last executing test programs: 3.448556969s ago: executing program 3 (id=1335): perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x100000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x4e24, @private=0xa010100}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000cdab020004000000000000880f000000657000006600000002400000", @ANYRES32=r4], 0x30, 0x2400e044}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r4, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={r4, 0xfb, "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"}, &(0x7f0000000180)=0x103) flock(r0, 0x1) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 3.200017755s ago: executing program 1 (id=1343): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req={0x8000, 0xb4f, 0x300, 0x1daf6}, 0x10) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), 0x4) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0xf, 0x0, 0x100000}, 0x20) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0x7, 0x10005}) syz_emit_ethernet(0x36, &(0x7f0000000d00)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004500002800000000002f9078000000006401010200008035", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0xfffffff7, @private0, 0x5}}, 0x7ff, 0x7}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x20d}, &(0x7f00000001c0)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008d26200b704000000800000850000003300000085000000a000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r5, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c80)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_BYTEORDER_DREG={0x8}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x4}, @NFTA_BYTEORDER_OP={0x8}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x98}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000100)={[{@grpid}, {@auto_da_alloc}, {@lazytime}, {@journal_dev={'journal_dev', 0x3d, 0x6}}]}, 0x7, 0x4d4, &(0x7f0000000180)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)=0x20) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x4) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4000, 0x1f842f947b598ea3, 0x0) r8 = socket$packet(0x11, 0x2, 0x300) setuid(0xee01) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'veth0_macvtap\x00', 0x0}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f00000006c0)=0x2, 0x4) bind$packet(r8, &(0x7f0000000140)={0x11, 0xf8, r9, 0x1, 0x6, 0x6, @remote}, 0xffffffffffffffed) sendmmsg$sock(r8, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@mark={{0x14, 0x1, 0x24, 0x48b}}], 0x18}}], 0x1, 0x40500f0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x6) r10 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r10, 0x11b, 0x6, &(0x7f0000000080)=0x4000, 0x4) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000680)={r2, 0x6}, 0x8) 3.127479813s ago: executing program 2 (id=1345): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000000)={0x30, r1, 0x11, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_KEY={0x1c, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x18, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8000000000000000}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x14) 3.126754393s ago: executing program 2 (id=1346): socket$nl_netfilter(0x10, 0x3, 0xc) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x442, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x18e) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460d04000c028000000000000003003e00ecffffff940200000000000040000000000000004d0200000000000000"], 0x78) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) close(r0) truncate(&(0x7f0000000180)='./file1\x00', 0x2fffffe) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 3.066260352s ago: executing program 1 (id=1347): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000f, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x8, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x8}, 0x102801, 0x9, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, &(0x7f0000005e40)="17000000020001000003d68c5ee17688", 0x10) pipe(&(0x7f0000000000)) 3.042931748s ago: executing program 2 (id=1349): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000000)={0x24, r1, 0x11, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_KEY={0x4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x14) 3.009805732s ago: executing program 2 (id=1350): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getpid() r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020400) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r3, 0x0, 0x0, 0x20033, 0x51b) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000041c0)={0x0, 0x0, &(0x7f0000004180)={&(0x7f0000000b80)=ANY=[@ANYBLOB="680000001500010028bd7000fcdbdf25fe8000000000000000000000000000aa6401010200"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000010000000c0015005b073500020000000c0008000880"], 0x68}, 0x1, 0x0, 0x0, 0x24008895}, 0x810) 2.898960093s ago: executing program 1 (id=1351): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20030, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) getpid() syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1818e58, &(0x7f00000003c0), 0x2a, 0x63f, &(0x7f0000000d80)="$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") r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000100)={0x80000000, 0x0, 0xfffffffc}, 0x10) write(r5, &(0x7f0000000000), 0x0) 2.461904315s ago: executing program 3 (id=1353): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="5bb65d3f2511", @remote, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0xe, 0x28, 0x65, 0x0, 0x3, 0x11, 0x0, @empty, @empty=0xe0000001, {[@generic={0x44, 0x11}]}}, {0x4e20, 0x4e20, 0x10, 0x0, @gue={{0x2, 0x0, 0x0, 0x6, 0x100}}}}}}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, '\x00', "5193bb672974593497c186a80e00", "0000b226", "000200000040e000"}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x400) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = syz_io_uring_setup(0x5c2, &(0x7f0000000280)={0x0, 0xb81, 0x3080, 0x8003, 0x25f}, &(0x7f0000000240)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000004c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x68, 0x3, r4, 0x0, 0x0, 0x0, 0x1, 0x1, {0x2}}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={0xffffffffffffffff, 0x0, 0x30, 0x0, @val=@uprobe_multi={0x0, &(0x7f0000000240)=[0x4], 0x0, 0x0, 0x1, 0x1}}, 0x40) io_uring_enter(r4, 0x6e2, 0x620, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1b, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.305989308s ago: executing program 0 (id=1355): socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11c0, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400c093, 0x2, @perf_config_ext={0x6fa, 0x7}, 0x4, 0x0, 0x10000, 0x6, 0x0, 0x80000001, 0xa5, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_int(r3, 0x29, 0x3c, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newtaction={0x68, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x0, 0x1, 0x400, 0xfffffff7}, 0x2, r2}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_emit_ethernet(0xfdef, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004500fde100ff0f000011907800000000000000000b004e2209cd907804000000010000400000000000000000102d22df33f3df3289688a4a1b183559836f97e865ea46ca33a7e766f36527360b62a5c7ee8633e58e6376e9631b0a4194ccee7d55f589281024860418373fdbadedde129862132078ca0debf63d862d125241"], 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) bind(r4, &(0x7f0000000200)=@in={0x2, 0x4e24, @empty}, 0x80) connect$inet(r5, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x6}, {0x0, 0x0, 0x400000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in6=@remote, 0x0, 0x32}, 0x0, @in=@private=0xa010101, 0x0, 0x0, 0x0, 0xb7, 0x2, 0xfffffffe}}, 0xe8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x22, 0x0, 0x0) sendmmsg(r5, &(0x7f0000007fc0), 0x800001d, 0x1c) 1.898177096s ago: executing program 1 (id=1359): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x442, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x18e) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460d04000c028000000000000003003e00ecffffff940200000000000040000000000000004d0200000000000000"], 0x78) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) close(r1) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 1.898019625s ago: executing program 4 (id=1360): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000000)={0x30, r1, 0x11, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_KEY={0x10, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}]}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x14) 1.896782465s ago: executing program 0 (id=1361): r0 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000004c0), 0x0, 0x20c02) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x4, 0x8000007e) socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x80200, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000d00)={[{@noauto_da_alloc}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x4c4, &(0x7f0000000540)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xe7c) lremovexattr(0x0, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000240)=@nullb, 0x0, &(0x7f0000000100)={0x3, 0x129, 0x2000000000800001, 0x620, 0x0, 0x8, 0x5, 0xfffffffffffffffd, 0xf801}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp(0xa, 0x2, 0x3a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x800001, &(0x7f00000002c0), 0x111, 0x5}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) sendto$rxrpc(r3, &(0x7f0000000500)="374bd125bb623f97f8824da58a94b8dbdd396ca8d810d1468ee7b27aa24ac423034a482067fc50d6ea37b1f75ac36dd86c7a7de4657e36b33e7386fc72d994963bc0832b626e54ac641eb047de65fb372fdf117e6dd230097edcdbe3c64045bbe77d39fb4841a0fdbbe7ef04b26d0c77581e1c5d92ffe89481b077f203bc38188d6aeb701ed077375008a227eb3d2b9bf8ac50de1216758738aa97b4c1e67ea1b5e4382291797304ec456d6ada71a885f0", 0xb1, 0x40000, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x6}}, 0x20) sched_setscheduler(0x0, 0x1, &(0x7f00000001c0)=0x6) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x43, 0x81, 0x8, 0x6, 0xe82}) 1.873886191s ago: executing program 0 (id=1362): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r0, &(0x7f0000000080)="df9686294ade6a1b163e2d3b06c6b22a5b462ca8a6398568b03a2a4c6a4af515f910", 0x22) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8, 0xf32}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)=""/218, 0xda}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f0000000400)=""/37, 0x25}, {&(0x7f0000000440)=""/238, 0xee}, {&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f0000000540)=""/51, 0x33}], 0x8, &(0x7f0000000a00)=[{&(0x7f0000000740)=""/144, 0x90}, {&(0x7f0000000800)=""/3, 0x3}, {&(0x7f0000000840)=""/37, 0x25}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/73, 0x49}, {&(0x7f0000000940)=""/143, 0x8f}], 0x6, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeea, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) rename(&(0x7f0000001140)='./file2\x00', &(0x7f0000001180)='./file2\x00') unshare(0x62000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000580)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}) open(&(0x7f00000011c0)='./file0\x00', 0x103a00, 0x4) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x80080) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x304, 0x10, &(0x7f0000000000), 0xfffffea2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xe, 0x0, &(0x7f0000000040)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) chmod(0x0, 0x0) r5 = socket$igmp(0x2, 0x3, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000012c0)=@newqdisc={0x80, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x6, 0x8}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x54, 0x2, [@TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x7}, @TCA_FQ_FLOW_REFILL_DELAY={0x8}, @TCA_FQ_FLOW_PLIMIT={0x2, 0x2, 0xfffeffff}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_TIMER_SLACK={0x8, 0xd, 0x7}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0xc}, @TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xf6}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0x60}, @TCA_FQ_CE_THRESHOLD={0x8, 0xc, 0x8}, @TCA_FQ_TIMER_SLACK={0x8, 0xd, 0x1}]}}]}, 0x80}}, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0x401, 0x6, 0xfffffff9, 0x9, 0x6]}, &(0x7f0000000040)=0x54) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 1.873429871s ago: executing program 4 (id=1363): unshare(0x6a040000) (async) unshare(0x6a040000) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000001340)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) getpid() (async) getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x24040010}, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.posix_acl_default\x00') close(r1) (async) close(r1) timerfd_gettime(r0, &(0x7f00000002c0)) unlink(&(0x7f0000000280)='./file1\x00') syz_genetlink_get_family_id$nl80211(&(0x7f0000000a80), r0) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a80), r0) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x20, r2, 0x1, 0x70bd28, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xe117, 0x24}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000840) (async) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x20, r2, 0x1, 0x70bd28, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xe117, 0x24}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000840) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000440)=@nfc, 0x80, &(0x7f0000000980)=[{&(0x7f0000000580)=""/96, 0x60}, {&(0x7f0000000600)=""/204, 0xcc}, {&(0x7f00000004c0)=""/24, 0x18}, {&(0x7f0000000700)=""/165, 0xa5}, {&(0x7f00000007c0)=""/44, 0x2c}, {&(0x7f0000000800)=""/94, 0x5e}, {&(0x7f0000000880)=""/75, 0x4b}, {&(0x7f0000000900)=""/92, 0x5c}], 0x8, &(0x7f0000001f40)=""/4096, 0x1000}, 0x1) socket$rxrpc(0x21, 0x2, 0xa) socket$netlink(0x10, 0x3, 0x0) (async) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newqdisc={0x5c, 0x10, 0x1, 0x70bd25, 0x25dfdbfc, {0x6, 0x0, 0x8100, 0x0, {0xf, 0x10}, {0xfff1, 0xfff2}, {0xe, 0x10}}, [@TCA_RATE={0x6, 0x5, {0xfc}}, @TCA_STAB={0x30, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x5}}, {0xe, 0x1b, [0x0, 0x0, 0x1, 0x515, 0x6]}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x400c800}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newqdisc={0x5c, 0x10, 0x1, 0x70bd25, 0x25dfdbfc, {0x6, 0x0, 0x8100, 0x0, {0xf, 0x10}, {0xfff1, 0xfff2}, {0xe, 0x10}}, [@TCA_RATE={0x6, 0x5, {0xfc}}, @TCA_STAB={0x30, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x5}}, {0xe, 0x1b, [0x0, 0x0, 0x1, 0x515, 0x6]}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x400c800}, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3121, 0x8, 0x0, 0x12, 0x2, 0x24, "a9cf99469bc92a85414145c906e1b8a0fbd83992efe4b728888cc72229e8f5baefc2f8cf94010fad5e7e2b72bf41c722edcd67112acaeae8acf0a96e7252976b", "9395d918c608e228a9c3f72943a924ba6719257d2cca574b291e086e9d12cd29b8ae4df02af39804edf9a328cc8ae0ac08ed34e59eb8a313041d911fd5d2be69", "78b90b9f4d2e2ec8293ea1cc869898aa01ccac0612400da8682ab28d2f5c7afd", [0x3, 0x6]}) ioctl$PAGEMAP_SCAN(r4, 0xc0606610, &(0x7f00000003c0)={0x60, 0x2, &(0x7f0000058000/0x3000)=nil, &(0x7f00001ba000/0x3000)=nil, 0x98ef, &(0x7f0000000340)=[{0x1ec, 0x3, 0x9}, {0x7, 0x7, 0x7}, {0x1000000000000000, 0x0, 0x6}], 0x3, 0x5, 0xc, 0xd, 0x20, 0x12}) (async) ioctl$PAGEMAP_SCAN(r4, 0xc0606610, &(0x7f00000003c0)={0x60, 0x2, &(0x7f0000058000/0x3000)=nil, &(0x7f00001ba000/0x3000)=nil, 0x98ef, &(0x7f0000000340)=[{0x1ec, 0x3, 0x9}, {0x7, 0x7, 0x7}, {0x1000000000000000, 0x0, 0x6}], 0x3, 0x5, 0xc, 0xd, 0x20, 0x12}) 1.774913434s ago: executing program 1 (id=1364): socket$inet_tcp(0x2, 0x1, 0x0) (async) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x8, &(0x7f0000000080)={[{@nodioread_nolock}, {@sb={'sb', 0x3d, 0x1}}]}, 0x4, 0x523, &(0x7f00000018c0)="$eJzs3cFvG1kZAPBvnLhJs+mmC3sABGxZFgqq6iTubrTqhfYCQlUlRMWJQxsSN4pi11Hsiib0kB65V6ISJ+A/4MYBqScO3LjBjUs5IBWoQA0SB6MZT1I3sZNAnbiJfz9pMvPeTP29F/e953mR5wUwtC5ExGZEnImIOxExlecn+RbX2lt63csXDxe2XjxcSKLVuvX3JDuf5kXHv0m9k7/meER8/zsRP0r2xm2sb6zMV6uVtTw93aytTjfWNy4vF/Kc8tzs3MynVz4p962uH9R+/fzbyzd+8NvffOnZHza/+ZO0WJM/PZed66xHP7WrXozJjrzRiLhxFMEGZDT//8PJk7a2z0TEh1n7n4qR7N0EAE6zVmsqWlOdaQDgtEvv/ycjKZTyuYDJKBRKpfYc3vsxUajWG81LU/X79xYjm8M6H8XC3eVqZSafKzwfxSRNz2bHr9Ll19KPK1ci4r2IeDx2NjtfWqhXFwf5wQcAhtg7u8b/f421x/9OxUEVDgA4OuODLgAAcOyM/wAwfIz/ADB8/ofx37cDAeCUcP8PAMPH+A8Aw+fA8f/R8ZQDADgW37t5M91aW+3nX28/qfvyYqWxUqrdXygt1NdWS0v1+lK1UlpotQ56vWq9vjr78U6ysb5xu1a/f695e7k2v1S5XfEsAQAYvPc+ePqndNDfvHo226JjLQdjNZxuhUEXABiYkUEXABgY3+eB4XWIe3zTAHDKdVmity2fIEh6XfDE4q9wUl38vPl/GFZvMv9v7gBOtv9v/v9bfS8HcPyM4TC8Wq3Emv8AMGTM8QM9//6f6/mIkCf9LwsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACcFJPZlhRK2Vrgm+nPQqkUcS4izkcxubtcrcxExLsR8cex4lianh10oQGAN1T4a5Kv/3Vx6qPJ3WfPJP8ey/YR8eOf3/rZg/lmc202zf/HTn7zSZp/trlWPjOICgAAna7tzcrG73K+77iRf/ni4cL2dpxFfH69vbhoGncr39pnRmM0249HMSIm/pnk6bb088pIH+JvPoqIz23XfzwedESYzOZA2iuf7o6fxj7X9/idv//d8Quv1beQnUv3xex38dnYVTjgQE+vt/vJvO2lTTxvf4W4kO27t//xrId6c2n/lzbXrT39X2Gn/xvZEz/J2vyFnfT+JXn+8e++uyezNdU+9yjiC6Pd4ic78ZPu/W/xo0PW8c9f/PKHvc61fhFxsWv9t1ekrmXd7HSztjrdWN+4vFybX6osVe6Vy3OzczOfXvmkPJ3NUbd//r5bjL9dvfRur/hp/Sd6xB/fv/7xtUPW/5f/ufPDr+wT/xtf7f7+v79P/HRM/Poh489PXOu5fHcaf7FH/Q94/+PSIeM/+8vG4iEvBQCOQWN9Y2W+Wq2sHXCQftY86BoHhz9I7+3fgmJkB7EZ0a8XzCYlIqLrNekn6rejykd1kAws+q/6/YKD7pmAo/aq0Q+6JAAAAAAAAAAAAAAAQC+N9Y2Vse7f1urbwaDrCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwOn13wAAAP//KHnENg==") (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/49) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) (async) r0 = syz_io_uring_setup(0x1b0f, &(0x7f0000000200)={0x0, 0xcfca, 0x1040, 0xfffffffd, 0x1000021}, &(0x7f0000000100), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000080), 0x0) (async) io_uring_register$IORING_REGISTER_CLOCK(r0, 0x1d, &(0x7f0000000140)={0x9}, 0x0) (async, rerun: 32) r1 = getpid() (async, rerun: 32) setrlimit(0xd, &(0x7f0000000040)={0x1, 0x1}) (async) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) (async, rerun: 64) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (rerun: 64) ioprio_get$pid(0x3, r1) (async, rerun: 32) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) (rerun: 32) sendmsg$nl_xfrm(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000280)=@migrate={0xa8, 0x21, 0x1, 0x70bd26, 0x25dfdbfd, {{@in=@rand_addr=0x64010101, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4e24, 0x0, 0x4e21, 0xffff, 0x2, 0xa0}, 0x6e6bb3, 0x1}, [@XFRMA_IF_ID={0x8, 0x1f, 0x3}, @migrate={0x50, 0x11, [{@in=@empty, @in=@local, @in=@remote, @in=@broadcast, 0x32, 0x1, 0x0, 0x3502, 0xa, 0x2}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000}, 0x90) (async) socket(0x28, 0x5, 0x0) (async) r5 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) (async, rerun: 64) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x20000007d, 0x0) (rerun: 64) r7 = dup3(r5, r6, 0x0) (async, rerun: 32) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (rerun: 32) sendfile(r8, r3, &(0x7f00000000c0)=0x800, 0x0) ioctl$MON_IOCG_STATS(r7, 0xc0109207, &(0x7f00000001c0)) 1.52431854s ago: executing program 3 (id=1365): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x42000, 0x10) r1 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x3, 0x370}, &(0x7f0000000340)=0x0, &(0x7f0000000240)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) getpid() syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) r4 = perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x8, 0x5}, 0x4, 0x1, 0x10000, 0x0, 0x3, 0x80000001, 0x2, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, r4, 0x1) listen(0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x2, 0x1}) io_uring_enter(r1, 0x847ba, 0x2000, 0xe, 0x0, 0x0) 1.166192336s ago: executing program 3 (id=1366): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x0, &(0x7f00000000c0)={[{@init_itable}, {@quota}, {@quota}, {@stripe={'stripe', 0x3d, 0x3}}, {@lazytime}]}, 0xff, 0x501, &(0x7f0000000e80)="$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") r0 = creat(&(0x7f0000000e40)='./file1\x00', 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xa0c42, 0x1c8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x42, 0x1fe) read$char_usb(r1, &(0x7f0000000100)=""/75, 0x4b) fallocate(r2, 0x10, 0x7, 0x10001) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1f, &(0x7f0000000040)=0x1, 0x4) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="10000000191407"], 0x10}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xc, r0, 0x2, 0x18, 0x4, 0xfffffffffe000001}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) mremap(&(0x7f000040b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00004b3000/0x4000)=nil) 1.045642405s ago: executing program 4 (id=1367): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000000)={0x20, r1, 0x11, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x14) 946.964848ms ago: executing program 4 (id=1368): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) socket$netlink(0x10, 0x3, 0xb) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast1, @multicast2}, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000440), 0x10) listen(r2, 0x5) ioctl$sock_ifreq(0xffffffffffffffff, 0x891a, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x453, 0x4, 0x70bd2a, 0x25dfdbfe, '\a'}, 0x14}, 0x1, 0x0, 0x0, 0x4044000}, 0x8000) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) mremap(&(0x7f000008f000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000486000/0x1000)=nil) r5 = accept4$packet(r4, &(0x7f00000001c0), &(0x7f0000000200)=0x14, 0x80800) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000380)={0x7, &(0x7f0000000340)=[{0x4faa, 0x5, 0x79, 0x7}, {0xcdc4, 0x3, 0x7, 0x3}, {0x1, 0x81, 0xf8, 0xffffe343}, {0x1, 0x3, 0x6, 0xffffff49}, {0x9a, 0x2, 0x5, 0x3}, {0x5, 0x1, 0x3, 0x820a}, {0x7ff, 0xb, 0x81, 0x100}]}, 0x10) connect$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000004c0)={0x40, 0x238f8219, 0x1, 0x8, 0x3, 0x0, [{0x2, 0x3c00, 0x7ff, '\x00', 0x9}, {0x7ff, 0xdb6, 0x1cb, '\x00', 0x2000}, {0x2, 0x2, 0x5, '\x00', 0x100}]}) sendto$packet(r3, &(0x7f0000000600)="5f0efc3e1792a50972d2eb21bdff9ca4ac804c2847fe7bf05ddc63ff512d4074687760a5fbd1fc97772c6f5027dcea15b6658de3b024a6ea22baafb445bf8427c8055d00", 0xffffff3d, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x6, 0x0, 0x3, 0x7fff7ffc}, {0xad, 0x5, 0x7f, 0xf}, {0x7, 0x1, 0xe, 0x7}]}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000c000000180001801400020073797a5f74756e0000000000000000001c00038004000100140003800c000180050002"], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) 896.081719ms ago: executing program 3 (id=1369): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20030, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) getpid() syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1818e58, &(0x7f00000003c0), 0x2a, 0x63f, &(0x7f0000000d80)="$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") r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000100)={0x80000000, 0x0, 0xfffffffc}, 0x10) write(r5, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00", 0x12) 451.47498ms ago: executing program 2 (id=1370): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fcntl$setlease(r0, 0x400, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e89}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) 389.076179ms ago: executing program 2 (id=1371): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000300)={0x44, 0x0, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x5}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x15}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x10) r1 = socket(0x18, 0x5, 0x6) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="48000000105737040000000000000000744ce668b4d165a70c3696e3cfb56c503315c2d2ad814189634800000000", @ANYRES32=0x0, @ANYRES32=r1, @ANYRES64=r1, @ANYRESOCT=r1], 0x48}, 0x1, 0x0, 0x0, 0x40010}, 0x4c040) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x880) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x2004000, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], 0xfe, 0x122e, &(0x7f0000001280)="$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") r3 = open(&(0x7f0000000200)='./file1\x00', 0x4827e, 0xdc) fallocate(r3, 0x6000000, 0x0, 0x8800000) 295.765183ms ago: executing program 0 (id=1372): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=@newtfilter={0x34, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0xb, 0xfff3}, {}, {0x7, 0xffff}}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0xf2ff000000000000, 0x20041090}, 0xd0) 244.049234ms ago: executing program 0 (id=1373): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000000)={0x30, r1, 0x11, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_KEY={0x10, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}]}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x14) 243.223693ms ago: executing program 0 (id=1374): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="22000000040000001000000012"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f00000000c0)='%pi6 \x00'}, 0x20) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x184) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000a50000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) write$qrtrtun(r1, &(0x7f0000000340)="66bb0b760dc0f4", 0x7) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000643200007b8af0ff00000000bfa100000000000007010000ffffff7fbfa400000000000007040000f0ffa2012f4b19f8f076000018230000", @ANYRES32=r7, @ANYBLOB="0000000018000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) 54.62491ms ago: executing program 1 (id=1375): r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0xb, 0x103381) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000017c0)=@urb_type_control={0x2, {}, 0x2000006, 0xc1, &(0x7f00000002c0)={0x9a, 0x8, 0x9, 0x7}, 0x8, 0x100, 0xa, 0x0, 0x313, 0x3, 0x0}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ff0700000000000000000000850000002a00000018010000646c6c2500000000002020207b1af8ff00000000bfc200000000000007010000f8ffffffb702000008000000b70300000000000085000000720000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r3, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0x1ff0000aa}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f0000000100)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="4400028040000100240001ea6c6f646500000000000000000001000000000000000000000000000000000000050003000500000010"], 0x60}, 0x1, 0x0, 0x0, 0x4000431}, 0x4040084) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x47f2, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r7, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) setresuid(0x0, 0xee00, 0x0) keyctl$set_reqkey_keyring(0xf, 0xfffffffb) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, 0x0) 54.13772ms ago: executing program 3 (id=1376): perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000000000000, 0x30385, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20030, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) getpid() syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1818e58, &(0x7f00000003c0), 0x2a, 0x63f, &(0x7f0000000d80)="$eJzs3c9rXFsdAPDvvZPkJWl86RMRX1AMuHgP5KVJfVh1Y1sXdlGwYBciLhqapIZOf5CkYGvBBFwoKIi4LdKN/4B76d6dCOrOtVBFKha0dB73zp1mMplfaTIzSe7nA5M599wzOeebOyf33HvnzA2gtOazH2nE+xGvbyQRs03rZqK+cr4o9+Lfj29mjyRqte/+K4mkyGuUT4rnM8XCZET86XLEpyv76918+Oj2crVW95OIc1t37p/bfPjoo/U7y7dWb63eXTr/tY8vLH596eOlpoa+vTPF85Wr3/n8L3/6w6+u/bn6URIX4/r4j1eiJY6jMh/z8boIsTl/LCIuZIk2f5eT5hSEUGqV4v04HhGfjdmo5Et1s7H+i5E2DhioWiWi1l3SqwBwUuneUFaNcUDj2L6/4+DrAx6VDM/zS/UDoP3xjxWnHCbzY6PpF0nTkVH93MbZI6g/q+PV48knrx7PPYk95yFevtk6Y0dQTyfbOxHxuXbxJ3nbzuaRZvGne47104hYjIiJon3fOkQbkqb0IM7DdHOQ+Ju3Qxb/xeI5y7/8lvW3ntYadvwAlNOzS8WOfDtb2t3/ZWOPxvgn2ox/Zg5/SSY36v1f5/FfY38/mY970pZxWDZmudb+V463Zvz951d+3an++vhv7knjkdXfGAsOw/OdiLmW+H+WBVuMf7L4kzbbPyty42J/dXz7L/+80mndqOOvPY34oO3xz+6oNEt1uT55bm29urpY/9m2jj/88Qe/61R/+/jfGUCk7WXbf7pD/E3bP219XfY3ud/+V+60Zvz+2tM7neqf6bn9039MJPXjzYki50c7W1sbSxETydWiSJG/vLW1cb57vPUyL2v581I9/g+/1L7/73n/t0Q11fiX2Yf737v9otO6t3n/N11Mfl3rsw2dZPGv9N7++/p/lverPuv47/cffKHTum7xTx0mMAAAAAAAACihNL8Gm6QLb9JpurBQny/7mZhOq/c2t768du/B3ZWID/PPQ46nkSb5R0Zm68vJ2np1dan4PGxj+XzL8lci4r2I+E1lKl9euHmvujLq4AEAAAAAAAAAAAAAAAAAAOCYOFPM/2/cp/o/lfr8f6Aket9gbt/9H4BTYpA3mASOt7z/d9vFvzu8tgDDZf8P5aX/Q3np/1Be+j+Ul/4P5aX/Q3np/1Be+j8AAAAAnErvffHZ35KI2P7GVP7ITBTrTPqF0238QKUrA2sHMHx6NJTXm0v/BvtQOn2N//9XfDng4JsDjEDSLjMfHNS6d/5nbV+5a+fwbQMAAAAAAAAAAAAA6j54v/P8/4PNDQZOGtP+oLwOMf/fVwfACeer/6G8HOMDPWbxx2SnFb3m/wMAAAAAAAAAAAAAR2YmfyTpQjEXeCbSdGEh4lMRcTbGk7X16upiRLwbEX+tjL+TLS+NutEAAAAAAAAAAAAAAAAAAABwymw+fHR7uVpd3WhO/H9fzulONO6C2rtwrY8yXRPfjAO+KpLh/1mmImLkG2VgibGmnCRiO9vyx6JhG5txPJqRJ0b8jwkAAAAAAAAAAAAAAAAAAEqoae5xe3O/HXKLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGD4du//3yOxMl1/QV+F9yZGHSMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcDJ9EgAA//+YYDw3") r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000000)="240000001a005f0214f9f407000904001f000000fe0000000000000008000f00fd000000", 0x24) 213.751µs ago: executing program 4 (id=1377): socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x200006, 0x8, &(0x7f0000006680)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000500)}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{}], 0x1}, 0x84884) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffc48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r3, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0xf, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x40, '\x00', r4}, 0x94) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) r5 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000000)='asymmetric\x00', 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00060026000506"], 0x2c}}, 0x800) recvmmsg(r2, &(0x7f0000007700), 0x318, 0xfc0, 0x0) 0s ago: executing program 4 (id=1378): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000000)={0x20, r1, 0x11, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x14) kernel console output (not intermixed with test programs): ][ T5304] devinet_ioctl+0x91/0xe00 [ 94.164324][ T5304] ? _copy_from_user+0x89/0xb0 [ 94.164374][ T5304] inet_ioctl+0x27c/0x3a0 [ 94.164403][ T5304] sock_do_ioctl+0x73/0x230 [ 94.164489][ T5304] sock_ioctl+0x41b/0x610 [ 94.164524][ T5304] ? __pfx_sock_ioctl+0x10/0x10 [ 94.164555][ T5304] __se_sys_ioctl+0xce/0x140 [ 94.164639][ T5304] __x64_sys_ioctl+0x43/0x50 [ 94.164775][ T5304] x64_sys_call+0x1563/0x3020 [ 94.164798][ T5304] do_syscall_64+0x12c/0x370 [ 94.164844][ T5304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.164940][ T5304] RIP: 0033:0x7f914055c799 [ 94.164955][ T5304] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 94.164972][ T5304] RSP: 002b:00007f913efb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 94.164994][ T5304] RAX: ffffffffffffffda RBX: 00007f91407d5fa0 RCX: 00007f914055c799 [ 94.165009][ T5304] RDX: 0000200000000000 RSI: 0000000000008915 RDI: 0000000000000003 [ 94.165022][ T5304] RBP: 00007f913efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 94.165090][ T5304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.165102][ T5304] R13: 00007f91407d6038 R14: 00007f91407d5fa0 R15: 00007ffd68d16218 [ 94.165139][ T5304] [ 96.109201][ T5318] FAULT_INJECTION: forcing a failure. [ 96.109201][ T5318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.109337][ T5318] CPU: 1 UID: 0 PID: 5318 Comm: syz.0.561 Not tainted syzkaller #0 PREEMPT(full) [ 96.109366][ T5318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 96.109378][ T5318] Call Trace: [ 96.109386][ T5318] [ 96.109394][ T5318] __dump_stack+0x1d/0x30 [ 96.109454][ T5318] dump_stack_lvl+0x95/0xd0 [ 96.109481][ T5318] dump_stack+0x15/0x1b [ 96.109505][ T5318] should_fail_ex+0x263/0x280 [ 96.109526][ T5318] should_fail+0xb/0x20 [ 96.109681][ T5318] should_fail_usercopy+0x1a/0x20 [ 96.109705][ T5318] _copy_to_user+0x20/0xa0 [ 96.109769][ T5318] simple_read_from_buffer+0xb5/0x130 [ 96.109796][ T5318] proc_fail_nth_read+0x10e/0x150 [ 96.109831][ T5318] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 96.109899][ T5318] vfs_read+0x1ab/0x7f0 [ 96.109937][ T5318] ? __rcu_read_unlock+0x4e/0x70 [ 96.109961][ T5318] ? __fget_files+0x184/0x1c0 [ 96.110068][ T5318] ? mutex_lock+0x57/0x90 [ 96.110136][ T5318] ksys_read+0xdc/0x1a0 [ 96.110167][ T5318] __x64_sys_read+0x40/0x50 [ 96.110226][ T5318] x64_sys_call+0x2886/0x3020 [ 96.110255][ T5318] do_syscall_64+0x12c/0x370 [ 96.110279][ T5318] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.110369][ T5318] RIP: 0033:0x7f914051cfce [ 96.110387][ T5318] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 96.110404][ T5318] RSP: 002b:00007f913ef74fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 96.110499][ T5318] RAX: ffffffffffffffda RBX: 00007f913ef756c0 RCX: 00007f914051cfce [ 96.110513][ T5318] RDX: 000000000000000f RSI: 00007f913ef750a0 RDI: 000000000000000a [ 96.110525][ T5318] RBP: 00007f913ef75090 R08: 0000000000000000 R09: 0000000000000000 [ 96.110537][ T5318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.110548][ T5318] R13: 00007f91407d6218 R14: 00007f91407d6180 R15: 00007ffd68d16218 [ 96.110586][ T5318] [ 97.428531][ T5356] bond4: option arp_missed_max: mode dependency failed, not supported in mode balance-tlb(5) [ 97.440551][ T5356] bond4 (unregistering): Released all slaves [ 97.522202][ T5363] FAULT_INJECTION: forcing a failure. [ 97.522202][ T5363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.535395][ T5363] CPU: 0 UID: 0 PID: 5363 Comm: syz.0.574 Not tainted syzkaller #0 PREEMPT(full) [ 97.535427][ T5363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 97.535440][ T5363] Call Trace: [ 97.535447][ T5363] [ 97.535455][ T5363] __dump_stack+0x1d/0x30 [ 97.535484][ T5363] dump_stack_lvl+0x95/0xd0 [ 97.535519][ T5363] dump_stack+0x15/0x1b [ 97.535543][ T5363] should_fail_ex+0x263/0x280 [ 97.535590][ T5363] should_fail+0xb/0x20 [ 97.535618][ T5363] should_fail_usercopy+0x1a/0x20 [ 97.535720][ T5363] _copy_from_user+0x1c/0xb0 [ 97.535750][ T5363] kstrtouint_from_user+0x69/0xf0 [ 97.535776][ T5363] ? __br_mdb_add+0x260/0xab0 [ 97.535812][ T5363] proc_fail_nth_write+0x50/0x160 [ 97.535914][ T5363] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 97.535946][ T5363] vfs_write+0x269/0x9f0 [ 97.535980][ T5363] ? __schedule+0x93c/0xd40 [ 97.536005][ T5363] ? __rcu_read_unlock+0x4e/0x70 [ 97.536157][ T5363] ? __fget_files+0x184/0x1c0 [ 97.536208][ T5363] ? mutex_lock+0x57/0x90 [ 97.536237][ T5363] ksys_write+0xdc/0x1a0 [ 97.536257][ T5363] __x64_sys_write+0x40/0x50 [ 97.536340][ T5363] x64_sys_call+0x27e1/0x3020 [ 97.536369][ T5363] do_syscall_64+0x12c/0x370 [ 97.536392][ T5363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.536415][ T5363] RIP: 0033:0x7f914051cfce [ 97.536481][ T5363] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 97.536501][ T5363] RSP: 002b:00007f913ef74fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 97.536523][ T5363] RAX: ffffffffffffffda RBX: 00007f913ef756c0 RCX: 00007f914051cfce [ 97.536538][ T5363] RDX: 0000000000000001 RSI: 00007f913ef750a0 RDI: 000000000000000a [ 97.536552][ T5363] RBP: 00007f913ef75090 R08: 0000000000000000 R09: 0000000000000000 [ 97.536566][ T5363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.536629][ T5363] R13: 00007f91407d6218 R14: 00007f91407d6180 R15: 00007ffd68d16218 [ 97.536704][ T5363] [ 97.654471][ T28] audit: type=1400 audit(1773009175.544:2389): avc: denied { setopt } for pid=5359 comm="syz.1.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 98.019100][ T5369] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 98.187258][ T28] audit: type=1400 audit(1773009175.874:2390): avc: denied { connect } for pid=5368 comm="syz.1.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 98.249434][ T28] audit: type=1400 audit(1773009175.874:2391): avc: denied { bind } for pid=5368 comm="syz.1.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 98.479130][ T28] audit: type=1400 audit(1773009176.254:2392): avc: denied { mounton } for pid=5380 comm="syz.4.581" path="/proc/330/cgroup" dev="proc" ino=11170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 98.534658][ T28] audit: type=1400 audit(1773009176.424:2393): avc: denied { create } for pid=5386 comm="syz.3.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 98.666855][ T5393] netlink: 8 bytes leftover after parsing attributes in process `syz.1.585'. [ 98.699512][ T28] audit: type=1400 audit(1773009176.584:2394): avc: denied { bind } for pid=5395 comm="syz.3.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.726990][ T5393] netlink: 8 bytes leftover after parsing attributes in process `syz.1.585'. [ 98.806452][ T28] audit: type=1400 audit(1773009176.694:2395): avc: denied { getopt } for pid=5402 comm="syz.4.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 98.908726][ T5403] vxcan1 speed is unknown, defaulting to 1000 [ 99.067780][ T28] audit: type=1400 audit(1773009176.714:2396): avc: denied { map } for pid=5402 comm="syz.4.588" path="socket:[11203]" dev="sockfs" ino=11203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 99.133498][ T28] audit: type=1400 audit(1773009176.714:2397): avc: denied { accept } for pid=5402 comm="syz.4.588" path="socket:[11203]" dev="sockfs" ino=11203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 99.152000][ T5403] lo speed is unknown, defaulting to 1000 [ 99.304861][ T5420] SELinux: ebitmap: truncated map [ 99.311570][ T5420] SELinux: failed to load policy [ 99.451863][ T5424] FAULT_INJECTION: forcing a failure. [ 99.451863][ T5424] name failslab, interval 1, probability 0, space 0, times 0 [ 99.469135][ T5424] CPU: 0 UID: 0 PID: 5424 Comm: syz.4.594 Not tainted syzkaller #0 PREEMPT(full) [ 99.469205][ T5424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 99.469218][ T5424] Call Trace: [ 99.469225][ T5424] [ 99.469234][ T5424] __dump_stack+0x1d/0x30 [ 99.469314][ T5424] dump_stack_lvl+0x95/0xd0 [ 99.469340][ T5424] dump_stack+0x15/0x1b [ 99.469363][ T5424] should_fail_ex+0x263/0x280 [ 99.469395][ T5424] should_failslab+0x8c/0xb0 [ 99.469418][ T5424] kmem_cache_alloc_noprof+0x66/0x400 [ 99.469477][ T5424] ? skb_clone+0x151/0x1f0 [ 99.469565][ T5424] skb_clone+0x151/0x1f0 [ 99.469635][ T5424] __netlink_deliver_tap+0x2c9/0x500 [ 99.469698][ T5424] netlink_unicast+0x66b/0x690 [ 99.469732][ T5424] netlink_sendmsg+0x5c8/0x6f0 [ 99.469774][ T5424] ? __pfx_netlink_sendmsg+0x10/0x10 [ 99.469823][ T5424] ____sys_sendmsg+0x563/0x5b0 [ 99.469921][ T5424] ___sys_sendmsg+0x195/0x1e0 [ 99.469963][ T5424] __x64_sys_sendmsg+0xd4/0x160 [ 99.469998][ T5424] x64_sys_call+0x194c/0x3020 [ 99.470027][ T5424] do_syscall_64+0x12c/0x370 [ 99.470116][ T5424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.470137][ T5424] RIP: 0033:0x7fcfb8c5c799 [ 99.470157][ T5424] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 99.470176][ T5424] RSP: 002b:00007fcfb76af028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.470199][ T5424] RAX: ffffffffffffffda RBX: 00007fcfb8ed5fa0 RCX: 00007fcfb8c5c799 [ 99.470262][ T5424] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000005 [ 99.470277][ T5424] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 99.470291][ T5424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.470303][ T5424] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 99.470403][ T5424] [ 99.907328][ T5433] xt_hashlimit: size too large, truncated to 1048576 [ 100.319779][ T5443] netlink: 'syz.0.601': attribute type 1 has an invalid length. [ 100.356202][ T5443] 8021q: adding VLAN 0 to HW filter on device bond2 [ 100.545055][ T5450] netlink: 'syz.2.604': attribute type 11 has an invalid length. [ 100.589008][ T5456] netlink: 8 bytes leftover after parsing attributes in process `syz.2.607'. [ 101.615744][ T5487] netlink: 8 bytes leftover after parsing attributes in process `syz.2.617'. [ 102.492610][ T5501] usb usb9: usbfs: process 5501 (syz.3.621) did not claim interface 0 before use [ 102.532573][ T5502] SELinux: failed to load policy [ 102.820023][ T28] audit: type=1326 audit(1773009180.714:2398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5512 comm="syz.0.626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f914055c799 code=0x7ffc0000 [ 102.888198][ T28] audit: type=1326 audit(1773009180.714:2399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5512 comm="syz.0.626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f914055c799 code=0x7ffc0000 [ 102.959418][ T28] audit: type=1326 audit(1773009180.744:2400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5512 comm="syz.0.626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7f914055c799 code=0x7ffc0000 [ 103.003204][ T28] audit: type=1326 audit(1773009180.744:2401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5512 comm="syz.0.626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f914055c799 code=0x7ffc0000 [ 103.070436][ T28] audit: type=1326 audit(1773009180.744:2402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5512 comm="syz.0.626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f914055c799 code=0x7ffc0000 [ 103.972867][ T5535] netlink: 8 bytes leftover after parsing attributes in process `syz.3.633'. [ 103.988057][ T28] audit: type=1400 audit(1773009181.844:2403): avc: denied { create } for pid=5536 comm="syz.1.634" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netrom_socket permissive=1 [ 104.150494][ T28] audit: type=1326 audit(1773009182.024:2404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.4.635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 104.175216][ T28] audit: type=1326 audit(1773009182.024:2405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.4.635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 104.268373][ T28] audit: type=1326 audit(1773009182.034:2406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.4.635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 104.414337][ T28] audit: type=1326 audit(1773009182.034:2407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.4.635" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 104.940025][ T5565] FAULT_INJECTION: forcing a failure. [ 104.940025][ T5565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 104.991247][ T5565] CPU: 1 UID: 0 PID: 5565 Comm: syz.3.642 Not tainted syzkaller #0 PREEMPT(full) [ 104.991312][ T5565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 104.991323][ T5565] Call Trace: [ 104.991331][ T5565] [ 104.991341][ T5565] __dump_stack+0x1d/0x30 [ 104.991526][ T5565] dump_stack_lvl+0x95/0xd0 [ 104.991547][ T5565] dump_stack+0x15/0x1b [ 104.991569][ T5565] should_fail_ex+0x263/0x280 [ 104.991596][ T5565] should_fail+0xb/0x20 [ 104.991621][ T5565] should_fail_usercopy+0x1a/0x20 [ 104.991643][ T5565] _copy_to_user+0x20/0xa0 [ 104.991747][ T5565] simple_read_from_buffer+0xb5/0x130 [ 104.991769][ T5565] proc_fail_nth_read+0x10e/0x150 [ 104.991834][ T5565] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 104.991866][ T5565] vfs_read+0x1ab/0x7f0 [ 104.991896][ T5565] ? __rcu_read_unlock+0x4e/0x70 [ 104.991915][ T5565] ? __fget_files+0x184/0x1c0 [ 104.991962][ T5565] ? mutex_lock+0x57/0x90 [ 104.992000][ T5565] ksys_read+0xdc/0x1a0 [ 104.992037][ T5565] __x64_sys_read+0x40/0x50 [ 104.992058][ T5565] x64_sys_call+0x2886/0x3020 [ 104.992135][ T5565] do_syscall_64+0x12c/0x370 [ 104.992160][ T5565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.992200][ T5565] RIP: 0033:0x7f78d625cfce [ 104.992215][ T5565] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 104.992234][ T5565] RSP: 002b:00007f78d4cf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 104.992260][ T5565] RAX: ffffffffffffffda RBX: 00007f78d4cf76c0 RCX: 00007f78d625cfce [ 104.992350][ T5565] RDX: 000000000000000f RSI: 00007f78d4cf70a0 RDI: 0000000000000004 [ 104.992364][ T5565] RBP: 00007f78d4cf7090 R08: 0000000000000000 R09: 0000000000000000 [ 104.992375][ T5565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.992387][ T5565] R13: 00007f78d6516038 R14: 00007f78d6515fa0 R15: 00007fffd8a43798 [ 104.992404][ T5565] [ 107.133992][ T5596] netlink: 8 bytes leftover after parsing attributes in process `syz.3.651'. [ 108.280983][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 108.280998][ T28] audit: type=1326 audit(1773009186.174:2466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5610 comm="syz.3.657" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x0 [ 108.853286][ T5624] SELinux: failed to load policy [ 108.946599][ T5628] netlink: 20 bytes leftover after parsing attributes in process `syz.1.661'. [ 109.043237][ T5634] bond_slave_0: entered promiscuous mode [ 109.049000][ T5634] bond_slave_1: entered promiscuous mode [ 109.061206][ T28] audit: type=1400 audit(1773009186.954:2467): avc: denied { accept } for pid=5632 comm="syz.2.664" laddr=::7f00:1 lport=37254 faddr=fc00:: fport=20066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 109.154377][ T5640] netlink: 'syz.3.666': attribute type 1 has an invalid length. [ 109.190709][ T5640] 8021q: adding VLAN 0 to HW filter on device bond3 [ 109.221611][ T5640] netlink: 4 bytes leftover after parsing attributes in process `syz.3.666'. [ 109.275928][ T5645] netlink: 8 bytes leftover after parsing attributes in process `syz.3.668'. [ 109.748618][ T28] audit: type=1400 audit(1773009187.634:2468): avc: denied { ioctl } for pid=5662 comm="syz.1.674" path="socket:[12237]" dev="sockfs" ino=12237 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 109.839150][ T5664] vxcan1 speed is unknown, defaulting to 1000 [ 109.903819][ T5664] lo speed is unknown, defaulting to 1000 [ 110.189029][ T5668] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 110.220912][ T5668] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 110.259638][ T28] audit: type=1326 audit(1773009187.854:2469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.2.673" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x0 [ 110.323053][ T5670] FAULT_INJECTION: forcing a failure. [ 110.323053][ T5670] name failslab, interval 1, probability 0, space 0, times 0 [ 110.335828][ T5670] CPU: 0 UID: 0 PID: 5670 Comm: syz.4.676 Not tainted syzkaller #0 PREEMPT(full) [ 110.335987][ T5670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 110.336002][ T5670] Call Trace: [ 110.336009][ T5670] [ 110.336019][ T5670] __dump_stack+0x1d/0x30 [ 110.336048][ T5670] dump_stack_lvl+0x95/0xd0 [ 110.336068][ T5670] dump_stack+0x15/0x1b [ 110.336196][ T5670] should_fail_ex+0x263/0x280 [ 110.336220][ T5670] should_failslab+0x8c/0xb0 [ 110.336243][ T5670] __kmalloc_node_noprof+0xc8/0x560 [ 110.336265][ T5670] ? __vmalloc_node_range_noprof+0x428/0x12b0 [ 110.336366][ T5670] __vmalloc_node_range_noprof+0x428/0x12b0 [ 110.336396][ T5670] ? selinux_file_open+0x2e6/0x330 [ 110.336462][ T5670] ? __rcu_read_unlock+0x4e/0x70 [ 110.336485][ T5670] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 110.336507][ T5670] __vmalloc_noprof+0xa4/0xf0 [ 110.336531][ T5670] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 110.336621][ T5670] bpf_prog_alloc_no_stats+0x47/0x390 [ 110.336642][ T5670] ? bpf_prog_alloc+0x2a/0x150 [ 110.336660][ T5670] bpf_prog_alloc+0x3c/0x150 [ 110.336676][ T5670] bpf_prog_load+0x506/0x1140 [ 110.336773][ T5670] ? security_bpf+0x2b/0x90 [ 110.336816][ T5670] __sys_bpf+0x505/0x7e0 [ 110.336893][ T5670] __x64_sys_bpf+0x41/0x50 [ 110.336945][ T5670] x64_sys_call+0x10cb/0x3020 [ 110.336971][ T5670] do_syscall_64+0x12c/0x370 [ 110.336996][ T5670] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.337018][ T5670] RIP: 0033:0x7fcfb8c5c799 [ 110.337048][ T5670] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 110.337064][ T5670] RSP: 002b:00007fcfb76af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.337087][ T5670] RAX: ffffffffffffffda RBX: 00007fcfb8ed5fa0 RCX: 00007fcfb8c5c799 [ 110.337190][ T5670] RDX: 0000000000000094 RSI: 0000200000000040 RDI: 0000000000000005 [ 110.337206][ T5670] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 110.337219][ T5670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.337230][ T5670] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 110.337313][ T5670] [ 110.337352][ T5670] syz.4.676: vmalloc error: size 4096, failed to allocated page array size 8, mode:0x500dc2(GFP_HIGHUSER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 110.573724][ T5670] CPU: 0 UID: 0 PID: 5670 Comm: syz.4.676 Not tainted syzkaller #0 PREEMPT(full) [ 110.573757][ T5670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 110.573770][ T5670] Call Trace: [ 110.573778][ T5670] [ 110.573787][ T5670] __dump_stack+0x1d/0x30 [ 110.573891][ T5670] dump_stack_lvl+0x95/0xd0 [ 110.573919][ T5670] dump_stack+0x15/0x1b [ 110.573943][ T5670] warn_alloc+0x145/0x1c0 [ 110.573974][ T5670] __vmalloc_node_range_noprof+0x7d9/0x12b0 [ 110.574059][ T5670] ? selinux_file_open+0x2e6/0x330 [ 110.574087][ T5670] ? __rcu_read_unlock+0x4e/0x70 [ 110.574112][ T5670] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 110.574237][ T5670] __vmalloc_noprof+0xa4/0xf0 [ 110.574259][ T5670] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 110.574279][ T5670] bpf_prog_alloc_no_stats+0x47/0x390 [ 110.574334][ T5670] ? bpf_prog_alloc+0x2a/0x150 [ 110.574430][ T5670] bpf_prog_alloc+0x3c/0x150 [ 110.574447][ T5670] bpf_prog_load+0x506/0x1140 [ 110.574474][ T5670] ? security_bpf+0x2b/0x90 [ 110.574518][ T5670] __sys_bpf+0x505/0x7e0 [ 110.574554][ T5670] __x64_sys_bpf+0x41/0x50 [ 110.574589][ T5670] x64_sys_call+0x10cb/0x3020 [ 110.574693][ T5670] do_syscall_64+0x12c/0x370 [ 110.574713][ T5670] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.574734][ T5670] RIP: 0033:0x7fcfb8c5c799 [ 110.574752][ T5670] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 110.574769][ T5670] RSP: 002b:00007fcfb76af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.574789][ T5670] RAX: ffffffffffffffda RBX: 00007fcfb8ed5fa0 RCX: 00007fcfb8c5c799 [ 110.574844][ T5670] RDX: 0000000000000094 RSI: 0000200000000040 RDI: 0000000000000005 [ 110.574857][ T5670] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 110.574939][ T5670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.574951][ T5670] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 110.574973][ T5670] [ 110.574981][ T5670] Mem-Info: [ 110.782619][ T5670] active_anon:7211 inactive_anon:0 isolated_anon:0 [ 110.782619][ T5670] active_file:22412 inactive_file:2328 isolated_file:0 [ 110.782619][ T5670] unevictable:1024 dirty:322 writeback:0 [ 110.782619][ T5670] slab_reclaimable:3403 slab_unreclaimable:20026 [ 110.782619][ T5670] mapped:31562 shmem:1010 pagetables:3234 [ 110.782619][ T5670] sec_pagetables:0 bounce:0 [ 110.782619][ T5670] kernel_misc_reclaimable:0 [ 110.782619][ T5670] free:1874143 free_pcp:9689 free_cma:0 [ 110.782725][ T5670] Node 0 active_anon:28844kB inactive_anon:0kB active_file:89648kB inactive_file:9312kB unevictable:4096kB isolated(anon):0kB isolated(file):0kB mapped:126248kB dirty:1288kB writeback:0kB shmem:4156kB kernel_stack:3728kB pagetables:12936kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 110.782775][ T5670] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 110.782902][ T5670] lowmem_reserve[]: 0 2879 7857 7857 [ 110.782996][ T5670] Node 0 DMA32 free:2944664kB boost:0kB min:4128kB low:7052kB high:9976kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948188kB mlocked:0kB bounce:0kB free_pcp:3524kB local_pcp:3524kB free_cma:0kB [ 110.783074][ T5670] lowmem_reserve[]: 0 0 4978 4978 [ 110.783107][ T5670] Node 0 Normal free:4536548kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:28844kB inactive_anon:0kB active_file:89648kB inactive_file:9312kB unevictable:4096kB writepending:1288kB zspages:0kB present:5242880kB managed:5098240kB mlocked:4096kB bounce:0kB free_pcp:35184kB local_pcp:19840kB free_cma:0kB [ 110.783297][ T5670] lowmem_reserve[]: 0 0 0 0 [ 110.783368][ T5670] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 110.783568][ T5670] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 6*16kB (M) 5*32kB (M) 4*64kB (M) 1*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2944664kB [ 110.783861][ T5670] Node 0 Normal: 95*4kB (M) 573*8kB (UM) 230*16kB (UM) 443*32kB (UME) 421*64kB (UME) 201*128kB (UM) 130*256kB (UM) 72*512kB (UM) 40*1024kB (UM) 24*2048kB (UME) 1050*4096kB (UM) = 4536548kB [ 110.784094][ T5670] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 110.784111][ T5670] 25804 total pagecache pages [ 110.784119][ T5670] 0 pages in swap cache [ 110.784140][ T5670] Free swap = 124996kB [ 110.784148][ T5670] Total swap = 124996kB [ 110.784157][ T5670] 2097051 pages RAM [ 110.784165][ T5670] 0 pages HighMem/MovableOnly [ 110.784173][ T5670] 81604 pages reserved [ 110.998308][ T28] audit: type=1400 audit(1773009188.844:2470): avc: denied { firmware_load } for pid=5689 comm="syz.3.684" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 111.196775][ T5698] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 111.196792][ T5698] IPv6: NLM_F_CREATE should be set when creating new route [ 111.196839][ T5698] IPv6: NLM_F_CREATE should be set when creating new route [ 111.196849][ T5698] IPv6: NLM_F_CREATE should be set when creating new route [ 112.680659][ T5718] netlink: 'syz.4.692': attribute type 1 has an invalid length. [ 112.700776][ T28] audit: type=1400 audit(1773009190.594:2471): avc: denied { create } for pid=5720 comm="syz.3.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 112.741771][ T5724] netlink: 12 bytes leftover after parsing attributes in process `syz.4.692'. [ 112.770074][ T28] audit: type=1400 audit(1773009190.624:2472): avc: denied { ioctl } for pid=5720 comm="syz.3.693" path="socket:[13327]" dev="sockfs" ino=13327 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 112.813386][ T5718] bond4: entered promiscuous mode [ 112.833052][ T5724] netlink: 12 bytes leftover after parsing attributes in process `syz.4.692'. [ 112.861943][ T5718] 8021q: adding VLAN 0 to HW filter on device bond4 [ 112.873356][ T28] audit: type=1400 audit(1773009190.624:2473): avc: denied { getopt } for pid=5720 comm="syz.3.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 113.073458][ T5726] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 113.111382][ T5726] SELinux: failed to load policy [ 113.215063][ T5733] sg_write: data in/out 65516/120 bytes for SCSI command 0x0-- guessing data in; [ 113.215063][ T5733] program syz.3.697 not setting count and/or reply_len properly [ 113.233263][ T5733] netlink: 64 bytes leftover after parsing attributes in process `syz.3.697'. [ 113.296460][ T5740] netlink: 8 bytes leftover after parsing attributes in process `syz.3.699'. [ 113.385972][ T5740] netlink: 4 bytes leftover after parsing attributes in process `syz.3.699'. [ 113.447753][ T5740] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 113.467135][ T5740] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 113.509196][ T5740] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 113.531608][ T5740] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 113.697891][ T5744] netlink: 83992 bytes leftover after parsing attributes in process `syz.0.700'. [ 113.715359][ T5744] netlink: zone id is out of range [ 113.733107][ T5744] netlink: zone id is out of range [ 113.761514][ T5744] netlink: zone id is out of range [ 114.166321][ T5744] netlink: set zone limit has 8 unknown bytes [ 114.448613][ T5762] netlink: 8 bytes leftover after parsing attributes in process `syz.2.705'. [ 114.912731][ T5776] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 114.920623][ T5776] SELinux: failed to load policy [ 114.998545][ T5784] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 115.007816][ T5784] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 115.706076][ T5808] random: crng reseeded on system resumption [ 115.924257][ T28] audit: type=1400 audit(1773009193.804:2474): avc: denied { listen } for pid=5798 comm="syz.4.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 115.980905][ T28] audit: type=1400 audit(1773009193.864:2475): avc: denied { read write } for pid=5798 comm="syz.4.719" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 116.031342][ T28] audit: type=1400 audit(1773009193.864:2476): avc: denied { open } for pid=5798 comm="syz.4.719" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 116.064928][ T28] audit: type=1400 audit(1773009193.864:2477): avc: denied { ioctl } for pid=5798 comm="syz.4.719" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 116.168835][ T28] audit: type=1400 audit(1773009194.054:2478): avc: denied { bind } for pid=5819 comm="syz.2.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 116.196408][ T28] audit: type=1400 audit(1773009194.054:2479): avc: denied { read } for pid=5819 comm="syz.2.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 116.279658][ T5833] netlink: 8 bytes leftover after parsing attributes in process `syz.0.727'. [ 116.289966][ T5827] netlink: 76 bytes leftover after parsing attributes in process `syz.3.725'. [ 116.394288][ T28] audit: type=1400 audit(1773009194.284:2480): avc: denied { ioctl } for pid=5840 comm="syz.2.730" path="pid:[4026532378]" dev="nsfs" ino=4026532378 ioctlcmd=0xb707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 116.463565][ T28] audit: type=1400 audit(1773009194.354:2481): avc: denied { read } for pid=5843 comm="syz.2.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 117.458153][ T28] audit: type=1400 audit(1773009194.424:2482): avc: denied { setopt } for pid=5843 comm="syz.2.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 117.646037][ T5861] vxcan1 speed is unknown, defaulting to 1000 [ 117.682800][ T5866] netlink: 'syz.3.736': attribute type 15 has an invalid length. [ 117.732955][ T28] audit: type=1400 audit(1773009195.614:2483): avc: denied { bind } for pid=5848 comm="syz.1.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 117.794325][ T5866] netlink: 24 bytes leftover after parsing attributes in process `syz.3.736'. [ 117.976588][ T5861] lo speed is unknown, defaulting to 1000 [ 118.044825][ T5874] FAULT_INJECTION: forcing a failure. [ 118.044825][ T5874] name failslab, interval 1, probability 0, space 0, times 0 [ 118.074199][ T5878] netlink: 'syz.2.742': attribute type 1 has an invalid length. [ 118.088853][ T5874] CPU: 0 UID: 0 PID: 5874 Comm: syz.0.740 Not tainted syzkaller #0 PREEMPT(full) [ 118.088949][ T5874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 118.088960][ T5874] Call Trace: [ 118.088968][ T5874] [ 118.088976][ T5874] __dump_stack+0x1d/0x30 [ 118.089051][ T5874] dump_stack_lvl+0x95/0xd0 [ 118.089072][ T5874] dump_stack+0x15/0x1b [ 118.089096][ T5874] should_fail_ex+0x263/0x280 [ 118.089120][ T5874] should_failslab+0x8c/0xb0 [ 118.089166][ T5874] __kmalloc_node_noprof+0xc8/0x560 [ 118.089188][ T5874] ? __nla_validate_parse+0x1650/0x1cf0 [ 118.089222][ T5874] ? qdisc_alloc+0x65/0x410 [ 118.089292][ T5874] qdisc_alloc+0x65/0x410 [ 118.089315][ T5874] ? nla_strcmp+0xc3/0xe0 [ 118.089343][ T5874] qdisc_create+0xf5/0x9d0 [ 118.089363][ T5874] tc_modify_qdisc+0xffc/0x14f0 [ 118.089406][ T5874] ? __mutex_lock_slowpath+0xa/0x10 [ 118.089438][ T5874] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 118.089525][ T5874] rtnetlink_rcv_msg+0x6a7/0x720 [ 118.089558][ T5874] netlink_rcv_skb+0x123/0x220 [ 118.089650][ T5874] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 118.089736][ T5874] rtnetlink_rcv+0x1c/0x30 [ 118.089764][ T5874] netlink_unicast+0x5c0/0x690 [ 118.089836][ T5874] netlink_sendmsg+0x5c8/0x6f0 [ 118.089871][ T5874] ? __pfx_netlink_sendmsg+0x10/0x10 [ 118.089900][ T5874] ____sys_sendmsg+0x563/0x5b0 [ 118.089994][ T5874] ___sys_sendmsg+0x195/0x1e0 [ 118.090110][ T5874] __x64_sys_sendmsg+0xd4/0x160 [ 118.090166][ T5874] x64_sys_call+0x194c/0x3020 [ 118.090191][ T5874] do_syscall_64+0x12c/0x370 [ 118.090253][ T5874] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 118.090274][ T5874] RIP: 0033:0x7f914055c799 [ 118.090291][ T5874] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.090312][ T5874] RSP: 002b:00007f913efb7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.090354][ T5874] RAX: ffffffffffffffda RBX: 00007f91407d5fa0 RCX: 00007f914055c799 [ 118.090370][ T5874] RDX: 0000000000008010 RSI: 0000200000001200 RDI: 0000000000000005 [ 118.090383][ T5874] RBP: 00007f913efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 118.090534][ T5874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.090546][ T5874] R13: 00007f91407d6038 R14: 00007f91407d5fa0 R15: 00007ffd68d16218 [ 118.090564][ T5874] [ 118.385471][ T5878] 8021q: adding VLAN 0 to HW filter on device bond3 [ 118.548924][ T5885] netlink: 76 bytes leftover after parsing attributes in process `syz.0.744'. [ 118.826750][ T5896] vxcan1 speed is unknown, defaulting to 1000 [ 118.896954][ T5896] lo speed is unknown, defaulting to 1000 [ 119.266663][ T5910] netlink: 348 bytes leftover after parsing attributes in process `syz.0.753'. [ 119.281216][ T5910] netlink: 52 bytes leftover after parsing attributes in process `syz.0.753'. [ 119.539939][ T5922] FAULT_INJECTION: forcing a failure. [ 119.539939][ T5922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.579524][ T5922] CPU: 0 UID: 0 PID: 5922 Comm: syz.0.757 Not tainted syzkaller #0 PREEMPT(full) [ 119.579593][ T5922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 119.579606][ T5922] Call Trace: [ 119.579614][ T5922] [ 119.579623][ T5922] __dump_stack+0x1d/0x30 [ 119.579651][ T5922] dump_stack_lvl+0x95/0xd0 [ 119.579681][ T5922] dump_stack+0x15/0x1b [ 119.579705][ T5922] should_fail_ex+0x263/0x280 [ 119.579731][ T5922] should_fail+0xb/0x20 [ 119.579752][ T5922] should_fail_usercopy+0x1a/0x20 [ 119.579793][ T5922] _copy_from_user+0x1c/0xb0 [ 119.579824][ T5922] ___sys_sendmsg+0xc1/0x1e0 [ 119.579898][ T5922] __x64_sys_sendmsg+0xd4/0x160 [ 119.579928][ T5922] x64_sys_call+0x194c/0x3020 [ 119.579957][ T5922] do_syscall_64+0x12c/0x370 [ 119.579980][ T5922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 119.580053][ T5922] RIP: 0033:0x7f914055c799 [ 119.580070][ T5922] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 119.580149][ T5922] RSP: 002b:00007f913efb7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 119.580172][ T5922] RAX: ffffffffffffffda RBX: 00007f91407d5fa0 RCX: 00007f914055c799 [ 119.580187][ T5922] RDX: 00000000000040d0 RSI: 0000200000000100 RDI: 0000000000000003 [ 119.580201][ T5922] RBP: 00007f913efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 119.580215][ T5922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 119.580288][ T5922] R13: 00007f91407d6038 R14: 00007f91407d5fa0 R15: 00007ffd68d16218 [ 119.580305][ T5922] [ 119.832066][ T5930] netlink: 36 bytes leftover after parsing attributes in process `syz.4.760'. [ 119.879127][ T5930] netlink: 24 bytes leftover after parsing attributes in process `syz.4.760'. [ 119.968424][ T5934] netlink: 8 bytes leftover after parsing attributes in process `syz.2.759'. [ 120.111209][ T5946] FAULT_INJECTION: forcing a failure. [ 120.111209][ T5946] name failslab, interval 1, probability 0, space 0, times 0 [ 120.128043][ T5946] CPU: 0 UID: 0 PID: 5946 Comm: syz.4.764 Not tainted syzkaller #0 PREEMPT(full) [ 120.128135][ T5946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 120.128146][ T5946] Call Trace: [ 120.128152][ T5946] [ 120.128158][ T5946] __dump_stack+0x1d/0x30 [ 120.128184][ T5946] dump_stack_lvl+0x95/0xd0 [ 120.128207][ T5946] dump_stack+0x15/0x1b [ 120.128275][ T5946] should_fail_ex+0x263/0x280 [ 120.128299][ T5946] should_failslab+0x8c/0xb0 [ 120.128321][ T5946] kmem_cache_alloc_noprof+0x66/0x400 [ 120.128417][ T5946] ? do_getname+0x2e/0x1c0 [ 120.128442][ T5946] do_getname+0x2e/0x1c0 [ 120.128462][ T5946] getname_flags+0x1d/0x30 [ 120.128507][ T5946] do_sys_openat2+0x60/0x130 [ 120.128534][ T5946] __x64_sys_open+0xe6/0x110 [ 120.128557][ T5946] x64_sys_call+0x14b9/0x3020 [ 120.128656][ T5946] do_syscall_64+0x12c/0x370 [ 120.128682][ T5946] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.128706][ T5946] RIP: 0033:0x7fcfb8c5c799 [ 120.128724][ T5946] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 120.128743][ T5946] RSP: 002b:00007fcfb76af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 120.128818][ T5946] RAX: ffffffffffffffda RBX: 00007fcfb8ed5fa0 RCX: 00007fcfb8c5c799 [ 120.128833][ T5946] RDX: 0000000000000000 RSI: 0000000000143142 RDI: 0000200000000100 [ 120.128845][ T5946] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 120.128857][ T5946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.128921][ T5946] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 120.128942][ T5946] [ 120.399866][ T5952] netlink: 348 bytes leftover after parsing attributes in process `syz.0.768'. [ 120.427222][ T5952] netlink: 52 bytes leftover after parsing attributes in process `syz.0.768'. [ 121.252943][ T5979] netlink: 20 bytes leftover after parsing attributes in process `syz.3.777'. [ 121.496434][ T5986] FAULT_INJECTION: forcing a failure. [ 121.496434][ T5986] name failslab, interval 1, probability 0, space 0, times 0 [ 121.510491][ T5986] CPU: 1 UID: 0 PID: 5986 Comm: syz.1.778 Not tainted syzkaller #0 PREEMPT(full) [ 121.510523][ T5986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 121.510655][ T5986] Call Trace: [ 121.510663][ T5986] [ 121.510672][ T5986] __dump_stack+0x1d/0x30 [ 121.510702][ T5986] dump_stack_lvl+0x95/0xd0 [ 121.510784][ T5986] dump_stack+0x15/0x1b [ 121.510805][ T5986] should_fail_ex+0x263/0x280 [ 121.510854][ T5986] ? __rdma_create_id+0x48/0x3d0 [ 121.510884][ T5986] should_failslab+0x8c/0xb0 [ 121.510908][ T5986] __kmalloc_cache_noprof+0x5f/0x410 [ 121.510936][ T5986] ? __pfx_rds_rdma_cm_event_handler+0x10/0x10 [ 121.510965][ T5986] __rdma_create_id+0x48/0x3d0 [ 121.510987][ T5986] ? __schedule+0x93c/0xd40 [ 121.511007][ T5986] ? __pfx_rds_rdma_cm_event_handler+0x10/0x10 [ 121.511049][ T5986] __rdma_create_kernel_id+0x3c/0x80 [ 121.511137][ T5986] rds_ib_laddr_check+0x8d/0x300 [ 121.511164][ T5986] rds_trans_get_preferred+0x106/0x2a0 [ 121.511276][ T5986] rds_bind+0x4d9/0xf20 [ 121.511303][ T5986] __sys_bind+0x1d0/0x290 [ 121.511332][ T5986] __x64_sys_bind+0x3f/0x50 [ 121.511377][ T5986] x64_sys_call+0x2b30/0x3020 [ 121.511404][ T5986] do_syscall_64+0x12c/0x370 [ 121.511426][ T5986] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 121.511453][ T5986] RIP: 0033:0x7fc53157c799 [ 121.511510][ T5986] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.511531][ T5986] RSP: 002b:00007fc52ff95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 121.511556][ T5986] RAX: ffffffffffffffda RBX: 00007fc5317f6180 RCX: 00007fc53157c799 [ 121.511627][ T5986] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000008 [ 121.511640][ T5986] RBP: 00007fc52ff95090 R08: 0000000000000000 R09: 0000000000000000 [ 121.511654][ T5986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.511669][ T5986] R13: 00007fc5317f6218 R14: 00007fc5317f6180 R15: 00007ffef345d3f8 [ 121.511694][ T5986] [ 127.509449][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 127.509469][ T28] audit: type=1326 audit(1773009205.354:2487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6012 comm="syz.4.786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 127.594773][ T28] audit: type=1326 audit(1773009205.354:2488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6012 comm="syz.4.786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=255 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 127.618246][ T28] audit: type=1326 audit(1773009205.354:2489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6012 comm="syz.4.786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 127.921525][ T28] audit: type=1326 audit(1773009205.354:2490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6012 comm="syz.4.786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 129.642030][ T6046] delete_channel: no stack [ 130.034207][ T6054] vxcan1 speed is unknown, defaulting to 1000 [ 130.071230][ T6054] lo speed is unknown, defaulting to 1000 [ 130.190163][ T6070] x_tables: unsorted underflow at hook 2 [ 130.201905][ T6068] IPVS: sed: FWM 3 0x00000003 - no destination available [ 130.329541][ T3391] IPVS: starting estimator thread 0... [ 130.437367][ T6077] netlink: 348 bytes leftover after parsing attributes in process `syz.1.805'. [ 130.470286][ T28] audit: type=1326 audit(1773009208.304:2491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6074 comm="syz.3.804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 130.507474][ T6077] netlink: 52 bytes leftover after parsing attributes in process `syz.1.805'. [ 130.516845][ T6071] IPVS: using max 2640 ests per chain, 132000 per kthread [ 130.609011][ T28] audit: type=1326 audit(1773009208.314:2492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6074 comm="syz.3.804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 130.652136][ T28] audit: type=1326 audit(1773009208.314:2493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6074 comm="syz.3.804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 130.688690][ T6083] netlink: 32 bytes leftover after parsing attributes in process `syz.4.807'. [ 130.697758][ T6083] netlink: 32 bytes leftover after parsing attributes in process `syz.4.807'. [ 130.729878][ T28] audit: type=1326 audit(1773009208.314:2494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6074 comm="syz.3.804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 130.756140][ T28] audit: type=1326 audit(1773009208.314:2495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6074 comm="syz.3.804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 130.799443][ T28] audit: type=1326 audit(1773009208.314:2496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6074 comm="syz.3.804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 130.974239][ T6094] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.019073][ T6098] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.066743][ T6103] netlink: 12 bytes leftover after parsing attributes in process `syz.0.813'. [ 131.092771][ T6094] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.122452][ T6098] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.145901][ T6094] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.157912][ T6104] vxcan1 speed is unknown, defaulting to 1000 [ 131.166893][ T6098] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.192319][ T6104] lo speed is unknown, defaulting to 1000 [ 131.207046][ T6094] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.226019][ T6098] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.277270][ T4978] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.299644][ T4978] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.314174][ T4978] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.326259][ T12] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.341804][ T12] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.357580][ T12] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.363268][ T6116] FAULT_INJECTION: forcing a failure. [ 131.363268][ T6116] name failslab, interval 1, probability 0, space 0, times 0 [ 131.366469][ T12] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.389585][ T6116] CPU: 1 UID: 0 PID: 6116 Comm: syz.3.818 Not tainted syzkaller #0 PREEMPT(full) [ 131.389617][ T6116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 131.389631][ T6116] Call Trace: [ 131.389638][ T6116] [ 131.389647][ T6116] __dump_stack+0x1d/0x30 [ 131.389684][ T6116] dump_stack_lvl+0x95/0xd0 [ 131.389744][ T6116] dump_stack+0x15/0x1b [ 131.389767][ T6116] should_fail_ex+0x263/0x280 [ 131.389789][ T6116] should_failslab+0x8c/0xb0 [ 131.389808][ T6116] kmem_cache_alloc_lru_noprof+0x6c/0x410 [ 131.389865][ T6116] ? __d_alloc+0x37/0x340 [ 131.389970][ T6116] __d_alloc+0x37/0x340 [ 131.390008][ T6116] ? security_inode_permission+0x4a/0xa0 [ 131.390036][ T6116] d_alloc+0x2e/0x100 [ 131.390066][ T6116] vfs_tmpfile+0xf3/0x520 [ 131.390138][ T6116] do_tmpfile+0xa8/0x190 [ 131.390290][ T6116] path_openat+0x1cf0/0x2050 [ 131.390337][ T6116] ? path_openat+0x1b01/0x2050 [ 131.390381][ T6116] ? _parse_integer_limit+0x170/0x190 [ 131.390454][ T6116] ? _parse_integer+0x27/0x40 [ 131.390475][ T6116] ? kstrtoull+0x111/0x140 [ 131.390494][ T6116] do_file_open+0x16c/0x290 [ 131.390527][ T6116] do_sys_openat2+0x94/0x130 [ 131.390638][ T6116] __se_sys_openat2+0x193/0x1f0 [ 131.390675][ T6116] __x64_sys_openat2+0x55/0x70 [ 131.390699][ T6116] x64_sys_call+0x2170/0x3020 [ 131.390727][ T6116] do_syscall_64+0x12c/0x370 [ 131.390776][ T6116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 131.390875][ T6116] RIP: 0033:0x7f78d629c799 [ 131.390894][ T6116] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 131.390913][ T6116] RSP: 002b:00007f78d4cf7028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b5 [ 131.390994][ T6116] RAX: ffffffffffffffda RBX: 00007f78d6515fa0 RCX: 00007f78d629c799 [ 131.391009][ T6116] RDX: 0000200000000140 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 131.391021][ T6116] RBP: 00007f78d4cf7090 R08: 0000000000000000 R09: 0000000000000000 [ 131.391033][ T6116] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 131.391122][ T6116] R13: 00007f78d6516038 R14: 00007f78d6515fa0 R15: 00007fffd8a43798 [ 131.391143][ T6116] [ 131.391228][ T12] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.622294][ T6122] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 131.655278][ T6124] netlink: 8 bytes leftover after parsing attributes in process `syz.2.820'. [ 131.860766][ T6137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=6137 comm=syz.1.825 [ 132.592489][ T6161] netlink: 348 bytes leftover after parsing attributes in process `syz.2.833'. [ 132.618351][ T6161] netlink: 52 bytes leftover after parsing attributes in process `syz.2.833'. [ 132.702870][ T28] kauditd_printk_skb: 332 callbacks suppressed [ 132.702889][ T28] audit: type=1400 audit(1773009210.594:2829): avc: denied { ioctl } for pid=6163 comm="syz.3.834" path="socket:[15744]" dev="sockfs" ino=15744 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 132.768312][ T6168] program syz.3.836 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 132.789434][ T28] audit: type=1400 audit(1773009210.674:2830): avc: denied { read write } for pid=6167 comm="syz.3.836" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 132.813393][ T28] audit: type=1400 audit(1773009210.674:2831): avc: denied { open } for pid=6167 comm="syz.3.836" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 132.839399][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 132.848515][ T6169] vxcan1 speed is unknown, defaulting to 1000 [ 132.855741][ T10] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 132.882901][ T6169] lo speed is unknown, defaulting to 1000 [ 132.907217][ T28] audit: type=1326 audit(1773009210.784:2832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6165 comm="syz.2.835" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x0 [ 132.961025][ T28] audit: type=1400 audit(1773009210.854:2833): avc: denied { read } for pid=6177 comm="syz.3.839" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 132.984473][ T28] audit: type=1400 audit(1773009210.854:2834): avc: denied { open } for pid=6177 comm="syz.3.839" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 133.008914][ T28] audit: type=1400 audit(1773009210.854:2835): avc: denied { ioctl } for pid=6177 comm="syz.3.839" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 133.035305][ T28] audit: type=1400 audit(1773009210.854:2836): avc: denied { read } for pid=6177 comm="syz.3.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 133.073487][ T3390] kernel read not supported for file /vcs (pid: 3390 comm: kworker/1:3) [ 133.153930][ T28] audit: type=1400 audit(1773009211.044:2837): avc: denied { name_connect } for pid=6186 comm="syz.4.843" dest=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 133.203220][ T6187] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 133.221267][ T10] vxcan1 speed is unknown, defaulting to 1000 [ 133.246230][ T6196] netlink: 348 bytes leftover after parsing attributes in process `syz.4.845'. [ 133.259735][ T6196] netlink: 52 bytes leftover after parsing attributes in process `syz.4.845'. [ 133.628215][ T6204] RDS: rds_bind could not find a transport for ::ffff:10.1.1.1, load rds_tcp or rds_rdma? [ 134.254185][ T28] audit: type=1400 audit(1773009212.144:2838): avc: denied { mounton } for pid=6228 comm="syz.3.857" path="/proc/575/task" dev="proc" ino=15219 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 134.462621][ T6239] vxcan1 speed is unknown, defaulting to 1000 [ 134.495861][ T6239] lo speed is unknown, defaulting to 1000 [ 134.517844][ T6240] vxcan1 speed is unknown, defaulting to 1000 [ 134.556710][ T6240] lo speed is unknown, defaulting to 1000 [ 136.427467][ T6264] __nla_validate_parse: 2 callbacks suppressed [ 136.427560][ T6264] netlink: 8 bytes leftover after parsing attributes in process `syz.0.868'. [ 136.456023][ T6265] netlink: 20 bytes leftover after parsing attributes in process `syz.4.864'. [ 136.490632][ T6261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=6261 comm=syz.3.867 [ 136.512695][ T6261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=6261 comm=syz.3.867 [ 136.564008][ T6273] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 136.605280][ T6272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 136.615125][ T6273] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 136.624113][ T6272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 136.743446][ T6279] vxcan1 speed is unknown, defaulting to 1000 [ 136.790070][ T6279] lo speed is unknown, defaulting to 1000 [ 137.524013][ T6306] vxcan1 speed is unknown, defaulting to 1000 [ 137.559686][ T6306] lo speed is unknown, defaulting to 1000 [ 137.632609][ T6307] SELinux: policydb string does not match my string SE Linux [ 137.645965][ T6307] SELinux: failed to load policy [ 138.033435][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 138.033460][ T28] audit: type=1400 audit(1773009215.924:2843): avc: denied { remount } for pid=6320 comm="syz.1.887" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 138.075227][ T6326] FAULT_INJECTION: forcing a failure. [ 138.075227][ T6326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 138.216983][ T6326] CPU: 0 UID: 0 PID: 6326 Comm: syz.4.888 Not tainted syzkaller #0 PREEMPT(full) [ 138.217012][ T6326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 138.217023][ T6326] Call Trace: [ 138.217030][ T6326] [ 138.217039][ T6326] __dump_stack+0x1d/0x30 [ 138.217157][ T6326] dump_stack_lvl+0x95/0xd0 [ 138.217208][ T6326] dump_stack+0x15/0x1b [ 138.217227][ T6326] should_fail_ex+0x263/0x280 [ 138.217331][ T6326] should_fail+0xb/0x20 [ 138.217353][ T6326] should_fail_usercopy+0x1a/0x20 [ 138.217431][ T6326] _copy_to_user+0x20/0xa0 [ 138.217464][ T6326] simple_read_from_buffer+0xb5/0x130 [ 138.217502][ T6326] proc_fail_nth_read+0x10e/0x150 [ 138.217531][ T6326] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 138.217623][ T6326] vfs_read+0x1ab/0x7f0 [ 138.217652][ T6326] ? set_user_sigmask+0x8b/0x140 [ 138.217719][ T6326] ? __se_sys_pselect6+0x250/0x2a0 [ 138.217746][ T6326] ksys_read+0xdc/0x1a0 [ 138.217781][ T6326] __x64_sys_read+0x40/0x50 [ 138.217800][ T6326] x64_sys_call+0x2886/0x3020 [ 138.217906][ T6326] do_syscall_64+0x12c/0x370 [ 138.217930][ T6326] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 138.217955][ T6326] RIP: 0033:0x7fcfb8c1cfce [ 138.217973][ T6326] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 138.217991][ T6326] RSP: 002b:00007fcfb76aefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 138.218016][ T6326] RAX: ffffffffffffffda RBX: 00007fcfb76af6c0 RCX: 00007fcfb8c1cfce [ 138.218031][ T6326] RDX: 000000000000000f RSI: 00007fcfb76af0a0 RDI: 0000000000000005 [ 138.218045][ T6326] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 138.218059][ T6326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 138.218072][ T6326] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 138.218117][ T6326] [ 138.476783][ T28] audit: type=1400 audit(1773009216.364:2844): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 138.560324][ T6332] vxcan1 speed is unknown, defaulting to 1000 [ 138.617693][ T6332] lo speed is unknown, defaulting to 1000 [ 138.651326][ T6339] vxcan1 speed is unknown, defaulting to 1000 [ 138.672613][ T6345] netlink: 104 bytes leftover after parsing attributes in process `syz.1.895'. [ 138.806665][ T28] audit: type=1400 audit(1773009216.654:2845): avc: denied { mount } for pid=6347 comm="syz.4.896" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 138.869877][ T6339] lo speed is unknown, defaulting to 1000 [ 138.948453][ T6356] vxcan1 speed is unknown, defaulting to 1000 [ 138.984572][ T6356] lo speed is unknown, defaulting to 1000 [ 139.059444][ T28] audit: type=1326 audit(1773009216.904:2846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6351 comm="syz.1.898" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc53157c799 code=0x0 [ 139.246290][ T4978] Bluetooth: hci0: Frame reassembly failed (-84) [ 139.255979][ T28] audit: type=1400 audit(1773009217.144:2847): avc: denied { checkpoint_restore } for pid=6329 comm="syz.2.889" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 139.283502][ T28] audit: type=1400 audit(1773009217.174:2848): avc: denied { setattr } for pid=6329 comm="syz.2.889" name="TIPC" dev="sockfs" ino=16139 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 139.309038][ T6364] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 33554436, id = 0 [ 139.374511][ T6368] netlink: 348 bytes leftover after parsing attributes in process `syz.4.901'. [ 140.230896][ T6381] hsr0: entered promiscuous mode [ 140.470651][ T6384] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 64993 [ 141.319436][ T3557] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 141.319525][ T43] Bluetooth: hci0: command 0x1003 tx timeout [ 141.755773][ T6389] FAULT_INJECTION: forcing a failure. [ 141.755773][ T6389] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 141.784982][ T6389] CPU: 0 UID: 0 PID: 6389 Comm: syz.4.909 Not tainted syzkaller #0 PREEMPT(full) [ 141.785012][ T6389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 141.785025][ T6389] Call Trace: [ 141.785032][ T6389] [ 141.785099][ T6389] __dump_stack+0x1d/0x30 [ 141.785142][ T6389] dump_stack_lvl+0x95/0xd0 [ 141.785163][ T6389] dump_stack+0x15/0x1b [ 141.785252][ T6389] should_fail_ex+0x263/0x280 [ 141.785274][ T6389] should_fail_alloc_page+0xf2/0x100 [ 141.785298][ T6389] __alloc_frozen_pages_noprof+0x108/0x360 [ 141.785388][ T6389] alloc_pages_mpol+0xb3/0x260 [ 141.785432][ T6389] ? obj_cgroup_charge_account+0x122/0x1a0 [ 141.785458][ T6389] alloc_pages_noprof+0x8f/0x130 [ 141.785522][ T6389] get_free_pages_noprof+0xc/0x40 [ 141.785549][ T6389] selinux_genfs_get_sid+0x33/0x180 [ 141.785645][ T6389] inode_doinit_with_dentry+0x5fd/0x7a0 [ 141.785673][ T6389] selinux_d_instantiate+0x27/0x40 [ 141.785701][ T6389] security_d_instantiate+0x76/0x90 [ 141.785726][ T6389] d_make_persistent+0x4f/0x110 [ 141.785813][ T6389] __debugfs_create_file+0x14e/0x2b0 [ 141.785840][ T6389] debugfs_create_file_full+0x3f/0x60 [ 141.785863][ T6389] ? __pfx_ieee802154_if_setup+0x10/0x10 [ 141.785885][ T6389] ref_tracker_dir_debugfs+0x10e/0x220 [ 141.785916][ T6389] alloc_netdev_mqs+0x1a7/0xa40 [ 141.785947][ T6389] ? __nla_validate_parse+0x1650/0x1cf0 [ 141.786052][ T6389] ieee802154_if_add+0x8e/0x7f0 [ 141.786080][ T6389] ieee802154_add_iface+0x44/0x70 [ 141.786107][ T6389] nl802154_new_interface+0x160/0x340 [ 141.786186][ T6389] genl_family_rcv_msg_doit+0x187/0x1f0 [ 141.786217][ T6389] genl_rcv_msg+0x432/0x470 [ 141.786239][ T6389] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 141.786301][ T6389] ? __pfx_nl802154_new_interface+0x10/0x10 [ 141.786328][ T6389] ? __pfx_nl802154_post_doit+0x10/0x10 [ 141.786359][ T6389] netlink_rcv_skb+0x123/0x220 [ 141.786436][ T6389] ? __pfx_genl_rcv_msg+0x10/0x10 [ 141.786461][ T6389] genl_rcv+0x28/0x40 [ 141.786557][ T6389] netlink_unicast+0x5c0/0x690 [ 141.786582][ T6389] netlink_sendmsg+0x5c8/0x6f0 [ 141.786614][ T6389] ? __pfx_netlink_sendmsg+0x10/0x10 [ 141.786645][ T6389] ____sys_sendmsg+0x563/0x5b0 [ 141.786751][ T6389] ___sys_sendmsg+0x195/0x1e0 [ 141.786818][ T6389] __x64_sys_sendmsg+0xd4/0x160 [ 141.786850][ T6389] x64_sys_call+0x194c/0x3020 [ 141.786879][ T6389] do_syscall_64+0x12c/0x370 [ 141.786903][ T6389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.786926][ T6389] RIP: 0033:0x7fcfb8c5c799 [ 141.787004][ T6389] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 141.787020][ T6389] RSP: 002b:00007fcfb76af028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.787109][ T6389] RAX: ffffffffffffffda RBX: 00007fcfb8ed5fa0 RCX: 00007fcfb8c5c799 [ 141.787144][ T6389] RDX: 0000000000000800 RSI: 0000200000000100 RDI: 0000000000000004 [ 141.787159][ T6389] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 141.787173][ T6389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.787187][ T6389] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 141.787208][ T6389] [ 142.126880][ T28] audit: type=1400 audit(1773009220.004:2849): avc: denied { bind } for pid=6392 comm="syz.3.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 142.296088][ T28] audit: type=1400 audit(1773009220.184:2850): avc: denied { create } for pid=6402 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 142.517593][ T6414] xt_CT: You must specify a L4 protocol and not use inversions on it [ 142.538388][ T6417] FAULT_INJECTION: forcing a failure. [ 142.538388][ T6417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.561111][ T6417] CPU: 0 UID: 0 PID: 6417 Comm: syz.0.918 Not tainted syzkaller #0 PREEMPT(full) [ 142.561141][ T6417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 142.561154][ T6417] Call Trace: [ 142.561162][ T6417] [ 142.561171][ T6417] __dump_stack+0x1d/0x30 [ 142.561197][ T6417] dump_stack_lvl+0x95/0xd0 [ 142.561268][ T6417] dump_stack+0x15/0x1b [ 142.561302][ T6417] should_fail_ex+0x263/0x280 [ 142.561338][ T6417] should_fail+0xb/0x20 [ 142.561361][ T6417] should_fail_usercopy+0x1a/0x20 [ 142.561385][ T6417] _copy_from_user+0x1c/0xb0 [ 142.561415][ T6417] do_ipv6_getsockopt+0x161/0x15f0 [ 142.561440][ T6417] ? avc_has_perm_noaudit+0xab/0x130 [ 142.561468][ T6417] ? avc_has_perm+0x101/0x190 [ 142.561566][ T6417] ipv6_getsockopt+0x71/0x1e0 [ 142.561656][ T6417] ? selinux_socket_getsockopt+0x110/0x1c0 [ 142.561690][ T6417] ? selinux_socket_getsockopt+0x110/0x1c0 [ 142.561778][ T6417] tcp_getsockopt+0xad/0xe0 [ 142.561806][ T6417] sock_common_getsockopt+0x60/0x70 [ 142.561830][ T6417] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 142.561899][ T6417] do_sock_getsockopt+0x1c4/0x210 [ 142.561951][ T6417] __x64_sys_getsockopt+0x11d/0x1a0 [ 142.561979][ T6417] x64_sys_call+0x2dcf/0x3020 [ 142.562006][ T6417] do_syscall_64+0x12c/0x370 [ 142.562089][ T6417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.562113][ T6417] RIP: 0033:0x7f914055c799 [ 142.562128][ T6417] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 142.562145][ T6417] RSP: 002b:00007f913efb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 142.562211][ T6417] RAX: ffffffffffffffda RBX: 00007f91407d5fa0 RCX: 00007f914055c799 [ 142.562281][ T6417] RDX: 0000000000000035 RSI: 0000000000000029 RDI: 0000000000000003 [ 142.562307][ T6417] RBP: 00007f913efb7090 R08: 0000200000001ffc R09: 0000000000000000 [ 142.562325][ T6417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.562337][ T6417] R13: 00007f91407d6038 R14: 00007f91407d5fa0 R15: 00007ffd68d16218 [ 142.562354][ T6417] [ 142.783030][ T28] audit: type=1326 audit(1773009220.674:2851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.4.917" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fcfb8c5c799 code=0x0 [ 142.789511][ T6414] wireguard0: entered promiscuous mode [ 142.821733][ T6414] wireguard0: entered allmulticast mode [ 142.873432][ T28] audit: type=1400 audit(1773009220.764:2852): avc: denied { mounton } for pid=6413 comm="syz.4.917" path="/syzcgroup/unified/syz4" dev="cgroup2" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 142.982723][ T6432] vxcan1 speed is unknown, defaulting to 1000 [ 143.034244][ T6435] netlink: 8 bytes leftover after parsing attributes in process `syz.2.924'. [ 143.089524][ T6432] lo speed is unknown, defaulting to 1000 [ 143.113741][ T28] audit: type=1400 audit(1773009221.004:2853): avc: denied { ioctl } for pid=6437 comm="syz.1.925" path="socket:[16331]" dev="sockfs" ino=16331 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 143.170833][ T6440] netlink: 156 bytes leftover after parsing attributes in process `syz.1.926'. [ 143.307282][ T6446] netlink: 60 bytes leftover after parsing attributes in process `syz.3.929'. [ 143.317685][ T6446] netlink: 168 bytes leftover after parsing attributes in process `syz.3.929'. [ 143.372719][ T6449] netlink: 24 bytes leftover after parsing attributes in process `syz.4.930'. [ 143.426349][ T28] audit: type=1400 audit(1773009221.304:2854): avc: denied { write } for pid=6448 comm="syz.4.930" name="file0" dev="tmpfs" ino=1015 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 143.649453][ T28] audit: type=1400 audit(1773009221.534:2855): avc: denied { setopt } for pid=6457 comm="syz.3.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 143.862119][ T6465] netlink: 'syz.4.933': attribute type 21 has an invalid length. [ 143.971329][ T6465] netlink: 164 bytes leftover after parsing attributes in process `syz.4.933'. [ 144.667871][ T6481] netlink: 8 bytes leftover after parsing attributes in process `syz.2.941'. [ 144.701263][ T4985] Bluetooth: hci0: Frame reassembly failed (-84) [ 145.111010][ T6496] vxcan1 speed is unknown, defaulting to 1000 [ 145.152709][ T6496] lo speed is unknown, defaulting to 1000 [ 145.241058][ T6499] netlink: 92 bytes leftover after parsing attributes in process `syz.3.947'. [ 145.270223][ T6501] FAULT_INJECTION: forcing a failure. [ 145.270223][ T6501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.283854][ T6501] CPU: 1 UID: 0 PID: 6501 Comm: syz.3.948 Not tainted syzkaller #0 PREEMPT(full) [ 145.283884][ T6501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 145.283912][ T6501] Call Trace: [ 145.283920][ T6501] [ 145.283928][ T6501] __dump_stack+0x1d/0x30 [ 145.284027][ T6501] dump_stack_lvl+0x95/0xd0 [ 145.284051][ T6501] dump_stack+0x15/0x1b [ 145.284077][ T6501] should_fail_ex+0x263/0x280 [ 145.284115][ T6501] should_fail+0xb/0x20 [ 145.284138][ T6501] should_fail_usercopy+0x1a/0x20 [ 145.284166][ T6501] _copy_from_user+0x1c/0xb0 [ 145.284252][ T6501] ___sys_sendmsg+0xc1/0x1e0 [ 145.284293][ T6501] __x64_sys_sendmsg+0xd4/0x160 [ 145.284341][ T6501] x64_sys_call+0x194c/0x3020 [ 145.284365][ T6501] do_syscall_64+0x12c/0x370 [ 145.284410][ T6501] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.284444][ T6501] RIP: 0033:0x7f78d629c799 [ 145.284463][ T6501] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 145.284514][ T6501] RSP: 002b:00007f78d4cf7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 145.284537][ T6501] RAX: ffffffffffffffda RBX: 00007f78d6515fa0 RCX: 00007f78d629c799 [ 145.284554][ T6501] RDX: 000000002c000010 RSI: 0000200000000180 RDI: 0000000000000005 [ 145.284568][ T6501] RBP: 00007f78d4cf7090 R08: 0000000000000000 R09: 0000000000000000 [ 145.284583][ T6501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.284597][ T6501] R13: 00007f78d6516038 R14: 00007f78d6515fa0 R15: 00007fffd8a43798 [ 145.284664][ T6501] [ 145.482465][ T28] audit: type=1400 audit(1773009223.374:2856): avc: denied { read } for pid=6504 comm="syz.4.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 145.531697][ T28] audit: type=1400 audit(1773009223.414:2857): avc: denied { read } for pid=6510 comm="syz.4.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 145.573866][ T28] audit: type=1400 audit(1773009223.464:2858): avc: denied { map } for pid=6510 comm="syz.4.951" path="socket:[16886]" dev="sockfs" ino=16886 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 145.613512][ T28] audit: type=1400 audit(1773009223.464:2859): avc: denied { accept } for pid=6510 comm="syz.4.951" path="socket:[16886]" dev="sockfs" ino=16886 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 146.210381][ T6518] syzkaller1: entered promiscuous mode [ 146.216823][ T6518] syzkaller1: entered allmulticast mode [ 146.266997][ T6522] netlink: 92 bytes leftover after parsing attributes in process `syz.3.954'. [ 146.759547][ T3557] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 146.821901][ T6537] netlink: 12 bytes leftover after parsing attributes in process `syz.1.961'. [ 146.931602][ T6541] random: crng reseeded on system resumption [ 147.275722][ T28] audit: type=1400 audit(1773009225.164:2860): avc: denied { validate_trans } for pid=6545 comm="syz.4.964" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 147.385845][ T6551] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.400127][ T6551] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 148.068519][ T6575] netlink: 8 bytes leftover after parsing attributes in process `syz.1.974'. [ 148.227976][ T6584] FAULT_INJECTION: forcing a failure. [ 148.227976][ T6584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.248248][ T6584] CPU: 1 UID: 0 PID: 6584 Comm: syz.1.977 Not tainted syzkaller #0 PREEMPT(full) [ 148.248343][ T6584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 148.248364][ T6584] Call Trace: [ 148.248372][ T6584] [ 148.248380][ T6584] __dump_stack+0x1d/0x30 [ 148.248409][ T6584] dump_stack_lvl+0x95/0xd0 [ 148.248479][ T6584] dump_stack+0x15/0x1b [ 148.248501][ T6584] should_fail_ex+0x263/0x280 [ 148.248630][ T6584] should_fail+0xb/0x20 [ 148.248648][ T6584] should_fail_usercopy+0x1a/0x20 [ 148.248691][ T6584] _copy_from_user+0x1c/0xb0 [ 148.248715][ T6584] get_timespec64+0x4c/0x100 [ 148.248773][ T6584] __se_sys_clock_nanosleep+0x10b/0x260 [ 148.248795][ T6584] __x64_sys_clock_nanosleep+0x55/0x70 [ 148.248815][ T6584] x64_sys_call+0x146e/0x3020 [ 148.248845][ T6584] do_syscall_64+0x12c/0x370 [ 148.248881][ T6584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.248901][ T6584] RIP: 0033:0x7fc53157c799 [ 148.248918][ T6584] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 148.248940][ T6584] RSP: 002b:00007fc52ffd7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 148.248961][ T6584] RAX: ffffffffffffffda RBX: 00007fc5317f5fa0 RCX: 00007fc53157c799 [ 148.249053][ T6584] RDX: 0000200000000080 RSI: 00000000fffffdfc RDI: 0000000000000002 [ 148.249067][ T6584] RBP: 00007fc52ffd7090 R08: 0000000000000000 R09: 0000000000000000 [ 148.249080][ T6584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.249091][ T6584] R13: 00007fc5317f6038 R14: 00007fc5317f5fa0 R15: 00007ffef345d3f8 [ 148.249109][ T6584] [ 149.190587][ T6604] FAULT_INJECTION: forcing a failure. [ 149.190587][ T6604] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.204021][ T6604] CPU: 1 UID: 0 PID: 6604 Comm: syz.0.984 Not tainted syzkaller #0 PREEMPT(full) [ 149.204052][ T6604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 149.204087][ T6604] Call Trace: [ 149.204095][ T6604] [ 149.204104][ T6604] __dump_stack+0x1d/0x30 [ 149.204174][ T6604] dump_stack_lvl+0x95/0xd0 [ 149.204263][ T6604] dump_stack+0x15/0x1b [ 149.204322][ T6604] should_fail_ex+0x263/0x280 [ 149.204344][ T6604] should_fail+0xb/0x20 [ 149.204442][ T6604] should_fail_usercopy+0x1a/0x20 [ 149.204470][ T6604] _copy_from_user+0x1c/0xb0 [ 149.204495][ T6604] __sys_connect+0xd0/0x2a0 [ 149.204519][ T6604] __x64_sys_connect+0x3f/0x50 [ 149.204553][ T6604] x64_sys_call+0x2df0/0x3020 [ 149.204576][ T6604] do_syscall_64+0x12c/0x370 [ 149.204638][ T6604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.204657][ T6604] RIP: 0033:0x7f914055c799 [ 149.204673][ T6604] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 149.204688][ T6604] RSP: 002b:00007f913efb7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 149.204710][ T6604] RAX: ffffffffffffffda RBX: 00007f91407d5fa0 RCX: 00007f914055c799 [ 149.204727][ T6604] RDX: 000000000000001c RSI: 00002000000002c0 RDI: 0000000000000003 [ 149.204756][ T6604] RBP: 00007f913efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 149.204883][ T6604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.204898][ T6604] R13: 00007f91407d6038 R14: 00007f91407d5fa0 R15: 00007ffd68d16218 [ 149.204917][ T6604] [ 149.553777][ T6611] netlink: 8 bytes leftover after parsing attributes in process `syz.1.987'. [ 149.701433][ T28] audit: type=1400 audit(1773009227.594:2861): avc: denied { relabelfrom } for pid=6615 comm="syz.0.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 149.763665][ T28] audit: type=1400 audit(1773009227.594:2862): avc: denied { relabelto } for pid=6615 comm="syz.0.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 149.835108][ T6620] FAULT_INJECTION: forcing a failure. [ 149.835108][ T6620] name failslab, interval 1, probability 0, space 0, times 0 [ 149.852780][ T6620] CPU: 1 UID: 0 PID: 6620 Comm: syz.2.990 Not tainted syzkaller #0 PREEMPT(full) [ 149.852806][ T6620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 149.852817][ T6620] Call Trace: [ 149.852836][ T6620] [ 149.852845][ T6620] __dump_stack+0x1d/0x30 [ 149.852871][ T6620] dump_stack_lvl+0x95/0xd0 [ 149.852891][ T6620] dump_stack+0x15/0x1b [ 149.852912][ T6620] should_fail_ex+0x263/0x280 [ 149.852980][ T6620] should_failslab+0x8c/0xb0 [ 149.853005][ T6620] kmem_cache_alloc_noprof+0x66/0x400 [ 149.853030][ T6620] ? skb_clone+0x151/0x1f0 [ 149.853068][ T6620] skb_clone+0x151/0x1f0 [ 149.853114][ T6620] __netlink_deliver_tap+0x2c9/0x500 [ 149.853146][ T6620] ? netlink_attachskb+0x2e2/0x660 [ 149.853239][ T6620] netlink_sendskb+0x126/0x150 [ 149.853267][ T6620] netlink_unicast+0x2a2/0x690 [ 149.853305][ T6620] netlink_ack+0x4c8/0x500 [ 149.853364][ T6620] netlink_rcv_skb+0x192/0x220 [ 149.853388][ T6620] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 149.853484][ T6620] sock_diag_rcv+0x1c/0x30 [ 149.853525][ T6620] netlink_unicast+0x5c0/0x690 [ 149.853553][ T6620] netlink_sendmsg+0x5c8/0x6f0 [ 149.853604][ T6620] ? __pfx_netlink_sendmsg+0x10/0x10 [ 149.853634][ T6620] ____sys_sendmsg+0x563/0x5b0 [ 149.853670][ T6620] ___sys_sendmsg+0x195/0x1e0 [ 149.853770][ T6620] __x64_sys_sendmsg+0xd4/0x160 [ 149.853811][ T6620] x64_sys_call+0x194c/0x3020 [ 149.853835][ T6620] do_syscall_64+0x12c/0x370 [ 149.853855][ T6620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.853891][ T6620] RIP: 0033:0x7ffb0a6bc799 [ 149.853910][ T6620] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 149.853931][ T6620] RSP: 002b:00007ffb0910f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.853954][ T6620] RAX: ffffffffffffffda RBX: 00007ffb0a935fa0 RCX: 00007ffb0a6bc799 [ 149.853967][ T6620] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 149.854027][ T6620] RBP: 00007ffb0910f090 R08: 0000000000000000 R09: 0000000000000000 [ 149.854042][ T6620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.854057][ T6620] R13: 00007ffb0a936038 R14: 00007ffb0a935fa0 R15: 00007ffced3bf088 [ 149.854154][ T6620] [ 150.195554][ T28] audit: type=1400 audit(1773009228.084:2863): avc: denied { bind } for pid=6623 comm="syz.3.992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 150.202375][ T6631] vxcan1 speed is unknown, defaulting to 1000 [ 150.280909][ T6642] netlink: 20 bytes leftover after parsing attributes in process `syz.3.998'. [ 150.298158][ T6631] lo speed is unknown, defaulting to 1000 [ 150.304496][ T6642] netlink: 12 bytes leftover after parsing attributes in process `syz.3.998'. [ 150.428550][ T28] audit: type=1400 audit(1773009228.304:2864): avc: denied { mount } for pid=6637 comm="syz.2.997" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 150.523523][ T28] audit: type=1400 audit(1773009228.414:2865): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 150.612358][ T6652] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1001'. [ 150.892903][ T6660] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1003'. [ 151.394437][ T6665] vxcan1 speed is unknown, defaulting to 1000 [ 151.430694][ T6665] lo speed is unknown, defaulting to 1000 [ 151.465920][ T28] audit: type=1326 audit(1773009229.354:2866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6662 comm="syz.3.1004" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x0 [ 151.775694][ T28] audit: type=1400 audit(1773009229.664:2867): avc: denied { setopt } for pid=6671 comm="syz.2.1007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 151.815847][ T28] audit: type=1400 audit(1773009229.694:2868): avc: denied { bind } for pid=6671 comm="syz.2.1007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 151.916970][ T6680] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1011'. [ 151.920043][ T6684] rdma_rxe: rxe_newlink: failed to add lo [ 152.260344][ T6707] netlink: 'syz.4.1020': attribute type 1 has an invalid length. [ 152.404401][ T6712] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1022'. [ 153.052280][ T6723] random: crng reseeded on system resumption [ 153.204157][ T6734] vxcan1 speed is unknown, defaulting to 1000 [ 153.239917][ T6734] lo speed is unknown, defaulting to 1000 [ 153.275221][ T28] audit: type=1326 audit(1773009231.164:2869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6731 comm="syz.2.1029" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x0 [ 153.453391][ T28] audit: type=1400 audit(1773009231.344:2870): avc: denied { node_bind } for pid=6736 comm="syz.4.1030" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 153.683077][ T6747] FAULT_INJECTION: forcing a failure. [ 153.683077][ T6747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.710266][ T6747] CPU: 0 UID: 0 PID: 6747 Comm: syz.1.1033 Not tainted syzkaller #0 PREEMPT(full) [ 153.710300][ T6747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 153.710314][ T6747] Call Trace: [ 153.710320][ T6747] [ 153.710327][ T6747] __dump_stack+0x1d/0x30 [ 153.710431][ T6747] dump_stack_lvl+0x95/0xd0 [ 153.710484][ T6747] dump_stack+0x15/0x1b [ 153.710504][ T6747] should_fail_ex+0x263/0x280 [ 153.710582][ T6747] should_fail+0xb/0x20 [ 153.710605][ T6747] should_fail_usercopy+0x1a/0x20 [ 153.710627][ T6747] _copy_from_iter+0xcf/0xea0 [ 153.710651][ T6747] ? __rcu_read_unlock+0x4e/0x70 [ 153.710747][ T6747] ? __rcu_read_unlock+0x4e/0x70 [ 153.710766][ T6747] rawv6_sendmsg+0x98c/0x1230 [ 153.710836][ T6747] ? __pfx_rawv6_sendmsg+0x10/0x10 [ 153.710869][ T6747] ? __pfx_inet_sendmsg+0x10/0x10 [ 153.710894][ T6747] inet_sendmsg+0xc5/0xd0 [ 153.710917][ T6747] __sys_sendto+0x3db/0x490 [ 153.710970][ T6747] __x64_sys_sendto+0x76/0x90 [ 153.710994][ T6747] x64_sys_call+0x2d35/0x3020 [ 153.711017][ T6747] do_syscall_64+0x12c/0x370 [ 153.711044][ T6747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.711067][ T6747] RIP: 0033:0x7fc53157c799 [ 153.711083][ T6747] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 153.711149][ T6747] RSP: 002b:00007fc52ffd7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 153.711173][ T6747] RAX: ffffffffffffffda RBX: 00007fc5317f5fa0 RCX: 00007fc53157c799 [ 153.711187][ T6747] RDX: 0000000000000016 RSI: 0000200000000300 RDI: 0000000000000003 [ 153.711199][ T6747] RBP: 00007fc52ffd7090 R08: 0000000000000000 R09: fffffffffffffdfd [ 153.711285][ T6747] R10: 0000000000003b00 R11: 0000000000000246 R12: 0000000000000001 [ 153.711298][ T6747] R13: 00007fc5317f6038 R14: 00007fc5317f5fa0 R15: 00007ffef345d3f8 [ 153.711316][ T6747] [ 154.259116][ T6754] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1036'. [ 154.271419][ T6754] vlan5: entered promiscuous mode [ 154.276740][ T6754] gretap0: entered promiscuous mode [ 154.523844][ T6763] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1039'. [ 155.124406][ T6770] A link change request failed with some changes committed already. Interface sit1 may have been left with an inconsistent configuration, please check. [ 155.476167][ T6772] random: crng reseeded on system resumption [ 155.988505][ T6782] vxcan1 speed is unknown, defaulting to 1000 [ 156.058207][ T28] audit: type=1326 audit(1773009233.944:2871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6778 comm="syz.2.1044" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x0 [ 156.199432][ T6782] lo speed is unknown, defaulting to 1000 [ 156.268640][ T6789] FAULT_INJECTION: forcing a failure. [ 156.268640][ T6789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.284873][ T6789] CPU: 1 UID: 0 PID: 6789 Comm: syz.1.1047 Not tainted syzkaller #0 PREEMPT(full) [ 156.284934][ T6789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 156.284947][ T6789] Call Trace: [ 156.284955][ T6789] [ 156.284964][ T6789] __dump_stack+0x1d/0x30 [ 156.284992][ T6789] dump_stack_lvl+0x95/0xd0 [ 156.285016][ T6789] dump_stack+0x15/0x1b [ 156.285058][ T6789] should_fail_ex+0x263/0x280 [ 156.285083][ T6789] should_fail+0xb/0x20 [ 156.285113][ T6789] should_fail_usercopy+0x1a/0x20 [ 156.285138][ T6789] _copy_to_user+0x20/0xa0 [ 156.285288][ T6789] simple_read_from_buffer+0xb5/0x130 [ 156.285313][ T6789] proc_fail_nth_read+0x10e/0x150 [ 156.285405][ T6789] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 156.285439][ T6789] vfs_read+0x1ab/0x7f0 [ 156.285474][ T6789] ? __rcu_read_unlock+0x4e/0x70 [ 156.285497][ T6789] ? __fget_files+0x184/0x1c0 [ 156.285647][ T6789] ? mutex_lock+0x57/0x90 [ 156.285675][ T6789] ksys_read+0xdc/0x1a0 [ 156.285705][ T6789] __x64_sys_read+0x40/0x50 [ 156.285731][ T6789] x64_sys_call+0x2886/0x3020 [ 156.285757][ T6789] do_syscall_64+0x12c/0x370 [ 156.285779][ T6789] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.285807][ T6789] RIP: 0033:0x7fc53153cfce [ 156.285895][ T6789] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 156.285924][ T6789] RSP: 002b:00007fc52ffd6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 156.285947][ T6789] RAX: ffffffffffffffda RBX: 00007fc52ffd76c0 RCX: 00007fc53153cfce [ 156.285963][ T6789] RDX: 000000000000000f RSI: 00007fc52ffd70a0 RDI: 0000000000000006 [ 156.285977][ T6789] RBP: 00007fc52ffd7090 R08: 0000000000000000 R09: 0000000000000000 [ 156.286059][ T6789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.286072][ T6789] R13: 00007fc5317f6038 R14: 00007fc5317f5fa0 R15: 00007ffef345d3f8 [ 156.286119][ T6789] [ 156.605549][ T28] audit: type=1326 audit(1773009234.494:2872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.639077][ T28] audit: type=1326 audit(1773009234.494:2873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.663756][ T28] audit: type=1326 audit(1773009234.494:2874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.688268][ T28] audit: type=1326 audit(1773009234.494:2875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.713817][ T28] audit: type=1326 audit(1773009234.494:2876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.738162][ T28] audit: type=1326 audit(1773009234.494:2877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.763133][ T6793] vxcan1 speed is unknown, defaulting to 1000 [ 156.812052][ T6796] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1050'. [ 156.829612][ T6796] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1050'. [ 156.883963][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 156.913092][ T9] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 156.922182][ T28] audit: type=1326 audit(1773009234.504:2878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 156.946872][ T28] audit: type=1326 audit(1773009234.504:2879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ffb0a67cfce code=0x7ffc0000 [ 156.970622][ T28] audit: type=1326 audit(1773009234.504:2880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6792 comm="syz.2.1049" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 157.032639][ T6793] lo speed is unknown, defaulting to 1000 [ 157.234106][ T6813] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 157.247176][ T6813] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 157.518545][ T6826] RDS: rds_bind could not find a transport for ::ffff:172.30.0.1, load rds_tcp or rds_rdma? [ 157.711531][ T6815] random: crng reseeded on system resumption [ 158.061086][ T6838] vxcan1 speed is unknown, defaulting to 1000 [ 158.263768][ T6838] lo speed is unknown, defaulting to 1000 [ 158.958062][ T6871] netlink: 277 bytes leftover after parsing attributes in process `syz.3.1073'. [ 158.970970][ T6871] netlink: 'syz.3.1073': attribute type 10 has an invalid length. [ 158.982492][ T6871] macvlan1: entered allmulticast mode [ 158.991407][ T6871] veth1_vlan: entered allmulticast mode [ 159.002423][ T6871] team0: Port device macvlan1 added [ 159.617874][ T6880] netlink: 'syz.1.1076': attribute type 10 has an invalid length. [ 159.636855][ T6880] bridge0: port 3(netdevsim1) entered blocking state [ 159.649503][ T6880] bridge0: port 3(netdevsim1) entered disabled state [ 159.662708][ T6880] netdevsim netdevsim1 netdevsim1: entered allmulticast mode [ 159.753526][ T6880] netdevsim netdevsim1 netdevsim1: entered promiscuous mode [ 159.775980][ T6880] bridge0: port 3(netdevsim1) entered blocking state [ 159.782832][ T6880] bridge0: port 3(netdevsim1) entered forwarding state [ 160.117885][ T6893] netlink: 26 bytes leftover after parsing attributes in process `syz.3.1079'. [ 160.167430][ T6894] random: crng reseeded on system resumption [ 160.281764][ T6903] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1084'. [ 160.309516][ T6903] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 160.346308][ T6905] FAULT_INJECTION: forcing a failure. [ 160.346308][ T6905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.376521][ T6905] CPU: 0 UID: 0 PID: 6905 Comm: syz.1.1085 Not tainted syzkaller #0 PREEMPT(full) [ 160.376549][ T6905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 160.376619][ T6905] Call Trace: [ 160.376625][ T6905] [ 160.376632][ T6905] __dump_stack+0x1d/0x30 [ 160.376688][ T6905] dump_stack_lvl+0x95/0xd0 [ 160.376786][ T6905] dump_stack+0x15/0x1b [ 160.376811][ T6905] should_fail_ex+0x263/0x280 [ 160.376838][ T6905] should_fail+0xb/0x20 [ 160.376936][ T6905] should_fail_usercopy+0x1a/0x20 [ 160.376962][ T6905] _copy_from_iter+0xcf/0xea0 [ 160.376991][ T6905] ? __rcu_read_unlock+0x4e/0x70 [ 160.377047][ T6905] ? terminate_walk+0x1e6/0x210 [ 160.377094][ T6905] ? path_openat+0x1ab2/0x2050 [ 160.377159][ T6905] tun_get_user+0x390/0x27c0 [ 160.377188][ T6905] ? ref_tracker_alloc+0x1eb/0x2f0 [ 160.377252][ T6905] tun_chr_write_iter+0x15e/0x210 [ 160.377277][ T6905] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 160.377417][ T6905] vfs_write+0x5a6/0x9f0 [ 160.377451][ T6905] ksys_write+0xdc/0x1a0 [ 160.377547][ T6905] __x64_sys_write+0x40/0x50 [ 160.377567][ T6905] x64_sys_call+0x27e1/0x3020 [ 160.377717][ T6905] do_syscall_64+0x12c/0x370 [ 160.377737][ T6905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.377760][ T6905] RIP: 0033:0x7fc53157c799 [ 160.377834][ T6905] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 160.377856][ T6905] RSP: 002b:00007fc52ffd7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 160.377880][ T6905] RAX: ffffffffffffffda RBX: 00007fc5317f5fa0 RCX: 00007fc53157c799 [ 160.377896][ T6905] RDX: 0000000000000ffe RSI: 0000200000000000 RDI: 0000000000000003 [ 160.377912][ T6905] RBP: 00007fc52ffd7090 R08: 0000000000000000 R09: 0000000000000000 [ 160.377927][ T6905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.378019][ T6905] R13: 00007fc5317f6038 R14: 00007fc5317f5fa0 R15: 00007ffef345d3f8 [ 160.378040][ T6905] [ 160.833966][ T6917] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1089'. [ 161.059565][ T28] kauditd_printk_skb: 524 callbacks suppressed [ 161.059582][ T28] audit: type=1326 audit(1773009238.944:3405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6909 comm="syz.2.1088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ffb0a67cfce code=0x7ffc0000 [ 161.090216][ T28] audit: type=1326 audit(1773009238.944:3406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6908 comm="syz.1.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc53153cfce code=0x7ffc0000 [ 161.115040][ T28] audit: type=1326 audit(1773009238.954:3407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6909 comm="syz.2.1088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ffb0a67cfce code=0x7ffc0000 [ 161.140014][ T28] audit: type=1326 audit(1773009238.954:3408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6908 comm="syz.1.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc53153cfce code=0x7ffc0000 [ 161.164256][ T28] audit: type=1326 audit(1773009238.954:3409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6909 comm="syz.2.1088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ffb0a67cfce code=0x7ffc0000 [ 161.189180][ T28] audit: type=1326 audit(1773009238.954:3410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6908 comm="syz.1.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc53153cfce code=0x7ffc0000 [ 161.213569][ T28] audit: type=1326 audit(1773009238.954:3411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6908 comm="syz.1.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc53153cfce code=0x7ffc0000 [ 161.238838][ T28] audit: type=1326 audit(1773009238.954:3412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6909 comm="syz.2.1088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ffb0a67cfce code=0x7ffc0000 [ 161.264511][ T28] audit: type=1326 audit(1773009238.954:3413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6909 comm="syz.2.1088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ffb0a67cfce code=0x7ffc0000 [ 161.289072][ T28] audit: type=1326 audit(1773009238.954:3414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6908 comm="syz.1.1087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc53153cfce code=0x7ffc0000 [ 161.324738][ T6921] vxcan1 speed is unknown, defaulting to 1000 [ 161.367152][ T6921] lo speed is unknown, defaulting to 1000 [ 161.519674][ T936] IPVS: starting estimator thread 0... [ 161.551543][ T6930] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1095'. [ 161.629507][ T6932] IPVS: using max 2736 ests per chain, 136800 per kthread [ 161.634017][ T6933] vxcan1 speed is unknown, defaulting to 1000 [ 161.654437][ T6934] random: crng reseeded on system resumption [ 161.696233][ T6941] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1096'. [ 161.794431][ T6933] lo speed is unknown, defaulting to 1000 [ 161.842223][ T6943] vxcan1 speed is unknown, defaulting to 1000 [ 161.890341][ T6952] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1101'. [ 161.954668][ T6943] lo speed is unknown, defaulting to 1000 [ 162.081148][ T6955] bond0: (slave veth1_macvtap): Error: Device is in use and cannot be enslaved [ 162.166597][ T6960] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1103'. [ 162.203761][ T6956] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 162.850942][ T6976] netlink: 172 bytes leftover after parsing attributes in process `syz.1.1107'. [ 162.860961][ T6977] vhci_hcd vhci_hcd.4: invalid port number 255 [ 162.867458][ T6977] vhci_hcd vhci_hcd.4: default hub control req: 6006 v0303 i00ff l0 [ 163.459773][ T6987] random: crng reseeded on system resumption [ 163.473925][ T6988] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1109'. [ 163.715651][ T6999] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1114'. [ 163.881325][ T7006] hub 8-0:1.0: USB hub found [ 163.886355][ T7006] hub 8-0:1.0: 8 ports detected [ 163.906322][ T7006] netlink: 'syz.1.1115': attribute type 10 has an invalid length. [ 163.915071][ T7006] macvlan1: entered allmulticast mode [ 163.922445][ T7006] veth1_vlan: entered allmulticast mode [ 163.930559][ T7006] team0: Port device macvlan1 added [ 164.511951][ T6364] IPVS: ip_vs_send_async error -22 [ 164.614894][ T7032] netlink: 'syz.1.1126': attribute type 7 has an invalid length. [ 164.679299][ T7036] random: crng reseeded on system resumption [ 165.610862][ T7077] __nla_validate_parse: 1 callbacks suppressed [ 165.610880][ T7077] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1141'. [ 165.627064][ T7075] random: crng reseeded on system resumption [ 165.924421][ T7084] SELinux: policydb string SE Linu does not match my string SE Linux [ 165.933075][ T7084] SELinux: failed to load policy [ 165.938790][ T7084] netlink: 'syz.4.1143': attribute type 10 has an invalid length. [ 165.950188][ T7084] bridge0: port 3(syz_tun) entered disabled state [ 165.957360][ T7084] syz_tun: left allmulticast mode [ 165.962709][ T7084] bridge0: port 3(syz_tun) entered disabled state [ 166.445797][ T28] kauditd_printk_skb: 6643 callbacks suppressed [ 166.445815][ T28] audit: type=1400 audit(1773009244.334:10052): avc: denied { map } for pid=7090 comm="syz.0.1145" path="socket:[19102]" dev="sockfs" ino=19102 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 167.377288][ T7105] netlink: 'syz.2.1150': attribute type 1 has an invalid length. [ 167.513083][ T28] audit: type=1400 audit(1773009245.404:10053): avc: denied { mount } for pid=7111 comm="syz.2.1153" name="/" dev="configfs" ino=34 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 167.693107][ T7119] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.733938][ T7120] random: crng reseeded on system resumption [ 167.739508][ T7119] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.804559][ T7119] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.852447][ T7119] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.908034][ T4974] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.921976][ T4974] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.937688][ T4974] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.016248][ T7138] netlink: 'syz.3.1163': attribute type 8 has an invalid length. [ 168.026186][ T7139] vxcan1 speed is unknown, defaulting to 1000 [ 168.061370][ T7139] lo speed is unknown, defaulting to 1000 [ 168.404474][ T7143] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1164'. [ 168.483590][ T28] audit: type=1400 audit(1773009246.374:10054): avc: denied { setopt } for pid=7144 comm="syz.1.1166" lport=54264 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 168.625700][ T28] audit: type=1400 audit(1773009246.404:10055): avc: denied { bind } for pid=7144 comm="syz.1.1166" lport=54264 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 169.185024][ T28] audit: type=1400 audit(1773009247.074:10056): avc: denied { append } for pid=7153 comm="syz.3.1168" name="loop5" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.334303][ T28] audit: type=1326 audit(1773009247.224:10057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7167 comm="syz.3.1174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 169.362912][ T28] audit: type=1326 audit(1773009247.224:10058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7167 comm="syz.3.1174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 169.387784][ T28] audit: type=1326 audit(1773009247.224:10059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7167 comm="syz.3.1174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 169.412134][ T28] audit: type=1326 audit(1773009247.224:10060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7167 comm="syz.3.1174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 169.457067][ T28] audit: type=1326 audit(1773009247.224:10061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7167 comm="syz.3.1174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 169.510596][ T7171] netlink: 277 bytes leftover after parsing attributes in process `syz.4.1175'. [ 169.553481][ T7121] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 169.673045][ T7121] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 169.858032][ T7181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7181 comm=syz.4.1175 [ 170.741140][ T7121] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.762242][ T7192] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1181'. [ 170.810538][ T7197] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1180'. [ 170.827773][ T7199] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1182'. [ 172.328942][ T7215] vxcan1 speed is unknown, defaulting to 1000 [ 172.367449][ T7215] lo speed is unknown, defaulting to 1000 [ 172.480380][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 172.480393][ T28] audit: type=1326 audit(1773009250.364:10080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7208 comm="syz.4.1186" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x0 [ 172.859956][ T7220] 9pnet_fd: Insufficient options for proto=fd [ 172.934679][ T28] audit: type=1326 audit(1773009250.824:10081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 172.970070][ T28] audit: type=1326 audit(1773009250.824:10082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 172.995067][ T28] audit: type=1326 audit(1773009250.824:10083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.018997][ T28] audit: type=1326 audit(1773009250.824:10084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.043146][ T28] audit: type=1326 audit(1773009250.824:10085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.149462][ T28] audit: type=1326 audit(1773009250.824:10086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.210721][ T28] audit: type=1326 audit(1773009250.824:10087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.234436][ T28] audit: type=1326 audit(1773009250.824:10088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.258072][ T28] audit: type=1326 audit(1773009250.824:10089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7228 comm="syz.4.1191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fcfb8c5c799 code=0x7ffc0000 [ 173.623463][ T7245] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1193'. [ 173.634886][ T7241] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1193'. [ 173.645630][ T7244] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1193'. [ 174.096166][ T7250] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1196'. [ 174.213711][ T12] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.240308][ T12] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.268892][ T12] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.298764][ T12] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.095982][ T7260] FAULT_INJECTION: forcing a failure. [ 175.095982][ T7260] name failslab, interval 1, probability 0, space 0, times 0 [ 175.133447][ T7260] CPU: 1 UID: 0 PID: 7260 Comm: syz.0.1199 Not tainted syzkaller #0 PREEMPT(full) [ 175.133532][ T7260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 175.133545][ T7260] Call Trace: [ 175.133553][ T7260] [ 175.133562][ T7260] __dump_stack+0x1d/0x30 [ 175.133636][ T7260] dump_stack_lvl+0x95/0xd0 [ 175.133707][ T7260] dump_stack+0x15/0x1b [ 175.133733][ T7260] should_fail_ex+0x263/0x280 [ 175.133759][ T7260] ? nfnetlink_rcv+0xa66/0x1720 [ 175.133780][ T7260] should_failslab+0x8c/0xb0 [ 175.133847][ T7260] __kmalloc_cache_noprof+0x5f/0x410 [ 175.133886][ T7260] nfnetlink_rcv+0xa66/0x1720 [ 175.133930][ T7260] netlink_unicast+0x5c0/0x690 [ 175.134001][ T7260] netlink_sendmsg+0x5c8/0x6f0 [ 175.134035][ T7260] ? __pfx_netlink_sendmsg+0x10/0x10 [ 175.134137][ T7260] ____sys_sendmsg+0x563/0x5b0 [ 175.134186][ T7260] ___sys_sendmsg+0x195/0x1e0 [ 175.134240][ T7260] __x64_sys_sendmsg+0xd4/0x160 [ 175.134372][ T7260] x64_sys_call+0x194c/0x3020 [ 175.134400][ T7260] do_syscall_64+0x12c/0x370 [ 175.134451][ T7260] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.134473][ T7260] RIP: 0033:0x7f914055c799 [ 175.134489][ T7260] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 175.134507][ T7260] RSP: 002b:00007f913efb7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 175.134532][ T7260] RAX: ffffffffffffffda RBX: 00007f91407d5fa0 RCX: 00007f914055c799 [ 175.134557][ T7260] RDX: 0000000000004000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 175.134572][ T7260] RBP: 00007f913efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 175.134587][ T7260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.134602][ T7260] R13: 00007f91407d6038 R14: 00007f91407d5fa0 R15: 00007ffd68d16218 [ 175.134622][ T7260] [ 175.486208][ T7267] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1202'. [ 175.992356][ T7292] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1210'. [ 176.949924][ T7308] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1217'. [ 178.145212][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 178.145308][ T28] audit: type=1326 audit(1773009256.034:10120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7297 comm="syz.3.1214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 178.329034][ T28] audit: type=1326 audit(1773009256.074:10121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7297 comm="syz.3.1214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 178.369678][ T28] audit: type=1326 audit(1773009256.114:10122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7297 comm="syz.3.1214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 178.393492][ T28] audit: type=1326 audit(1773009256.114:10123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7297 comm="syz.3.1214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 178.430187][ T28] audit: type=1326 audit(1773009256.114:10124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7297 comm="syz.3.1214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 178.821406][ T7342] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1226'. [ 179.025637][ T7352] ip6tnl1: entered allmulticast mode [ 179.064005][ T28] audit: type=1400 audit(1773009256.954:10125): avc: denied { read } for pid=7351 comm="syz.3.1231" name="usbmon5" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 179.089724][ T28] audit: type=1400 audit(1773009256.954:10126): avc: denied { open } for pid=7351 comm="syz.3.1231" path="/dev/usbmon5" dev="devtmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 179.114100][ T28] audit: type=1400 audit(1773009256.954:10127): avc: denied { ioctl } for pid=7351 comm="syz.3.1231" path="/dev/usbmon5" dev="devtmpfs" ino=157 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 180.509041][ T28] audit: type=1326 audit(1773009258.394:10128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7374 comm="syz.2.1237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 180.538820][ T28] audit: type=1326 audit(1773009258.394:10129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7374 comm="syz.2.1237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 180.771569][ T7378] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1238'. [ 180.782622][ T7379] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1239'. [ 180.812466][ T7381] af_packet: tpacket_rcv: packet too big, clamped from 32 to 4294967280. macoff=96 [ 180.813797][ T7383] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1236'. [ 181.758607][ T7415] syzkaller0: entered promiscuous mode [ 181.767027][ T7415] syzkaller0: entered allmulticast mode [ 181.915453][ T7415] tipc: Started in network mode [ 181.922647][ T7415] tipc: Node identity aaaaaaaaaa33, cluster identity 4711 [ 182.022435][ T7415] tipc: Enabled bearer , priority 10 [ 182.094057][ T7415] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=46724 sclass=netlink_xfrm_socket pid=7415 comm=syz.3.1248 [ 182.316448][ T7458] sd 0:0:1:0: device reset [ 182.379520][ T7458] tipc: Can't bind to reserved service type 2 [ 182.585684][ T7478] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=247 sclass=netlink_xfrm_socket pid=7478 comm=syz.3.1256 [ 182.607304][ T7478] xt_cgroup: path and classid specified [ 182.810834][ T7483] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1254'. [ 183.049936][ T7493] FAULT_INJECTION: forcing a failure. [ 183.049936][ T7493] name failslab, interval 1, probability 0, space 0, times 0 [ 183.063112][ T7493] CPU: 0 UID: 0 PID: 7493 Comm: syz.2.1259 Not tainted syzkaller #0 PREEMPT(full) [ 183.063193][ T7493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 183.063207][ T7493] Call Trace: [ 183.063214][ T7493] [ 183.063223][ T7493] __dump_stack+0x1d/0x30 [ 183.063314][ T7493] dump_stack_lvl+0x95/0xd0 [ 183.063347][ T7493] dump_stack+0x15/0x1b [ 183.063444][ T7493] should_fail_ex+0x263/0x280 [ 183.063467][ T7493] should_failslab+0x8c/0xb0 [ 183.063518][ T7493] __kmalloc_noprof+0xb8/0x4e0 [ 183.063538][ T7493] ? sk_prot_alloc+0xa8/0x180 [ 183.063562][ T7493] sk_prot_alloc+0xa8/0x180 [ 183.063590][ T7493] sk_alloc+0x35/0x3e0 [ 183.063624][ T7493] ? __pfx_genl_release+0x10/0x10 [ 183.063648][ T7493] ? __pfx_genl_release+0x10/0x10 [ 183.063667][ T7493] netlink_create+0x32a/0x450 [ 183.063715][ T7493] ? __pfx_genl_unbind+0x10/0x10 [ 183.063736][ T7493] ? __pfx_genl_bind+0x10/0x10 [ 183.063825][ T7493] __sock_create+0x2e4/0x580 [ 183.063849][ T7493] __sys_socket+0xaf/0x180 [ 183.063868][ T7493] __x64_sys_socket+0x3f/0x50 [ 183.063924][ T7493] x64_sys_call+0x11fc/0x3020 [ 183.063950][ T7493] do_syscall_64+0x12c/0x370 [ 183.064000][ T7493] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.064069][ T7493] RIP: 0033:0x7ffb0a6be007 [ 183.064085][ T7493] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 183.064103][ T7493] RSP: 002b:00007ffb0910df98 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 183.064123][ T7493] RAX: ffffffffffffffda RBX: 00007ffb0a935fa0 RCX: 00007ffb0a6be007 [ 183.064137][ T7493] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 183.064194][ T7493] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 183.064279][ T7493] R10: 0000200000000100 R11: 0000000000000286 R12: 0000000000000001 [ 183.064291][ T7493] R13: 00007ffb0a936038 R14: 00007ffb0a935fa0 R15: 00007ffced3bf088 [ 183.064309][ T7493] [ 183.266156][ T3418] tipc: Node number set to 10070698 [ 183.449964][ T7498] netlink: 'syz.3.1261': attribute type 13 has an invalid length. [ 183.490567][ T7498] gretap0: refused to change device tx_queue_len [ 183.508663][ T7498] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 183.836605][ T7506] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1264'. [ 183.971050][ T7529] tmpfs: Unknown parameter 'subj_type' [ 183.979162][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 183.979178][ T28] audit: type=1326 audit(1773009261.864:10175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.029879][ T28] audit: type=1326 audit(1773009261.864:10176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.064001][ T28] audit: type=1326 audit(1773009261.894:10177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.117221][ T28] audit: type=1326 audit(1773009261.894:10178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.164327][ T28] audit: type=1326 audit(1773009261.894:10179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.286781][ T28] audit: type=1326 audit(1773009261.904:10180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.327090][ T28] audit: type=1326 audit(1773009261.904:10181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.352241][ T28] audit: type=1326 audit(1773009261.904:10182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.376342][ T28] audit: type=1326 audit(1773009261.904:10183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.445910][ T28] audit: type=1326 audit(1773009261.904:10184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7528 comm="syz.3.1273" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f78d629c799 code=0x7ffc0000 [ 184.521079][ T7537] SELinux: Context system_u:object_r:hwdata_t:s0 is not valid (left unmapped). [ 184.523288][ T7534] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1273'. [ 184.607784][ T7506] veth1_vlan (unregistering): left allmulticast mode [ 184.970980][ T7506] team0: Port device macvlan1 removed [ 185.166841][ T7525] netlink: 52 bytes leftover after parsing attributes in process `syz.1.1264'. [ 185.646988][ T7568] cgroup: fork rejected by pids controller in /syz2 [ 185.809480][ T7665] syzkaller0: entered promiscuous mode [ 185.822120][ T7665] syzkaller0: entered allmulticast mode [ 186.190287][ T7883] 9p: Bad value for 'wfdno' [ 186.322970][ T7887] netlink: 64 bytes leftover after parsing attributes in process `syz.2.1306'. [ 186.609802][ T7889] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1307'. [ 186.700848][ T7899] vxcan1 speed is unknown, defaulting to 1000 [ 186.779649][ T7899] lo speed is unknown, defaulting to 1000 [ 186.945554][ T7925] IPVS: set_ctl: invalid protocol: 43 172.20.20.65:20004 [ 187.063473][ T7935] random: crng reseeded on system resumption [ 188.135535][ T7942] bond4: option lacp_active: mode dependency failed, not supported in mode balance-rr(0) [ 188.148033][ T7942] bond4 (unregistering): Released all slaves [ 188.487574][ T7981] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1341'. [ 188.812519][ T7989] 9p: Bad value for 'wfdno' [ 189.008370][ T28] kauditd_printk_skb: 410 callbacks suppressed [ 189.008388][ T28] audit: type=1326 audit(1773009266.894:10595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8000 comm="syz.2.1350" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 189.074920][ T28] audit: type=1326 audit(1773009266.934:10596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8000 comm="syz.2.1350" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 189.144267][ T28] audit: type=1326 audit(1773009266.954:10597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8000 comm="syz.2.1350" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 189.170079][ T28] audit: type=1326 audit(1773009266.954:10598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8000 comm="syz.2.1350" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 189.193967][ T28] audit: type=1326 audit(1773009266.954:10599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8000 comm="syz.2.1350" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 189.217941][ T28] audit: type=1326 audit(1773009266.954:10600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8000 comm="syz.2.1350" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7ffb0a6bc799 code=0x7ffc0000 [ 189.353698][ T8016] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1350'. [ 189.505754][ T8031] FAULT_INJECTION: forcing a failure. [ 189.505754][ T8031] name failslab, interval 1, probability 0, space 0, times 0 [ 189.544905][ T8031] CPU: 0 UID: 0 PID: 8031 Comm: syz.4.1357 Not tainted syzkaller #0 PREEMPT(full) [ 189.544934][ T8031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 189.544945][ T8031] Call Trace: [ 189.544951][ T8031] [ 189.544958][ T8031] __dump_stack+0x1d/0x30 [ 189.544984][ T8031] dump_stack_lvl+0x95/0xd0 [ 189.545056][ T8031] dump_stack+0x15/0x1b [ 189.545081][ T8031] should_fail_ex+0x263/0x280 [ 189.545106][ T8031] should_failslab+0x8c/0xb0 [ 189.545128][ T8031] kmem_cache_alloc_noprof+0x66/0x400 [ 189.545165][ T8031] ? dst_alloc+0xbd/0x100 [ 189.545187][ T8031] dst_alloc+0xbd/0x100 [ 189.545213][ T8031] ip_route_output_key_hash_rcu+0xf29/0x1380 [ 189.545326][ T8031] ip_route_output_flow+0x65/0x110 [ 189.545395][ T8031] udp_sendmsg+0x1383/0x1590 [ 189.545488][ T8031] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 189.545522][ T8031] ? avc_has_perm+0x101/0x190 [ 189.545553][ T8031] ? __pfx_udp_sendmsg+0x10/0x10 [ 189.545582][ T8031] inet_sendmsg+0xac/0xd0 [ 189.545665][ T8031] ? __pfx_inet_sendmsg+0x10/0x10 [ 189.545691][ T8031] ____sys_sendmsg+0x519/0x5b0 [ 189.545718][ T8031] ___sys_sendmsg+0x195/0x1e0 [ 189.545745][ T8031] ? path_openat+0x1b01/0x2050 [ 189.545846][ T8031] __sys_sendmmsg+0x185/0x320 [ 189.545881][ T8031] __x64_sys_sendmmsg+0x57/0x70 [ 189.545932][ T8031] x64_sys_call+0x27aa/0x3020 [ 189.546016][ T8031] do_syscall_64+0x12c/0x370 [ 189.546040][ T8031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 189.546092][ T8031] RIP: 0033:0x7fcfb8c5c799 [ 189.546110][ T8031] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 189.546168][ T8031] RSP: 002b:00007fcfb76af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 189.546193][ T8031] RAX: ffffffffffffffda RBX: 00007fcfb8ed5fa0 RCX: 00007fcfb8c5c799 [ 189.546210][ T8031] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000007 [ 189.546226][ T8031] RBP: 00007fcfb76af090 R08: 0000000000000000 R09: 0000000000000000 [ 189.546242][ T8031] R10: 000000000000001c R11: 0000000000000246 R12: 0000000000000001 [ 189.546257][ T8031] R13: 00007fcfb8ed6038 R14: 00007fcfb8ed5fa0 R15: 00007fff68365638 [ 189.546276][ T8031] [ 189.887490][ T8045] vxcan1 speed is unknown, defaulting to 1000 [ 189.995009][ T8045] lo speed is unknown, defaulting to 1000 [ 190.006845][ T8044] vxcan1 speed is unknown, defaulting to 1000 [ 190.066214][ T8044] lo speed is unknown, defaulting to 1000 [ 190.315617][ T8055] vxcan1 speed is unknown, defaulting to 1000 [ 190.321931][ T28] audit: type=1326 audit(1773009268.204:10601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8042 comm="syz.0.1362" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f914055c799 code=0x0 [ 190.821580][ T28] audit: type=1400 audit(1773009268.714:10602): avc: denied { create } for pid=8065 comm="syz.4.1368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 190.959402][ T28] audit: type=1400 audit(1773009268.764:10603): avc: denied { audit_write } for pid=8065 comm="syz.4.1368" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 190.977032][ T8055] lo speed is unknown, defaulting to 1000 [ 190.981118][ T28] audit: type=1107 audit(1773009268.764:10604): pid=8065 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 191.731254][ T8086] usb usb1: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 191.738982][ T8086] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 191.747747][ T8086] vhci_hcd vhci_hcd.0: default hub control req: 9a08 v0009 i0007 l0 [ 191.767717][ T8074] ================================================================== [ 191.776160][ T8074] BUG: KCSAN: data-race in __filemap_remove_folio / folio_mapping [ 191.784142][ T8074] [ 191.786460][ T8074] write to 0xffffea00064e1ad8 of 8 bytes by task 7985 on cpu 0: [ 191.794128][ T8074] __filemap_remove_folio+0x201/0x310 [ 191.800831][ T8074] filemap_remove_folio+0x6d/0x1d0 [ 191.805959][ T8074] truncate_inode_folio+0x42/0x50 [ 191.810994][ T8074] shmem_undo_range+0x26d/0xb10 [ 191.815925][ T8074] shmem_evict_inode+0x12e/0x510 [ 191.820947][ T8074] evict+0x2af/0x510 [ 191.824842][ T8074] iput+0x41a/0x580 [ 191.828659][ T8074] dentry_unlink_inode+0x24f/0x260 [ 191.833858][ T8074] __dentry_kill+0x13f/0x460 [ 191.838627][ T8074] finish_dput+0x2b/0x200 [ 191.843048][ T8074] dput+0x52/0x60 [ 191.846675][ T8074] __fput+0x444/0x650 [ 191.850660][ T8074] ____fput+0x1c/0x30 [ 191.854822][ T8074] task_work_run+0x130/0x1a0 [ 191.859594][ T8074] do_exit+0x4ae/0x1600 [ 191.863753][ T8074] do_group_exit+0xfe/0x140 [ 191.868383][ T8074] get_signal+0xe54/0xf60 [ 191.872805][ T8074] arch_do_signal_or_restart+0x96/0x450 [ 191.878376][ T8074] irqentry_exit+0xf7/0x520 [ 191.883001][ T8074] asm_exc_page_fault+0x26/0x30 [ 191.888230][ T8074] [ 191.890766][ T8074] read to 0xffffea00064e1ad8 of 8 bytes by task 8074 on cpu 1: [ 191.898401][ T8074] folio_mapping+0xa1/0xe0 [ 191.902953][ T8074] move_folios_to_lru+0x128/0x6d0 [ 191.907994][ T8074] evict_folios+0x31f8/0x35c0 [ 191.912702][ T8074] try_to_shrink_lruvec+0x81b/0xbf0 [ 191.917906][ T8074] shrink_lruvec+0x255/0x1c60 [ 191.922593][ T8074] shrink_node+0x67a/0x2130 [ 191.927090][ T8074] do_try_to_free_pages+0x408/0xc80 [ 191.932727][ T8074] try_to_free_mem_cgroup_pages+0x1f5/0x470 [ 191.938893][ T8074] try_charge_memcg+0x37e/0xa10 [ 191.943914][ T8074] obj_cgroup_charge_pages+0x23/0xc0 [ 191.949193][ T8074] __memcg_kmem_charge_page+0x9e/0x170 [ 191.954648][ T8074] __alloc_frozen_pages_noprof+0x18a/0x360 [ 191.960531][ T8074] alloc_pages_mpol+0xb3/0x260 [ 191.965470][ T8074] alloc_pages_noprof+0x8f/0x130 [ 191.970422][ T8074] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 191.976312][ T8074] __kvmalloc_node_noprof+0x3d4/0x650 [ 191.981759][ T8074] ip_set_alloc+0x24/0x30 [ 191.986087][ T8074] hash_netiface_create+0x282/0x740 [ 191.991361][ T8074] ip_set_create+0x3cf/0x970 [ 191.995954][ T8074] nfnetlink_rcv_msg+0x509/0x5d0 [ 192.000969][ T8074] netlink_rcv_skb+0x123/0x220 [ 192.005726][ T8074] nfnetlink_rcv+0x167/0x1720 [ 192.010740][ T8074] netlink_unicast+0x5c0/0x690 [ 192.015610][ T8074] netlink_sendmsg+0x5c8/0x6f0 [ 192.020651][ T8074] ____sys_sendmsg+0x563/0x5b0 [ 192.025495][ T8074] ___sys_sendmsg+0x195/0x1e0 [ 192.030508][ T8074] __x64_sys_sendmsg+0xd4/0x160 [ 192.035364][ T8074] x64_sys_call+0x194c/0x3020 [ 192.040051][ T8074] do_syscall_64+0x12c/0x370 [ 192.044631][ T8074] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.050527][ T8074] [ 192.053014][ T8074] value changed: 0xffff8881016561e8 -> 0x0000000000000000 [ 192.060350][ T8074] [ 192.062680][ T8074] Reported by Kernel Concurrency Sanitizer on: [ 192.068990][ T8074] CPU: 1 UID: 0 PID: 8074 Comm: syz.2.1371 Not tainted syzkaller #0 PREEMPT(full) [ 192.078606][ T8074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 192.088746][ T8074] ================================================================== [ 192.342596][ T8074] syz.2.1371 (8074) used greatest stack depth: 5928 bytes left