/0x280 [ 555.595183][T29387] should_failslab+0x8c/0xb0 [ 555.595255][T29387] kmem_cache_alloc_noprof+0x50/0x310 [ 555.595293][T29387] ? dst_alloc+0xbd/0x100 [ 555.595361][T29387] dst_alloc+0xbd/0x100 [ 555.595408][T29387] ip_route_output_key_hash_rcu+0xf16/0x1440 [ 555.595452][T29387] ip_route_output_flow+0x7b/0x130 [ 555.595485][T29387] udp_sendmsg+0x1197/0x13b0 [ 555.595544][T29387] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 555.595583][T29387] ? __rcu_read_unlock+0x4f/0x70 [ 555.595625][T29387] ? __pfx_udp_sendmsg+0x10/0x10 [ 555.595657][T29387] inet_sendmsg+0xac/0xd0 [ 555.595683][T29387] __sock_sendmsg+0x102/0x180 [ 555.595748][T29387] ____sys_sendmsg+0x345/0x4e0 [ 555.595789][T29387] ___sys_sendmsg+0x17b/0x1d0 [ 555.595854][T29387] __sys_sendmmsg+0x178/0x300 [ 555.595935][T29387] __x64_sys_sendmmsg+0x57/0x70 [ 555.595959][T29387] x64_sys_call+0x2f2f/0x2fb0 [ 555.595983][T29387] do_syscall_64+0xd2/0x200 [ 555.596009][T29387] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 555.596044][T29387] ? clear_bhb_loop+0x40/0x90 [ 555.596135][T29387] ? clear_bhb_loop+0x40/0x90 [ 555.596168][T29387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 555.596196][T29387] RIP: 0033:0x7fbfbba7e929 [ 555.596219][T29387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.596277][T29387] RSP: 002b:00007fbfba0e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 555.596304][T29387] RAX: ffffffffffffffda RBX: 00007fbfbbca5fa0 RCX: 00007fbfbba7e929 [ 555.596329][T29387] RDX: 0000000000000001 RSI: 0000200000000780 RDI: 0000000000000004 [ 555.596348][T29387] RBP: 00007fbfba0e7090 R08: 0000000000000000 R09: 0000000000000000 [ 555.596366][T29387] R10: 0000000004008804 R11: 0000000000000246 R12: 0000000000000001 [ 555.596384][T29387] R13: 0000000000000000 R14: 00007fbfbbca5fa0 R15: 00007ffea2186338 [ 555.596411][T29387] [ 555.898280][T29394] FAULT_INJECTION: forcing a failure. [ 555.898280][T29394] name failslab, interval 1, probability 0, space 0, times 0 [ 555.911086][T29394] CPU: 1 UID: 0 PID: 29394 Comm: syz.4.9512 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 555.911116][T29394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 555.911132][T29394] Call Trace: [ 555.911140][T29394] [ 555.911151][T29394] __dump_stack+0x1d/0x30 [ 555.911178][T29394] dump_stack_lvl+0xe8/0x140 [ 555.911204][T29394] dump_stack+0x15/0x1b [ 555.911225][T29394] should_fail_ex+0x265/0x280 [ 555.911265][T29394] should_failslab+0x8c/0xb0 [ 555.911288][T29394] __kmalloc_noprof+0xa5/0x3e0 [ 555.911323][T29394] ? iter_file_splice_write+0xfe/0x970 [ 555.911379][T29394] iter_file_splice_write+0xfe/0x970 [ 555.911415][T29394] ? atime_needs_update+0x3be/0x3e0 [ 555.911445][T29394] ? shmem_file_splice_read+0x5c2/0x600 [ 555.911510][T29394] ? __pfx_iter_file_splice_write+0x10/0x10 [ 555.911546][T29394] direct_splice_actor+0x156/0x2a0 [ 555.911575][T29394] ? shmem_mmap+0x71/0xb0 [ 555.911602][T29394] splice_direct_to_actor+0x312/0x680 [ 555.911637][T29394] ? __pfx_direct_splice_actor+0x10/0x10 [ 555.911678][T29394] do_splice_direct+0xda/0x150 [ 555.911708][T29394] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 555.911852][T29394] do_sendfile+0x380/0x650 [ 555.911962][T29394] __x64_sys_sendfile64+0x105/0x150 [ 555.911994][T29394] x64_sys_call+0xb39/0x2fb0 [ 555.912026][T29394] do_syscall_64+0xd2/0x200 [ 555.912049][T29394] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 555.912088][T29394] ? clear_bhb_loop+0x40/0x90 [ 555.912115][T29394] ? clear_bhb_loop+0x40/0x90 [ 555.912147][T29394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 555.912172][T29394] RIP: 0033:0x7fb860eee929 [ 555.912186][T29394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.912246][T29394] RSP: 002b:00007fb85f557038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 555.912268][T29394] RAX: ffffffffffffffda RBX: 00007fb861115fa0 RCX: 00007fb860eee929 [ 555.912280][T29394] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 555.912291][T29394] RBP: 00007fb85f557090 R08: 0000000000000000 R09: 0000000000000000 [ 555.912302][T29394] R10: 000000000000e065 R11: 0000000000000246 R12: 0000000000000002 [ 555.912317][T29394] R13: 0000000000000000 R14: 00007fb861115fa0 R15: 00007ffe63a3f868 [ 555.912415][T29394] [ 556.243804][T29407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29407 comm=syz.0.9518 [ 556.369170][T29416] netlink: 176 bytes leftover after parsing attributes in process `syz.0.9521'. [ 556.408558][T29419] vhci_hcd: invalid port number 96 [ 556.413762][T29419] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 556.455074][T29421] FAULT_INJECTION: forcing a failure. [ 556.455074][T29421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.468266][T29421] CPU: 0 UID: 0 PID: 29421 Comm: syz.2.9523 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 556.468373][T29421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 556.468390][T29421] Call Trace: [ 556.468398][T29421] [ 556.468408][T29421] __dump_stack+0x1d/0x30 [ 556.468442][T29421] dump_stack_lvl+0xe8/0x140 [ 556.468461][T29421] dump_stack+0x15/0x1b [ 556.468555][T29421] should_fail_ex+0x265/0x280 [ 556.468587][T29421] should_fail+0xb/0x20 [ 556.468614][T29421] should_fail_usercopy+0x1a/0x20 [ 556.468652][T29421] _copy_from_user+0x1c/0xb0 [ 556.468729][T29421] ___sys_sendmsg+0xc1/0x1d0 [ 556.468793][T29421] __x64_sys_sendmsg+0xd4/0x160 [ 556.468897][T29421] x64_sys_call+0x2999/0x2fb0 [ 556.468920][T29421] do_syscall_64+0xd2/0x200 [ 556.468977][T29421] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 556.469006][T29421] ? clear_bhb_loop+0x40/0x90 [ 556.469027][T29421] ? clear_bhb_loop+0x40/0x90 [ 556.469052][T29421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 556.469140][T29421] RIP: 0033:0x7fbb430ae929 [ 556.469157][T29421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 556.469175][T29421] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 556.469269][T29421] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 556.469287][T29421] RDX: 0000000020004004 RSI: 00002000000004c0 RDI: 0000000000000007 [ 556.469329][T29421] RBP: 00007fbb41717090 R08: 0000000000000000 R09: 0000000000000000 [ 556.469364][T29421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 556.469381][T29421] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 556.469407][T29421] [ 556.695838][T29423] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9525'. [ 556.710122][T29428] serio: Serial port ptm0 [ 556.779015][T29438] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29438 comm=syz.0.9529 [ 557.058093][T29454] vhci_hcd: invalid port number 96 [ 557.063290][T29454] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 557.087963][T29464] 9pnet_fd: Insufficient options for proto=fd [ 557.096285][T29459] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9539'. [ 557.162728][T29470] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9544'. [ 557.210510][T29470] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29470 comm=syz.0.9544 [ 557.287704][T29483] geneve2: entered allmulticast mode [ 557.312846][T29485] serio: Serial port ptm0 [ 557.368706][T29488] vhci_hcd: invalid port number 96 [ 557.373997][T29488] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 557.425089][T29503] 9pnet_fd: Insufficient options for proto=fd [ 557.442073][ T29] kauditd_printk_skb: 280 callbacks suppressed [ 557.442093][ T29] audit: type=1326 audit(1750148596.256:60387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29501 comm="syz.1.9555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.472566][ T29] audit: type=1326 audit(1750148596.256:60388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29501 comm="syz.1.9555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.496582][ T29] audit: type=1326 audit(1750148596.256:60389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29501 comm="syz.1.9555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.520696][ T29] audit: type=1326 audit(1750148596.256:60390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29501 comm="syz.1.9555" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.579208][T29515] FAULT_INJECTION: forcing a failure. [ 557.579208][T29515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.592542][T29515] CPU: 1 UID: 0 PID: 29515 Comm: syz.3.9559 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 557.592621][T29515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 557.592638][T29515] Call Trace: [ 557.592695][T29515] [ 557.592703][T29515] __dump_stack+0x1d/0x30 [ 557.592724][T29515] dump_stack_lvl+0xe8/0x140 [ 557.592743][T29515] dump_stack+0x15/0x1b [ 557.592761][T29515] should_fail_ex+0x265/0x280 [ 557.592874][T29515] should_fail+0xb/0x20 [ 557.592936][T29515] should_fail_usercopy+0x1a/0x20 [ 557.593039][T29515] _copy_from_user+0x1c/0xb0 [ 557.593061][T29515] ___sys_sendmsg+0xc1/0x1d0 [ 557.593183][T29515] __x64_sys_sendmsg+0xd4/0x160 [ 557.593207][T29515] x64_sys_call+0x2999/0x2fb0 [ 557.593229][T29515] do_syscall_64+0xd2/0x200 [ 557.593263][T29515] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 557.593290][T29515] ? clear_bhb_loop+0x40/0x90 [ 557.593312][T29515] ? clear_bhb_loop+0x40/0x90 [ 557.593371][T29515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 557.593393][T29515] RIP: 0033:0x7fbfbba7e929 [ 557.593408][T29515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 557.593427][T29515] RSP: 002b:00007fbfba0e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 557.593522][T29515] RAX: ffffffffffffffda RBX: 00007fbfbbca5fa0 RCX: 00007fbfbba7e929 [ 557.593535][T29515] RDX: 0000000020008040 RSI: 0000200000000280 RDI: 0000000000000005 [ 557.593548][T29515] RBP: 00007fbfba0e7090 R08: 0000000000000000 R09: 0000000000000000 [ 557.593560][T29515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.593572][T29515] R13: 0000000000000000 R14: 00007fbfbbca5fa0 R15: 00007ffea2186338 [ 557.593591][T29515] [ 557.789854][T29518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29518 comm=syz.2.9560 [ 557.876389][T29523] syzkaller0: entered promiscuous mode [ 557.882089][T29523] syzkaller0: entered allmulticast mode [ 557.894626][ T29] audit: type=1326 audit(1750148596.706:60391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29525 comm="syz.1.9563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.918603][ T29] audit: type=1326 audit(1750148596.706:60392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29525 comm="syz.1.9563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.942687][ T29] audit: type=1326 audit(1750148596.706:60393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29525 comm="syz.1.9563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.966862][ T29] audit: type=1326 audit(1750148596.706:60394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29525 comm="syz.1.9563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 557.997556][ T29] audit: type=1326 audit(1750148596.816:60395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29507 comm="syz.4.9558" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 558.021369][ T29] audit: type=1326 audit(1750148596.816:60396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29507 comm="syz.4.9558" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 558.099505][T29539] FAULT_INJECTION: forcing a failure. [ 558.099505][T29539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.112962][T29539] CPU: 0 UID: 0 PID: 29539 Comm: syz.2.9566 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 558.112996][T29539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 558.113012][T29539] Call Trace: [ 558.113019][T29539] [ 558.113026][T29539] __dump_stack+0x1d/0x30 [ 558.113049][T29539] dump_stack_lvl+0xe8/0x140 [ 558.113071][T29539] dump_stack+0x15/0x1b [ 558.113115][T29539] should_fail_ex+0x265/0x280 [ 558.113154][T29539] should_fail+0xb/0x20 [ 558.113186][T29539] should_fail_usercopy+0x1a/0x20 [ 558.113225][T29539] _copy_from_user+0x1c/0xb0 [ 558.113308][T29539] __sys_bpf+0x178/0x790 [ 558.113353][T29539] __x64_sys_bpf+0x41/0x50 [ 558.113387][T29539] x64_sys_call+0x2478/0x2fb0 [ 558.113414][T29539] do_syscall_64+0xd2/0x200 [ 558.113451][T29539] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 558.113485][T29539] ? clear_bhb_loop+0x40/0x90 [ 558.113517][T29539] ? clear_bhb_loop+0x40/0x90 [ 558.113546][T29539] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 558.113572][T29539] RIP: 0033:0x7fbb430ae929 [ 558.113590][T29539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.113611][T29539] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 558.113707][T29539] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 558.113722][T29539] RDX: 0000000000000004 RSI: 00002000000001c0 RDI: 0000000000000022 [ 558.113737][T29539] RBP: 00007fbb41717090 R08: 0000000000000000 R09: 0000000000000000 [ 558.113857][T29539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.113919][T29539] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 558.113941][T29539] [ 558.308542][T29542] __nla_validate_parse: 2 callbacks suppressed [ 558.308564][T29542] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9565'. [ 558.370058][T29536] vhci_hcd: invalid port number 96 [ 558.373789][T29545] serio: Serial port ptm1 [ 558.375368][T29536] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 558.459886][T29555] FAULT_INJECTION: forcing a failure. [ 558.459886][T29555] name failslab, interval 1, probability 0, space 0, times 0 [ 558.472982][T29555] CPU: 0 UID: 0 PID: 29555 Comm: syz.2.9572 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 558.473019][T29555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 558.473032][T29555] Call Trace: [ 558.473039][T29555] [ 558.473047][T29555] __dump_stack+0x1d/0x30 [ 558.473099][T29555] dump_stack_lvl+0xe8/0x140 [ 558.473139][T29555] dump_stack+0x15/0x1b [ 558.473158][T29555] should_fail_ex+0x265/0x280 [ 558.473192][T29555] should_failslab+0x8c/0xb0 [ 558.473224][T29555] __kmalloc_node_noprof+0xa9/0x410 [ 558.473335][T29555] ? load_msg+0x41/0x2f0 [ 558.473359][T29555] ? get_pid_task+0x96/0xd0 [ 558.473380][T29555] load_msg+0x41/0x2f0 [ 558.473402][T29555] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 558.473427][T29555] ? vfs_write+0x75e/0x8e0 [ 558.473500][T29555] do_mq_timedsend+0x23e/0x6b0 [ 558.473540][T29555] __x64_sys_mq_timedsend+0xd1/0x160 [ 558.473569][T29555] x64_sys_call+0x2db9/0x2fb0 [ 558.473605][T29555] do_syscall_64+0xd2/0x200 [ 558.473628][T29555] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 558.473672][T29555] ? clear_bhb_loop+0x40/0x90 [ 558.473696][T29555] ? clear_bhb_loop+0x40/0x90 [ 558.473724][T29555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 558.473750][T29555] RIP: 0033:0x7fbb430ae929 [ 558.473771][T29555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.473794][T29555] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f2 [ 558.473817][T29555] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 558.473833][T29555] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 558.473893][T29555] RBP: 00007fbb41717090 R08: 0000000000000000 R09: 0000000000000000 [ 558.473908][T29555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.473924][T29555] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 558.473952][T29555] [ 558.731097][T29562] siw: device registration error -23 [ 558.756120][T29562] SELinux: policydb magic number 0x6b7a7973 does not match expected magic number 0xf97cff8c [ 558.768370][T29562] SELinux: failed to load policy [ 558.794415][T29569] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9576'. [ 558.818156][T29569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=29569 comm=syz.0.9576 [ 558.918326][T29577] SELinux: policydb magic number 0x6c65732f does not match expected magic number 0xf97cff8c [ 558.931054][T29577] SELinux: failed to load policy [ 558.998134][T29589] vhci_hcd: invalid port number 96 [ 559.003447][T29589] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 559.039118][T29598] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9581'. [ 559.175728][T29603] syzkaller0: entered promiscuous mode [ 559.181616][T29603] syzkaller0: entered allmulticast mode [ 559.362011][T29621] vhci_hcd: invalid port number 96 [ 559.367415][T29621] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 559.377836][T29625] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9594'. [ 559.427169][T29631] FAULT_INJECTION: forcing a failure. [ 559.427169][T29631] name failslab, interval 1, probability 0, space 0, times 0 [ 559.441034][T29631] CPU: 1 UID: 0 PID: 29631 Comm: syz.4.9596 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 559.441118][T29631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 559.441138][T29631] Call Trace: [ 559.441147][T29631] [ 559.441158][T29631] __dump_stack+0x1d/0x30 [ 559.441188][T29631] dump_stack_lvl+0xe8/0x140 [ 559.441212][T29631] dump_stack+0x15/0x1b [ 559.441265][T29631] should_fail_ex+0x265/0x280 [ 559.441309][T29631] should_failslab+0x8c/0xb0 [ 559.441341][T29631] kmem_cache_alloc_noprof+0x50/0x310 [ 559.441390][T29631] ? audit_log_start+0x365/0x6c0 [ 559.441437][T29631] audit_log_start+0x365/0x6c0 [ 559.441488][T29631] audit_seccomp+0x48/0x100 [ 559.441527][T29631] ? __seccomp_filter+0x68c/0x10d0 [ 559.441617][T29631] __seccomp_filter+0x69d/0x10d0 [ 559.441651][T29631] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 559.441679][T29631] ? vfs_write+0x75e/0x8e0 [ 559.441778][T29631] ? __rcu_read_unlock+0x4f/0x70 [ 559.441808][T29631] ? __fget_files+0x184/0x1c0 [ 559.441837][T29631] __secure_computing+0x82/0x150 [ 559.441871][T29631] syscall_trace_enter+0xcf/0x1e0 [ 559.441976][T29631] do_syscall_64+0xac/0x200 [ 559.442000][T29631] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 559.442036][T29631] ? clear_bhb_loop+0x40/0x90 [ 559.442065][T29631] ? clear_bhb_loop+0x40/0x90 [ 559.442164][T29631] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 559.442275][T29631] RIP: 0033:0x7fb860eee929 [ 559.442345][T29631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.442384][T29631] RSP: 002b:00007fb85f557038 EFLAGS: 00000246 ORIG_RAX: 0000000000000041 [ 559.442410][T29631] RAX: ffffffffffffffda RBX: 00007fb861115fa0 RCX: 00007fb860eee929 [ 559.442438][T29631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 559.442456][T29631] RBP: 00007fb85f557090 R08: 0000000000000000 R09: 0000000000000000 [ 559.442473][T29631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.442489][T29631] R13: 0000000000000000 R14: 00007fb861115fa0 R15: 00007ffe63a3f868 [ 559.442516][T29631] [ 559.739659][T29652] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9605'. [ 560.050240][T29662] netlink: 60 bytes leftover after parsing attributes in process `syz.3.9609'. [ 560.203860][T29668] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9612'. [ 560.422537][T29671] FAULT_INJECTION: forcing a failure. [ 560.422537][T29671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 560.437484][T29671] CPU: 0 UID: 0 PID: 29671 Comm: syz.1.9613 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 560.437596][T29671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 560.437611][T29671] Call Trace: [ 560.437618][T29671] [ 560.437626][T29671] __dump_stack+0x1d/0x30 [ 560.437648][T29671] dump_stack_lvl+0xe8/0x140 [ 560.437667][T29671] dump_stack+0x15/0x1b [ 560.437688][T29671] should_fail_ex+0x265/0x280 [ 560.437787][T29671] should_fail+0xb/0x20 [ 560.437878][T29671] should_fail_usercopy+0x1a/0x20 [ 560.437921][T29671] _copy_from_user+0x1c/0xb0 [ 560.437948][T29671] do_sock_getsockopt+0xf1/0x240 [ 560.438016][T29671] __x64_sys_getsockopt+0x11e/0x1a0 [ 560.438058][T29671] x64_sys_call+0x12aa/0x2fb0 [ 560.438088][T29671] do_syscall_64+0xd2/0x200 [ 560.438111][T29671] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 560.438149][T29671] ? clear_bhb_loop+0x40/0x90 [ 560.438176][T29671] ? clear_bhb_loop+0x40/0x90 [ 560.438254][T29671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 560.438309][T29671] RIP: 0033:0x7f22ef27e929 [ 560.438325][T29671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.438349][T29671] RSP: 002b:00007f22ed8c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 560.438374][T29671] RAX: ffffffffffffffda RBX: 00007f22ef4a6080 RCX: 00007f22ef27e929 [ 560.438451][T29671] RDX: 0000000000000008 RSI: 000000000000011b RDI: 000000000000000e [ 560.438467][T29671] RBP: 00007f22ed8c6090 R08: 0000200000000040 R09: 0000000000000000 [ 560.438559][T29671] R10: 0000200000003140 R11: 0000000000000246 R12: 0000000000000001 [ 560.438574][T29671] R13: 0000000000000000 R14: 00007f22ef4a6080 R15: 00007ffd2e5a0fd8 [ 560.438600][T29671] [ 560.776502][T29688] xt_TCPMSS: Only works on TCP SYN packets [ 560.952738][T29692] syzkaller0: entered promiscuous mode [ 560.958323][T29692] syzkaller0: entered allmulticast mode [ 561.244388][T29728] syzkaller0: entered promiscuous mode [ 561.250167][T29728] syzkaller0: entered allmulticast mode [ 561.692540][T29745] netlink: 'syz.0.9624': attribute type 2 has an invalid length. [ 561.714896][T29745] netlink: 'syz.0.9624': attribute type 83 has an invalid length. [ 561.825259][T29747] netlink: 60 bytes leftover after parsing attributes in process `syz.2.9625'. [ 561.833657][T29751] SELinux: failed to load policy [ 561.846067][T29751] netlink: 'syz.4.9627': attribute type 4 has an invalid length. [ 561.956581][T29753] xt_hashlimit: max too large, truncated to 1048576 [ 562.073185][T29759] SELinux: failed to load policy [ 562.085783][T29759] netlink: 'syz.1.9630': attribute type 4 has an invalid length. [ 562.274639][T29777] SELinux: failed to load policy [ 562.323062][T29773] syzkaller0: entered promiscuous mode [ 562.328661][T29773] syzkaller0: entered allmulticast mode [ 562.337009][T29777] netlink: 'syz.3.9638': attribute type 4 has an invalid length. [ 562.402648][T29784] netlink: 60 bytes leftover after parsing attributes in process `syz.1.9641'. [ 562.487021][T29786] syzkaller0: entered promiscuous mode [ 562.492554][T29786] syzkaller0: entered allmulticast mode [ 562.677814][ T29] kauditd_printk_skb: 260 callbacks suppressed [ 562.677830][ T29] audit: type=1326 audit(1750148601.496:60655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.719162][ T29] audit: type=1326 audit(1750148601.496:60656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.743114][ T29] audit: type=1326 audit(1750148601.496:60657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=141 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.767941][ T29] audit: type=1326 audit(1750148601.496:60658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.792881][ T29] audit: type=1326 audit(1750148601.496:60659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.817548][ T29] audit: type=1326 audit(1750148601.496:60660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.841934][ T29] audit: type=1326 audit(1750148601.496:60661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.866235][ T29] audit: type=1326 audit(1750148601.496:60662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.890275][ T29] audit: type=1326 audit(1750148601.496:60663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.914940][ T29] audit: type=1326 audit(1750148601.496:60664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29796 comm="syz.2.9646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 562.982614][T29809] netlink: 60 bytes leftover after parsing attributes in process `syz.3.9650'. [ 563.029993][T29811] vhci_hcd: invalid port number 96 [ 563.035278][T29811] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 563.139362][T29816] syzkaller0: entered promiscuous mode [ 563.144972][T29816] syzkaller0: entered allmulticast mode [ 563.258470][T29831] siw: device registration error -23 [ 563.309717][T29831] SELinux: failed to load policy [ 563.429578][T29842] syzkaller0: entered promiscuous mode [ 563.435159][T29842] syzkaller0: entered allmulticast mode [ 563.608684][T29851] syzkaller0: entered promiscuous mode [ 563.614304][T29851] syzkaller0: entered allmulticast mode [ 564.128018][T29897] SELinux: failed to load policy [ 564.173001][T29892] syzkaller0: entered promiscuous mode [ 564.178787][T29892] syzkaller0: entered allmulticast mode [ 564.186556][T29897] netlink: 'syz.3.9680': attribute type 4 has an invalid length. [ 564.336594][T29916] __nla_validate_parse: 1 callbacks suppressed [ 564.336688][T29916] netlink: 60 bytes leftover after parsing attributes in process `syz.3.9689'. [ 564.523961][T29926] syzkaller0: entered promiscuous mode [ 564.529599][T29926] syzkaller0: entered allmulticast mode [ 564.623648][T29939] SELinux: failed to load policy [ 564.633249][T29939] netlink: 'syz.0.9699': attribute type 4 has an invalid length. [ 564.876712][T29957] netlink: 'syz.0.9708': attribute type 9 has an invalid length. [ 564.988485][T29980] SELinux: failed to load policy [ 564.998849][T29980] netlink: 'syz.0.9714': attribute type 4 has an invalid length. [ 565.247824][T30018] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 565.256123][T30018] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 565.306488][T30027] SELinux: failed to load policy [ 565.319279][T30027] netlink: 'syz.0.9730': attribute type 4 has an invalid length. [ 565.400344][T30041] netlink: 60 bytes leftover after parsing attributes in process `syz.2.9733'. [ 565.423771][T30045] netlink: 60 bytes leftover after parsing attributes in process `syz.4.9735'. [ 566.092180][T30060] syzkaller0: entered promiscuous mode [ 566.092279][T30067] SELinux: failed to load policy [ 566.097878][T30060] syzkaller0: entered allmulticast mode [ 566.453747][T30103] SELinux: failed to load policy [ 566.619087][T30116] netlink: 40 bytes leftover after parsing attributes in process `syz.2.9759'. [ 566.644475][T30116] geneve1: entered promiscuous mode [ 566.650623][T30116] geneve1: entered allmulticast mode [ 566.659822][T30116] team0: Port device geneve1 added [ 566.755025][T30126] FAULT_INJECTION: forcing a failure. [ 566.755025][T30126] name failslab, interval 1, probability 0, space 0, times 0 [ 566.768314][T30126] CPU: 1 UID: 0 PID: 30126 Comm: syz.4.9765 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 566.768359][T30126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 566.768374][T30126] Call Trace: [ 566.768382][T30126] [ 566.768392][T30126] __dump_stack+0x1d/0x30 [ 566.768416][T30126] dump_stack_lvl+0xe8/0x140 [ 566.768438][T30126] dump_stack+0x15/0x1b [ 566.768468][T30126] should_fail_ex+0x265/0x280 [ 566.768526][T30126] should_failslab+0x8c/0xb0 [ 566.768555][T30126] __kvmalloc_node_noprof+0x123/0x4e0 [ 566.768591][T30126] ? nf_hook_entries_grow+0x1bc/0x450 [ 566.768629][T30126] ? xas_load+0x413/0x430 [ 566.768689][T30126] nf_hook_entries_grow+0x1bc/0x450 [ 566.768778][T30126] ? pcpu_block_refresh_hint+0x10b/0x170 [ 566.768803][T30126] __nf_register_net_hook+0x18e/0x480 [ 566.768847][T30126] nf_register_net_hook+0x88/0x130 [ 566.768901][T30126] nf_register_net_hooks+0x44/0x150 [ 566.768998][T30126] nf_defrag_ipv4_enable+0x6e/0xc0 [ 566.769028][T30126] tproxy_tg4_check+0x2d/0x100 [ 566.769054][T30126] xt_check_target+0x28d/0x4c0 [ 566.769141][T30126] ? strnlen+0x28/0x50 [ 566.769164][T30126] ? strcmp+0x22/0x50 [ 566.769187][T30126] ? xt_find_target+0x1cd/0x200 [ 566.769223][T30126] translate_table+0xc31/0xf90 [ 566.769323][T30126] do_ipt_set_ctl+0x66f/0x820 [ 566.769360][T30126] nf_setsockopt+0x199/0x1b0 [ 566.769387][T30126] ip_setsockopt+0x102/0x110 [ 566.769501][T30126] udp_setsockopt+0x99/0xb0 [ 566.769527][T30126] sock_common_setsockopt+0x66/0x80 [ 566.769554][T30126] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 566.769584][T30126] __sys_setsockopt+0x181/0x200 [ 566.769692][T30126] __x64_sys_setsockopt+0x64/0x80 [ 566.769730][T30126] x64_sys_call+0x2bd5/0x2fb0 [ 566.769750][T30126] do_syscall_64+0xd2/0x200 [ 566.769790][T30126] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 566.769822][T30126] ? clear_bhb_loop+0x40/0x90 [ 566.769929][T30126] ? clear_bhb_loop+0x40/0x90 [ 566.769956][T30126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 566.769982][T30126] RIP: 0033:0x7fb860eee929 [ 566.770001][T30126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.770023][T30126] RSP: 002b:00007fb85f557038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 566.770077][T30126] RAX: ffffffffffffffda RBX: 00007fb861115fa0 RCX: 00007fb860eee929 [ 566.770092][T30126] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 566.770107][T30126] RBP: 00007fb85f557090 R08: 0000000000000570 R09: 0000000000000000 [ 566.770123][T30126] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000001 [ 566.770138][T30126] R13: 0000000000000000 R14: 00007fb861115fa0 R15: 00007ffe63a3f868 [ 566.770217][T30126] [ 567.097928][T30137] SELinux: failed to load policy [ 567.108383][T30137] validate_nla: 3 callbacks suppressed [ 567.108401][T30137] netlink: 'syz.4.9769': attribute type 4 has an invalid length. [ 567.260839][T30153] FAULT_INJECTION: forcing a failure. [ 567.260839][T30153] name failslab, interval 1, probability 0, space 0, times 0 [ 567.273582][T30153] CPU: 0 UID: 0 PID: 30153 Comm: syz.1.9774 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 567.273654][T30153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 567.273667][T30153] Call Trace: [ 567.273675][T30153] [ 567.273684][T30153] __dump_stack+0x1d/0x30 [ 567.273705][T30153] dump_stack_lvl+0xe8/0x140 [ 567.273725][T30153] dump_stack+0x15/0x1b [ 567.273743][T30153] should_fail_ex+0x265/0x280 [ 567.273854][T30153] should_failslab+0x8c/0xb0 [ 567.273879][T30153] kmem_cache_alloc_noprof+0x50/0x310 [ 567.273910][T30153] ? alloc_empty_file+0x76/0x200 [ 567.274016][T30153] alloc_empty_file+0x76/0x200 [ 567.274048][T30153] alloc_file_pseudo+0xc6/0x160 [ 567.274085][T30153] __shmem_file_setup+0x1de/0x210 [ 567.274158][T30153] shmem_file_setup+0x3b/0x50 [ 567.274186][T30153] __se_sys_memfd_create+0x2c3/0x590 [ 567.274269][T30153] __x64_sys_memfd_create+0x31/0x40 [ 567.274343][T30153] x64_sys_call+0x122f/0x2fb0 [ 567.274369][T30153] do_syscall_64+0xd2/0x200 [ 567.274391][T30153] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 567.274480][T30153] ? clear_bhb_loop+0x40/0x90 [ 567.274508][T30153] ? clear_bhb_loop+0x40/0x90 [ 567.274534][T30153] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 567.274561][T30153] RIP: 0033:0x7f22ef27e929 [ 567.274640][T30153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.274658][T30153] RSP: 002b:00007f22ed8e6d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 567.274678][T30153] RAX: ffffffffffffffda RBX: 0000000000001060 RCX: 00007f22ef27e929 [ 567.274694][T30153] RDX: 00007f22ed8e6dec RSI: 0000000000000000 RDI: 00007f22ef3014cc [ 567.274709][T30153] RBP: 0000200000000000 R08: 00007f22ed8e6b07 R09: 0000000000000000 [ 567.274789][T30153] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 567.274859][T30153] R13: 00007f22ed8e6dec R14: 00007f22ed8e6df0 R15: 00007ffd2e5a0fd8 [ 567.274881][T30153] [ 567.574582][T30168] netlink: 60 bytes leftover after parsing attributes in process `syz.2.9781'. [ 567.689643][ T29] kauditd_printk_skb: 1132 callbacks suppressed [ 567.689700][ T29] audit: type=1326 audit(1750148606.506:61797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30187 comm="syz.4.9785" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 567.736504][ T29] audit: type=1326 audit(1750148606.546:61798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30187 comm="syz.4.9785" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 567.760519][ T29] audit: type=1326 audit(1750148606.546:61799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30187 comm="syz.4.9785" exe="/root/syz-executor" sig=0 arch=c000003e syscall=158 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 567.785090][ T29] audit: type=1326 audit(1750148606.546:61800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30187 comm="syz.4.9785" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 567.809242][ T29] audit: type=1326 audit(1750148606.546:61801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30187 comm="syz.4.9785" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 568.000487][T30219] netlink: 76 bytes leftover after parsing attributes in process `syz.1.9789'. [ 568.022714][T30222] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9787'. [ 568.040012][T30222] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 568.048947][T30222] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 568.057813][T30222] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 568.067119][T30222] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 568.071884][T30226] FAULT_INJECTION: forcing a failure. [ 568.071884][T30226] name failslab, interval 1, probability 0, space 0, times 0 [ 568.081997][T30222] vxlan0: entered promiscuous mode [ 568.088944][T30226] CPU: 1 UID: 0 PID: 30226 Comm: syz.4.9792 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 568.089073][T30226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 568.089094][T30226] Call Trace: [ 568.089103][T30226] [ 568.089114][T30226] __dump_stack+0x1d/0x30 [ 568.089149][T30226] dump_stack_lvl+0xe8/0x140 [ 568.089176][T30226] dump_stack+0x15/0x1b [ 568.089200][T30226] should_fail_ex+0x265/0x280 [ 568.089242][T30226] ? v9fs_mount+0x51/0x590 [ 568.089283][T30226] should_failslab+0x8c/0xb0 [ 568.089392][T30226] __kmalloc_cache_noprof+0x4c/0x320 [ 568.089435][T30226] v9fs_mount+0x51/0x590 [ 568.089475][T30226] ? __pfx_v9fs_mount+0x10/0x10 [ 568.089517][T30226] legacy_get_tree+0x75/0xd0 [ 568.089616][T30226] vfs_get_tree+0x57/0x1d0 [ 568.089641][T30226] do_new_mount+0x207/0x680 [ 568.089719][T30226] path_mount+0x4a4/0xb20 [ 568.089798][T30226] ? user_path_at+0x109/0x130 [ 568.089835][T30226] __se_sys_mount+0x28f/0x2e0 [ 568.089860][T30226] ? fput+0x8f/0xc0 [ 568.089963][T30226] __x64_sys_mount+0x67/0x80 [ 568.089988][T30226] x64_sys_call+0xd36/0x2fb0 [ 568.090019][T30226] do_syscall_64+0xd2/0x200 [ 568.090044][T30226] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 568.090079][T30226] ? clear_bhb_loop+0x40/0x90 [ 568.090109][T30226] ? clear_bhb_loop+0x40/0x90 [ 568.090171][T30226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 568.090201][T30226] RIP: 0033:0x7fb860eee929 [ 568.090231][T30226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.090257][T30226] RSP: 002b:00007fb85f557038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 568.090282][T30226] RAX: ffffffffffffffda RBX: 00007fb861115fa0 RCX: 00007fb860eee929 [ 568.090368][T30226] RDX: 0000200000000180 RSI: 0000200000000000 RDI: 0000000000000000 [ 568.090380][T30226] RBP: 00007fb85f557090 R08: 0000200000000080 R09: 0000000000000000 [ 568.090391][T30226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.090403][T30226] R13: 0000000000000000 R14: 00007fb861115fa0 R15: 00007ffe63a3f868 [ 568.090440][T30226] [ 568.150003][T30229] SELinux: failed to load policy [ 568.324582][ T29] audit: type=1326 audit(1750148607.136:61802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30231 comm="syz.4.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 568.348384][ T29] audit: type=1326 audit(1750148607.136:61803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30231 comm="syz.4.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 568.372113][ T29] audit: type=1326 audit(1750148607.136:61804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30231 comm="syz.4.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 568.379737][T30237] netlink: 60 bytes leftover after parsing attributes in process `syz.1.9796'. [ 568.396156][ T29] audit: type=1326 audit(1750148607.136:61805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30231 comm="syz.4.9794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 568.430438][T30229] netlink: 'syz.0.9795': attribute type 4 has an invalid length. [ 568.462385][ T29] audit: type=1326 audit(1750148607.276:61806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30238 comm="syz.2.9797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb430ae929 code=0x7ffc0000 [ 568.506824][T30243] FAULT_INJECTION: forcing a failure. [ 568.506824][T30243] name failslab, interval 1, probability 0, space 0, times 0 [ 568.519548][T30243] CPU: 1 UID: 0 PID: 30243 Comm: syz.2.9799 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 568.519634][T30243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 568.519650][T30243] Call Trace: [ 568.519658][T30243] [ 568.519668][T30243] __dump_stack+0x1d/0x30 [ 568.519692][T30243] dump_stack_lvl+0xe8/0x140 [ 568.519712][T30243] dump_stack+0x15/0x1b [ 568.519729][T30243] should_fail_ex+0x265/0x280 [ 568.519769][T30243] should_failslab+0x8c/0xb0 [ 568.519794][T30243] kmem_cache_alloc_node_noprof+0x57/0x320 [ 568.519878][T30243] ? __alloc_skb+0x101/0x320 [ 568.519911][T30243] __alloc_skb+0x101/0x320 [ 568.519942][T30243] netlink_alloc_large_skb+0xba/0xf0 [ 568.519975][T30243] netlink_sendmsg+0x3cf/0x6b0 [ 568.520031][T30243] ? __pfx_netlink_sendmsg+0x10/0x10 [ 568.520052][T30243] __sock_sendmsg+0x142/0x180 [ 568.520079][T30243] ____sys_sendmsg+0x31e/0x4e0 [ 568.520169][T30243] ___sys_sendmsg+0x17b/0x1d0 [ 568.520301][T30243] __x64_sys_sendmsg+0xd4/0x160 [ 568.520326][T30243] x64_sys_call+0x2999/0x2fb0 [ 568.520361][T30243] do_syscall_64+0xd2/0x200 [ 568.520381][T30243] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 568.520420][T30243] ? clear_bhb_loop+0x40/0x90 [ 568.520443][T30243] ? clear_bhb_loop+0x40/0x90 [ 568.520474][T30243] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 568.520496][T30243] RIP: 0033:0x7fbb430ae929 [ 568.520512][T30243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.520603][T30243] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 568.520623][T30243] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 568.520635][T30243] RDX: 0000000000020000 RSI: 0000200000000cc0 RDI: 0000000000000006 [ 568.520647][T30243] RBP: 00007fbb41717090 R08: 0000000000000000 R09: 0000000000000000 [ 568.520679][T30243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.520693][T30243] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 568.520718][T30243] [ 569.218747][T30277] siw: device registration error -23 [ 569.372543][T30280] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 569.381305][T30280] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 569.482355][T30277] SELinux: failed to load policy [ 569.533172][T30284] netlink: 60 bytes leftover after parsing attributes in process `syz.1.9808'. [ 569.848285][T30304] netlink: 76 bytes leftover after parsing attributes in process `syz.0.9815'. [ 569.924104][T30314] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9817'. [ 570.025666][T30326] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 570.034088][T30326] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 570.060997][T30328] siw: device registration error -23 [ 570.102597][T30328] SELinux: failed to load policy [ 570.239772][T30343] netlink: 16 bytes leftover after parsing attributes in process `syz.2.9826'. [ 570.422112][T30361] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 570.430861][T30361] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 570.441322][T30364] siw: device registration error -23 [ 570.480119][T30367] netlink: 'syz.1.9832': attribute type 1 has an invalid length. [ 570.514877][T30364] SELinux: failed to load policy [ 570.547621][T30375] netlink: 'syz.1.9833': attribute type 1 has an invalid length. [ 570.580954][T30375] FAULT_INJECTION: forcing a failure. [ 570.580954][T30375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.582054][T30380] 9pnet: Could not find request transport: 0xffffffffffffffff [ 570.594214][T30375] CPU: 1 UID: 0 PID: 30375 Comm: syz.1.9833 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 570.594247][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 570.594322][T30375] Call Trace: [ 570.594333][T30375] [ 570.594344][T30375] __dump_stack+0x1d/0x30 [ 570.594375][T30375] dump_stack_lvl+0xe8/0x140 [ 570.594405][T30375] dump_stack+0x15/0x1b [ 570.594453][T30375] should_fail_ex+0x265/0x280 [ 570.594497][T30375] should_fail+0xb/0x20 [ 570.594535][T30375] should_fail_usercopy+0x1a/0x20 [ 570.594643][T30375] strncpy_from_user+0x25/0x230 [ 570.594693][T30375] __se_sys_memfd_create+0x1ff/0x590 [ 570.594744][T30375] __x64_sys_memfd_create+0x31/0x40 [ 570.594823][T30375] x64_sys_call+0x122f/0x2fb0 [ 570.594852][T30375] do_syscall_64+0xd2/0x200 [ 570.594919][T30375] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 570.595047][T30375] ? clear_bhb_loop+0x40/0x90 [ 570.595077][T30375] ? clear_bhb_loop+0x40/0x90 [ 570.595150][T30375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 570.595179][T30375] RIP: 0033:0x7f22ef27e929 [ 570.595200][T30375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.595227][T30375] RSP: 002b:00007f22ed8e6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 570.595253][T30375] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007f22ef27e929 [ 570.595271][T30375] RDX: 00007f22ed8e6ef0 RSI: 0000000000000000 RDI: 00007f22ef3014cc [ 570.595290][T30375] RBP: 0000200000000180 R08: 00007f22ed8e6bb7 R09: 00007f22ed8e6e40 [ 570.595308][T30375] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 570.595325][T30375] R13: 00007f22ed8e6ef0 R14: 00007f22ed8e6eb0 R15: 0000200000000940 [ 570.595372][T30375] [ 570.824373][T30388] netlink: 16 bytes leftover after parsing attributes in process `syz.1.9837'. [ 570.855761][T30392] netlink: 60 bytes leftover after parsing attributes in process `syz.1.9839'. [ 571.090804][T30405] syzkaller0: entered promiscuous mode [ 571.096697][T30405] syzkaller0: entered allmulticast mode [ 571.139589][T30411] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 571.147880][T30411] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 571.255728][T30417] syzkaller0: entered promiscuous mode [ 571.261301][T30417] syzkaller0: entered allmulticast mode [ 571.336703][T30433] 9pnet_fd: Insufficient options for proto=fd [ 571.503106][T30442] netlink: 60 bytes leftover after parsing attributes in process `syz.3.9850'. [ 571.862766][T30449] netlink: 16 bytes leftover after parsing attributes in process `syz.1.9851'. [ 571.973209][T30459] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 571.981538][T30459] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 572.029172][T30465] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 572.037900][T30465] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 572.138197][T30481] netlink: 60 bytes leftover after parsing attributes in process `syz.4.9861'. [ 572.293524][T30490] SELinux: failed to load policy [ 572.315947][T30492] netlink: 16 bytes leftover after parsing attributes in process `syz.0.9864'. [ 572.401137][T30496] syzkaller0: entered promiscuous mode [ 572.407046][T30496] syzkaller0: entered allmulticast mode [ 572.414189][T30501] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 572.422611][T30501] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 572.702882][ T29] kauditd_printk_skb: 966 callbacks suppressed [ 572.702902][ T29] audit: type=1326 audit(1750148611.517:62773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f22ef2758e7 code=0x7ffc0000 [ 572.735468][ T29] audit: type=1326 audit(1750148611.517:62774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f22ef21ab19 code=0x7ffc0000 [ 572.759516][ T29] audit: type=1326 audit(1750148611.517:62775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 572.783233][ T29] audit: type=1326 audit(1750148611.527:62776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f22ef2758e7 code=0x7ffc0000 [ 572.807142][ T29] audit: type=1326 audit(1750148611.527:62777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f22ef21ab19 code=0x7ffc0000 [ 572.830708][ T29] audit: type=1326 audit(1750148611.527:62778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 572.854513][ T29] audit: type=1326 audit(1750148611.547:62779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f22ef2758e7 code=0x7ffc0000 [ 572.878319][ T29] audit: type=1326 audit(1750148611.547:62780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f22ef21ab19 code=0x7ffc0000 [ 572.902456][ T29] audit: type=1326 audit(1750148611.547:62781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 572.927423][ T29] audit: type=1326 audit(1750148611.587:62782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30486 comm="syz.1.9862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f22ef2758e7 code=0x7ffc0000 [ 572.940845][T30539] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 572.959905][T30539] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 573.004128][T30541] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 573.004128][T30541] program syz.2.9880 not setting count and/or reply_len properly [ 573.247149][T30566] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 573.255465][T30566] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 573.302504][T30576] SELinux: failed to load policy [ 573.334330][T30576] netlink: 'syz.2.9893': attribute type 4 has an invalid length. [ 573.381043][T30584] openvswitch: netlink: Message has 6 unknown bytes. [ 573.408097][T30588] vhci_hcd: default hub control req: 2317 v0040 i0002 l0 [ 573.495445][T30605] FAULT_INJECTION: forcing a failure. [ 573.495445][T30605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.508816][T30605] CPU: 0 UID: 0 PID: 30605 Comm: syz.2.9901 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 573.508851][T30605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 573.508884][T30605] Call Trace: [ 573.508890][T30605] [ 573.508899][T30605] __dump_stack+0x1d/0x30 [ 573.508925][T30605] dump_stack_lvl+0xe8/0x140 [ 573.508956][T30605] dump_stack+0x15/0x1b [ 573.508977][T30605] should_fail_ex+0x265/0x280 [ 573.509010][T30605] should_fail+0xb/0x20 [ 573.509054][T30605] should_fail_usercopy+0x1a/0x20 [ 573.509085][T30605] _copy_from_user+0x1c/0xb0 [ 573.509106][T30605] memdup_user+0x5e/0xd0 [ 573.509129][T30605] strndup_user+0x68/0xb0 [ 573.509223][T30605] __se_sys_mount+0x4d/0x2e0 [ 573.509250][T30605] ? fput+0x8f/0xc0 [ 573.509279][T30605] ? ksys_write+0x192/0x1a0 [ 573.509302][T30605] __x64_sys_mount+0x67/0x80 [ 573.509325][T30605] x64_sys_call+0xd36/0x2fb0 [ 573.509400][T30605] do_syscall_64+0xd2/0x200 [ 573.509444][T30605] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 573.509472][T30605] ? clear_bhb_loop+0x40/0x90 [ 573.509492][T30605] ? clear_bhb_loop+0x40/0x90 [ 573.509609][T30605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.509634][T30605] RIP: 0033:0x7fbb430ae929 [ 573.509649][T30605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.509671][T30605] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 573.509695][T30605] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 573.509711][T30605] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 573.509727][T30605] RBP: 00007fbb41717090 R08: 0000200000000240 R09: 0000000000000000 [ 573.509743][T30605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.509765][T30605] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 573.509789][T30605] [ 573.823252][T30608] syzkaller0: entered promiscuous mode [ 573.829045][T30608] syzkaller0: entered allmulticast mode [ 573.841453][T30612] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 573.850011][T30612] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 573.912967][T30621] SELinux: failed to load policy [ 573.923400][T30621] netlink: 'syz.2.9909': attribute type 4 has an invalid length. [ 573.952047][T30625] sctp: [Deprecated]: syz.1.9912 (pid 30625) Use of int in max_burst socket option. [ 573.952047][T30625] Use struct sctp_assoc_value instead [ 573.992845][T30625] lo speed is unknown, defaulting to 1000 [ 574.067765][T30625] lo speed is unknown, defaulting to 1000 [ 574.182946][T30650] openvswitch: netlink: Message has 6 unknown bytes. [ 574.204079][T30650] netlink: 'syz.1.9916': attribute type 10 has an invalid length. [ 574.212299][T30650] veth1_macvtap: left promiscuous mode [ 574.222631][T30650] batman_adv: batadv0: Adding interface: macsec0 [ 574.229149][T30650] batman_adv: batadv0: The MTU of interface macsec0 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 574.255065][T30650] batman_adv: batadv0: Not using interface macsec0 (retrying later): interface not active [ 574.372704][T30668] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 574.381266][T30668] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 574.423219][T30673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11800 sclass=netlink_route_socket pid=30673 comm=syz.3.9924 [ 574.519434][T30678] SELinux: failed to load policy [ 574.532166][T30678] netlink: 'syz.4.9927': attribute type 4 has an invalid length. [ 574.615082][T30687] siw: device registration error -23 [ 574.941647][T30702] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 574.950055][T30702] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 575.145660][T30706] __nla_validate_parse: 8 callbacks suppressed [ 575.145680][T30706] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9938'. [ 575.267288][T30727] siw: device registration error -23 [ 575.299102][T30710] workqueue: Failed to create a rescuer kthread for wq "nfc7_nci_rx_wq": -EINTR [ 575.329621][T30727] SELinux: failed to load policy [ 575.411744][T30742] SELinux: failed to load policy [ 575.493333][T30735] syzkaller0: entered promiscuous mode [ 575.499001][T30735] syzkaller0: entered allmulticast mode [ 575.589971][T30742] netlink: 'syz.2.9945': attribute type 4 has an invalid length. [ 575.653207][T30750] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 575.661621][T30750] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 575.809989][T30756] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9951'. [ 575.883149][T30758] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9952'. [ 575.900908][T30758] netlink: 32 bytes leftover after parsing attributes in process `syz.0.9952'. [ 575.913455][T30758] 9pnet_fd: Insufficient options for proto=fd [ 576.061401][T30768] SELinux: failed to load policy [ 576.915681][T30791] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9964'. [ 576.948427][T30793] FAULT_INJECTION: forcing a failure. [ 576.948427][T30793] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 576.961683][T30793] CPU: 0 UID: 0 PID: 30793 Comm: syz.0.9965 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 576.961751][T30793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 576.961802][T30793] Call Trace: [ 576.961811][T30793] [ 576.961845][T30793] __dump_stack+0x1d/0x30 [ 576.961872][T30793] dump_stack_lvl+0xe8/0x140 [ 576.961892][T30793] dump_stack+0x15/0x1b [ 576.961907][T30793] should_fail_ex+0x265/0x280 [ 576.961939][T30793] should_fail+0xb/0x20 [ 576.962051][T30793] should_fail_usercopy+0x1a/0x20 [ 576.962086][T30793] _copy_from_user+0x1c/0xb0 [ 576.962106][T30793] __copy_msghdr+0x244/0x300 [ 576.962192][T30793] ___sys_sendmsg+0x109/0x1d0 [ 576.962270][T30793] __x64_sys_sendmsg+0xd4/0x160 [ 576.962336][T30793] x64_sys_call+0x2999/0x2fb0 [ 576.962362][T30793] do_syscall_64+0xd2/0x200 [ 576.962386][T30793] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 576.962455][T30793] ? clear_bhb_loop+0x40/0x90 [ 576.962480][T30793] ? clear_bhb_loop+0x40/0x90 [ 576.962504][T30793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.962531][T30793] RIP: 0033:0x7ff0d92ee929 [ 576.962609][T30793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.962632][T30793] RSP: 002b:00007ff0d7957038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 576.962655][T30793] RAX: ffffffffffffffda RBX: 00007ff0d9515fa0 RCX: 00007ff0d92ee929 [ 576.962668][T30793] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000000000000007 [ 576.962684][T30793] RBP: 00007ff0d7957090 R08: 0000000000000000 R09: 0000000000000000 [ 576.962700][T30793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.962713][T30793] R13: 0000000000000000 R14: 00007ff0d9515fa0 R15: 00007ffd25adedd8 [ 576.962733][T30793] [ 577.249122][T30795] SELinux: Context system_u:object_r:hwdata_t:s0 is not valid (left unmapped). [ 577.287917][T30799] netlink: 'syz.1.9968': attribute type 10 has an invalid length. [ 577.315441][T30799] batman_adv: batadv0: Adding interface: team0 [ 577.321682][T30799] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 577.346996][T30799] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 577.399482][T30799] netlink: 'syz.1.9968': attribute type 10 has an invalid length. [ 577.407635][T30799] netlink: 2 bytes leftover after parsing attributes in process `syz.1.9968'. [ 577.423681][T30799] team0: entered promiscuous mode [ 577.449309][T30799] team_slave_0: entered promiscuous mode [ 577.455125][T30799] team_slave_1: entered promiscuous mode [ 577.468731][T30799] 8021q: adding VLAN 0 to HW filter on device team0 [ 577.495750][T30799] batman_adv: batadv0: Interface activated: team0 [ 577.502451][T30799] batman_adv: batadv0: Interface deactivated: team0 [ 577.509265][T30799] batman_adv: batadv0: Removing interface: team0 [ 577.529706][T30799] bridge0: port 3(team0) entered blocking state [ 577.536079][T30799] bridge0: port 3(team0) entered disabled state [ 577.550890][T30799] team0: entered allmulticast mode [ 577.564960][T30799] team_slave_0: entered allmulticast mode [ 577.570806][T30799] team_slave_1: entered allmulticast mode [ 577.590723][T30799] bridge0: port 3(team0) entered blocking state [ 577.597512][T30799] bridge0: port 3(team0) entered forwarding state [ 577.690668][T30824] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9976'. [ 577.712349][ T29] kauditd_printk_skb: 527 callbacks suppressed [ 577.712364][ T29] audit: type=1326 audit(1750148616.527:63310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30823 comm="syz.1.9975" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 577.743012][ T29] audit: type=1326 audit(1750148616.527:63311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30823 comm="syz.1.9975" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 577.766670][ T29] audit: type=1326 audit(1750148616.527:63312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30823 comm="syz.1.9975" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 577.790655][ T29] audit: type=1326 audit(1750148616.527:63313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30823 comm="syz.1.9975" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 577.814906][ T29] audit: type=1326 audit(1750148616.527:63314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30823 comm="syz.1.9975" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x7ffc0000 [ 577.888611][ T29] audit: type=1326 audit(1750148616.707:63315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30835 comm="syz.0.9979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 577.918235][ T29] audit: type=1326 audit(1750148616.707:63316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30835 comm="syz.0.9979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 577.942409][ T29] audit: type=1326 audit(1750148616.707:63317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30835 comm="syz.0.9979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 577.966547][ T29] audit: type=1326 audit(1750148616.707:63318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30835 comm="syz.0.9979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 577.990807][ T29] audit: type=1326 audit(1750148616.707:63319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30835 comm="syz.0.9979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff0d92ee929 code=0x7ffc0000 [ 578.263912][T30866] program syz.4.9989 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 578.294154][T30870] program syz.2.9991 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 578.306786][T30870] FAULT_INJECTION: forcing a failure. [ 578.306786][T30870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.320115][T30870] CPU: 1 UID: 0 PID: 30870 Comm: syz.2.9991 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 578.320214][T30870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 578.320231][T30870] Call Trace: [ 578.320266][T30870] [ 578.320276][T30870] __dump_stack+0x1d/0x30 [ 578.320303][T30870] dump_stack_lvl+0xe8/0x140 [ 578.320329][T30870] dump_stack+0x15/0x1b [ 578.320407][T30870] should_fail_ex+0x265/0x280 [ 578.320448][T30870] should_fail+0xb/0x20 [ 578.320483][T30870] should_fail_usercopy+0x1a/0x20 [ 578.320524][T30870] _copy_to_user+0x20/0xa0 [ 578.320558][T30870] scsi_ioctl+0x13c8/0x14d0 [ 578.320590][T30870] ? avc_has_perm+0xd3/0x150 [ 578.320628][T30870] ? file_has_perm+0x324/0x370 [ 578.320659][T30870] ? do_vfs_ioctl+0x9df/0x11d0 [ 578.320719][T30870] sg_ioctl+0xdf6/0x1360 [ 578.320760][T30870] ? __pfx_sg_ioctl+0x10/0x10 [ 578.320795][T30870] __se_sys_ioctl+0xce/0x140 [ 578.320833][T30870] __x64_sys_ioctl+0x43/0x50 [ 578.321019][T30870] x64_sys_call+0x19a8/0x2fb0 [ 578.321046][T30870] do_syscall_64+0xd2/0x200 [ 578.321070][T30870] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 578.321105][T30870] ? clear_bhb_loop+0x40/0x90 [ 578.321195][T30870] ? clear_bhb_loop+0x40/0x90 [ 578.321222][T30870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.321293][T30870] RIP: 0033:0x7fbb430ae929 [ 578.321355][T30870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.321378][T30870] RSP: 002b:00007fbb41717038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 578.321457][T30870] RAX: ffffffffffffffda RBX: 00007fbb432d5fa0 RCX: 00007fbb430ae929 [ 578.321541][T30870] RDX: 0000200000000040 RSI: 0000000000000001 RDI: 0000000000000005 [ 578.321557][T30870] RBP: 00007fbb41717090 R08: 0000000000000000 R09: 0000000000000000 [ 578.321572][T30870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.321583][T30870] R13: 0000000000000000 R14: 00007fbb432d5fa0 R15: 00007ffd8e51cb28 [ 578.321604][T30870] [ 578.325663][T30874] netlink: 60 bytes leftover after parsing attributes in process `syz.4.9993'. [ 578.661662][T30904] netlink: 'syz.2.9997': attribute type 10 has an invalid length. [ 578.672079][T30904] bridge0: port 3(team0) entered disabled state [ 578.679141][T30904] team0: left allmulticast mode [ 578.684067][T30904] team_slave_0: left allmulticast mode [ 578.689749][T30904] team_slave_1: left allmulticast mode [ 578.695309][T30904] geneve1: left allmulticast mode [ 578.700356][T30904] team0: left promiscuous mode [ 578.705174][T30904] team_slave_0: left promiscuous mode [ 578.710716][T30904] team_slave_1: left promiscuous mode [ 578.716240][T30904] geneve1: left promiscuous mode [ 578.721417][T30904] bridge0: port 3(team0) entered disabled state [ 578.729052][T30904] batman_adv: batadv0: Adding interface: team0 [ 578.735280][T30904] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 578.760690][T30904] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 578.769444][T30907] FAULT_INJECTION: forcing a failure. [ 578.769444][T30907] name failslab, interval 1, probability 0, space 0, times 0 [ 578.783235][T30907] CPU: 0 UID: 0 PID: 30907 Comm: syz.2.9997 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 578.783271][T30907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 578.783314][T30907] Call Trace: [ 578.783321][T30907] [ 578.783331][T30907] __dump_stack+0x1d/0x30 [ 578.783433][T30907] dump_stack_lvl+0xe8/0x140 [ 578.783459][T30907] dump_stack+0x15/0x1b [ 578.783478][T30907] should_fail_ex+0x265/0x280 [ 578.783508][T30907] should_failslab+0x8c/0xb0 [ 578.783589][T30907] kmem_cache_alloc_noprof+0x50/0x310 [ 578.783621][T30907] ? skb_clone+0x151/0x1f0 [ 578.783685][T30907] skb_clone+0x151/0x1f0 [ 578.783708][T30907] __netlink_deliver_tap+0x2c9/0x500 [ 578.783816][T30907] netlink_unicast+0x64c/0x670 [ 578.783860][T30907] netlink_sendmsg+0x58b/0x6b0 [ 578.783888][T30907] ? __pfx_netlink_sendmsg+0x10/0x10 [ 578.783913][T30907] __sock_sendmsg+0x142/0x180 [ 578.783976][T30907] ____sys_sendmsg+0x31e/0x4e0 [ 578.784012][T30907] ___sys_sendmsg+0x17b/0x1d0 [ 578.784192][T30907] __x64_sys_sendmsg+0xd4/0x160 [ 578.784221][T30907] x64_sys_call+0x2999/0x2fb0 [ 578.784319][T30907] do_syscall_64+0xd2/0x200 [ 578.784341][T30907] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 578.784374][T30907] ? clear_bhb_loop+0x40/0x90 [ 578.784468][T30907] ? clear_bhb_loop+0x40/0x90 [ 578.784489][T30907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.784513][T30907] RIP: 0033:0x7fbb430ae929 [ 578.784532][T30907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.784555][T30907] RSP: 002b:00007fbb416d5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 578.784598][T30907] RAX: ffffffffffffffda RBX: 00007fbb432d6160 RCX: 00007fbb430ae929 [ 578.784614][T30907] RDX: 0000000000000080 RSI: 0000200000000100 RDI: 0000000000000004 [ 578.784629][T30907] RBP: 00007fbb416d5090 R08: 0000000000000000 R09: 0000000000000000 [ 578.784646][T30907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.784661][T30907] R13: 0000000000000000 R14: 00007fbb432d6160 R15: 00007ffd8e51cb28 [ 578.784690][T30907] [ 578.999910][T30907] netlink: 'syz.2.9997': attribute type 10 has an invalid length. [ 579.007997][T30907] netlink: 2 bytes leftover after parsing attributes in process `syz.2.9997'. [ 579.025669][T30907] team0: entered promiscuous mode [ 579.031496][T30907] team_slave_0: entered promiscuous mode [ 579.037423][T30907] team_slave_1: entered promiscuous mode [ 579.043239][T30907] geneve1: entered promiscuous mode [ 579.050112][T30907] 8021q: adding VLAN 0 to HW filter on device team0 [ 579.057236][T30907] batman_adv: batadv0: Interface activated: team0 [ 579.063843][T30907] batman_adv: batadv0: Interface deactivated: team0 [ 579.070613][T30907] batman_adv: batadv0: Removing interface: team0 [ 579.097930][T30907] bridge0: port 3(team0) entered blocking state [ 579.104310][T30907] bridge0: port 3(team0) entered disabled state [ 579.113839][T30907] team0: entered allmulticast mode [ 579.119633][T30907] team_slave_0: entered allmulticast mode [ 579.125716][T30907] team_slave_1: entered allmulticast mode [ 579.131488][T30907] geneve1: entered allmulticast mode [ 579.138866][T30907] bridge0: port 3(team0) entered blocking state [ 579.145455][T30907] bridge0: port 3(team0) entered forwarding state [ 579.280376][T30917] SELinux: failed to load policy [ 579.299287][ T5225] IPVS: starting estimator thread 0... [ 579.391173][T30935] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 579.399996][T30935] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 579.402198][T30922] IPVS: using max 2064 ests per chain, 103200 per kthread [ 579.526203][T30943] netlink: 60 bytes leftover after parsing attributes in process `syz.0.10014'. [ 579.619682][T30947] SELinux: failed to load policy [ 579.701451][T30953] syzkaller0: entered promiscuous mode [ 579.707202][T30953] syzkaller0: entered allmulticast mode [ 580.251707][T30968] __nla_validate_parse: 1 callbacks suppressed [ 580.251725][T30968] netlink: 60 bytes leftover after parsing attributes in process `syz.4.10023'. [ 580.375636][T30972] netlink: 60 bytes leftover after parsing attributes in process `syz.0.10024'. [ 580.559362][T30977] netlink: 'syz.1.10026': attribute type 10 has an invalid length. [ 580.569446][T30977] bridge0: port 3(team0) entered disabled state [ 580.576827][T30977] team0: left allmulticast mode [ 580.581915][T30977] team_slave_0: left allmulticast mode [ 580.587587][T30977] team_slave_1: left allmulticast mode [ 580.593296][T30977] team0: left promiscuous mode [ 580.598378][T30977] team_slave_0: left promiscuous mode [ 580.603936][T30977] team_slave_1: left promiscuous mode [ 580.609899][T30977] bridge0: port 3(team0) entered disabled state [ 580.627790][T30977] batman_adv: batadv0: Adding interface: team0 [ 580.634216][T30977] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 580.659744][T30977] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 580.685208][T30977] netlink: 'syz.1.10026': attribute type 10 has an invalid length. [ 580.693228][T30977] netlink: 2 bytes leftover after parsing attributes in process `syz.1.10026'. [ 580.702665][T30977] team0: entered promiscuous mode [ 580.707958][T30977] team_slave_0: entered promiscuous mode [ 580.713803][T30977] team_slave_1: entered promiscuous mode [ 580.721116][T30977] 8021q: adding VLAN 0 to HW filter on device team0 [ 580.728570][T30977] batman_adv: batadv0: Interface activated: team0 [ 580.735332][T30977] batman_adv: batadv0: Interface deactivated: team0 [ 580.742076][T30977] batman_adv: batadv0: Removing interface: team0 [ 580.749288][T30977] bridge0: port 3(team0) entered blocking state [ 580.755728][T30977] bridge0: port 3(team0) entered disabled state [ 580.762595][T30977] team0: entered allmulticast mode [ 580.768320][T30977] team_slave_0: entered allmulticast mode [ 580.774310][T30977] team_slave_1: entered allmulticast mode [ 580.782195][T30977] bridge0: port 3(team0) entered blocking state [ 580.788647][T30977] bridge0: port 3(team0) entered forwarding state [ 580.899733][T30986] SELinux: failed to load policy [ 581.127211][T30998] netlink: 60 bytes leftover after parsing attributes in process `syz.4.10034'. [ 581.320235][T31004] syzkaller0: entered promiscuous mode [ 581.325794][T31004] syzkaller0: entered allmulticast mode [ 581.870249][T31012] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10040'. [ 582.109314][T31021] netlink: 60 bytes leftover after parsing attributes in process `syz.1.10044'. [ 582.123745][T31017] SELinux: failed to load policy [ 582.168449][T31024] SELinux: failed to load policy [ 582.182348][T31024] netlink: 'syz.4.10045': attribute type 4 has an invalid length. [ 582.261672][T31034] FAULT_INJECTION: forcing a failure. [ 582.261672][T31034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 582.275277][T31034] CPU: 0 UID: 0 PID: 31034 Comm: syz.2.10048 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 582.275313][T31034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 582.275332][T31034] Call Trace: [ 582.275342][T31034] [ 582.275354][T31034] __dump_stack+0x1d/0x30 [ 582.275398][T31034] dump_stack_lvl+0xe8/0x140 [ 582.275424][T31034] dump_stack+0x15/0x1b [ 582.275441][T31034] should_fail_ex+0x265/0x280 [ 582.275492][T31034] should_fail+0xb/0x20 [ 582.275528][T31034] should_fail_usercopy+0x1a/0x20 [ 582.275570][T31034] _copy_from_iter+0xcf/0xe40 [ 582.275604][T31034] ? __build_skb_around+0x1a0/0x200 [ 582.275636][T31034] ? __alloc_skb+0x223/0x320 [ 582.275679][T31034] netlink_sendmsg+0x471/0x6b0 [ 582.275779][T31034] ? __pfx_netlink_sendmsg+0x10/0x10 [ 582.275799][T31034] __sock_sendmsg+0x142/0x180 [ 582.275825][T31034] __sys_sendto+0x268/0x330 [ 582.275874][T31034] __x64_sys_sendto+0x76/0x90 [ 582.275933][T31034] x64_sys_call+0x2eb6/0x2fb0 [ 582.275953][T31034] do_syscall_64+0xd2/0x200 [ 582.275971][T31034] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 582.276004][T31034] ? clear_bhb_loop+0x40/0x90 [ 582.276032][T31034] ? clear_bhb_loop+0x40/0x90 [ 582.276079][T31034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 582.276105][T31034] RIP: 0033:0x7fbb430b07bc [ 582.276123][T31034] Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b [ 582.276259][T31034] RSP: 002b:00007fbb41715ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 582.276283][T31034] RAX: ffffffffffffffda RBX: 00007fbb41715fc0 RCX: 00007fbb430b07bc [ 582.276298][T31034] RDX: 0000000000000028 RSI: 00007fbb41716010 RDI: 0000000000000006 [ 582.276312][T31034] RBP: 0000000000000000 R08: 00007fbb41715f14 R09: 000000000000000c [ 582.276326][T31034] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 582.276369][T31034] R13: 00007fbb41715f68 R14: 00007fbb41716010 R15: 0000000000000000 [ 582.276436][T31034] [ 582.528808][T31039] netlink: 60 bytes leftover after parsing attributes in process `syz.2.10050'. [ 582.770448][T31048] netlink: 60 bytes leftover after parsing attributes in process `syz.0.10053'. [ 583.089829][T31055] syzkaller0: entered promiscuous mode [ 583.095615][T31055] syzkaller0: entered allmulticast mode [ 583.108015][T31059] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 583.116361][T31059] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 583.179853][ T29] kauditd_printk_skb: 2049 callbacks suppressed [ 583.179871][ T29] audit: type=1326 audit(1750148621.997:65369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31064 comm="syz.3.10060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 583.210243][ T29] audit: type=1326 audit(1750148621.997:65370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31064 comm="syz.3.10060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 583.234322][ T29] audit: type=1326 audit(1750148621.997:65371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31064 comm="syz.3.10060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 583.258707][ T29] audit: type=1326 audit(1750148621.997:65372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31064 comm="syz.3.10060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbfbba7e929 code=0x7ffc0000 [ 583.334733][T31071] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10063'. [ 583.347849][T31071] syz!: rxe_newlink: already configured on team_slave_0 [ 583.398311][T31075] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10065'. [ 583.476850][T31079] vhci_hcd: invalid port number 96 [ 583.482124][T31079] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 583.592529][T31090] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5123 sclass=netlink_xfrm_socket pid=31090 comm=syz.3.10071 [ 583.747235][T31090] rdma_rxe: rxe_newlink: failed to add veth0_to_team [ 583.898758][T31103] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 583.996814][T31112] vhci_hcd: invalid port number 96 [ 584.002059][T31112] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 584.032341][ T29] audit: type=1326 audit(1750148622.847:65373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31117 comm="syz.1.10083" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f22ef27e929 code=0x0 [ 584.190523][ T29] audit: type=1326 audit(1750148623.007:65374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31123 comm="syz.4.10085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 584.214665][ T29] audit: type=1326 audit(1750148623.007:65375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31123 comm="syz.4.10085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 584.238535][ T29] audit: type=1326 audit(1750148623.007:65376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31123 comm="syz.4.10085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 584.262521][ T29] audit: type=1326 audit(1750148623.007:65377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31123 comm="syz.4.10085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 584.286619][ T29] audit: type=1326 audit(1750148623.007:65378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31123 comm="syz.4.10085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb860eee929 code=0x7ffc0000 [ 584.427436][T31127] syzkaller0: entered promiscuous mode [ 584.433087][T31127] syzkaller0: entered allmulticast mode [ 584.819648][T31138] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 584.897739][T31144] SELinux: failed to load policy [ 584.914082][T31144] netlink: 'syz.0.10094': attribute type 4 has an invalid length. [ 584.974551][T31147] SELinux: failed to load policy [ 585.241767][T31168] syz!: rxe_newlink: already configured on team_slave_0 [ 585.282335][T31170] SELinux: failed to load policy [ 585.291866][T31170] netlink: 'syz.4.10106': attribute type 4 has an invalid length. [ 585.542646][T31191] syzkaller0: entered promiscuous mode [ 585.548678][T31191] syzkaller0: entered allmulticast mode [ 585.793095][T31202] __nla_validate_parse: 6 callbacks suppressed [ 585.793113][T31202] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10120'. [ 585.812546][T31202] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 585.902152][T31204] SELinux: failed to load policy [ 585.911922][T31204] netlink: 'syz.1.10121': attribute type 4 has an invalid length. [ 586.199315][T31223] ================================================================== [ 586.207468][T31223] BUG: KCSAN: data-race in memcpy_and_pad / release_task [ 586.214578][T31223] [ 586.216933][T31223] write to 0xffff88812773d608 of 8 bytes by task 28156 on cpu 0: [ 586.224678][T31223] release_task+0x6f9/0xb60 [ 586.229232][T31223] wait_consider_task+0x113f/0x1650 [ 586.234458][T31223] __do_wait+0xfa/0x510 [ 586.238722][T31223] do_wait+0xb7/0x260 [ 586.242812][T31223] kernel_wait4+0x16b/0x1e0 [ 586.247341][T31223] __x64_sys_wait4+0x91/0x120 [ 586.252149][T31223] x64_sys_call+0x26c8/0x2fb0 [ 586.256866][T31223] do_syscall_64+0xd2/0x200 [ 586.261473][T31223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 586.267385][T31223] [ 586.269826][T31223] read to 0xffff88812773d140 of 3200 bytes by task 31223 on cpu 1: [ 586.277925][T31223] memcpy_and_pad+0x48/0x80 [ 586.282538][T31223] arch_dup_task_struct+0x2c/0x40 [ 586.287756][T31223] dup_task_struct+0x83/0x6a0 [ 586.292451][T31223] copy_process+0x399/0x1fe0 [ 586.297069][T31223] kernel_clone+0x16c/0x5b0 [ 586.301644][T31223] __se_sys_clone3+0x1c2/0x200 [ 586.306454][T31223] __x64_sys_clone3+0x31/0x40 [ 586.311176][T31223] x64_sys_call+0x10c9/0x2fb0 [ 586.315876][T31223] do_syscall_64+0xd2/0x200 [ 586.320409][T31223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 586.326338][T31223] [ 586.329025][T31223] Reported by Kernel Concurrency Sanitizer on: [ 586.335509][T31223] CPU: 1 UID: 0 PID: 31223 Comm: syz.3.10130 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(voluntary) [ 586.348200][T31223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 586.358274][T31223] ================================================================== [ 586.380205][T31228] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10131'. [ 586.401134][T31228] rdma_rxe: rxe_newlink: failed to add team_slave_0