last executing test programs: 4.168589327s ago: executing program 3 (id=7261): socket$inet(0x2, 0x4000000000000001, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x103d, 0x8, 0x401, 0x483}}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r1, &(0x7f0000001040)={0xc, {"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", 0x1000}}, 0x1006) 4.062355333s ago: executing program 3 (id=7262): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x1c3}, 0x4) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)='N', 0x2a000}], 0x1, 0x0, 0x0, 0x804c040}, 0x0) 3.976440938s ago: executing program 3 (id=7264): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000001880)="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", 0x159}], 0x1, 0x0, 0xa8}, 0x48040) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x8, 0x3fff8000}, 0xa00, 0x81, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) fsmount(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10, 0x0}}], 0x1, 0x20000000) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfc}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) io_setup(0x2007, &(0x7f0000000980)) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000001a00)={0x3, 0x4, @status={[0x6, 0x2, 0x6, 0x9, 0x7fffffff, 0xe8]}, [0x6, 0x459, 0x5, 0x2, 0x0, 0x6, 0x8, 0xaa, 0x8, 0x5, 0x8, 0x1d, 0x200, 0x8, 0x343, 0x6, 0x1, 0xd, 0x7, 0x2, 0x4, 0x80, 0x2, 0x100000001, 0xa62, 0x6, 0x7, 0xb, 0x1, 0xffffffffffffffcd, 0x1, 0x5a42, 0x1, 0x4, 0x9, 0x0, 0x0, 0xffffffff00000000, 0x101, 0xd011, 0x2, 0x0, 0x2, 0x1, 0x2, 0x8, 0x4, 0x1, 0x6, 0x1, 0x0, 0x4, 0xa, 0x36, 0x1, 0x65e0, 0x5, 0x7fffffffffffffff, 0x7fffffff, 0xec, 0x5, 0x71, 0x5, 0x1]}) 3.09260471s ago: executing program 3 (id=7292): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x95, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x200, 0x2, @perf_bp={0x0, 0xa}, 0x62a4, 0x2, 0xffffffff, 0x0, 0x2, 0x1ce, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3f}, [], {0x95, 0x0, 0x5a5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000003c0)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) 2.023512192s ago: executing program 4 (id=7322): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYRES32=r1], 0x7c}, 0x1, 0x0, 0x0, 0x40800}, 0x40000000) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a740a0000060a0b04000000000000000002000000400004803c0001800a0001006d617463680000002c000280080002400000000009000100646363700000000014000300ebae551382395afa4d23edfcbe6d55b50900010073797a30000000000900020073797a32000000000500074006000000140000001100200000000000000000000000040a"], 0x9c}, 0x1, 0x0, 0x0, 0x8010}, 0x4000800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x8000000, 0x4, 0x3a8, 0xffffffff, 0x0, 0x1d0, 0x1d0, 0xfeffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x29}, @private2, [0xffffff00, 0xff000000, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff], 'nicvf0\x00', 'sit0\x00', {}, {}, 0x87, 0x3, 0x4, 0x11}, 0x2f2, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2, 0x5, {0x1}}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x3, 0x5, {0x2000010}}}}, {{@ipv6={@private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0xff000000, 0xff000000, 0x0, 0xff], [0xff000000, 0xffffffff, 0xff000000], 'veth0_to_bond\x00', 'geneve1\x00', {}, {}, 0x21, 0x9, 0x6, 0x10}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xffffffff, 0xff, 0x100fffe00, 0xff000000], 0x4e20, 0x4e20, 0x4e21, 0x4e24, 0xdb, 0x8, 0x8, 0x0, 0x99}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) r4 = openat(r1, &(0x7f0000000000)='./file2\x00', 0x101002, 0x2c) r5 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x36, &(0x7f0000000ec0)=@raw={'raw\x00', 0x3c1, 0x3, 0x29c, 0x10c, 0x150, 0x150, 0x0, 0xf8010000, 0x1d4, 0x238, 0x238, 0x1d4, 0x238, 0x3, 0x0, {[{{@ipv6={@mcast1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [], [], 'team_slave_0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0x10c}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@ipv6={@empty, @mcast1, [], [0x0, 0xff], 'batadv_slave_0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@SYNPROXY={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2f8) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r4, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x1ff, 0x82) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) 1.963302955s ago: executing program 4 (id=7325): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000540)="86271bba8dc420f5807fb84e60d09b01d7ced81b65", 0x15, 0x48800, &(0x7f0000000380)={0x11, 0xf5, r1, 0x1, 0x5, 0x6, @broadcast}, 0x14) 1.936713327s ago: executing program 4 (id=7326): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r2, 0x2004) 1.674383113s ago: executing program 4 (id=7335): syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000200)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x20, 0x29, 0xf, {0xf, 0x29, 0x81, 0x18, 0xe3, 0xeb, "4080340d", "00000100"}}, 0x0}, 0x0) (async) r0 = syz_io_uring_setup(0xa4d, &(0x7f0000000480)={0x0, 0xf792, 0x4, 0x0, 0xf6}, &(0x7f0000000680)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x31, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0xc42a, 0x1, 0x0, 0x0, 0x400, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000400000900"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000006000000040000000100000000000000", @ANYRES32=r3], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f0000000900)}, 0x20) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) vmsplice(r5, &(0x7f00000004c0)=[{&(0x7f0000000300)="90f09bc4147062bf4f4a6bb9ecfc47dfd2dc943ab5d017022412614087049a0fc76783daf7316ee0b4e047efc752eab2fd0c2fc2ce07b580a143a19ee71da0fd025c052a165868013ee1d748a0bdf34cf1b1673d6fd069f4", 0x58}, {&(0x7f0000000380)="c2a4499b126afb37b90a73ba04bf5a1f6e884240883f1f0c015742cdd1f2b30e32940325201216c40df915415f234963eb7ca8b75cf8cc993344b58318d240b0d83cf36c7890a6ed184a0852f3de266ee6cc50137f2f3414ccd2755140cbb0a78e445af6a29061dd7c7df5ada47588a3e94dd75a18cbaf7f1a56879d76f521f276bd53756be51ca355147465a815ca89d31bfa11b0a231a866c6471ae4be760d69339d86eae5b4bb59412ebeee0579a5219a13b1806f93b20f8357321cb9", 0xbe}, {&(0x7f0000000480)="adbf20034672ce90b471a6b5b2e5", 0xe}, {&(0x7f0000000240)="803b0fb2df5af3fbc9b33df500a07b247697a6d5a9ad36eeeddb77f137a7af9e1d479a7243182907410a851defe872175fe70d62758203a5af533fc731dd6a5a5c55603b803f8298e157f66e9997afb98f53f6c59bb48ff29c306bb6e18332ea21689c05c7e92a63dc72ace111a523a82807b4b1a9f4586c336d1440f2d167ed142a6e66ecd398590e07550ff97017c8a710fb19c792fea583b9fa6599d27d4477af776d8cfff899fff0c8984a9db64e", 0xb0}, {&(0x7f0000000440)="28b2a59777acb2866a2e6ca4f29ab718731fcfbd0900d320265bc69e183a0fde9fbdf9abd29d14168335a6a2ea", 0x2d}, {&(0x7f0000000140)="25fd1a6a09e1e1ffa45565614176b5b6827b1a56a1bfbb906304316aa0a718e0d3c7a1972bc4117396b6590f3b6d462e594995bffd3ce15a83e4c582dc1703c273be43c1b9fabce0c26ec6a95097dad5f22f789b8cf076a5b63297cb22fa386c9c4c63942f38852f96aff5a7c1209f07e6c1669fed69059b6d0ed80362496f728a8a5b4e4cb1a640cc3697ec06d1301a30683acdd3765197bcdddb474c176e691e83faefa45570ca250b083076ff9d3f56b319ab5c60c948d48d5a004b46ad4b6c052c5baeebb9dbc82fa98b60f4f688a0e68b0da006", 0xd6}], 0x6, 0x1) syz_io_uring_setup(0x5d1e, &(0x7f0000001a00)={0x0, 0x139c, 0x1, 0x1, 0x1ea, 0x0, r5}, &(0x7f00000016c0), &(0x7f0000001900)=0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002a000000850000005000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e000790b6462272963484d3e4206", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000001ac0)=@IORING_OP_TIMEOUT={0xb, 0x54, 0x0, 0x0, 0x5, &(0x7f0000001a80)={0x0, 0x3938700}, 0x1, 0x20, 0x1, {0x0, r8}}) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async, rerun: 64) close(0xffffffffffffffff) (async, rerun: 64) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r9, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000740)=ANY=[@ANYBLOB="240000eb0c0a010200000000000000000100000a08000440000000000800044000000002371f16dc43af34431d5ba1b7551713e50a5a9029cae0edd286885899330a4d9d4b529de278534b82fd63"], 0x24}, 0x1, 0x0, 0x0, 0x20008840}, 0x0) (async, rerun: 64) socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@noblock_validity}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@debug}, {@inlinecrypt}]}, 0x6, 0x5fc, &(0x7f0000000c00)="$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") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x200026, &(0x7f00000008c0)=ANY=[], 0xb, 0x0, &(0x7f0000000000)) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_WRITEV={0x2, 0x8, 0x3, @fd=r0, 0x80, &(0x7f00000006c0)=[{&(0x7f00000000c0)="328fc3beaa27d38f8482f8e7a3304012a3ed4dc260b836140415e468d0b80e1f0402dfe474caadb8b61e08ba5df5b5307fe1f1c143fcb117227b3b54ad709b8718a2485e1367f3", 0x47}, {&(0x7f0000000240)="d5c71789098bccd648f58a4fcdc6cd75792fe0887618f8c9d14b2e48d7d2336ba078047a6464e6af03cb7a57f50b956fafa70227a46807960b8134da7dd551348a19c5833185596bd2adcfa0b98cae61a321071188f00abf8716cfd27b4cd93bc120e92e7784197db87f1a242a770b7f44674dab8c59f909507cf2be844e6cdfcb467c990c3c622b26d770ac54462973dfbd7a26dab5dc7a87c209ecc7f14750b3a67c4310076e3d", 0xa8}, {&(0x7f0000000300)="07a9d782adaaf52e87a0422558959a05e0d9d7ea2a2ef11e14e58eeac22ef377b1706801b5c2cd64523f6d27d518659a3e1895230bcfd17e365ebf0d3abed0c0be77c7eb2c1ce826a30c9c0e01afc52632441440a8d752004ffa7af7451e45440a34acbececda96044637f6ef32f4e0a84d551511153970b865b87c59d0c188ab6ede8bdcc08c2b72bb50c940eb09fb8ba0561ba4bfa", 0x96}, {&(0x7f0000000500)="14c5d95f89d45f34de08bf07075e2a0100c52c566659b025f8d3044cb43e5bf4c51d830430f8401509e1cd75ef399cba1f86d5787de4dbbd9b301f49558071075a1a9cc07e0e010bec126a27969f77bd5406f40248639e71f7195890f150a5c4e257a378d444746f1559f20ae5ba3b2371ceb042a8c9e2789529057874acc21ecfa414a17e33f06c2857f8b6618410b6f1e4bfca651a5bb08218f5747389ff14da1d1b147684db98dc57f33a2a7dcba52dd5e668a1d845c8341d74f56db778da21725006ef57", 0xc6}, {&(0x7f00000003c0)="ad0a3e26bce644972c0aba03c86d179ab82eb6b571d9a156076cbbb690064098d9663579234f1aa65f89a48180e2376fa406c58765b76c5b35ed86cff49c69d227dcf5a0a8e1e44e2c6721be9c3c52b1dab194ce1ee8348dcc9c744cf1a97decc6497e7c95c7d20cbee755505e4017e83c4d6dedf4b4011f06", 0x79}, {&(0x7f0000000600)="f83bd0c931a0cef157a8167062b0a841b3e87fe03e47f4415b23a842ae71c6b0170358fea57bfbb1f8612db5ec172b8ea417efbbef95b42acee8b3a88b4c68c2c3ee0d", 0x43}], 0x6, 0xa, 0x0, {0x3, r8}}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000480), 0xc0d00) (async) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x0, @private0, 0x4}, {0xa, 0x0, 0x7, @mcast1}, r11, 0x800}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private2}, {0xa, 0x0, 0x0, @local}, r11}}, 0x48) (async, rerun: 32) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) (rerun: 32) 1.439533636s ago: executing program 0 (id=7342): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001ec0), 0x800, 0x0) poll(&(0x7f0000001f80)=[{r0, 0x18100}], 0x1, 0x7fffffff) read$msr(r0, &(0x7f0000000000)=""/212, 0xd4) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000400)=""/209, 0xd1}, {&(0x7f0000000300)=""/122, 0x7a}, {&(0x7f0000000580)=""/249, 0xf9}, {&(0x7f0000000680)=""/192, 0xc0}, {&(0x7f0000000740)=""/188, 0xbc}, {&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000000800)=""/200, 0xc8}, {&(0x7f0000000900)=""/123, 0x7b}, {&(0x7f0000000a40)=""/187, 0xbb}], 0x9) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xc, 0xf}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x80000000, 0x8, 0x2}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x48801}, 0x20008850) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x400000000010, 0x3, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000240)=0x0) quotactl_fd$Q_QUOTAON(r1, 0xffffffff80000200, r7, &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690a3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x33, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x40006}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="600000000206050000000000000000000000000005000400000000000900020073797a32000000001400078005001500130000000800124000008000050005000a000000050001000600000012000300686173683a6e6574"], 0x60}}, 0x40000010) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r9, {0x5}, {}, {0xc, 0xfff1}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) 1.380649189s ago: executing program 0 (id=7343): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone3(&(0x7f0000000240)={0x200a00000, 0x0, 0x0, 0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) (fail_nth: 11) 1.189960591s ago: executing program 0 (id=7345): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r2, 0x2004) 1.116880685s ago: executing program 4 (id=7347): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000001880)="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", 0x159}], 0x1, 0x0, 0xa8}, 0x48040) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x8, 0x3fff8000}, 0xa00, 0x81, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsmount(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10, 0x0}}], 0x1, 0x20000000) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfc}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) io_setup(0x2007, &(0x7f0000000980)) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000001a00)={0x3, 0x4, @status={[0x6, 0x2, 0x6, 0x9, 0x7fffffff, 0xe8]}, [0x6, 0x459, 0x5, 0x2, 0x0, 0x6, 0x8, 0xaa, 0x8, 0x5, 0x8, 0x1d, 0x200, 0x8, 0x343, 0x6, 0x1, 0xd, 0x7, 0x2, 0x4, 0x80, 0x2, 0x100000001, 0xa62, 0x6, 0x7, 0xb, 0x1, 0xffffffffffffffcd, 0x1, 0x5a42, 0x1, 0x4, 0x9, 0x0, 0x0, 0xffffffff00000000, 0x101, 0xd011, 0x2, 0x0, 0x2, 0x1, 0x2, 0x8, 0x4, 0x1, 0x6, 0x1, 0x0, 0x4, 0xa, 0x36, 0x1, 0x65e0, 0x5, 0x7fffffffffffffff, 0x7fffffff, 0xec, 0x5, 0x71, 0x5, 0x1]}) 940.477675ms ago: executing program 0 (id=7352): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000040)=[{0x515, 0x7, 0x9, 0x4}]}, 0x35) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x80000001, @local, 0x7}, 0x1c) (async) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x80000001, @local, 0x7}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) (async) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) socket(0x40000000015, 0x5, 0x0) (async) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000900)='Z', 0xffaa}, {&(0x7f0000000040)="a3d7f3e8a9cf9e3887a6f6eca30e90d85fcfa281378973ab916b0e1d03bd28bca55c552da8cfecb0fbccbfb18ef20fe9541e0e1e8fa214cb6bb0455c2386f5ebb4730be449beb72f481c1429d6eb835b76fd1fdcacd50b884c98caa871ec4e225b6036b6ad2638ab5b06828c10fc355b170075f37b748b8f466fe29f40ec981d1431132bca9884654780b3205ed61f49c3b3b6229593e61d13a8505de19a8a0f502d4f3148f9450ed35ef5950bb7fefcf299beed14", 0xb5}], 0x2}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xfffffffffffffe01}}, './file0\x00'}) accept4$tipc(r5, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x800) 740.628977ms ago: executing program 0 (id=7354): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x1c3}, 0x4) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)='N', 0x2a000}], 0x1, 0x0, 0x0, 0x804c040}, 0x0) 724.642098ms ago: executing program 0 (id=7356): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0300000000000000000000000000000000000000e88c913313b4caad298d5d062fd1305f1a1f0c9c0e1ffa38b656e85f8e88f573554eec517ea388c5fb60a6cf2f5a4d82d44a036fd99276d1a46c5b1ae86cd50b60ba8a98cd57a8c49a6b7465950028faf39b12bf8c3b9006cce88750ea9903a155ef159e2874df01308aa937b32e44f76a157774372a52ce37cb9e9397b29ab41a9f2d73548501b648f65d1be2"], 0x48) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x9}}, {{0xa, 0x0, 0xae6c, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x6, 0x8, 0x1014}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r3}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001200)={&(0x7f0000001000), 0x0, 0x0, 0x0, 0xa560, r4}, 0x38) unshare(0x24020400) r5 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r5, &(0x7f0000000240)={0xa, 0x1a, 0x1000, @ipv4={'\x00', '\xff\xff', @remote}, 0xc}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000008c0)={[{@nombcache}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8}}, {@lazytime}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x569, &(0x7f0000000a40)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file1\x00', &(0x7f0000000840), &(0x7f0000000940)=ANY=[], 0x361, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000060000000200"], 0x0, 0x36}, 0x28) setxattr$security_ima(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140), &(0x7f00000013c0)=ANY=[], 0x700, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file1\x00', &(0x7f00000000c0), &(0x7f00000001c0)=ANY=[], 0xfe37, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x4]}, 0x8, 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r7, 0x47f, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f00000003c0)="951aa14bd6f68579cac67c83bf8d4500e5cea1bb1596d4ee6645fa16fa7cacb9214070a622a2c57b89075f59b85c7b5b2c41edc9d2cd5a2c95ed1c2cf72425be9c1a2df1b60a309bc3228d7e85b300f0d7a042a40166b9208e9d2e423c32ad8e47adedf5dc425c6bcb031fb2230835d41afc23476eae602bad3246417e5ac757", 0x80}]) recvmsg(r6, &(0x7f00000004c0)={&(0x7f0000000340)=@hci, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/43, 0x2b}, {&(0x7f0000000400)=""/87, 0x57}], 0x2}, 0x2100) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b"], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 354.063079ms ago: executing program 1 (id=7367): r0 = socket(0x10, 0x3, 0x0) fallocate(r0, 0x89000000, 0x0, 0x400001) 353.692479ms ago: executing program 1 (id=7369): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000040)=0x2, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4d93, 0x4) sendmsg$sock(r0, &(0x7f0000000780)={&(0x7f0000000300)=@in6={0xa, 0x4e24, 0x7fff, @loopback, 0x3}, 0x80, 0x0}, 0x24040040) 353.352299ms ago: executing program 2 (id=7370): sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x48, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40081c4}, 0x44000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128009000100626f6e640000000018000280140008"], 0x48}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x55, 0x8, 0x0, 0xe42, 0x1, r2}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@ipv6_newrule={0x24, 0x20, 0x1, 0x70bd27, 0x0, {0xa, 0x0, 0x0, 0x40}, [@FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e23, 0x4e20}}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040804}, 0x4008000) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00') mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x8, 0x3032, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000b, 0x2013, r4, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[], 0x32600) r5 = epoll_create1(0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x140, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x2b, 0x13, 0x17, 0xffffffff, 0xb, 0xa9, 0x5, 0x2, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000240)={0x80000011}) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r3, &(0x7f0000000c40)={0x1}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x2, 0x4, 0x0, @empty, @remote, 0x8, 0x10, 0xa2e, 0x80000001}}) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f00000005c0)=@newpolicy={0xe0, 0x13, 0x12c, 0x70bd29, 0x25dfdbfb, {{@in=@local, @in6=@empty, 0x4e23, 0x8001, 0x4e23, 0x507, 0xa, 0x30, 0xa0, 0x89, r7}, {0x3, 0x8, 0xfffffffffffffff0, 0x5, 0x3ac, 0x7fffffff, 0xf8d}, {0x1, 0x4f3, 0x6, 0x73d0}, 0x1, 0x6e6bbe, 0x2, 0x1, 0x1, 0x3}, [@sec_ctx={0x27, 0x8, {0x23, 0x8, 0x1, 0xb, 0x1b, "bf0011b9e0d4bff0718f3c3394747a7d833174e5d79a9ffd466eea"}}]}, 0xe0}}, 0x4) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000040)={0x502, "8d989d"}, 0x6) io_setup(0x1, &(0x7f00000004c0)=0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101042, 0x56633bd1cf1d94b2) io_submit(r8, 0x2, &(0x7f0000000480)=[&(0x7f0000000280)={0xffffff7f00000000, 0x0, 0x0, 0x1, 0x3, r9, 0x0, 0x0, 0x400a00}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8, 0x0, r9, &(0x7f00000000c0)="e321fb92d586adb266", 0x9, 0x7ff, 0x0, 0x2}]) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005200)=[{{0x0, 0x4b, &(0x7f0000000000), 0x1}}], 0x1, 0x0) 341.85231ms ago: executing program 1 (id=7371): r0 = socket$packet(0x11, 0x3, 0x300) socket$can_raw(0x1d, 0x3, 0x1) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000000c0)=0x14) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000280)="020409fcec074802010e0200c52cf7c20675e005b02f0800eb2b2ff0dac8897c6b112002faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0x4a, 0x8814, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x3, 0x4) recvmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002abd7000fedbdf2509000000840004801300010062726f6164636173742d6c696e6b00004c00078008000400070000000800020082b00000080001"], 0x98}, 0x1, 0x0, 0x0, 0x48c0}, 0x80) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0f02000039000511d25a80648c63940d0224fc600b003540280009000200002037153e37eb010280060410000a00", 0x33fe0}], 0x1}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000010000)=@ipv4_deladdr={0x18, 0x15, 0x1, 0xfffffffd, 0x0, {0x2, 0x0, 0x0, 0xfd}}, 0x18}}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)={{0x0, 0x7f, 0x3e3e8111, 0x4, 0x9, 0xe7, 0x0, 0x5, 0x3, 0x5, 0x5, 0x7fffffffffffffff, 0x7fffffffffffffff, 0x22e, 0x4}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000300)={{r7, 0x7, 0x1, 0x7fffffffffffffff, 0x8, 0x757, 0x1, 0x49df, 0x7fff, 0x7, 0x5, 0x8, 0x9, 0x59c, 0x4}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000e00)=@newtaction={0x488, 0x30, 0x12f, 0x3c, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0xb, 0x4, 0x0, 0x8d, 0x0, 0x7ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1000, 0x10, 0xfffffffd, 0x3, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x1, 0x8000000, 0x0, 0x0, 0x11, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x3, 0xb2e4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x100, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x934, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x10000000, 0x0, 0x7, 0x0, 0x81, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x7, 0x3, 0x8, 0xfffffffe, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffff3bac, 0xd, 0x2, 0x2000, 0x3, 0x0, 0x0, 0xfffffffe, 0xffffffd1, 0x480000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a3, 0x0, 0x6, 0x7ff, 0x4, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x713b, 0x0, 0x0, 0x0, 0xffff, 0x1000000, 0xffffffff, 0x2, 0xfffffffd, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce2, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2000000, 0xfffffff9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x10000000, 0x7, 0xff, 0x0, 0x7]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x1, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x3, 0xbed}, {0x0, 0xf6c5d7a4e5a498ca, 0x1000, 0x8}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x3}}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x4044840}, 0x44004) 292.305853ms ago: executing program 2 (id=7372): listen(0xffffffffffffffff, 0x220c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) capset(&(0x7f0000000740)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200004, 0x0, 0x800, 0xffffffff, 0x7}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x8312, 0xdcf, 0x43a1bd75, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000030000000900010073797a30000000005c000000090a010400000000000000000300000008000a40000000000900020073797a31000000000900010073797a300000f7ff0800054000000023200011800e000100636f6e6e6c696d69740000000c000280080001"], 0xa4}}, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_opts(r8, 0x0, 0xd, &(0x7f0000000080)="9ef3166bebdf9176456352659a9e17ebe85c695d17b5b361f98a", 0x1a) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80a, &(0x7f0000000000), 0x1, 0x79b, &(0x7f0000000a40)="$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") r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r10, 0x58, &(0x7f0000000040)}, 0x10) listen(r9, 0x0) r11 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r11, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r11) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x100010, 0xffffffffffffffff, 0xff) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x8, &(0x7f0000000100)={[{@debug}, {@init_itable}]}, 0x1, 0x5a2, &(0x7f0000000180)="$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") 291.895783ms ago: executing program 1 (id=7373): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf94b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x200003, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x5}, 0x94) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f0000010000000003"], 0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000008c0)={0x1, {{0x2, 0x0, @multicast2}}}, 0x88) 240.341436ms ago: executing program 2 (id=7374): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xc, 0xf}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10, 0x1, {0x0, 0xfffffffe, 0x4}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x8001}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r6) sendmsg$IEEE802154_ASSOCIATE_REQ(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x30, r7, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_COORD_PAN_ID={0x6}, @IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x1a}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=@newqdisc={0x58, 0x28, 0x4ee4e6a52ff56541, 0x5001, 0xfffffdfc, {0x0, 0x0, 0x0, r8, {0xc}, {0x0, 0xffe0}, {0x2, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x0, 0xd8, 0x7ff, 0x2, 0x9, 0x6, 0x20000002, 0xfffffff9, 0xc00000}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@newqdisc={0x24, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0x25dfdbfe, {0x0, 0x0, 0x0, r10, {0xffff}, {0x4}, {0xe, 0xfffb}}}, 0x24}, 0x1, 0x0, 0x0, 0xc004}, 0x890) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000840)={[{@nombcache}, {@journal_dev={'journal_dev', 0x3d, 0xda}}, {@nombcache}, {@nobarrier}, {@init_itable}, {@errors_remount}]}, 0x1, 0x569, &(0x7f00000002c0)="$eJzs3U1rXFUfAPD/nWT6/jxNoRQVkYALK7WTJvGlgou61mJB93VIbkPJpFMyk9LEgu3CrqW4EQviXly7LH4BF36GghaKlKALN5E7uTOdJDPJtJ0mU+f3g1vOuS8598y5/9NzcmYyAQyt8eyfQsTLEfF1EnE0IpL82GjkB8fXz1t9dGMm25JYW/v0z6RxXpZv/qzmdYfzzEsR8ctXEacKW8utLa/MlyuVdDHPT9QXrk7UlldOX14oz6Vz6ZWp6emz70xPvf/eu32r65sX/v72k3sjee7YnSTOxZE8116PZ3CzPTMe4/lrUoxzm06c7ENhgyTpuPenXb8PnsxIHufFyPqAozGSRz3w3/dlRKwBQyp54vj/rfh87gTYXc1xQHNu36d58Avj4YfrE6Ct9R9d/91IHGjMjQ6tJhtmRtl8d6wP5Wdl/PzH3TvZFv37PQTAjm7eiogzo6Nb+78k7/+e3pkeztlchv4Pds+9bPzzVqfxT6E1/okO45/DHWL3aewc/4UHfSimq2z890HH8W9r0WpsJM/9rzHmKyaXLlfSrG/7f0ScjOL+LL/des7Z1ftr3Y61j/+yLSu/ORbM7+PB6P6N18yW6+VnqXO7h7ciXuk4/k1a7Z90aP/s9bjQYxkn0ruvdTu2c/2fr7UfIt7o2P6PV7SS7dcnJxrPw0Tzqdjqr9snfu1W/l7XP2v/Q9vXfyxpX6+ttV890lMZ3x/4J43WevJGG+ofvT//+5LPGul9+b7r5Xp9cTJiX/Jxa3+huX/q8bXNfPP8rP4nX9++/+v0/B+MiM97qn3E7eM/vtrt2CC0/2zH9m/Nbje1/5Mn7n/0xXfdyu+t/3u7kTqZ7+ml/+v1Bp/ltQMAAAAAAIBBU4iII5EUSq10oVAqrb+/43gcKlSqtfqpS9WlK7PR+KzsWBQLzZXuo23vh5jMVwyb+alN+emIOBYR34wcbORLM9XK7F5XHgAAAAAAAAAAAAAAAAAAAAbE4S6f/8/8vvXPux/Y/TsEnitf+Q3Da8f478c3PQEDyf//MLzEPwwv8Q/DS/zD8BL/MLzEPwwv8Q/DS/wDAAAAAAAAAAAAAAAAAAAAAAAAAABAX104fz7b1lYf3ZjJ8rPXlpfmq9dOz6a1+dLC0kxpprp4tTRXrc5V0tJMdWGnn1epVq9OTsXS9Yl6WqtP1JZXLi5Ul67UL15eKM+lF9PirtQKAAAAAAAAAAAAAAAAAAAAXiy15ZX5cqWSLkpIPFVidDBuQ6LPib3umQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgsX8DAAD//welMww=") lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xfe37, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file1\x00', &(0x7f00000009c0), 0x0, 0x0, 0x2) 191.930679ms ago: executing program 4 (id=7375): r0 = socket(0x10, 0x3, 0x0) r1 = socket(0xa, 0x3, 0xff) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000400)) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000040)=0x800, 0x4) syz_emit_ethernet(0x4e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa3986dd6c370c8900182b01fe800000000000000000000000000025fe8000000000000000000000000000aaff"], 0x0) recvmmsg(r1, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') exit(0x4000000000009) fchdir(r3) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x84, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000300)) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x1280b000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0xd, 0x53a1bd79, 0x7, 0x9, 0x86, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180800000004000000000000000000001800000004000040000000000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000000)) add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x4, 0x4, 0x22}, 0x50) r10 = socket$inet(0x2, 0x80003, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r9, &(0x7f00000001c0), &(0x7f00000004c0)=@udp=r10}, 0x20) ioctl$BLKRRPART(r8, 0x125f, 0x0) r11 = socket$can_raw(0x1d, 0x3, 0x1) write(r11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="85102d77d76c3f8bcd25e179a60e04af4feece2717e8e4", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000000000850000008600000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000850000008000000018160000", @ANYRES32=r4, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000810000008500000006000000"], &(0x7f0000000240)='GPL\x00', 0x4, 0x1005, &(0x7f00000014c0)=""/4101, 0x40f00, 0xc}, 0x94) 128.489652ms ago: executing program 2 (id=7376): gettid() timer_create(0x1, 0x0, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r1, 0x2004) 128.105313ms ago: executing program 1 (id=7377): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) execve(0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000c08d) 123.223053ms ago: executing program 2 (id=7378): syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x555, &(0x7f0000000640)="$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") quotactl$Q_QUOTAON(0xffffffff80000200, 0x0, 0x0, &(0x7f0000000000)='./file0\x00') 49.051277ms ago: executing program 1 (id=7379): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x50, 0x10, 0x1, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe, 0xd}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x4000000}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1a}, {0x4, 0x1b}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) 48.751068ms ago: executing program 3 (id=7380): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80140, 0x38) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc04c811, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x21) fcntl$setlease(r0, 0x400, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0xa) 518.69µs ago: executing program 2 (id=7381): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x1c3}, 0x4) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), 0x8) sendmsg$inet_sctp(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000380)='N', 0x1}], 0x1, 0x0, 0x0, 0x804c040}, 0x0) 0s ago: executing program 3 (id=7382): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = io_uring_setup(0xbbc, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x2, 0xc9}) io_uring_enter(r0, 0x100000, 0x2, 0xf, &(0x7f0000000000), 0x18) r1 = socket(0x10, 0x803, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000001580)={'tunl0\x00', &(0x7f0000001500)={'gre0\x00', 0x0, 0x8, 0x7800, 0x0, 0x4, {{0x5, 0x4, 0x3, 0x4, 0x14, 0x67, 0x0, 0x10, 0x29, 0x0, @private=0xa010102, @rand_addr=0x640100ff}}}}) kernel console output (not intermixed with test programs): 2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 324.467756][T18233] [ 324.753354][T18246] netem: incorrect gi model size [ 325.312859][T18317] bridge0: entered promiscuous mode [ 325.322600][T18317] netlink: 'syz.2.6152': attribute type 3 has an invalid length. [ 325.330530][T18317] netlink: 3 bytes leftover after parsing attributes in process `syz.2.6152'. [ 325.467170][T18337] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6163'. [ 325.476201][T18337] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6163'. [ 325.485515][T18337] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6163'. [ 325.494433][T18337] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6163'. [ 325.569357][T18349] FAULT_INJECTION: forcing a failure. [ 325.569357][T18349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.582594][T18349] CPU: 1 UID: 0 PID: 18349 Comm: syz.3.6169 Not tainted syzkaller #0 PREEMPT(voluntary) [ 325.582630][T18349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 325.582647][T18349] Call Trace: [ 325.582657][T18349] [ 325.582667][T18349] __dump_stack+0x1d/0x30 [ 325.582727][T18349] dump_stack_lvl+0x95/0xd0 [ 325.582756][T18349] dump_stack+0x15/0x1b [ 325.582782][T18349] should_fail_ex+0x263/0x280 [ 325.582888][T18349] should_fail+0xb/0x20 [ 325.582954][T18349] should_fail_usercopy+0x1a/0x20 [ 325.582993][T18349] _copy_to_user+0x20/0xa0 [ 325.583019][T18349] simple_read_from_buffer+0xb5/0x130 [ 325.583061][T18349] proc_fail_nth_read+0x10e/0x150 [ 325.583149][T18349] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 325.583254][T18349] vfs_read+0x1ab/0x7f0 [ 325.583273][T18349] ? __rcu_read_unlock+0x4e/0x70 [ 325.583302][T18349] ? __fget_files+0x184/0x1c0 [ 325.583329][T18349] ? mutex_lock+0x57/0x90 [ 325.583359][T18349] ksys_read+0xdc/0x1a0 [ 325.583432][T18349] __x64_sys_read+0x40/0x50 [ 325.583453][T18349] x64_sys_call+0x2889/0x3000 [ 325.583478][T18349] do_syscall_64+0xc0/0x2a0 [ 325.583558][T18349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.583635][T18349] RIP: 0033:0x7f4ba235b78e [ 325.583654][T18349] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 325.583731][T18349] RSP: 002b:00007f4ba0df6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 325.583758][T18349] RAX: ffffffffffffffda RBX: 00007f4ba0df76c0 RCX: 00007f4ba235b78e [ 325.583776][T18349] RDX: 000000000000000f RSI: 00007f4ba0df70a0 RDI: 0000000000000005 [ 325.583793][T18349] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 325.583839][T18349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.583873][T18349] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 325.583891][T18349] [ 325.878188][T18366] FAULT_INJECTION: forcing a failure. [ 325.878188][T18366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.891646][T18366] CPU: 1 UID: 0 PID: 18366 Comm: syz.1.6176 Not tainted syzkaller #0 PREEMPT(voluntary) [ 325.891680][T18366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 325.891695][T18366] Call Trace: [ 325.891703][T18366] [ 325.891713][T18366] __dump_stack+0x1d/0x30 [ 325.891803][T18366] dump_stack_lvl+0x95/0xd0 [ 325.891824][T18366] dump_stack+0x15/0x1b [ 325.891844][T18366] should_fail_ex+0x263/0x280 [ 325.891940][T18366] should_fail+0xb/0x20 [ 325.892013][T18366] should_fail_usercopy+0x1a/0x20 [ 325.892048][T18366] _copy_to_user+0x20/0xa0 [ 325.892074][T18366] simple_read_from_buffer+0xb5/0x130 [ 325.892171][T18366] proc_fail_nth_read+0x10e/0x150 [ 325.892200][T18366] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 325.892238][T18366] vfs_read+0x1ab/0x7f0 [ 325.892256][T18366] ? _copy_to_user+0x7c/0xa0 [ 325.892279][T18366] ? __rcu_read_unlock+0x4e/0x70 [ 325.892309][T18366] ? __fget_files+0x184/0x1c0 [ 325.892365][T18366] ? mutex_lock+0x57/0x90 [ 325.892423][T18366] ksys_read+0xdc/0x1a0 [ 325.892475][T18366] __x64_sys_read+0x40/0x50 [ 325.892494][T18366] x64_sys_call+0x2889/0x3000 [ 325.892521][T18366] do_syscall_64+0xc0/0x2a0 [ 325.892550][T18366] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 325.892602][T18366] RIP: 0033:0x7f7179fdb78e [ 325.892694][T18366] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 325.892761][T18366] RSP: 002b:00007f7178a76fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 325.892924][T18366] RAX: ffffffffffffffda RBX: 00007f7178a776c0 RCX: 00007f7179fdb78e [ 325.892939][T18366] RDX: 000000000000000f RSI: 00007f7178a770a0 RDI: 0000000000000006 [ 325.892952][T18366] RBP: 00007f7178a77090 R08: 0000000000000000 R09: 0000000000000000 [ 325.892965][T18366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.892979][T18366] R13: 00007f717a296038 R14: 00007f717a295fa0 R15: 00007fff6b327008 [ 325.893002][T18366] [ 326.160834][T18371] bond0: (slave team0): Releasing backup interface [ 326.210555][ T31] bond4: (slave macvlan2): link status definitely down, disabling slave [ 326.457105][T18383] FAULT_INJECTION: forcing a failure. [ 326.457105][T18383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.470367][T18383] CPU: 0 UID: 0 PID: 18383 Comm: syz.3.6181 Not tainted syzkaller #0 PREEMPT(voluntary) [ 326.470464][T18383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 326.470477][T18383] Call Trace: [ 326.470484][T18383] [ 326.470491][T18383] __dump_stack+0x1d/0x30 [ 326.470517][T18383] dump_stack_lvl+0x95/0xd0 [ 326.470619][T18383] dump_stack+0x15/0x1b [ 326.470643][T18383] should_fail_ex+0x263/0x280 [ 326.470716][T18383] should_fail+0xb/0x20 [ 326.470747][T18383] should_fail_usercopy+0x1a/0x20 [ 326.470782][T18383] _copy_to_user+0x20/0xa0 [ 326.470811][T18383] simple_read_from_buffer+0xb5/0x130 [ 326.470854][T18383] proc_fail_nth_read+0x10e/0x150 [ 326.470881][T18383] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 326.470933][T18383] vfs_read+0x1ab/0x7f0 [ 326.471086][T18383] ? __rcu_read_unlock+0x4e/0x70 [ 326.471205][T18383] ? __fget_files+0x184/0x1c0 [ 326.471234][T18383] ? mutex_lock+0x57/0x90 [ 326.471289][T18383] ksys_read+0xdc/0x1a0 [ 326.471312][T18383] __x64_sys_read+0x40/0x50 [ 326.471342][T18383] x64_sys_call+0x2889/0x3000 [ 326.471371][T18383] do_syscall_64+0xc0/0x2a0 [ 326.471413][T18383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.471439][T18383] RIP: 0033:0x7f4ba235b78e [ 326.471457][T18383] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 326.471502][T18383] RSP: 002b:00007f4ba0df6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 326.471528][T18383] RAX: ffffffffffffffda RBX: 00007f4ba0df76c0 RCX: 00007f4ba235b78e [ 326.471545][T18383] RDX: 000000000000000f RSI: 00007f4ba0df70a0 RDI: 0000000000000003 [ 326.471560][T18383] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 326.471576][T18383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.471644][T18383] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 326.471665][T18383] [ 326.600705][ T29] kauditd_printk_skb: 996 callbacks suppressed [ 326.600798][ T29] audit: type=1400 audit(6064706735.473:39360): avc: denied { map_create } for pid=18390 comm="syz.0.6183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.741989][T18401] FAULT_INJECTION: forcing a failure. [ 326.741989][T18401] name failslab, interval 1, probability 0, space 0, times 0 [ 326.754699][T18401] CPU: 1 UID: 0 PID: 18401 Comm: syz.3.6188 Not tainted syzkaller #0 PREEMPT(voluntary) [ 326.754749][T18401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 326.754763][T18401] Call Trace: [ 326.754771][T18401] [ 326.754780][T18401] __dump_stack+0x1d/0x30 [ 326.754808][T18401] dump_stack_lvl+0x95/0xd0 [ 326.754872][T18401] dump_stack+0x15/0x1b [ 326.754895][T18401] should_fail_ex+0x263/0x280 [ 326.754929][T18401] should_failslab+0x8c/0xb0 [ 326.754969][T18401] kmem_cache_alloc_noprof+0x68/0x490 [ 326.754996][T18401] ? copy_pid_ns+0x1a9/0x610 [ 326.755092][T18401] copy_pid_ns+0x1a9/0x610 [ 326.755117][T18401] ? _raw_spin_unlock+0x9/0x30 [ 326.755179][T18401] ? __ns_tree_add_raw+0x64b/0x660 [ 326.755209][T18401] create_new_namespaces+0x176/0x440 [ 326.755236][T18401] unshare_nsproxy_namespaces+0xe6/0x120 [ 326.755263][T18401] ksys_unshare+0x3cd/0x6d0 [ 326.755366][T18401] ? ksys_write+0x194/0x1a0 [ 326.755389][T18401] __x64_sys_unshare+0x1f/0x30 [ 326.755424][T18401] x64_sys_call+0x2ae6/0x3000 [ 326.755452][T18401] do_syscall_64+0xc0/0x2a0 [ 326.755523][T18401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.755549][T18401] RIP: 0033:0x7f4ba239aeb9 [ 326.755627][T18401] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 326.755648][T18401] RSP: 002b:00007f4ba0df7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 326.755672][T18401] RAX: ffffffffffffffda RBX: 00007f4ba2615fa0 RCX: 00007f4ba239aeb9 [ 326.755689][T18401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006a040000 [ 326.755704][T18401] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 326.755736][T18401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 326.755751][T18401] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 326.755772][T18401] [ 326.958940][ T29] audit: type=1400 audit(6064706735.533:39361): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.983456][ T29] audit: type=1400 audit(6064706735.573:39362): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 327.008111][ T29] audit: type=1400 audit(6064706735.603:39363): avc: denied { create } for pid=18398 comm="syz.0.6189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 327.029146][ T29] audit: type=1400 audit(6064706735.613:39364): avc: denied { open } for pid=18400 comm="syz.3.6188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 327.069217][ T29] audit: type=1400 audit(6064706735.933:39365): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 327.093646][ T29] audit: type=1400 audit(6064706735.933:39366): avc: denied { open } for pid=18402 comm="syz.3.6192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 327.113341][ T29] audit: type=1400 audit(6064706735.933:39367): avc: denied { prog_load } for pid=18402 comm="syz.3.6192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 327.132725][ T29] audit: type=1400 audit(6064706735.933:39368): avc: denied { open } for pid=18402 comm="syz.3.6192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 327.135375][T18405] netlink: 'syz.0.6193': attribute type 13 has an invalid length. [ 327.152511][ T29] audit: type=1400 audit(6064706735.933:39369): avc: denied { open } for pid=18402 comm="syz.3.6192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 327.222048][T18405] FAULT_INJECTION: forcing a failure. [ 327.222048][T18405] name failslab, interval 1, probability 0, space 0, times 0 [ 327.234888][T18405] CPU: 1 UID: 0 PID: 18405 Comm: syz.0.6193 Not tainted syzkaller #0 PREEMPT(voluntary) [ 327.234921][T18405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 327.234936][T18405] Call Trace: [ 327.234944][T18405] [ 327.234953][T18405] __dump_stack+0x1d/0x30 [ 327.234979][T18405] dump_stack_lvl+0x95/0xd0 [ 327.235002][T18405] dump_stack+0x15/0x1b [ 327.235099][T18405] should_fail_ex+0x263/0x280 [ 327.235251][T18405] should_failslab+0x8c/0xb0 [ 327.235274][T18405] __kmalloc_cache_noprof+0x64/0x4a0 [ 327.235306][T18405] ? ipv6_add_addr+0x3a1/0x860 [ 327.235330][T18405] ipv6_add_addr+0x3a1/0x860 [ 327.235403][T18405] add_addr+0x89/0x1e0 [ 327.235436][T18405] addrconf_init_auto_addrs+0x368/0x7b0 [ 327.235518][T18405] ? __pfx_taprio_dev_notifier+0x10/0x10 [ 327.235586][T18405] ? taprio_dev_notifier+0xd1/0x710 [ 327.235611][T18405] ? _raw_spin_lock+0x52/0xa0 [ 327.235712][T18405] ? _raw_spin_unlock+0x9/0x30 [ 327.235750][T18405] ? cbs_dev_notifier+0xdb/0x1e0 [ 327.235775][T18405] addrconf_notify+0x709/0x8f0 [ 327.235873][T18405] ? __pfx_addrconf_notify+0x10/0x10 [ 327.235907][T18405] raw_notifier_call_chain+0x6f/0x1b0 [ 327.236029][T18405] ? netif_state_change+0x1a4/0x250 [ 327.236057][T18405] netif_state_change+0x1b8/0x250 [ 327.236103][T18405] do_setlink+0x276d/0x2940 [ 327.236136][T18405] ? _raw_spin_unlock+0x9/0x30 [ 327.236279][T18405] ? finish_task_switch+0x79/0x280 [ 327.236310][T18405] ? __schedule+0x82d/0xc90 [ 327.236398][T18405] rtnl_newlink+0xdb5/0x1370 [ 327.236432][T18405] ? __rcu_read_unlock+0x4e/0x70 [ 327.236551][T18405] ? __memcg_slab_free_hook+0x135/0x230 [ 327.236593][T18405] ? __rcu_read_unlock+0x4e/0x70 [ 327.236621][T18405] ? avc_has_perm_noaudit+0xab/0x130 [ 327.236652][T18405] ? cred_has_capability+0x224/0x290 [ 327.236685][T18405] ? selinux_capable+0x31/0x40 [ 327.236780][T18405] ? security_capable+0x7b/0x90 [ 327.236888][T18405] ? ns_capable+0x7c/0xb0 [ 327.236921][T18405] ? __pfx_rtnl_newlink+0x10/0x10 [ 327.236949][T18405] rtnetlink_rcv_msg+0x64b/0x720 [ 327.236974][T18405] netlink_rcv_skb+0x123/0x220 [ 327.237060][T18405] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 327.237091][T18405] rtnetlink_rcv+0x1c/0x30 [ 327.237116][T18405] netlink_unicast+0x5c0/0x690 [ 327.237178][T18405] netlink_sendmsg+0x5c8/0x6f0 [ 327.237198][T18405] ? __pfx_netlink_sendmsg+0x10/0x10 [ 327.237223][T18405] ____sys_sendmsg+0x5af/0x600 [ 327.237248][T18405] ___sys_sendmsg+0x195/0x1e0 [ 327.237275][T18405] __x64_sys_sendmsg+0xd4/0x160 [ 327.237410][T18405] x64_sys_call+0x17ba/0x3000 [ 327.237441][T18405] do_syscall_64+0xc0/0x2a0 [ 327.237469][T18405] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.237495][T18405] RIP: 0033:0x7fc6b85caeb9 [ 327.237511][T18405] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 327.237530][T18405] RSP: 002b:00007fc6b7027028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 327.237556][T18405] RAX: ffffffffffffffda RBX: 00007fc6b8845fa0 RCX: 00007fc6b85caeb9 [ 327.237574][T18405] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000004 [ 327.237662][T18405] RBP: 00007fc6b7027090 R08: 0000000000000000 R09: 0000000000000000 [ 327.237676][T18405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.237691][T18405] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 327.237713][T18405] [ 327.584815][T18405] gretap0: refused to change device tx_queue_len [ 328.011491][T18453] FAULT_INJECTION: forcing a failure. [ 328.011491][T18453] name failslab, interval 1, probability 0, space 0, times 0 [ 328.024343][T18453] CPU: 0 UID: 0 PID: 18453 Comm: syz.1.6211 Not tainted syzkaller #0 PREEMPT(voluntary) [ 328.024440][T18453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 328.024453][T18453] Call Trace: [ 328.024461][T18453] [ 328.024469][T18453] __dump_stack+0x1d/0x30 [ 328.024507][T18453] dump_stack_lvl+0x95/0xd0 [ 328.024608][T18453] dump_stack+0x15/0x1b [ 328.024630][T18453] should_fail_ex+0x263/0x280 [ 328.024663][T18453] should_failslab+0x8c/0xb0 [ 328.024686][T18453] kmem_cache_alloc_noprof+0x68/0x490 [ 328.024740][T18453] ? create_new_namespaces+0x3c/0x440 [ 328.024807][T18453] create_new_namespaces+0x3c/0x440 [ 328.024829][T18453] unshare_nsproxy_namespaces+0xe6/0x120 [ 328.024923][T18453] ksys_unshare+0x3cd/0x6d0 [ 328.024944][T18453] ? ksys_write+0x161/0x1a0 [ 328.024964][T18453] __x64_sys_unshare+0x1f/0x30 [ 328.024986][T18453] x64_sys_call+0x2ae6/0x3000 [ 328.025033][T18453] do_syscall_64+0xc0/0x2a0 [ 328.025065][T18453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.025099][T18453] RIP: 0033:0x7f717a01aeb9 [ 328.025136][T18453] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 328.025155][T18453] RSP: 002b:00007f7178a77028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 328.025176][T18453] RAX: ffffffffffffffda RBX: 00007f717a295fa0 RCX: 00007f717a01aeb9 [ 328.025191][T18453] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000400 [ 328.025206][T18453] RBP: 00007f7178a77090 R08: 0000000000000000 R09: 0000000000000000 [ 328.025221][T18453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.025284][T18453] R13: 00007f717a296038 R14: 00007f717a295fa0 R15: 00007fff6b327008 [ 328.025319][T18453] [ 328.275196][T18461] netlink: 60 bytes leftover after parsing attributes in process `syz.0.6216'. [ 328.317951][T18461] bridge7: entered promiscuous mode [ 328.323271][T18461] bridge7: entered allmulticast mode [ 328.575697][T18512] Option 'Ú¼ÂeFœýØ 2Í‚úØ ·æÞÅ ¡†¶K¡…*Ϫã,ÛŸÊn‰yBÞ6Îf[åA [ 328.575697][T18512] Q¿ñí׿2:[¼„‚”·¶éÇkáz' to dns_resolver key: bad/missing value [ 329.925265][T18567] netlink: 65039 bytes leftover after parsing attributes in process `syz.2.6261'. [ 330.056526][T18583] Option 'Ú¼ÂeFœýØ 2Í‚úØ ·æÞÅ ¡†¶K¡…*Ϫã,ÛŸÊn‰yBÞ6Îf[åA [ 330.056526][T18583] Q¿ñí׿2:[¼„‚”·¶éÇkáz' to dns_resolver key: bad/missing value [ 330.383088][T18615] syzkaller0: entered promiscuous mode [ 330.388696][T18615] syzkaller0: entered allmulticast mode [ 330.398168][T18615] FAULT_INJECTION: forcing a failure. [ 330.398168][T18615] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.411615][T18615] CPU: 0 UID: 0 PID: 18615 Comm: syz.3.6283 Not tainted syzkaller #0 PREEMPT(voluntary) [ 330.411714][T18615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 330.411802][T18615] Call Trace: [ 330.411810][T18615] [ 330.411820][T18615] __dump_stack+0x1d/0x30 [ 330.411864][T18615] dump_stack_lvl+0x95/0xd0 [ 330.411889][T18615] dump_stack+0x15/0x1b [ 330.412024][T18615] should_fail_ex+0x263/0x280 [ 330.412057][T18615] should_fail+0xb/0x20 [ 330.412086][T18615] should_fail_usercopy+0x1a/0x20 [ 330.412155][T18615] _copy_to_user+0x20/0xa0 [ 330.412204][T18615] simple_read_from_buffer+0xb5/0x130 [ 330.412246][T18615] proc_fail_nth_read+0x10e/0x150 [ 330.412279][T18615] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 330.412330][T18615] vfs_read+0x1ab/0x7f0 [ 330.412352][T18615] ? __rcu_read_unlock+0x4e/0x70 [ 330.412382][T18615] ? __fget_files+0x184/0x1c0 [ 330.412476][T18615] ? mutex_lock+0x57/0x90 [ 330.412529][T18615] ksys_read+0xdc/0x1a0 [ 330.412551][T18615] __x64_sys_read+0x40/0x50 [ 330.412574][T18615] x64_sys_call+0x2889/0x3000 [ 330.412603][T18615] do_syscall_64+0xc0/0x2a0 [ 330.412715][T18615] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 330.412741][T18615] RIP: 0033:0x7f4ba235b78e [ 330.412760][T18615] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 330.412818][T18615] RSP: 002b:00007f4ba0df6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 330.412846][T18615] RAX: ffffffffffffffda RBX: 00007f4ba0df76c0 RCX: 00007f4ba235b78e [ 330.412864][T18615] RDX: 000000000000000f RSI: 00007f4ba0df70a0 RDI: 000000000000000a [ 330.412880][T18615] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 330.412896][T18615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.412909][T18615] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 330.412927][T18615] [ 330.622505][T18619] geneve3: entered promiscuous mode [ 330.628198][ T3508] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.637072][ T3508] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.645961][ T3508] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.656273][ T3508] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.672228][T18624] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 330.680672][T18624] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 330.723098][T18631] netlink: 'syz.4.6286': attribute type 13 has an invalid length. [ 330.731202][T18631] netlink: 'syz.4.6286': attribute type 27 has an invalid length. [ 330.750020][T18635] netlink: 1004 bytes leftover after parsing attributes in process `syz.3.6292'. [ 330.780645][T18637] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18637 comm=syz.3.6293 [ 330.896760][T18645] netlink: 'syz.3.6296': attribute type 10 has an invalid length. [ 330.996173][T18653] FAULT_INJECTION: forcing a failure. [ 330.996173][T18653] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.009535][T18653] CPU: 1 UID: 0 PID: 18653 Comm: syz.4.6299 Not tainted syzkaller #0 PREEMPT(voluntary) [ 331.009552][T18653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 331.009560][T18653] Call Trace: [ 331.009564][T18653] [ 331.009639][T18653] __dump_stack+0x1d/0x30 [ 331.009691][T18653] dump_stack_lvl+0x95/0xd0 [ 331.009703][T18653] dump_stack+0x15/0x1b [ 331.009714][T18653] should_fail_ex+0x263/0x280 [ 331.009748][T18653] should_fail+0xb/0x20 [ 331.009773][T18653] should_fail_usercopy+0x1a/0x20 [ 331.009799][T18653] _copy_to_user+0x20/0xa0 [ 331.009867][T18653] simple_read_from_buffer+0xb5/0x130 [ 331.009956][T18653] proc_fail_nth_read+0x10e/0x150 [ 331.009972][T18653] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 331.010063][T18653] vfs_read+0x1ab/0x7f0 [ 331.010073][T18653] ? __rcu_read_unlock+0x4e/0x70 [ 331.010148][T18653] ? __fget_files+0x184/0x1c0 [ 331.010169][T18653] ? mutex_lock+0x57/0x90 [ 331.010182][T18653] ksys_read+0xdc/0x1a0 [ 331.010192][T18653] __x64_sys_read+0x40/0x50 [ 331.010241][T18653] x64_sys_call+0x2889/0x3000 [ 331.010254][T18653] do_syscall_64+0xc0/0x2a0 [ 331.010275][T18653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.010287][T18653] RIP: 0033:0x7f26444bb78e [ 331.010297][T18653] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 331.010308][T18653] RSP: 002b:00007f2642f56fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 331.010321][T18653] RAX: ffffffffffffffda RBX: 00007f2642f576c0 RCX: 00007f26444bb78e [ 331.010331][T18653] RDX: 000000000000000f RSI: 00007f2642f570a0 RDI: 0000000000000003 [ 331.010338][T18653] RBP: 00007f2642f57090 R08: 0000000000000000 R09: 0000000000000000 [ 331.010351][T18653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.010359][T18653] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 331.010368][T18653] [ 331.246356][T18660] netlink: 1004 bytes leftover after parsing attributes in process `syz.4.6303'. [ 331.445792][T18683] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6312'. [ 331.547845][T18696] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6314'. [ 331.557096][T18696] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6314'. [ 331.574187][T18696] netlink: 'syz.4.6314': attribute type 10 has an invalid length. [ 331.582123][T18696] netlink: 40 bytes leftover after parsing attributes in process `syz.4.6314'. [ 331.594599][T18696] team0: entered promiscuous mode [ 331.599671][T18696] team_slave_0: entered promiscuous mode [ 331.605698][T18696] team_slave_1: entered promiscuous mode [ 331.611557][T18696] team0: entered allmulticast mode [ 331.616722][T18696] team_slave_0: entered allmulticast mode [ 331.620145][ T29] kauditd_printk_skb: 1527 callbacks suppressed [ 331.620161][ T29] audit: type=1400 audit(6064706740.483:40895): avc: denied { map_create } for pid=18702 comm="syz.3.6321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.623190][T18696] team_slave_1: entered allmulticast mode [ 331.629890][ T29] audit: type=1400 audit(6064706740.493:40896): avc: denied { allowed } for pid=18702 comm="syz.3.6321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 331.649190][T18696] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.655728][ T29] audit: type=1400 audit(6064706740.533:40897): avc: denied { create } for pid=18702 comm="syz.3.6321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 331.675493][T18696] bridge0: port 2(team0) entered blocking state [ 331.707974][T18696] bridge0: port 2(team0) entered disabled state [ 331.726149][ T29] audit: type=1400 audit(6064706740.593:40898): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.752232][ T29] audit: type=1326 audit(6064706740.623:40899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18701 comm="syz.3.6319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f4ba239aeb9 code=0x7ffc0000 [ 331.776259][ T29] audit: type=1400 audit(6064706740.623:40900): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.801501][ T29] audit: type=1400 audit(6064706740.653:40901): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.826007][ T29] audit: type=1400 audit(6064706740.653:40902): avc: denied { read append } for pid=18709 comm="syz.4.6324" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.850939][ T29] audit: type=1400 audit(6064706740.653:40903): avc: denied { create } for pid=18709 comm="syz.4.6324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 331.870848][ T29] audit: type=1400 audit(6064706740.653:40904): avc: denied { module_request } for pid=18709 comm="syz.4.6324" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 331.894851][T18717] FAULT_INJECTION: forcing a failure. [ 331.894851][T18717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.908014][T18717] CPU: 1 UID: 0 PID: 18717 Comm: syz.0.6327 Not tainted syzkaller #0 PREEMPT(voluntary) [ 331.908060][T18717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 331.908153][T18717] Call Trace: [ 331.908159][T18717] [ 331.908167][T18717] __dump_stack+0x1d/0x30 [ 331.908185][T18717] dump_stack_lvl+0x95/0xd0 [ 331.908197][T18717] dump_stack+0x15/0x1b [ 331.908244][T18717] should_fail_ex+0x263/0x280 [ 331.908261][T18717] should_fail+0xb/0x20 [ 331.908275][T18717] should_fail_usercopy+0x1a/0x20 [ 331.908294][T18717] _copy_from_user+0x1c/0xb0 [ 331.908306][T18717] do_sock_getsockopt+0xf1/0x210 [ 331.908324][T18717] __x64_sys_getsockopt+0x11d/0x1a0 [ 331.908367][T18717] x64_sys_call+0x2dc7/0x3000 [ 331.908381][T18717] do_syscall_64+0xc0/0x2a0 [ 331.908448][T18717] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.908460][T18717] RIP: 0033:0x7fc6b85caeb9 [ 331.908507][T18717] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 331.908517][T18717] RSP: 002b:00007fc6b7027028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 331.908530][T18717] RAX: ffffffffffffffda RBX: 00007fc6b8845fa0 RCX: 00007fc6b85caeb9 [ 331.908538][T18717] RDX: 0000000000000013 RSI: 0000000000000084 RDI: 0000000000000003 [ 331.908621][T18717] RBP: 00007fc6b7027090 R08: 0000200000000040 R09: 0000000000000000 [ 331.908661][T18717] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.908740][T18717] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 331.908779][T18717] [ 332.079085][T18719] FAULT_INJECTION: forcing a failure. [ 332.079085][T18719] name failslab, interval 1, probability 0, space 0, times 0 [ 332.092031][T18719] CPU: 0 UID: 0 PID: 18719 Comm: syz.0.6328 Not tainted syzkaller #0 PREEMPT(voluntary) [ 332.092059][T18719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 332.092074][T18719] Call Trace: [ 332.092148][T18719] [ 332.092158][T18719] __dump_stack+0x1d/0x30 [ 332.092186][T18719] dump_stack_lvl+0x95/0xd0 [ 332.092225][T18719] dump_stack+0x15/0x1b [ 332.092301][T18719] should_fail_ex+0x263/0x280 [ 332.092323][T18719] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 332.092344][T18719] should_failslab+0x8c/0xb0 [ 332.092361][T18719] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 332.092382][T18719] ? shmem_alloc_inode+0x34/0x50 [ 332.092402][T18719] ? kstrtouint+0x76/0xc0 [ 332.092541][T18719] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 332.092561][T18719] shmem_alloc_inode+0x34/0x50 [ 332.092581][T18719] alloc_inode+0x40/0x170 [ 332.092601][T18719] new_inode+0x1d/0xe0 [ 332.092692][T18719] shmem_get_inode+0x246/0x750 [ 332.092713][T18719] __shmem_file_setup+0x112/0x210 [ 332.092732][T18719] shmem_file_setup+0x3b/0x50 [ 332.092750][T18719] memfd_alloc_file+0x4e/0x300 [ 332.092770][T18719] __se_sys_memfd_create+0x2e1/0x3b0 [ 332.092787][T18719] __x64_sys_memfd_create+0x31/0x40 [ 332.092804][T18719] x64_sys_call+0x28cb/0x3000 [ 332.092889][T18719] do_syscall_64+0xc0/0x2a0 [ 332.092906][T18719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.092948][T18719] RIP: 0033:0x7fc6b85caeb9 [ 332.092958][T18719] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 332.092969][T18719] RSP: 002b:00007fc6b7026e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 332.093049][T18719] RAX: ffffffffffffffda RBX: 000000000000030a RCX: 00007fc6b85caeb9 [ 332.093057][T18719] RDX: 00007fc6b7026ee0 RSI: 0000000000000000 RDI: 00007fc6b8637333 [ 332.093138][T18719] RBP: 0000200000001040 R08: 00000000ffffffff R09: 0000000000000000 [ 332.093193][T18719] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000000 [ 332.093204][T18719] R13: 00007fc6b7026ee0 R14: 00007fc6b7026ea0 R15: 0000200000000080 [ 332.093220][T18719] [ 332.539495][T18746] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6339'. [ 332.585342][T18756] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6344'. [ 332.686884][T18776] net_ratelimit: 16 callbacks suppressed [ 332.686904][T18776] geneve1: mtu less than device minimum [ 333.600747][T18863] netlink: 'syz.1.6392': attribute type 13 has an invalid length. [ 333.608716][T18863] netlink: 'syz.1.6392': attribute type 27 has an invalid length. [ 333.736847][T18872] FAULT_INJECTION: forcing a failure. [ 333.736847][T18872] name failslab, interval 1, probability 0, space 0, times 0 [ 333.749562][T18872] CPU: 1 UID: 0 PID: 18872 Comm: syz.1.6396 Not tainted syzkaller #0 PREEMPT(voluntary) [ 333.749597][T18872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 333.749612][T18872] Call Trace: [ 333.749622][T18872] [ 333.749679][T18872] __dump_stack+0x1d/0x30 [ 333.749709][T18872] dump_stack_lvl+0x95/0xd0 [ 333.749807][T18872] dump_stack+0x15/0x1b [ 333.749895][T18872] should_fail_ex+0x263/0x280 [ 333.749930][T18872] should_failslab+0x8c/0xb0 [ 333.749958][T18872] __kmalloc_cache_noprof+0x64/0x4a0 [ 333.749989][T18872] ? bpf_prog_create_from_user+0x16b/0x260 [ 333.750083][T18872] bpf_prog_create_from_user+0x16b/0x260 [ 333.750133][T18872] ? do_seccomp+0x5c2/0xa50 [ 333.750156][T18872] ? __pfx_seccomp_check_filter+0x10/0x10 [ 333.750182][T18872] do_seccomp+0x5f7/0xa50 [ 333.750272][T18872] ? fput+0x8f/0xc0 [ 333.750304][T18872] ? ksys_write+0x194/0x1a0 [ 333.750385][T18872] __x64_sys_seccomp+0x40/0x50 [ 333.750422][T18872] x64_sys_call+0x28d6/0x3000 [ 333.750452][T18872] do_syscall_64+0xc0/0x2a0 [ 333.750541][T18872] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 333.750567][T18872] RIP: 0033:0x7f717a01aeb9 [ 333.750587][T18872] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 333.750609][T18872] RSP: 002b:00007f7178a77028 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 333.750694][T18872] RAX: ffffffffffffffda RBX: 00007f717a295fa0 RCX: 00007f717a01aeb9 [ 333.750712][T18872] RDX: 0000200000000040 RSI: 0000000000000008 RDI: 0000000000000001 [ 333.750728][T18872] RBP: 00007f7178a77090 R08: 0000000000000000 R09: 0000000000000000 [ 333.750746][T18872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.750761][T18872] R13: 00007f717a296038 R14: 00007f717a295fa0 R15: 00007fff6b327008 [ 333.750821][T18872] [ 334.022496][T18886] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6400'. [ 334.105035][T18897] bridge0: left allmulticast mode [ 334.246944][T18915] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18915 comm=syz.2.6417 [ 334.441280][T18945] bond5 (unregistering): Released all slaves [ 334.451825][T18943] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18943 comm=syz.2.6430 [ 334.503097][T18948] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18948 comm=syz.2.6432 [ 334.521545][T18950] FAULT_INJECTION: forcing a failure. [ 334.521545][T18950] name failslab, interval 1, probability 0, space 0, times 0 [ 334.534430][T18950] CPU: 0 UID: 0 PID: 18950 Comm: syz.3.6433 Not tainted syzkaller #0 PREEMPT(voluntary) [ 334.534462][T18950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 334.534475][T18950] Call Trace: [ 334.534482][T18950] [ 334.534531][T18950] __dump_stack+0x1d/0x30 [ 334.534560][T18950] dump_stack_lvl+0x95/0xd0 [ 334.534611][T18950] dump_stack+0x15/0x1b [ 334.534634][T18950] should_fail_ex+0x263/0x280 [ 334.534672][T18950] should_failslab+0x8c/0xb0 [ 334.534705][T18950] kmem_cache_alloc_noprof+0x68/0x490 [ 334.534790][T18950] ? skb_clone+0x151/0x1f0 [ 334.534894][T18950] skb_clone+0x151/0x1f0 [ 334.534986][T18950] __netlink_deliver_tap+0x2c9/0x500 [ 334.535027][T18950] ? netlink_attachskb+0x2e2/0x660 [ 334.535058][T18950] netlink_sendskb+0x126/0x150 [ 334.535091][T18950] netlink_unicast+0x2a2/0x690 [ 334.535154][T18950] netlink_ack+0x4c8/0x500 [ 334.535195][T18950] netlink_rcv_skb+0x192/0x220 [ 334.535318][T18950] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 334.535346][T18950] rtnetlink_rcv+0x1c/0x30 [ 334.535366][T18950] netlink_unicast+0x5c0/0x690 [ 334.535398][T18950] netlink_sendmsg+0x5c8/0x6f0 [ 334.535489][T18950] ? __pfx_netlink_sendmsg+0x10/0x10 [ 334.535510][T18950] ____sys_sendmsg+0x5af/0x600 [ 334.535534][T18950] ___sys_sendmsg+0x195/0x1e0 [ 334.535559][T18950] __x64_sys_sendmsg+0xd4/0x160 [ 334.535581][T18950] x64_sys_call+0x17ba/0x3000 [ 334.535686][T18950] do_syscall_64+0xc0/0x2a0 [ 334.535722][T18950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.535744][T18950] RIP: 0033:0x7f4ba239aeb9 [ 334.535810][T18950] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 334.535835][T18950] RSP: 002b:00007f4ba0df7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 334.535858][T18950] RAX: ffffffffffffffda RBX: 00007f4ba2615fa0 RCX: 00007f4ba239aeb9 [ 334.535876][T18950] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 334.535893][T18950] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 334.535935][T18950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.535948][T18950] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 334.535965][T18950] [ 334.841469][T18957] FAULT_INJECTION: forcing a failure. [ 334.841469][T18957] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.854957][T18957] CPU: 1 UID: 0 PID: 18957 Comm: syz.2.6435 Not tainted syzkaller #0 PREEMPT(voluntary) [ 334.855004][T18957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 334.855084][T18957] Call Trace: [ 334.855093][T18957] [ 334.855103][T18957] __dump_stack+0x1d/0x30 [ 334.855141][T18957] dump_stack_lvl+0x95/0xd0 [ 334.855172][T18957] dump_stack+0x15/0x1b [ 334.855197][T18957] should_fail_ex+0x263/0x280 [ 334.855289][T18957] should_fail_alloc_page+0xf2/0x100 [ 334.855319][T18957] __alloc_frozen_pages_noprof+0x108/0x350 [ 334.855365][T18957] alloc_pages_mpol+0xb3/0x260 [ 334.855441][T18957] folio_alloc_mpol_noprof+0x39/0x80 [ 334.855479][T18957] shmem_get_folio_gfp+0x3da/0xd60 [ 334.855513][T18957] shmem_write_begin+0xfc/0x1f0 [ 334.855621][T18957] generic_perform_write+0x183/0x490 [ 334.855660][T18957] shmem_file_write_iter+0xc5/0xf0 [ 334.855699][T18957] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 334.855807][T18957] vfs_write+0x5a6/0x9f0 [ 334.855861][T18957] ksys_write+0xdc/0x1a0 [ 334.855965][T18957] __x64_sys_write+0x40/0x50 [ 334.855989][T18957] x64_sys_call+0x2847/0x3000 [ 334.856022][T18957] do_syscall_64+0xc0/0x2a0 [ 334.856054][T18957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.856125][T18957] RIP: 0033:0x7ffa8381b78e [ 334.856145][T18957] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 334.856167][T18957] RSP: 002b:00007ffa822b6cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 334.856193][T18957] RAX: ffffffffffffffda RBX: 00007ffa822b76c0 RCX: 00007ffa8381b78e [ 334.856212][T18957] RDX: 0000000000100000 RSI: 00007ffa79e97000 RDI: 0000000000000004 [ 334.856229][T18957] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 334.856246][T18957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 334.856311][T18957] R13: 00007ffa822b6ddc R14: 00007ffa822b6de0 R15: 00007ffa79e97000 [ 334.856333][T18957] [ 335.144245][T18969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18969 comm=syz.3.6444 [ 335.197857][T18975] __nla_validate_parse: 7 callbacks suppressed [ 335.197877][T18975] netlink: 148 bytes leftover after parsing attributes in process `syz.1.6443'. [ 335.215886][T18971] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18971 comm=syz.4.6442 [ 335.234962][T18981] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6447'. [ 335.297478][T18986] netlink: 'syz.3.6450': attribute type 1 has an invalid length. [ 335.350100][T18999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18999 comm=syz.2.6456 [ 335.353607][T18986] 8021q: adding VLAN 0 to HW filter on device bond5 [ 335.391704][T19000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19000 comm=syz.3.6450 [ 335.465395][T19013] syzkaller0: entered promiscuous mode [ 335.471620][T19013] syzkaller0: entered allmulticast mode [ 335.553771][T19017] netlink: 'syz.1.6463': attribute type 13 has an invalid length. [ 335.563507][T19017] gretap0: refused to change device tx_queue_len [ 335.575032][T19017] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 335.679108][T19022] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=19022 comm=syz.3.6464 [ 335.694778][T19021] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19021 comm=syz.3.6464 [ 336.277080][T19052] netlink: 1004 bytes leftover after parsing attributes in process `syz.1.6477'. [ 336.315823][T19055] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19055 comm=syz.3.6480 [ 336.335398][T19061] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6482'. [ 336.444069][T19070] netlink: 'syz.4.6483': attribute type 5 has an invalid length. [ 336.623807][ T29] kauditd_printk_skb: 626 callbacks suppressed [ 336.623841][ T29] audit: type=1400 audit(6064706745.493:41531): avc: denied { create } for pid=19083 comm="syz.1.6493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 336.659658][ T29] audit: type=1400 audit(6064706745.523:41532): avc: denied { create } for pid=19083 comm="syz.1.6493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 336.681033][ T29] audit: type=1400 audit(6064706745.523:41533): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 336.705862][ T29] audit: type=1400 audit(6064706745.583:41534): avc: denied { read write } for pid=19087 comm="syz.2.6495" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 336.731199][ T29] audit: type=1400 audit(6064706745.583:41535): avc: denied { prog_load } for pid=19083 comm="syz.1.6493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.750685][ T29] audit: type=1400 audit(6064706745.583:41536): avc: denied { create } for pid=19089 comm="syz.4.6496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 336.771193][ T29] audit: type=1400 audit(6064706745.603:41537): avc: denied { create } for pid=19087 comm="syz.2.6495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 336.802471][ T29] audit: type=1400 audit(6064706745.603:41538): avc: denied { read } for pid=19087 comm="syz.2.6495" dev="nsfs" ino=4026532474 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 336.802874][T19094] netlink: 'syz.4.6499': attribute type 10 has an invalid length. [ 336.824511][ T29] audit: type=1400 audit(6064706745.603:41539): avc: denied { open } for pid=19087 comm="syz.2.6495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 336.852667][ T29] audit: type=1400 audit(6064706745.623:41540): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 336.872191][T19099] FAULT_INJECTION: forcing a failure. [ 336.872191][T19099] name failslab, interval 1, probability 0, space 0, times 0 [ 336.890078][T19099] CPU: 0 UID: 0 PID: 19099 Comm: syz.1.6501 Not tainted syzkaller #0 PREEMPT(voluntary) [ 336.890151][T19099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 336.890165][T19099] Call Trace: [ 336.890174][T19099] [ 336.890184][T19099] __dump_stack+0x1d/0x30 [ 336.890214][T19099] dump_stack_lvl+0x95/0xd0 [ 336.890269][T19099] dump_stack+0x15/0x1b [ 336.890290][T19099] should_fail_ex+0x263/0x280 [ 336.890371][T19099] should_failslab+0x8c/0xb0 [ 336.890399][T19099] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 336.890430][T19099] ? __alloc_skb+0x2f0/0x4b0 [ 336.890514][T19099] __alloc_skb+0x2f0/0x4b0 [ 336.890542][T19099] ? __alloc_skb+0x219/0x4b0 [ 336.890578][T19099] audit_log_start+0x3aa/0x730 [ 336.890612][T19099] ? inode_maybe_inc_iversion+0x127/0x160 [ 336.890642][T19099] audit_seccomp+0x47/0x100 [ 336.890743][T19099] ? __seccomp_filter+0x8db/0x1350 [ 336.890764][T19099] __seccomp_filter+0x8ec/0x1350 [ 336.890790][T19099] ? mnt_drop_write+0xbc/0x120 [ 336.890932][T19099] ? lockref_put_return+0xf7/0x130 [ 336.890957][T19099] __secure_computing+0x81/0x150 [ 336.890982][T19099] syscall_trace_enter+0xce/0x1e0 [ 336.891048][T19099] do_syscall_64+0x9a/0x2a0 [ 336.891083][T19099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.891111][T19099] RIP: 0033:0x7f7179fdb78e [ 336.891198][T19099] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 336.891276][T19099] RSP: 002b:00007f7178a76fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 336.891303][T19099] RAX: ffffffffffffffda RBX: 00007f7178a776c0 RCX: 00007f7179fdb78e [ 336.891321][T19099] RDX: 000000000000000f RSI: 00007f7178a770a0 RDI: 0000000000000004 [ 336.891350][T19099] RBP: 00007f7178a77090 R08: 0000000000000000 R09: 0000000000000000 [ 336.891364][T19099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.891377][T19099] R13: 00007f717a296038 R14: 00007f717a295fa0 R15: 00007fff6b327008 [ 336.891395][T19099] [ 337.129079][T19102] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19102 comm=syz.3.6497 [ 337.152084][T19108] FAULT_INJECTION: forcing a failure. [ 337.152084][T19108] name failslab, interval 1, probability 0, space 0, times 0 [ 337.164798][T19108] CPU: 0 UID: 0 PID: 19108 Comm: syz.4.6503 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.164883][T19108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 337.164899][T19108] Call Trace: [ 337.164907][T19108] [ 337.164925][T19108] __dump_stack+0x1d/0x30 [ 337.164992][T19108] dump_stack_lvl+0x95/0xd0 [ 337.165026][T19108] dump_stack+0x15/0x1b [ 337.165050][T19108] should_fail_ex+0x263/0x280 [ 337.165134][T19108] should_failslab+0x8c/0xb0 [ 337.165244][T19108] __kmalloc_node_track_caller_noprof+0xb8/0x590 [ 337.165352][T19108] ? sidtab_sid2str_get+0xa0/0x130 [ 337.165416][T19108] kmemdup_noprof+0x2b/0x70 [ 337.165440][T19108] sidtab_sid2str_get+0xa0/0x130 [ 337.165469][T19108] security_sid_to_context_core+0x1eb/0x2e0 [ 337.165571][T19108] security_sid_to_context+0x27/0x40 [ 337.165601][T19108] avc_audit_post_callback+0x9d/0x520 [ 337.165638][T19108] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 337.165712][T19108] common_lsm_audit+0x1ba/0x230 [ 337.165739][T19108] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 337.165778][T19108] slow_avc_audit+0x14c/0x190 [ 337.165813][T19108] cred_has_capability+0x1c1/0x290 [ 337.165841][T19108] selinux_capable+0x31/0x40 [ 337.165860][T19108] security_capable+0x7b/0x90 [ 337.165975][T19108] capable+0x4b/0xb0 [ 337.166097][T19108] dev_load+0x86/0xc0 [ 337.166120][T19108] dev_ioctl+0x776/0x960 [ 337.166201][T19108] sock_ioctl+0x593/0x610 [ 337.166297][T19108] ? __pfx_sock_ioctl+0x10/0x10 [ 337.166321][T19108] __se_sys_ioctl+0xce/0x140 [ 337.166352][T19108] __x64_sys_ioctl+0x43/0x50 [ 337.166454][T19108] x64_sys_call+0x14b0/0x3000 [ 337.166649][T19108] do_syscall_64+0xc0/0x2a0 [ 337.166683][T19108] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.166706][T19108] RIP: 0033:0x7f26444faeb9 [ 337.166723][T19108] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.166805][T19108] RSP: 002b:00007f2642f57028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.166827][T19108] RAX: ffffffffffffffda RBX: 00007f2644775fa0 RCX: 00007f26444faeb9 [ 337.166842][T19108] RDX: 0000200000002280 RSI: 00000000000089fd RDI: 0000000000000003 [ 337.166856][T19108] RBP: 00007f2642f57090 R08: 0000000000000000 R09: 0000000000000000 [ 337.166871][T19108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.166899][T19108] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 337.166921][T19108] [ 337.171858][T19111] FAULT_INJECTION: forcing a failure. [ 337.171858][T19111] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.312491][T19118] netlink: 1004 bytes leftover after parsing attributes in process `syz.2.6509'. [ 337.313311][T19111] CPU: 1 UID: 0 PID: 19111 Comm: syz.3.6506 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.313349][T19111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 337.313380][T19111] Call Trace: [ 337.313467][T19111] [ 337.313553][T19111] __dump_stack+0x1d/0x30 [ 337.313580][T19111] dump_stack_lvl+0x95/0xd0 [ 337.313655][T19111] dump_stack+0x15/0x1b [ 337.313750][T19111] should_fail_ex+0x263/0x280 [ 337.313846][T19111] should_fail+0xb/0x20 [ 337.313875][T19111] should_fail_usercopy+0x1a/0x20 [ 337.313946][T19111] _copy_from_user+0x1c/0xb0 [ 337.313969][T19111] ___sys_sendmsg+0xc1/0x1e0 [ 337.313998][T19111] __sys_sendmmsg+0x185/0x320 [ 337.314025][T19111] __x64_sys_sendmmsg+0x57/0x70 [ 337.314059][T19111] x64_sys_call+0x1e28/0x3000 [ 337.314125][T19111] do_syscall_64+0xc0/0x2a0 [ 337.314156][T19111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.314179][T19111] RIP: 0033:0x7f4ba239aeb9 [ 337.314198][T19111] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.314296][T19111] RSP: 002b:00007f4ba0df7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 337.314319][T19111] RAX: ffffffffffffffda RBX: 00007f4ba2615fa0 RCX: 00007f4ba239aeb9 [ 337.314335][T19111] RDX: 0400000000000159 RSI: 0000200000001c00 RDI: 0000000000000003 [ 337.314359][T19111] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 337.314373][T19111] R10: 0000000000040840 R11: 0000000000000246 R12: 0000000000000001 [ 337.314423][T19111] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 337.314548][T19111] [ 337.406115][T19123] sch_tbf: peakrate 16 is lower than or equals to rate 1215085480286663888 ! [ 337.680836][T19133] FAULT_INJECTION: forcing a failure. [ 337.680836][T19133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.694219][T19133] CPU: 1 UID: 0 PID: 19133 Comm: syz.2.6514 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.694251][T19133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 337.694264][T19133] Call Trace: [ 337.694279][T19133] [ 337.694287][T19133] __dump_stack+0x1d/0x30 [ 337.694385][T19133] dump_stack_lvl+0x95/0xd0 [ 337.694412][T19133] dump_stack+0x15/0x1b [ 337.694432][T19133] should_fail_ex+0x263/0x280 [ 337.694536][T19133] should_fail+0xb/0x20 [ 337.694566][T19133] should_fail_usercopy+0x1a/0x20 [ 337.694665][T19133] _copy_from_user+0x1c/0xb0 [ 337.694708][T19133] snd_seq_write+0x1d5/0x560 [ 337.694736][T19133] ? __pfx_snd_seq_write+0x10/0x10 [ 337.694762][T19133] vfs_write+0x269/0x9f0 [ 337.694783][T19133] ? __rcu_read_unlock+0x4e/0x70 [ 337.694864][T19133] ? __fget_files+0x184/0x1c0 [ 337.694888][T19133] ksys_write+0xdc/0x1a0 [ 337.694907][T19133] __x64_sys_write+0x40/0x50 [ 337.694926][T19133] x64_sys_call+0x2847/0x3000 [ 337.695016][T19133] do_syscall_64+0xc0/0x2a0 [ 337.695045][T19133] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.695067][T19133] RIP: 0033:0x7ffa8385aeb9 [ 337.695091][T19133] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.695110][T19133] RSP: 002b:00007ffa822b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 337.695131][T19133] RAX: ffffffffffffffda RBX: 00007ffa83ad5fa0 RCX: 00007ffa8385aeb9 [ 337.695145][T19133] RDX: 000000000001001a RSI: 0000200000000000 RDI: 0000000000000003 [ 337.695158][T19133] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 337.695248][T19133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.695261][T19133] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 337.695284][T19133] [ 338.035227][T19160] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6528'. [ 338.243944][T19184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19184 comm=syz.0.6539 [ 338.319724][T19190] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19190 comm=syz.0.6542 [ 338.492991][T19207] FAULT_INJECTION: forcing a failure. [ 338.492991][T19207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.506520][T19207] CPU: 0 UID: 0 PID: 19207 Comm: syz.2.6548 Not tainted syzkaller #0 PREEMPT(voluntary) [ 338.506553][T19207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 338.506566][T19207] Call Trace: [ 338.506573][T19207] [ 338.506582][T19207] __dump_stack+0x1d/0x30 [ 338.506645][T19207] dump_stack_lvl+0x95/0xd0 [ 338.506666][T19207] dump_stack+0x15/0x1b [ 338.506685][T19207] should_fail_ex+0x263/0x280 [ 338.506767][T19207] should_fail+0xb/0x20 [ 338.506793][T19207] should_fail_usercopy+0x1a/0x20 [ 338.506824][T19207] _copy_from_user+0x1c/0xb0 [ 338.506846][T19207] ___sys_sendmsg+0xc1/0x1e0 [ 338.506873][T19207] __x64_sys_sendmsg+0xd4/0x160 [ 338.506893][T19207] x64_sys_call+0x17ba/0x3000 [ 338.506918][T19207] do_syscall_64+0xc0/0x2a0 [ 338.506962][T19207] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 338.506984][T19207] RIP: 0033:0x7ffa8385aeb9 [ 338.507000][T19207] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 338.507019][T19207] RSP: 002b:00007ffa822b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.507104][T19207] RAX: ffffffffffffffda RBX: 00007ffa83ad5fa0 RCX: 00007ffa8385aeb9 [ 338.507119][T19207] RDX: 0000000024040040 RSI: 0000200000000780 RDI: 0000000000000003 [ 338.507133][T19207] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 338.507146][T19207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.507158][T19207] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 338.507176][T19207] [ 338.564346][T19213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19213 comm=syz.1.6551 [ 338.824481][T19247] FAULT_INJECTION: forcing a failure. [ 338.824481][T19247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.837650][T19247] CPU: 0 UID: 0 PID: 19247 Comm: syz.2.6566 Not tainted syzkaller #0 PREEMPT(voluntary) [ 338.837736][T19247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 338.837750][T19247] Call Trace: [ 338.837757][T19247] [ 338.837767][T19247] __dump_stack+0x1d/0x30 [ 338.837796][T19247] dump_stack_lvl+0x95/0xd0 [ 338.837821][T19247] dump_stack+0x15/0x1b [ 338.837856][T19247] should_fail_ex+0x263/0x280 [ 338.837893][T19247] should_fail+0xb/0x20 [ 338.837924][T19247] should_fail_usercopy+0x1a/0x20 [ 338.837962][T19247] _copy_to_user+0x20/0xa0 [ 338.837988][T19247] simple_read_from_buffer+0xb5/0x130 [ 338.838030][T19247] proc_fail_nth_read+0x10e/0x150 [ 338.838119][T19247] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 338.838147][T19247] vfs_read+0x1ab/0x7f0 [ 338.838246][T19247] ? __rcu_read_unlock+0x4e/0x70 [ 338.838281][T19247] ? __fget_files+0x184/0x1c0 [ 338.838310][T19247] ? mutex_lock+0x57/0x90 [ 338.838340][T19247] ksys_read+0xdc/0x1a0 [ 338.838363][T19247] __x64_sys_read+0x40/0x50 [ 338.838386][T19247] x64_sys_call+0x2889/0x3000 [ 338.838455][T19247] do_syscall_64+0xc0/0x2a0 [ 338.838485][T19247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 338.838509][T19247] RIP: 0033:0x7ffa8381b78e [ 338.838529][T19247] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 338.838554][T19247] RSP: 002b:00007ffa822b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 338.838614][T19247] RAX: ffffffffffffffda RBX: 00007ffa822b76c0 RCX: 00007ffa8381b78e [ 338.838651][T19247] RDX: 000000000000000f RSI: 00007ffa822b70a0 RDI: 0000000000000003 [ 338.838665][T19247] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 338.838681][T19247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.838697][T19247] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 338.838716][T19247] [ 339.146557][T19269] FAULT_INJECTION: forcing a failure. [ 339.146557][T19269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.160630][T19269] CPU: 1 UID: 0 PID: 19269 Comm: syz.2.6577 Not tainted syzkaller #0 PREEMPT(voluntary) [ 339.160730][T19269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 339.160743][T19269] Call Trace: [ 339.160751][T19269] [ 339.160828][T19269] __dump_stack+0x1d/0x30 [ 339.160859][T19269] dump_stack_lvl+0x95/0xd0 [ 339.160963][T19269] dump_stack+0x15/0x1b [ 339.160987][T19269] should_fail_ex+0x263/0x280 [ 339.161055][T19269] should_fail+0xb/0x20 [ 339.161127][T19269] should_fail_usercopy+0x1a/0x20 [ 339.161166][T19269] _copy_from_user+0x1c/0xb0 [ 339.161192][T19269] set_selection_user+0x4a/0xf0 [ 339.161225][T19269] tioclinux+0x346/0x460 [ 339.161326][T19269] vt_ioctl+0x75e/0x18d0 [ 339.161354][T19269] ? tty_jobctrl_ioctl+0x29c/0x810 [ 339.161381][T19269] tty_ioctl+0x7d7/0xb80 [ 339.161435][T19269] ? __pfx_tty_ioctl+0x10/0x10 [ 339.161472][T19269] __se_sys_ioctl+0xce/0x140 [ 339.161574][T19269] __x64_sys_ioctl+0x43/0x50 [ 339.161612][T19269] x64_sys_call+0x14b0/0x3000 [ 339.161661][T19269] do_syscall_64+0xc0/0x2a0 [ 339.161695][T19269] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.161721][T19269] RIP: 0033:0x7ffa8385aeb9 [ 339.161741][T19269] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 339.161764][T19269] RSP: 002b:00007ffa822b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.161826][T19269] RAX: ffffffffffffffda RBX: 00007ffa83ad5fa0 RCX: 00007ffa8385aeb9 [ 339.161871][T19269] RDX: 0000200000001900 RSI: 000000000000541c RDI: 0000000000000004 [ 339.161881][T19269] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 339.161890][T19269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.161899][T19269] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 339.161959][T19269] [ 339.364615][T19289] serio: Serial port ptm3 [ 339.789440][T19331] xt_NFQUEUE: number of total queues is 0 [ 339.960581][T19339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=19339 comm=syz.3.6608 [ 340.217436][T19355] FAULT_INJECTION: forcing a failure. [ 340.217436][T19355] name failslab, interval 1, probability 0, space 0, times 0 [ 340.230530][T19355] CPU: 1 UID: 0 PID: 19355 Comm: syz.1.6616 Not tainted syzkaller #0 PREEMPT(voluntary) [ 340.230548][T19355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 340.230555][T19355] Call Trace: [ 340.230630][T19355] [ 340.230635][T19355] __dump_stack+0x1d/0x30 [ 340.230650][T19355] dump_stack_lvl+0x95/0xd0 [ 340.230661][T19355] dump_stack+0x15/0x1b [ 340.230672][T19355] should_fail_ex+0x263/0x280 [ 340.230757][T19355] should_failslab+0x8c/0xb0 [ 340.230770][T19355] kmem_cache_alloc_noprof+0x68/0x490 [ 340.230783][T19355] ? security_inode_alloc+0x37/0x100 [ 340.230915][T19355] security_inode_alloc+0x37/0x100 [ 340.230931][T19355] inode_init_always_gfp+0x4b7/0x500 [ 340.230945][T19355] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 340.230975][T19355] alloc_inode+0x58/0x170 [ 340.230998][T19355] new_inode+0x1d/0xe0 [ 340.231010][T19355] shmem_get_inode+0x246/0x750 [ 340.231026][T19355] __shmem_file_setup+0x112/0x210 [ 340.231048][T19355] shmem_file_setup+0x3b/0x50 [ 340.231120][T19355] memfd_alloc_file+0x4e/0x300 [ 340.231209][T19355] __se_sys_memfd_create+0x2e1/0x3b0 [ 340.231226][T19355] __x64_sys_memfd_create+0x31/0x40 [ 340.231243][T19355] x64_sys_call+0x28cb/0x3000 [ 340.231315][T19355] do_syscall_64+0xc0/0x2a0 [ 340.231331][T19355] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.231378][T19355] RIP: 0033:0x7f717a01aeb9 [ 340.231388][T19355] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 340.231398][T19355] RSP: 002b:00007f7178a76e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 340.231443][T19355] RAX: ffffffffffffffda RBX: 000000000000030a RCX: 00007f717a01aeb9 [ 340.231468][T19355] RDX: 00007f7178a76ee0 RSI: 0000000000000000 RDI: 00007f717a087333 [ 340.231476][T19355] RBP: 0000200000001040 R08: 00000000ffffffff R09: 0000000000000000 [ 340.231483][T19355] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000000 [ 340.231491][T19355] R13: 00007f7178a76ee0 R14: 00007f7178a76ea0 R15: 0000200000000080 [ 340.231501][T19355] [ 340.704923][T19386] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6630'. [ 340.851266][T19399] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6634'. [ 340.989452][T19406] xt_NFQUEUE: number of total queues is 0 [ 341.079406][T19416] FAULT_INJECTION: forcing a failure. [ 341.079406][T19416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.092541][T19416] CPU: 0 UID: 0 PID: 19416 Comm: syz.2.6641 Not tainted syzkaller #0 PREEMPT(voluntary) [ 341.092615][T19416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 341.092630][T19416] Call Trace: [ 341.092639][T19416] [ 341.092648][T19416] __dump_stack+0x1d/0x30 [ 341.092678][T19416] dump_stack_lvl+0x95/0xd0 [ 341.092776][T19416] dump_stack+0x15/0x1b [ 341.092801][T19416] should_fail_ex+0x263/0x280 [ 341.092888][T19416] should_fail+0xb/0x20 [ 341.092915][T19416] should_fail_usercopy+0x1a/0x20 [ 341.093054][T19416] _copy_from_user+0x1c/0xb0 [ 341.093077][T19416] __sys_bpf+0x183/0x7b0 [ 341.093176][T19416] __x64_sys_bpf+0x41/0x50 [ 341.093200][T19416] x64_sys_call+0x28e1/0x3000 [ 341.093289][T19416] do_syscall_64+0xc0/0x2a0 [ 341.093322][T19416] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.093349][T19416] RIP: 0033:0x7ffa8385aeb9 [ 341.093368][T19416] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 341.093435][T19416] RSP: 002b:00007ffa822b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.093461][T19416] RAX: ffffffffffffffda RBX: 00007ffa83ad5fa0 RCX: 00007ffa8385aeb9 [ 341.093479][T19416] RDX: 0000000000000094 RSI: 0000200000000000 RDI: 0000000000000005 [ 341.093522][T19416] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 341.093538][T19416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.093552][T19416] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 341.093570][T19416] [ 341.631685][ T29] kauditd_printk_skb: 625 callbacks suppressed [ 341.631704][ T29] audit: type=1400 audit(6064706750.503:42162): avc: denied { name_bind } for pid=19463 comm="syz.3.6664" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 341.679076][ T29] audit: type=1400 audit(6064706750.503:42163): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 341.704416][ T29] audit: type=1400 audit(6064706750.533:42164): avc: denied { read } for pid=19459 comm="syz.2.6663" dev="nsfs" ino=4026532474 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 341.725962][ T29] audit: type=1400 audit(6064706750.533:42165): avc: denied { open } for pid=19459 comm="syz.2.6663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 341.745829][ T29] audit: type=1400 audit(6064706750.533:42166): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 341.770976][ T29] audit: type=1400 audit(6064706750.543:42167): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 341.795609][ T29] audit: type=1400 audit(6064706750.543:42168): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 341.825846][ T29] audit: type=1400 audit(6064706750.603:42169): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 341.850948][ T29] audit: type=1400 audit(6064706750.603:42170): avc: denied { read write } for pid=19469 comm="syz.2.6668" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 341.875311][ T29] audit: type=1400 audit(6064706750.603:42171): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 342.000787][T19497] FAULT_INJECTION: forcing a failure. [ 342.000787][T19497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.014039][T19497] CPU: 1 UID: 0 PID: 19497 Comm: syz.2.6678 Not tainted syzkaller #0 PREEMPT(voluntary) [ 342.014088][T19497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 342.014101][T19497] Call Trace: [ 342.014109][T19497] [ 342.014118][T19497] __dump_stack+0x1d/0x30 [ 342.014146][T19497] dump_stack_lvl+0x95/0xd0 [ 342.014226][T19497] dump_stack+0x15/0x1b [ 342.014246][T19497] should_fail_ex+0x263/0x280 [ 342.014295][T19497] should_fail+0xb/0x20 [ 342.014327][T19497] should_fail_usercopy+0x1a/0x20 [ 342.014433][T19497] _copy_from_user+0x1c/0xb0 [ 342.014454][T19497] ___sys_sendmsg+0xc1/0x1e0 [ 342.014486][T19497] __x64_sys_sendmsg+0xd4/0x160 [ 342.014587][T19497] x64_sys_call+0x17ba/0x3000 [ 342.014615][T19497] do_syscall_64+0xc0/0x2a0 [ 342.014659][T19497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.014684][T19497] RIP: 0033:0x7ffa8385aeb9 [ 342.014700][T19497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 342.014787][T19497] RSP: 002b:00007ffa822b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 342.014883][T19497] RAX: ffffffffffffffda RBX: 00007ffa83ad5fa0 RCX: 00007ffa8385aeb9 [ 342.014897][T19497] RDX: 0000000024040040 RSI: 0000200000000780 RDI: 0000000000000003 [ 342.014914][T19497] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 342.014931][T19497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.014947][T19497] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 342.014969][T19497] [ 342.223089][T19507] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6684'. [ 342.482665][T19541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19541 comm=syz.3.6697 [ 342.843196][T19574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19574 comm=syz.3.6713 [ 343.098137][T19587] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6717'. [ 343.288210][T19604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19604 comm=syz.2.6725 [ 343.952522][T19642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19642 comm=syz.3.6736 [ 344.745611][T19694] w: entered promiscuous mode [ 344.751256][T19694] 8021q: adding VLAN 0 to HW filter on device w [ 344.806518][T19702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19702 comm=syz.2.6766 [ 345.330166][T19754] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6789'. [ 345.339970][T19755] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6789'. [ 345.573441][T19777] FAULT_INJECTION: forcing a failure. [ 345.573441][T19777] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 345.574262][T19775] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6798'. [ 345.586597][T19777] CPU: 1 UID: 0 PID: 19777 Comm: syz.4.6799 Not tainted syzkaller #0 PREEMPT(voluntary) [ 345.586629][T19777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 345.586788][T19777] Call Trace: [ 345.586796][T19777] [ 345.586805][T19777] __dump_stack+0x1d/0x30 [ 345.586833][T19777] dump_stack_lvl+0x95/0xd0 [ 345.586856][T19777] dump_stack+0x15/0x1b [ 345.586878][T19777] should_fail_ex+0x263/0x280 [ 345.586911][T19777] should_fail+0xb/0x20 [ 345.586980][T19777] should_fail_usercopy+0x1a/0x20 [ 345.587014][T19777] _copy_from_user+0x1c/0xb0 [ 345.587037][T19777] ___sys_sendmsg+0xc1/0x1e0 [ 345.587095][T19777] __x64_sys_sendmsg+0xd4/0x160 [ 345.587186][T19777] x64_sys_call+0x17ba/0x3000 [ 345.587238][T19777] do_syscall_64+0xc0/0x2a0 [ 345.587270][T19777] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.587315][T19777] RIP: 0033:0x7f26444faeb9 [ 345.587334][T19777] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 345.587362][T19777] RSP: 002b:00007f2642f57028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 345.587385][T19777] RAX: ffffffffffffffda RBX: 00007f2644775fa0 RCX: 00007f26444faeb9 [ 345.587429][T19777] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000004 [ 345.587443][T19777] RBP: 00007f2642f57090 R08: 0000000000000000 R09: 0000000000000000 [ 345.587458][T19777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.587472][T19777] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 345.587541][T19777] [ 345.611564][T19779] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6800'. [ 345.689117][T19783] xt_connbytes: Forcing CT accounting to be enabled [ 345.724670][T19779] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6800'. [ 345.730254][T19783] xt_NFQUEUE: number of total queues is 0 [ 345.788939][T19779] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 346.541151][T19868] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6835'. [ 347.134780][ T29] kauditd_printk_skb: 694 callbacks suppressed [ 347.134833][ T29] audit: type=1400 audit(6064706756.003:42862): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 347.167509][ T29] audit: type=1400 audit(6064706756.043:42863): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 347.193601][ T29] audit: type=1400 audit(6064706756.063:42864): avc: denied { create } for pid=19873 comm="syz.4.6842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 347.221221][ T29] audit: type=1400 audit(6064706756.093:42865): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 347.246781][ T29] audit: type=1400 audit(6064706756.093:42866): avc: denied { mount } for pid=19875 comm="syz.4.6843" name="/" dev="configfs" ino=1502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 347.270096][ T29] audit: type=1400 audit(6064706756.093:42867): avc: denied { read } for pid=19875 comm="syz.4.6843" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 347.291821][ T29] audit: type=1400 audit(6064706756.103:42868): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 347.350513][ T29] audit: type=1400 audit(6064706756.123:42869): avc: denied { create } for pid=19877 comm="syz.4.6844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 347.370401][ T29] audit: type=1400 audit(6064706756.123:42870): avc: denied { create } for pid=19877 comm="syz.4.6844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 347.390320][ T29] audit: type=1400 audit(6064706756.163:42871): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 347.866891][T19944] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=19944 comm=syz.4.6874 [ 347.949415][T19950] FAULT_INJECTION: forcing a failure. [ 347.949415][T19950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 347.962988][T19950] CPU: 1 UID: 0 PID: 19950 Comm: syz.4.6877 Not tainted syzkaller #0 PREEMPT(voluntary) [ 347.963022][T19950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 347.963094][T19950] Call Trace: [ 347.963100][T19950] [ 347.963106][T19950] __dump_stack+0x1d/0x30 [ 347.963125][T19950] dump_stack_lvl+0x95/0xd0 [ 347.963140][T19950] dump_stack+0x15/0x1b [ 347.963199][T19950] should_fail_ex+0x263/0x280 [ 347.963268][T19950] should_fail+0xb/0x20 [ 347.963359][T19950] should_fail_usercopy+0x1a/0x20 [ 347.963395][T19950] _copy_to_user+0x20/0xa0 [ 347.963419][T19950] simple_read_from_buffer+0xb5/0x130 [ 347.963513][T19950] proc_fail_nth_read+0x10e/0x150 [ 347.963529][T19950] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 347.963608][T19950] vfs_read+0x1ab/0x7f0 [ 347.963619][T19950] ? __rcu_read_unlock+0x4e/0x70 [ 347.963705][T19950] ? __fget_files+0x184/0x1c0 [ 347.963717][T19950] ? mutex_lock+0x57/0x90 [ 347.963730][T19950] ksys_read+0xdc/0x1a0 [ 347.963741][T19950] __x64_sys_read+0x40/0x50 [ 347.963780][T19950] x64_sys_call+0x2889/0x3000 [ 347.963794][T19950] do_syscall_64+0xc0/0x2a0 [ 347.963810][T19950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.963893][T19950] RIP: 0033:0x7f26444bb78e [ 347.963903][T19950] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 347.964037][T19950] RSP: 002b:00007f2642f56fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 347.964118][T19950] RAX: ffffffffffffffda RBX: 00007f2642f576c0 RCX: 00007f26444bb78e [ 347.964126][T19950] RDX: 000000000000000f RSI: 00007f2642f570a0 RDI: 0000000000000005 [ 347.964133][T19950] RBP: 00007f2642f57090 R08: 0000000000000000 R09: 0000000000000000 [ 347.964140][T19950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.964147][T19950] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 347.964157][T19950] [ 348.202602][T19958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19958 comm=syz.2.6881 [ 348.260159][T19966] xt_connbytes: Forcing CT accounting to be enabled [ 348.266886][T19966] xt_NFQUEUE: number of total queues is 0 [ 348.673885][T20009] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6903'. [ 348.843774][T20040] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 348.893072][T20047] FAULT_INJECTION: forcing a failure. [ 348.893072][T20047] name failslab, interval 1, probability 0, space 0, times 0 [ 348.905924][T20047] CPU: 0 UID: 0 PID: 20047 Comm: syz.4.6920 Not tainted syzkaller #0 PREEMPT(voluntary) [ 348.905947][T20047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 348.905957][T20047] Call Trace: [ 348.905963][T20047] [ 348.906035][T20047] __dump_stack+0x1d/0x30 [ 348.906055][T20047] dump_stack_lvl+0x95/0xd0 [ 348.906095][T20047] dump_stack+0x15/0x1b [ 348.906114][T20047] should_fail_ex+0x263/0x280 [ 348.906218][T20047] ? __pfx_proc_alloc_inode+0x10/0x10 [ 348.906241][T20047] should_failslab+0x8c/0xb0 [ 348.906259][T20047] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 348.906286][T20047] ? proc_alloc_inode+0x34/0x90 [ 348.906432][T20047] ? __pfx_proc_alloc_inode+0x10/0x10 [ 348.906490][T20047] proc_alloc_inode+0x34/0x90 [ 348.906524][T20047] alloc_inode+0x40/0x170 [ 348.906546][T20047] new_inode+0x1d/0xe0 [ 348.906568][T20047] proc_pid_make_inode+0x1f/0xd0 [ 348.906660][T20047] proc_ns_dir_lookup+0x486/0x560 [ 348.906685][T20047] ? __pfx_proc_ns_dir_lookup+0x10/0x10 [ 348.906703][T20047] path_openat+0xee1/0x23c0 [ 348.906729][T20047] do_filp_open+0x15d/0x280 [ 348.906816][T20047] do_sys_openat2+0xa6/0x150 [ 348.906919][T20047] __se_sys_openat2+0x193/0x1f0 [ 348.906946][T20047] __x64_sys_openat2+0x55/0x70 [ 348.906989][T20047] x64_sys_call+0x2c04/0x3000 [ 348.907018][T20047] do_syscall_64+0xc0/0x2a0 [ 348.907053][T20047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.907070][T20047] RIP: 0033:0x7f26444faeb9 [ 348.907153][T20047] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 348.907220][T20047] RSP: 002b:00007f2642f57028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b5 [ 348.907235][T20047] RAX: ffffffffffffffda RBX: 00007f2644775fa0 RCX: 00007f26444faeb9 [ 348.907248][T20047] RDX: 0000200000000400 RSI: 0000200000000380 RDI: 0000000000000003 [ 348.907258][T20047] RBP: 00007f2642f57090 R08: 0000000000000000 R09: 0000000000000000 [ 348.907267][T20047] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000002 [ 348.907276][T20047] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 348.907289][T20047] [ 349.281785][T20074] FAULT_INJECTION: forcing a failure. [ 349.281785][T20074] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.295110][T20074] CPU: 0 UID: 0 PID: 20074 Comm: syz.2.6933 Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.295146][T20074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 349.295162][T20074] Call Trace: [ 349.295172][T20074] [ 349.295249][T20074] __dump_stack+0x1d/0x30 [ 349.295280][T20074] dump_stack_lvl+0x95/0xd0 [ 349.295307][T20074] dump_stack+0x15/0x1b [ 349.295332][T20074] should_fail_ex+0x263/0x280 [ 349.295442][T20074] should_fail+0xb/0x20 [ 349.295540][T20074] should_fail_usercopy+0x1a/0x20 [ 349.295574][T20074] _copy_to_user+0x20/0xa0 [ 349.295601][T20074] simple_read_from_buffer+0xb5/0x130 [ 349.295755][T20074] proc_fail_nth_read+0x10e/0x150 [ 349.295786][T20074] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 349.295814][T20074] vfs_read+0x1ab/0x7f0 [ 349.295834][T20074] ? __rcu_read_unlock+0x4e/0x70 [ 349.295969][T20074] ? __fget_files+0x184/0x1c0 [ 349.295999][T20074] ? mutex_lock+0x57/0x90 [ 349.296029][T20074] ksys_read+0xdc/0x1a0 [ 349.296118][T20074] __x64_sys_read+0x40/0x50 [ 349.296138][T20074] x64_sys_call+0x2889/0x3000 [ 349.296172][T20074] do_syscall_64+0xc0/0x2a0 [ 349.296274][T20074] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.296369][T20074] RIP: 0033:0x7ffa8381b78e [ 349.296418][T20074] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 349.296440][T20074] RSP: 002b:00007ffa822b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 349.296461][T20074] RAX: ffffffffffffffda RBX: 00007ffa822b76c0 RCX: 00007ffa8381b78e [ 349.296476][T20074] RDX: 000000000000000f RSI: 00007ffa822b70a0 RDI: 0000000000000004 [ 349.296490][T20074] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 349.296572][T20074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.296585][T20074] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 349.296675][T20074] [ 349.629465][T20097] FAULT_INJECTION: forcing a failure. [ 349.629465][T20097] name failslab, interval 1, probability 0, space 0, times 0 [ 349.630907][T20095] xt_NFQUEUE: number of total queues is 0 [ 349.642429][T20097] CPU: 0 UID: 0 PID: 20097 Comm: syz.1.6943 Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.642514][T20097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 349.642529][T20097] Call Trace: [ 349.642537][T20097] [ 349.642545][T20097] __dump_stack+0x1d/0x30 [ 349.642648][T20097] dump_stack_lvl+0x95/0xd0 [ 349.642705][T20097] dump_stack+0x15/0x1b [ 349.642727][T20097] should_fail_ex+0x263/0x280 [ 349.642759][T20097] should_failslab+0x8c/0xb0 [ 349.642883][T20097] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 349.642911][T20097] ? __alloc_skb+0x2f0/0x4b0 [ 349.642985][T20097] ? selinux_socket_sock_rcv_skb+0x221/0x640 [ 349.643011][T20097] __alloc_skb+0x2f0/0x4b0 [ 349.643108][T20097] ? __alloc_skb+0x219/0x4b0 [ 349.643195][T20097] alloc_skb_with_frags+0x7d/0x470 [ 349.643227][T20097] ? __pfx_flush_tlb_func+0x10/0x10 [ 349.643310][T20097] ? css_rstat_updated+0xbb/0x280 [ 349.643339][T20097] ? bpf_skb_get_nlattr_nest+0x67/0x140 [ 349.643401][T20097] sock_alloc_send_pskb+0x44d/0x500 [ 349.643427][T20097] unix_dgram_sendmsg+0x391/0x1060 [ 349.643459][T20097] ? selinux_socket_sendmsg+0x192/0x1c0 [ 349.643516][T20097] unix_seqpacket_sendmsg+0xd1/0x110 [ 349.643547][T20097] ? __pfx_unix_seqpacket_sendmsg+0x10/0x10 [ 349.643578][T20097] ____sys_sendmsg+0x5af/0x600 [ 349.643601][T20097] ___sys_sendmsg+0x195/0x1e0 [ 349.643684][T20097] __sys_sendmmsg+0x185/0x320 [ 349.643772][T20097] __x64_sys_sendmmsg+0x57/0x70 [ 349.643794][T20097] x64_sys_call+0x1e28/0x3000 [ 349.643820][T20097] do_syscall_64+0xc0/0x2a0 [ 349.643903][T20097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.643927][T20097] RIP: 0033:0x7f717a01aeb9 [ 349.643945][T20097] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 349.643965][T20097] RSP: 002b:00007f7178a77028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 349.643999][T20097] RAX: ffffffffffffffda RBX: 00007f717a295fa0 RCX: 00007f717a01aeb9 [ 349.644014][T20097] RDX: 0400000000000159 RSI: 0000200000001c00 RDI: 0000000000000003 [ 349.644030][T20097] RBP: 00007f7178a77090 R08: 0000000000000000 R09: 0000000000000000 [ 349.644044][T20097] R10: 0000000000040840 R11: 0000000000000246 R12: 0000000000000001 [ 349.644058][T20097] R13: 00007f717a296038 R14: 00007f717a295fa0 R15: 00007fff6b327008 [ 349.644210][T20097] [ 349.742913][T20103] FAULT_INJECTION: forcing a failure. [ 349.742913][T20103] name failslab, interval 1, probability 0, space 0, times 0 [ 349.901126][T20103] CPU: 0 UID: 0 PID: 20103 Comm: syz.0.6944 Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.901211][T20103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 349.901232][T20103] Call Trace: [ 349.901239][T20103] [ 349.901247][T20103] __dump_stack+0x1d/0x30 [ 349.901324][T20103] dump_stack_lvl+0x95/0xd0 [ 349.901350][T20103] dump_stack+0x15/0x1b [ 349.901374][T20103] should_fail_ex+0x263/0x280 [ 349.901476][T20103] should_failslab+0x8c/0xb0 [ 349.901580][T20103] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 349.901727][T20103] ? __alloc_skb+0x2f0/0x4b0 [ 349.901761][T20103] __alloc_skb+0x2f0/0x4b0 [ 349.901794][T20103] ? __alloc_skb+0x219/0x4b0 [ 349.901823][T20103] audit_log_start+0x3aa/0x730 [ 349.901879][T20103] audit_seccomp+0x47/0x100 [ 349.901979][T20103] ? __seccomp_filter+0x8db/0x1350 [ 349.902004][T20103] __seccomp_filter+0x8ec/0x1350 [ 349.902030][T20103] ? __se_sys_keyctl+0x120/0xb80 [ 349.902122][T20103] __secure_computing+0x81/0x150 [ 349.902142][T20103] syscall_trace_enter+0xce/0x1e0 [ 349.902249][T20103] do_syscall_64+0x9a/0x2a0 [ 349.902282][T20103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.902304][T20103] RIP: 0033:0x7fc6b858b78e [ 349.902449][T20103] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 349.902471][T20103] RSP: 002b:00007fc6b7026fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 349.902496][T20103] RAX: ffffffffffffffda RBX: 00007fc6b70276c0 RCX: 00007fc6b858b78e [ 349.902613][T20103] RDX: 000000000000000f RSI: 00007fc6b70270a0 RDI: 0000000000000003 [ 349.902627][T20103] RBP: 00007fc6b7027090 R08: 0000000000000000 R09: 0000000000000000 [ 349.902643][T20103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.902657][T20103] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 349.902675][T20103] [ 350.219948][T20121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=20121 comm=syz.0.6950 [ 350.752142][T20159] netlink: 'syz.0.6967': attribute type 1 has an invalid length. [ 350.774370][T20162] xt_NFQUEUE: number of total queues is 0 [ 350.825874][T20159] 8021q: adding VLAN 0 to HW filter on device bond4 [ 351.050982][T20174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20174 comm=syz.0.6973 [ 351.272910][T20187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20187 comm=syz.4.6978 [ 351.446717][T20199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20199 comm=syz.4.6984 [ 351.732697][T20228] xt_hashlimit: size too large, truncated to 1048576 [ 351.739427][T20228] xt_hashlimit: overflow, try lower: 18446744073709551610/3 [ 351.763765][T20230] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6998'. [ 351.772801][T20230] netlink: 36 bytes leftover after parsing attributes in process `syz.2.6998'. [ 351.786110][T20230] sch_tbf: burst 4398 is lower than device lo mtu (11337746) ! [ 351.795972][T20234] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6998'. [ 351.805963][T20232] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6998'. [ 351.889703][T20246] FAULT_INJECTION: forcing a failure. [ 351.889703][T20246] name failslab, interval 1, probability 0, space 0, times 0 [ 351.902570][T20246] CPU: 0 UID: 0 PID: 20246 Comm: syz.2.7004 Not tainted syzkaller #0 PREEMPT(voluntary) [ 351.902600][T20246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 351.902613][T20246] Call Trace: [ 351.902620][T20246] [ 351.902628][T20246] __dump_stack+0x1d/0x30 [ 351.902657][T20246] dump_stack_lvl+0x95/0xd0 [ 351.902682][T20246] dump_stack+0x15/0x1b [ 351.902704][T20246] should_fail_ex+0x263/0x280 [ 351.902734][T20246] should_failslab+0x8c/0xb0 [ 351.902867][T20246] kmem_cache_alloc_noprof+0x68/0x490 [ 351.902897][T20246] ? copy_fs_struct+0x31/0x110 [ 351.902933][T20246] copy_fs_struct+0x31/0x110 [ 351.902967][T20246] copy_fs+0x57/0xf0 [ 351.903040][T20246] copy_process+0xc40/0x1f10 [ 351.903080][T20246] kernel_clone+0x16b/0x5b0 [ 351.903131][T20246] __se_sys_clone3+0x1f5/0x230 [ 351.903173][T20246] __x64_sys_clone3+0x31/0x40 [ 351.903197][T20246] x64_sys_call+0x2c0f/0x3000 [ 351.903292][T20246] do_syscall_64+0xc0/0x2a0 [ 351.903327][T20246] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.903387][T20246] RIP: 0033:0x7ffa8385aeb9 [ 351.903408][T20246] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 351.903431][T20246] RSP: 002b:00007ffa822b6ef8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 351.903470][T20246] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007ffa8385aeb9 [ 351.903537][T20246] RDX: 00007ffa822b6f10 RSI: 0000000000000058 RDI: 00007ffa822b6f10 [ 351.903553][T20246] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000058 [ 351.903569][T20246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 351.903655][T20246] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 351.903675][T20246] [ 351.953726][T20253] FAULT_INJECTION: forcing a failure. [ 351.953726][T20253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.105447][T20253] CPU: 1 UID: 0 PID: 20253 Comm: syz.4.7007 Not tainted syzkaller #0 PREEMPT(voluntary) [ 352.105482][T20253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 352.105498][T20253] Call Trace: [ 352.105508][T20253] [ 352.105518][T20253] __dump_stack+0x1d/0x30 [ 352.105597][T20253] dump_stack_lvl+0x95/0xd0 [ 352.105641][T20253] dump_stack+0x15/0x1b [ 352.105664][T20253] should_fail_ex+0x263/0x280 [ 352.105701][T20253] should_fail+0xb/0x20 [ 352.105808][T20253] should_fail_usercopy+0x1a/0x20 [ 352.105845][T20253] strncpy_from_user+0x27/0x250 [ 352.105904][T20253] path_setxattrat+0xeb/0x310 [ 352.105953][T20253] __x64_sys_lsetxattr+0x71/0x90 [ 352.105980][T20253] x64_sys_call+0x2ef0/0x3000 [ 352.106010][T20253] do_syscall_64+0xc0/0x2a0 [ 352.106124][T20253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 352.106152][T20253] RIP: 0033:0x7f26444faeb9 [ 352.106173][T20253] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 352.106242][T20253] RSP: 002b:00007f2642f57028 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 352.106276][T20253] RAX: ffffffffffffffda RBX: 00007f2644775fa0 RCX: 00007f26444faeb9 [ 352.106291][T20253] RDX: 0000000000000000 RSI: 00002000000009c0 RDI: 0000200000000180 [ 352.106305][T20253] RBP: 00007f2642f57090 R08: 0000000000000002 R09: 0000000000000000 [ 352.106318][T20253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.106332][T20253] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 352.106354][T20253] [ 352.106935][T20266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20266 comm=syz.3.6999 [ 352.180939][ T29] kauditd_printk_skb: 646 callbacks suppressed [ 352.180957][ T29] audit: type=1400 audit(6064706761.043:43516): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 352.314374][ T29] audit: type=1400 audit(6064706761.183:43517): avc: denied { open } for pid=20270 comm="syz.4.7014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 352.330995][T20271] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 352.334242][ T29] audit: type=1400 audit(6064706761.203:43518): avc: denied { prog_load } for pid=20270 comm="syz.4.7014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 352.375980][ T29] audit: type=1400 audit(6064706761.243:43519): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 352.404028][ T29] audit: type=1400 audit(6064706761.273:43520): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 352.429533][ T29] audit: type=1400 audit(6064706761.303:43521): avc: denied { create } for pid=20272 comm="syz.4.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 352.455027][T20273] syzkaller0: entered promiscuous mode [ 352.460659][T20273] syzkaller0: entered allmulticast mode [ 352.468414][ T29] audit: type=1400 audit(6064706761.333:43522): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 352.495321][ T29] audit: type=1400 audit(6064706761.363:43523): avc: denied { create } for pid=20272 comm="syz.4.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 352.515751][ T29] audit: type=1400 audit(6064706761.363:43524): avc: denied { read write } for pid=20276 comm="syz.2.7017" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 352.541470][ T29] audit: type=1400 audit(6064706761.363:43525): avc: denied { create } for pid=20276 comm="syz.2.7017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 352.692119][T20305] netlink: 'syz.4.7031': attribute type 13 has an invalid length. [ 352.700201][T20305] netlink: 'syz.4.7031': attribute type 27 has an invalid length. [ 352.729702][T20312] FAULT_INJECTION: forcing a failure. [ 352.729702][T20312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.743058][T20312] CPU: 1 UID: 0 PID: 20312 Comm: syz.2.7034 Not tainted syzkaller #0 PREEMPT(voluntary) [ 352.743089][T20312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 352.743105][T20312] Call Trace: [ 352.743149][T20312] [ 352.743176][T20312] __dump_stack+0x1d/0x30 [ 352.743204][T20312] dump_stack_lvl+0x95/0xd0 [ 352.743227][T20312] dump_stack+0x15/0x1b [ 352.743254][T20312] should_fail_ex+0x263/0x280 [ 352.743329][T20312] should_fail+0xb/0x20 [ 352.743361][T20312] should_fail_usercopy+0x1a/0x20 [ 352.743397][T20312] _copy_from_user+0x1c/0xb0 [ 352.743422][T20312] __copy_msghdr+0x244/0x300 [ 352.743578][T20312] ___sys_sendmsg+0x10c/0x1e0 [ 352.743607][T20312] __x64_sys_sendmsg+0xd4/0x160 [ 352.743632][T20312] x64_sys_call+0x17ba/0x3000 [ 352.743732][T20312] do_syscall_64+0xc0/0x2a0 [ 352.743768][T20312] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 352.743815][T20312] RIP: 0033:0x7ffa8385aeb9 [ 352.743835][T20312] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 352.743895][T20312] RSP: 002b:00007ffa822b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 352.743941][T20312] RAX: ffffffffffffffda RBX: 00007ffa83ad5fa0 RCX: 00007ffa8385aeb9 [ 352.743959][T20312] RDX: 0000000024040040 RSI: 0000200000000780 RDI: 0000000000000003 [ 352.743973][T20312] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 352.743987][T20312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.744019][T20312] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 352.744039][T20312] [ 353.006472][T20329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20329 comm=syz.4.7041 [ 353.729425][T20377] netlink: 'syz.2.7062': attribute type 13 has an invalid length. [ 353.737484][T20377] netlink: 'syz.2.7062': attribute type 27 has an invalid length. [ 353.745518][T20377] FAULT_INJECTION: forcing a failure. [ 353.745518][T20377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.759979][T20377] CPU: 1 UID: 0 PID: 20377 Comm: syz.2.7062 Not tainted syzkaller #0 PREEMPT(voluntary) [ 353.760055][T20377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 353.760145][T20377] Call Trace: [ 353.760153][T20377] [ 353.760163][T20377] __dump_stack+0x1d/0x30 [ 353.760194][T20377] dump_stack_lvl+0x95/0xd0 [ 353.760302][T20377] dump_stack+0x15/0x1b [ 353.760327][T20377] should_fail_ex+0x263/0x280 [ 353.760431][T20377] should_fail+0xb/0x20 [ 353.760463][T20377] should_fail_usercopy+0x1a/0x20 [ 353.760499][T20377] _copy_to_user+0x20/0xa0 [ 353.760580][T20377] simple_read_from_buffer+0xb5/0x130 [ 353.760756][T20377] proc_fail_nth_read+0x10e/0x150 [ 353.760788][T20377] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 353.760851][T20377] vfs_read+0x1ab/0x7f0 [ 353.760929][T20377] ? __rcu_read_unlock+0x4e/0x70 [ 353.760965][T20377] ? __fget_files+0x184/0x1c0 [ 353.760992][T20377] ? mutex_lock+0x57/0x90 [ 353.761016][T20377] ksys_read+0xdc/0x1a0 [ 353.761103][T20377] __x64_sys_read+0x40/0x50 [ 353.761127][T20377] x64_sys_call+0x2889/0x3000 [ 353.761154][T20377] do_syscall_64+0xc0/0x2a0 [ 353.761239][T20377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.761273][T20377] RIP: 0033:0x7ffa8381b78e [ 353.761293][T20377] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 353.761375][T20377] RSP: 002b:00007ffa822b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 353.761400][T20377] RAX: ffffffffffffffda RBX: 00007ffa822b76c0 RCX: 00007ffa8381b78e [ 353.761415][T20377] RDX: 000000000000000f RSI: 00007ffa822b70a0 RDI: 0000000000000004 [ 353.761474][T20377] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 353.761490][T20377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.761502][T20377] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 353.761520][T20377] [ 353.974144][T20384] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7065'. [ 354.341399][T20407] netlink: 52 bytes leftover after parsing attributes in process `syz.2.7075'. [ 354.366950][T20409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20409 comm=syz.2.7076 [ 354.585544][T20422] FAULT_INJECTION: forcing a failure. [ 354.585544][T20422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 354.600084][T20422] CPU: 1 UID: 0 PID: 20422 Comm: syz.0.7081 Not tainted syzkaller #0 PREEMPT(voluntary) [ 354.600118][T20422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 354.600131][T20422] Call Trace: [ 354.600139][T20422] [ 354.600147][T20422] __dump_stack+0x1d/0x30 [ 354.600220][T20422] dump_stack_lvl+0x95/0xd0 [ 354.600248][T20422] dump_stack+0x15/0x1b [ 354.600273][T20422] should_fail_ex+0x263/0x280 [ 354.600309][T20422] should_fail+0xb/0x20 [ 354.600342][T20422] should_fail_usercopy+0x1a/0x20 [ 354.600373][T20422] _copy_from_user+0x1c/0xb0 [ 354.600398][T20422] __x64_sys_epoll_ctl+0x92/0x100 [ 354.600433][T20422] x64_sys_call+0x745/0x3000 [ 354.600533][T20422] do_syscall_64+0xc0/0x2a0 [ 354.600633][T20422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 354.600659][T20422] RIP: 0033:0x7fc6b85caeb9 [ 354.600732][T20422] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 354.600753][T20422] RSP: 002b:00007fc6b7027028 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 354.600780][T20422] RAX: ffffffffffffffda RBX: 00007fc6b8845fa0 RCX: 00007fc6b85caeb9 [ 354.600799][T20422] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000003 [ 354.600815][T20422] RBP: 00007fc6b7027090 R08: 0000000000000000 R09: 0000000000000000 [ 354.600832][T20422] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.600877][T20422] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 354.600899][T20422] [ 354.810315][T20426] FAULT_INJECTION: forcing a failure. [ 354.810315][T20426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 354.823818][T20426] CPU: 1 UID: 0 PID: 20426 Comm: syz.0.7083 Not tainted syzkaller #0 PREEMPT(voluntary) [ 354.823870][T20426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 354.823883][T20426] Call Trace: [ 354.823891][T20426] [ 354.823899][T20426] __dump_stack+0x1d/0x30 [ 354.823928][T20426] dump_stack_lvl+0x95/0xd0 [ 354.823990][T20426] dump_stack+0x15/0x1b [ 354.824016][T20426] should_fail_ex+0x263/0x280 [ 354.824050][T20426] should_fail+0xb/0x20 [ 354.824078][T20426] should_fail_usercopy+0x1a/0x20 [ 354.824179][T20426] _copy_from_user+0x1c/0xb0 [ 354.824201][T20426] kstrtouint_from_user+0x69/0xf0 [ 354.824248][T20426] proc_fail_nth_write+0x50/0x160 [ 354.824313][T20426] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 354.824431][T20426] vfs_write+0x269/0x9f0 [ 354.824452][T20426] ? __rcu_read_unlock+0x4e/0x70 [ 354.824488][T20426] ? __fget_files+0x184/0x1c0 [ 354.824517][T20426] ? mutex_lock+0x57/0x90 [ 354.824618][T20426] ksys_write+0xdc/0x1a0 [ 354.824641][T20426] __x64_sys_write+0x40/0x50 [ 354.824664][T20426] x64_sys_call+0x2847/0x3000 [ 354.824689][T20426] do_syscall_64+0xc0/0x2a0 [ 354.824800][T20426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 354.824823][T20426] RIP: 0033:0x7fc6b858b78e [ 354.824925][T20426] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 354.824979][T20426] RSP: 002b:00007fc6b7026fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.825006][T20426] RAX: ffffffffffffffda RBX: 00007fc6b70276c0 RCX: 00007fc6b858b78e [ 354.825021][T20426] RDX: 0000000000000001 RSI: 00007fc6b70270a0 RDI: 0000000000000003 [ 354.825034][T20426] RBP: 00007fc6b7027090 R08: 0000000000000000 R09: 0000000000000000 [ 354.825048][T20426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.825061][T20426] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 354.825096][T20426] [ 355.418550][T20446] syzkaller0: entered promiscuous mode [ 355.425422][T20446] syzkaller0: entered allmulticast mode [ 355.623219][T20458] xt_NFQUEUE: number of total queues is 0 [ 355.694761][T20461] macsec3: entered promiscuous mode [ 356.651188][T20501] netlink: 12 bytes leftover after parsing attributes in process `syz.4.7109'. [ 356.788834][T20509] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7114'. [ 356.911648][T20519] netlink: 'syz.0.7119': attribute type 5 has an invalid length. [ 357.007823][T20527] netlink: 56 bytes leftover after parsing attributes in process `syz.2.7118'. [ 357.066626][T20533] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7123'. [ 357.190743][ T29] kauditd_printk_skb: 434 callbacks suppressed [ 357.190839][ T29] audit: type=1400 audit(6064706766.063:43960): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 357.264099][ T29] audit: type=1400 audit(6064706766.133:43961): avc: denied { read } for pid=20542 comm="syz.1.7130" dev="nsfs" ino=4026532862 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 357.393664][ T29] audit: type=1400 audit(6064706766.183:43962): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 357.393721][ T29] audit: type=1400 audit(6064706766.193:43963): avc: denied { open } for pid=20545 comm="syz.4.7129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 357.393751][ T29] audit: type=1400 audit(6064706766.193:43964): avc: denied { prog_load } for pid=20545 comm="syz.4.7129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 357.393812][ T29] audit: type=1400 audit(6064706766.203:43965): avc: denied { prog_load } for pid=20545 comm="syz.4.7129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 357.393836][ T29] audit: type=1400 audit(6064706766.213:43966): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 357.393868][ T29] audit: type=1400 audit(6064706766.223:43967): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 357.393900][ T29] audit: type=1400 audit(6064706766.233:43968): avc: denied { create } for pid=20547 comm="syz.4.7131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 357.567583][ T29] audit: type=1400 audit(6064706766.313:43969): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 357.848987][T20591] xt_connbytes: Forcing CT accounting to be enabled [ 357.855752][T20591] xt_NFQUEUE: number of total queues is 0 [ 358.077324][T20606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=20606 comm=syz.0.7156 [ 358.080032][T20608] FAULT_INJECTION: forcing a failure. [ 358.080032][T20608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 358.104664][T20608] CPU: 1 UID: 0 PID: 20608 Comm: syz.4.7157 Not tainted syzkaller #0 PREEMPT(voluntary) [ 358.104714][T20608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 358.104800][T20608] Call Trace: [ 358.104810][T20608] [ 358.104820][T20608] __dump_stack+0x1d/0x30 [ 358.104846][T20608] dump_stack_lvl+0x95/0xd0 [ 358.104868][T20608] dump_stack+0x15/0x1b [ 358.104957][T20608] should_fail_ex+0x263/0x280 [ 358.105025][T20608] should_fail+0xb/0x20 [ 358.105053][T20608] should_fail_usercopy+0x1a/0x20 [ 358.105096][T20608] _copy_from_user+0x1c/0xb0 [ 358.105170][T20608] snd_seq_write+0x1d5/0x560 [ 358.105200][T20608] ? __pfx_snd_seq_write+0x10/0x10 [ 358.105268][T20608] vfs_write+0x269/0x9f0 [ 358.105334][T20608] ? __rcu_read_unlock+0x4e/0x70 [ 358.105401][T20608] ? __fget_files+0x184/0x1c0 [ 358.105436][T20608] ksys_write+0xdc/0x1a0 [ 358.105456][T20608] __x64_sys_write+0x40/0x50 [ 358.105475][T20608] x64_sys_call+0x2847/0x3000 [ 358.105500][T20608] do_syscall_64+0xc0/0x2a0 [ 358.105618][T20608] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 358.105644][T20608] RIP: 0033:0x7f26444faeb9 [ 358.105664][T20608] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 358.105687][T20608] RSP: 002b:00007f2642f57028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 358.105820][T20608] RAX: ffffffffffffffda RBX: 00007f2644775fa0 RCX: 00007f26444faeb9 [ 358.105915][T20608] RDX: 000000000001001a RSI: 0000200000000000 RDI: 0000000000000003 [ 358.105984][T20608] RBP: 00007f2642f57090 R08: 0000000000000000 R09: 0000000000000000 [ 358.106000][T20608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 358.106017][T20608] R13: 00007f2644776038 R14: 00007f2644775fa0 R15: 00007ffe367bf1e8 [ 358.106039][T20608] [ 359.044205][T20666] x_tables: duplicate underflow at hook 1 [ 359.189167][T20685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20685 comm=syz.4.7191 [ 359.487394][T20717] FAULT_INJECTION: forcing a failure. [ 359.487394][T20717] name failslab, interval 1, probability 0, space 0, times 0 [ 359.500169][T20717] CPU: 1 UID: 0 PID: 20717 Comm: syz.0.7206 Not tainted syzkaller #0 PREEMPT(voluntary) [ 359.500193][T20717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 359.500202][T20717] Call Trace: [ 359.500208][T20717] [ 359.500214][T20717] __dump_stack+0x1d/0x30 [ 359.500236][T20717] dump_stack_lvl+0x95/0xd0 [ 359.500274][T20717] dump_stack+0x15/0x1b [ 359.500348][T20717] should_fail_ex+0x263/0x280 [ 359.500369][T20717] should_failslab+0x8c/0xb0 [ 359.500385][T20717] __kmalloc_noprof+0xb8/0x580 [ 359.500403][T20717] ? security_task_alloc+0x4d/0x110 [ 359.500435][T20717] ? mutex_init_generic+0x4c/0x60 [ 359.500466][T20717] security_task_alloc+0x4d/0x110 [ 359.500569][T20717] copy_process+0xbb4/0x1f10 [ 359.500594][T20717] kernel_clone+0x16b/0x5b0 [ 359.500622][T20717] ? vfs_write+0x86e/0x9f0 [ 359.500636][T20717] __x64_sys_clone+0x143/0x180 [ 359.500653][T20717] x64_sys_call+0x12d0/0x3000 [ 359.500730][T20717] do_syscall_64+0xc0/0x2a0 [ 359.500793][T20717] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.500865][T20717] RIP: 0033:0x7fc6b85caeb9 [ 359.500878][T20717] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 359.500892][T20717] RSP: 002b:00007fc6b7026fd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 359.500908][T20717] RAX: ffffffffffffffda RBX: 00007fc6b8845fa0 RCX: 00007fc6b85caeb9 [ 359.500918][T20717] RDX: 0000200000000000 RSI: 0000000000000000 RDI: 000000004416c080 [ 359.500966][T20717] RBP: 00007fc6b7027090 R08: 0000000000000000 R09: 0000000000000000 [ 359.501061][T20717] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 359.501071][T20717] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 359.501083][T20717] [ 359.809241][T20734] FAULT_INJECTION: forcing a failure. [ 359.809241][T20734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.822485][T20734] CPU: 0 UID: 0 PID: 20734 Comm: syz.3.7213 Not tainted syzkaller #0 PREEMPT(voluntary) [ 359.822508][T20734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 359.822520][T20734] Call Trace: [ 359.822528][T20734] [ 359.822580][T20734] __dump_stack+0x1d/0x30 [ 359.822596][T20734] dump_stack_lvl+0x95/0xd0 [ 359.822608][T20734] dump_stack+0x15/0x1b [ 359.822619][T20734] should_fail_ex+0x263/0x280 [ 359.822678][T20734] should_fail+0xb/0x20 [ 359.822692][T20734] should_fail_usercopy+0x1a/0x20 [ 359.822709][T20734] _copy_from_iter+0xcf/0xea0 [ 359.822721][T20734] ? __alloc_skb+0x397/0x4b0 [ 359.822736][T20734] ? __alloc_skb+0x219/0x4b0 [ 359.822885][T20734] netlink_sendmsg+0x4ae/0x6f0 [ 359.822897][T20734] ? __pfx_netlink_sendmsg+0x10/0x10 [ 359.822907][T20734] ____sys_sendmsg+0x5af/0x600 [ 359.822919][T20734] ___sys_sendmsg+0x195/0x1e0 [ 359.822934][T20734] __x64_sys_sendmsg+0xd4/0x160 [ 359.822997][T20734] x64_sys_call+0x17ba/0x3000 [ 359.823011][T20734] do_syscall_64+0xc0/0x2a0 [ 359.823027][T20734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.823039][T20734] RIP: 0033:0x7f4ba239aeb9 [ 359.823198][T20734] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 359.823208][T20734] RSP: 002b:00007f4ba0df7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.823264][T20734] RAX: ffffffffffffffda RBX: 00007f4ba2615fa0 RCX: 00007f4ba239aeb9 [ 359.823272][T20734] RDX: 0000000000040000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 359.823280][T20734] RBP: 00007f4ba0df7090 R08: 0000000000000000 R09: 0000000000000000 [ 359.823287][T20734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.823294][T20734] R13: 00007f4ba2616038 R14: 00007f4ba2615fa0 R15: 00007ffd288c23f8 [ 359.823353][T20734] [ 360.150729][T20757] xt_connbytes: Forcing CT accounting to be enabled [ 360.158266][T20757] xt_NFQUEUE: number of total queues is 0 [ 360.217453][T20761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20761 comm=syz.3.7225 [ 360.516076][T20784] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 360.800418][T20809] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7244'. [ 360.864235][T20818] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=20818 comm=syz.2.7250 [ 361.451240][T20858] FAULT_INJECTION: forcing a failure. [ 361.451240][T20858] name failslab, interval 1, probability 0, space 0, times 0 [ 361.464204][T20858] CPU: 0 UID: 0 PID: 20858 Comm: syz.1.7266 Not tainted syzkaller #0 PREEMPT(voluntary) [ 361.464282][T20858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 361.464338][T20858] Call Trace: [ 361.464425][T20858] [ 361.464435][T20858] __dump_stack+0x1d/0x30 [ 361.464465][T20858] dump_stack_lvl+0x95/0xd0 [ 361.464492][T20858] dump_stack+0x15/0x1b [ 361.464515][T20858] should_fail_ex+0x263/0x280 [ 361.464573][T20858] should_failslab+0x8c/0xb0 [ 361.464600][T20858] kmem_cache_alloc_noprof+0x68/0x490 [ 361.464628][T20858] ? alloc_empty_file+0x76/0x200 [ 361.464658][T20858] alloc_empty_file+0x76/0x200 [ 361.464687][T20858] alloc_file_pseudo+0xf6/0x190 [ 361.464720][T20858] __shmem_file_setup+0x1dd/0x210 [ 361.464755][T20858] shmem_file_setup+0x3b/0x50 [ 361.464849][T20858] memfd_alloc_file+0x4e/0x300 [ 361.464918][T20858] __se_sys_memfd_create+0x2e1/0x3b0 [ 361.464953][T20858] __x64_sys_memfd_create+0x31/0x40 [ 361.465096][T20858] x64_sys_call+0x28cb/0x3000 [ 361.465127][T20858] do_syscall_64+0xc0/0x2a0 [ 361.465159][T20858] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.465238][T20858] RIP: 0033:0x7f717a01aeb9 [ 361.465258][T20858] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 361.465280][T20858] RSP: 002b:00007f7178a76e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 361.465305][T20858] RAX: ffffffffffffffda RBX: 000000000000030a RCX: 00007f717a01aeb9 [ 361.465322][T20858] RDX: 00007f7178a76ee0 RSI: 0000000000000000 RDI: 00007f717a087333 [ 361.465345][T20858] RBP: 0000200000001040 R08: 00000000ffffffff R09: 0000000000000000 [ 361.465361][T20858] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000000 [ 361.465382][T20858] R13: 00007f7178a76ee0 R14: 00007f7178a76ea0 R15: 0000200000000080 [ 361.465403][T20858] [ 362.002113][T20898] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7284'. [ 362.213742][ T29] kauditd_printk_skb: 584 callbacks suppressed [ 362.213763][ T29] audit: type=1400 audit(6064706771.083:44552): avc: denied { create } for pid=20912 comm="syz.4.7291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 362.280390][ T29] audit: type=1400 audit(6064706771.153:44553): avc: denied { create } for pid=20910 comm="syz.0.7290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 362.311865][ T29] audit: type=1400 audit(6064706771.173:44554): avc: denied { create } for pid=20910 comm="syz.0.7290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 362.333384][ T29] audit: type=1400 audit(6064706771.173:44555): avc: denied { create } for pid=20910 comm="syz.0.7290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 362.353077][ T29] audit: type=1400 audit(6064706771.173:44556): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 362.387832][ T29] audit: type=1400 audit(6064706771.183:44557): avc: denied { create } for pid=20919 comm="syz.4.7293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 362.435115][ T29] audit: type=1400 audit(6064706771.303:44558): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 362.464432][ T29] audit: type=1400 audit(6064706771.333:44559): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 362.495585][ T29] audit: type=1400 audit(6064706771.363:44560): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 362.522472][ T29] audit: type=1400 audit(6064706771.363:44561): avc: denied { create } for pid=20923 comm="syz.4.7296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 362.523770][T20922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20922 comm=syz.0.7295 [ 362.577078][T20928] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7297'. [ 363.122154][T20969] syzkaller0: entered promiscuous mode [ 363.127790][T20969] syzkaller0: entered allmulticast mode [ 363.170449][T20973] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 363.202589][T20973] block device autoloading is deprecated and will be removed. [ 363.857736][T21038] FAULT_INJECTION: forcing a failure. [ 363.857736][T21038] name failslab, interval 1, probability 0, space 0, times 0 [ 363.870563][T21038] CPU: 1 UID: 0 PID: 21038 Comm: syz.0.7343 Not tainted syzkaller #0 PREEMPT(voluntary) [ 363.870594][T21038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 363.870610][T21038] Call Trace: [ 363.870619][T21038] [ 363.870629][T21038] __dump_stack+0x1d/0x30 [ 363.870709][T21038] dump_stack_lvl+0x95/0xd0 [ 363.870736][T21038] dump_stack+0x15/0x1b [ 363.870761][T21038] should_fail_ex+0x263/0x280 [ 363.870796][T21038] should_failslab+0x8c/0xb0 [ 363.870825][T21038] __kvmalloc_node_noprof+0x148/0x680 [ 363.870914][T21038] ? alloc_fdtable+0xc2/0x1d0 [ 363.870944][T21038] alloc_fdtable+0xc2/0x1d0 [ 363.870969][T21038] dup_fd+0x492/0x510 [ 363.871084][T21038] copy_files+0x97/0xe0 [ 363.871261][T21038] copy_process+0xc18/0x1f10 [ 363.871305][T21038] kernel_clone+0x16b/0x5b0 [ 363.871330][T21038] __se_sys_clone3+0x1f5/0x230 [ 363.871397][T21038] __x64_sys_clone3+0x31/0x40 [ 363.871422][T21038] x64_sys_call+0x2c0f/0x3000 [ 363.871485][T21038] do_syscall_64+0xc0/0x2a0 [ 363.871516][T21038] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 363.871540][T21038] RIP: 0033:0x7fc6b85caeb9 [ 363.871614][T21038] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 363.871713][T21038] RSP: 002b:00007fc6b7026ef8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 363.871736][T21038] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fc6b85caeb9 [ 363.871754][T21038] RDX: 00007fc6b7026f10 RSI: 0000000000000058 RDI: 00007fc6b7026f10 [ 363.871797][T21038] RBP: 00007fc6b7027090 R08: 0000000000000000 R09: 0000000000000058 [ 363.871815][T21038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 363.871846][T21038] R13: 00007fc6b8846038 R14: 00007fc6b8845fa0 R15: 00007ffce44a41a8 [ 363.871866][T21038] [ 364.290696][T21060] FAULT_INJECTION: forcing a failure. [ 364.290696][T21060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.304772][T21060] CPU: 1 UID: 0 PID: 21060 Comm: syz.2.7351 Not tainted syzkaller #0 PREEMPT(voluntary) [ 364.304874][T21060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 364.304890][T21060] Call Trace: [ 364.304899][T21060] [ 364.304927][T21060] __dump_stack+0x1d/0x30 [ 364.305038][T21060] dump_stack_lvl+0x95/0xd0 [ 364.305065][T21060] dump_stack+0x15/0x1b [ 364.305111][T21060] should_fail_ex+0x263/0x280 [ 364.305186][T21060] should_fail+0xb/0x20 [ 364.305245][T21060] should_fail_usercopy+0x1a/0x20 [ 364.305281][T21060] _copy_to_user+0x20/0xa0 [ 364.305306][T21060] simple_read_from_buffer+0xb5/0x130 [ 364.305397][T21060] proc_fail_nth_read+0x10e/0x150 [ 364.305495][T21060] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 364.305526][T21060] vfs_read+0x1ab/0x7f0 [ 364.305548][T21060] ? __fput+0x555/0x650 [ 364.305578][T21060] ? __rcu_read_unlock+0x4e/0x70 [ 364.305682][T21060] ? __fget_files+0x184/0x1c0 [ 364.305710][T21060] ? mutex_lock+0x57/0x90 [ 364.305736][T21060] ksys_read+0xdc/0x1a0 [ 364.305822][T21060] __x64_sys_read+0x40/0x50 [ 364.305841][T21060] x64_sys_call+0x2889/0x3000 [ 364.305866][T21060] do_syscall_64+0xc0/0x2a0 [ 364.305949][T21060] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.305971][T21060] RIP: 0033:0x7ffa8381b78e [ 364.305988][T21060] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 364.306011][T21060] RSP: 002b:00007ffa822b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 364.306033][T21060] RAX: ffffffffffffffda RBX: 00007ffa822b76c0 RCX: 00007ffa8381b78e [ 364.306139][T21060] RDX: 000000000000000f RSI: 00007ffa822b70a0 RDI: 0000000000000004 [ 364.306153][T21060] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 364.306175][T21060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.306216][T21060] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 364.306238][T21060] [ 364.562423][T21073] FAULT_INJECTION: forcing a failure. [ 364.562423][T21073] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.575578][T21073] CPU: 1 UID: 0 PID: 21073 Comm: syz.2.7357 Not tainted syzkaller #0 PREEMPT(voluntary) [ 364.575671][T21073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 364.575679][T21073] Call Trace: [ 364.575684][T21073] [ 364.575689][T21073] __dump_stack+0x1d/0x30 [ 364.575705][T21073] dump_stack_lvl+0x95/0xd0 [ 364.575750][T21073] dump_stack+0x15/0x1b [ 364.575761][T21073] should_fail_ex+0x263/0x280 [ 364.575777][T21073] should_fail+0xb/0x20 [ 364.575847][T21073] should_fail_usercopy+0x1a/0x20 [ 364.575863][T21073] _copy_to_user+0x20/0xa0 [ 364.575875][T21073] simple_read_from_buffer+0xb5/0x130 [ 364.576006][T21073] proc_fail_nth_read+0x10e/0x150 [ 364.576079][T21073] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 364.576093][T21073] vfs_read+0x1ab/0x7f0 [ 364.576103][T21073] ? __sys_bind+0x1e9/0x290 [ 364.576184][T21073] ksys_read+0xdc/0x1a0 [ 364.576195][T21073] __x64_sys_read+0x40/0x50 [ 364.576243][T21073] x64_sys_call+0x2889/0x3000 [ 364.576332][T21073] do_syscall_64+0xc0/0x2a0 [ 364.576349][T21073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.576426][T21073] RIP: 0033:0x7ffa8381b78e [ 364.576443][T21073] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 364.576454][T21073] RSP: 002b:00007ffa822b6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 364.576467][T21073] RAX: ffffffffffffffda RBX: 00007ffa822b76c0 RCX: 00007ffa8381b78e [ 364.576488][T21073] RDX: 000000000000000f RSI: 00007ffa822b70a0 RDI: 0000000000000004 [ 364.576495][T21073] RBP: 00007ffa822b7090 R08: 0000000000000000 R09: 0000000000000000 [ 364.576502][T21073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.576577][T21073] R13: 00007ffa83ad6038 R14: 00007ffa83ad5fa0 R15: 00007ffd0df154e8 [ 364.576587][T21073] [ 364.990141][T21106] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21106 comm=syz.2.7372 [ 365.242179][T21126] netlink: 'syz.1.7379': attribute type 13 has an invalid length. [ 365.242273][T21113] ================================================================== [ 365.250149][T21126] netlink: 'syz.1.7379': attribute type 27 has an invalid length. [ 365.258197][T21113] BUG: KCSAN: data-race in _prb_read_valid / data_alloc [ 365.258233][T21113] [ 365.258247][T21113] write to 0xffffffff86a96540 of 8 bytes by task 21126 on cpu 0: [ 365.258266][T21113] data_alloc+0x310/0x390 [ 365.287523][T21113] prb_reserve+0x8d7/0xae0 [ 365.291954][T21113] vprintk_store+0x54a/0x910 [ 365.296564][T21113] vprintk_emit+0x1a4/0x600 [ 365.301080][T21113] vprintk_default+0x26/0x30 [ 365.305683][T21113] vprintk+0x1d/0x30 [ 365.309581][T21113] _printk+0x79/0xa0 [ 365.313565][T21113] __nla_validate_parse+0x1226/0x1cf0 [ 365.319046][T21113] __nla_parse+0x40/0x60 [ 365.323295][T21113] rtnl_newlink+0xef/0x1370 [ 365.327810][T21113] rtnetlink_rcv_msg+0x64b/0x720 [ 365.332789][T21113] netlink_rcv_skb+0x123/0x220 [ 365.337596][T21113] rtnetlink_rcv+0x1c/0x30 [ 365.342041][T21113] netlink_unicast+0x5c0/0x690 [ 365.346899][T21113] netlink_sendmsg+0x5c8/0x6f0 [ 365.351672][T21113] ____sys_sendmsg+0x5af/0x600 [ 365.356442][T21113] ___sys_sendmsg+0x195/0x1e0 [ 365.361126][T21113] __x64_sys_sendmsg+0xd4/0x160 [ 365.366075][T21113] x64_sys_call+0x17ba/0x3000 [ 365.370915][T21113] do_syscall_64+0xc0/0x2a0 [ 365.375432][T21113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.381338][T21113] [ 365.383664][T21113] read to 0xffffffff86a96540 of 16 bytes by task 21113 on cpu 1: [ 365.391385][T21113] _prb_read_valid+0x1bc/0x950 [ 365.396164][T21113] prb_read_valid+0x3c/0x60 [ 365.400689][T21113] console_unlock+0x146/0x280 [ 365.405405][T21113] con_flush_chars+0x5d/0x70 [ 365.410014][T21113] n_tty_receive_buf_common+0x8d5/0xc10 [ 365.415566][T21113] n_tty_receive_buf2+0x33/0x40 [ 365.420419][T21113] tty_ldisc_receive_buf+0x66/0xf0 [ 365.425553][T21113] paste_selection+0x344/0x4a0 [ 365.430338][T21113] tioclinux+0x3b4/0x460 [ 365.434676][T21113] vt_ioctl+0x75e/0x18d0 [ 365.438925][T21113] tty_ioctl+0x7d7/0xb80 [ 365.443266][T21113] __se_sys_ioctl+0xce/0x140 [ 365.447880][T21113] __x64_sys_ioctl+0x43/0x50 [ 365.452489][T21113] x64_sys_call+0x14b0/0x3000 [ 365.457175][T21113] do_syscall_64+0xc0/0x2a0 [ 365.461694][T21113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.467593][T21113] [ 365.469917][T21113] Reported by Kernel Concurrency Sanitizer on: [ 365.476068][T21113] CPU: 1 UID: 0 PID: 21113 Comm: syz.4.7375 Not tainted syzkaller #0 PREEMPT(voluntary) [ 365.485898][T21113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 365.496043][T21113] ==================================================================