last executing test programs: 3.413978371s ago: executing program 4 (id=2081): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x5, 0xf0360, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x6, 0xfffffffffffffffe}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f00000000c0)=0x0) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x1c, r4, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x4008004) (async) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x1c, r4, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x4008004) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x26400, 0x0) (async) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x26400, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r5, 0x400c330d, &(0x7f0000000140)={0xe, 0x2}) write$nci(r2, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x4) (async) write$nci(r2, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 3.291237956s ago: executing program 4 (id=2082): lsetxattr$security_selinux(&(0x7f0000000000)='./cgroup\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:v4l_device_t:s0\x00', 0x22, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newlink={0x68, 0x10, 0x437, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x20c89, 0x48044}, [@IFLA_LINKINFO={0x48, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x38, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_LINK={0x8, 0x1, r1}, @IFLA_GRE_REMOTE={0x14, 0x7, @remote}, @IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}}}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000c800}, 0x20000000) listxattr(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) 3.254166717s ago: executing program 4 (id=2083): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) mount(&(0x7f0000000100)=@sr0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='efs\x00', 0x4d0000, &(0x7f0000000240)='-,\x00') r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x10000, 0x2, 0x1ff, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r2, &(0x7f00000001c0)={0x11, 0x10, 0x0, 0x1, 0x0, 0x6, @random="27738d50c7f5"}, 0x14) sendmsg$inet(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)="91cfdfefdb", 0x1a000}], 0x1, 0x0, 0x0, 0x300}, 0x0) 3.208691909s ago: executing program 4 (id=2084): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./mnt\x00', 0x2000c10, &(0x7f0000000000)={[{@nolazytime}, {@commit={'commit', 0x3d, 0xffffffffffffffff}}, {@usrquota}, {@debug}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") open(&(0x7f0000000140)='./file1\x00', 0x141242, 0x40) r0 = open(&(0x7f0000000100)='./file0\x00', 0x10000, 0x5b) mount$tmpfs(0x0, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000f80), 0x400, &(0x7f0000000000)=ANY=[@ANYBLOB='mpol=bind:N-N']) getdents(r0, &(0x7f0000001fc0)=""/184, 0xb8) 3.107015752s ago: executing program 4 (id=2085): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="50000000101e030428bd78000000000000000000", @ANYRES32=0x0, @ANYBLOB="46060900000000002800128009000100766c616e00000000180002800c0002001f0000001f000000060001000100000008000500", @ANYRES32=r5, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x600}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010000104000000000000000000000400", @ANYRESOCT=r8, @ANYBLOB="00000000183e00001400350065727370616e3000000000000000000008000a00", @ANYRES32=r8], 0x3c}, 0x1, 0x0, 0x0, 0x70}, 0x0) 2.970167567s ago: executing program 4 (id=2089): r0 = socket$packet(0x11, 0xa, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x0) recvmmsg(r0, &(0x7f0000003c80)=[{{0x0, 0x0, 0x0}, 0x9}], 0x1, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(0xffffffffffffffff, 0x0, 0x0, r2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x9, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) io_uring_setup(0x650c, &(0x7f0000000180)={0x0, 0xf695, 0x2, 0x21, 0xa7}) close(0xffffffffffffffff) r8 = socket(0x28, 0x5, 0x0) r9 = socket(0x28, 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r8, 0x113, 0x2, &(0x7f0000000400), &(0x7f00000004c0)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r8, &(0x7f0000000900)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100408}, 0xc, &(0x7f0000000700)={&(0x7f0000000800)=ANY=[@ANYBLOB="14003d38", @ANYRES16=0x0, @ANYBLOB="000829bd7000fedbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0xc010) listen(r9, 0x4) connect$vsock_stream(r8, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="006f270500"/22, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 1.523121767s ago: executing program 1 (id=2111): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) io_setup(0xb, &(0x7f00000003c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff2e) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000040)={{0xfffffffffffffffd, 0x4}, {0xffffffff, 0x20000201}, 0x1, 0x2}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3000490, &(0x7f00000002c0), 0x45, 0x7b1, &(0x7f0000000c80)="$eJzs3c9rHNcdAPDvrFY/7VYqFFr3JCi0BuNV5ap2C4Wq9FAKNRjaUw+1xWotHK20RrsylhCJTQjkEkhCbsnF5/y8hFzz45BL8n8EGyeRTRxyCAqzP6SVtCvvOtKuHX8+MNZ7M2/2ve+82TfPmtFuAE+tyfSfTMSJiHg5iRivr08iYrCaykbM1so92NzIp0sSW1v/+Sqplrm/uZGPpn1Sx+qZX0fExy9EnMrsr7e8tr44VywWVur5qcrS1any2vrpK0tzC4WFwvLZ6ZmZM+f+dO7s4cX6zefrx++88s/fvzP73fO/evelT5KYjeP1bc1xHJbJmKwfk8H0EO7yj8OurG/ef7aDQk1nQPYoG0OX0o4ZqPfKiRiPgYP6Z7SXLQMAjspzEbHVzkDbLQDAEy2pXf//1u92AAC90vg9wP3NjXxj6e9vJHrr7t8jYqQWf+P+Zm1Ltn7PbqR6H3TsfrLrzkgSEROHUP9kRLzxwf/fSpc4ovuQAK3cuBkRlyYm94//yb5nFrr1h9arF5ozk3s2Gv+gdz5M5z9/bjX/y2zPf6LF/Ge4xXv3UTz8/Z+5fQjVtJXO//7a9Gzbg6b46yYG6rmfVed8g8nlK8VCOrb9PCJOxuBwmp8+oI6T976/125b8/zv61efeTOtP/25UyJzOzu8e5/5ucrcj4m52d2bEb/Jtoo/Hf+Hq/2ftJn/Xuiwjn/95cXX221L40/jbSz74z9aW7ciftey/5PtMsmBzydOVU+HqcZJ0cJ7szHWrv7J7E7/p0taf+P/Ar2Q9v/YwfFPJM3Pa5Y7funtp8U+uzX+UbtCzed/6/hbn/9DyX+r6aH6uutzlcrKdMRQ8u/968/s7NvIN8qn8Z/8bev3f2P8a3H+/y99/UsdHojsnS/ffvT4j1Ya/3xX/d91IkYeLA60q7+z/p/ZtU8n41+nDXzU4wYAAAAAAAAAAAAAAAAAAAAAAAAA3chExPFIMrntdCaTy9W+w/uXMZYplsqVU5dLq8vzUf2u7IkYzDQ+6nK86fNQp+ufh9/In9mT/2NE/CIiXhsereZz+VJxvt/BAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDdsTbf/5/6YnhP4YF+tBAAOBIjLuwA8LRJstl+NwEA6LWRrkqPHlk7AIDe6e76DwD8FLj+A8DT5yHX/71/BgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADdunD+fLpsfbu5kU/z89fWVhdL107PF8qLuaXVfC5fWrmaWyiVFoqFXL601PaFbtR+FEulqzOxvHp9qlIoV6bKa+sXl0qry5WLV5bmFgoXC4M9iwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOldeW1+cKxYLKxJ9SSx+WuuHx6U9Et0l4kat/x6X9hxeIoZ2RonR/gxOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE+AHwIAAP//4VQjgA==") openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) 1.520464917s ago: executing program 0 (id=2113): syz_mount_image$ext4(&(0x7f00000009c0)='ext4\x00', &(0x7f0000000540)='./file0\x00', 0x800718, &(0x7f0000000000)={[{@nodioread_nolock}, {@journal_dev={'journal_dev', 0x3d, 0x40000ff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80000000005c}}, {@nouid32}, {@resgid}, {@data_err_abort}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x48c, &(0x7f0000000a00)="$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") getpgid(0x0) 1.44226797s ago: executing program 0 (id=2116): syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800, &(0x7f0000000200)={[{@usrquota}, {@debug}, {@dioread_nolock}, {@delalloc}, {}, {@jqfmt_vfsv1}, {@grpid}, {@data_ordered}, {@sb={'sb', 0x3d, 0x7}}, {@inlinecrypt}, {@errors_continue}, {@init_itable_val={'init_itable', 0x3d, 0x9}}, {@grpjquota}], [{@subj_user={'subj_user', 0x3d, 'grpjquota='}}, {@seclabel}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x31, 0x36, 0x39, 0x62, 0x30, 0x63, 0x39], 0x2d, [0x36, 0xc7, 0x38, 0x31], 0x2d, [0x37, 0x37, 0x61, 0x38], 0x2d, [0x31, 0x61, 0x36, 0x32], 0x2d, [0x63, 0x66, 0x32, 0x64, 0x61, 0x31, 0x0, 0x38]}}}, {@fsname={'fsname', 0x3d, '\xbf\x8e\x13V\x00\x00\x00\x00\x00\x00\x00\x02\x8eur\xf6\xeb8\xea'}}, {@seclabel}]}, 0x2, 0x48e, &(0x7f0000000380)="$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") r0 = fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0xf) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='rw\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 1.44104286s ago: executing program 1 (id=2118): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000c80)={r1, 0x8}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@generic={0x81, 0x1, 0x1, 0xac}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000080)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f00000000c0)=0x4, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ipvlan1\x00'}) syz_clone3(&(0x7f0000000400)={0x80000000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0, {0xf}, &(0x7f00000001c0)=""/213, 0xd5, &(0x7f00000002c0)=""/217, &(0x7f00000003c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x8, {r2}}, 0x58) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000004c0)={0x0, 0x8}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000600)={r4, 0x200}, 0x8) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r3, &(0x7f0000000480), 0x4003) 1.375176183s ago: executing program 0 (id=2119): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x7, 0x7ffc0001}]}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x1}, 0x204, 0x0, 0xfff, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 1.374546042s ago: executing program 1 (id=2121): ioperm(0x0, 0x7, 0x80006) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24004045) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6, 0xfd, 0xc, 0x42}]}, 0x10) listen(r0, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24040014, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendmmsg$inet(r1, &(0x7f0000004440)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)="39b73c23faa621f10c9457864265483377c393230402c600d5e422df31033a", 0x1f}, {&(0x7f0000000340)="3ae5be9f", 0x4}], 0x2}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="72753efaf7fbc6d9bbb3e910c50720", 0xf}], 0x1}}], 0x2, 0x48045) 1.335932004s ago: executing program 0 (id=2123): socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x200000, &(0x7f0000000000)={[{@dioread_lock}, {@noquota}, {@errors_remount}, {@grpquota}]}, 0xfc, 0x579, &(0x7f0000000680)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) statfs(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100)=""/116) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000080)='ro\x00', 0x0, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, 0x0, 0x20044053) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f00000006c0)='./file0\x00', 0x10808, &(0x7f0000000c00), 0x1, 0xb88, &(0x7f0000002380)="$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") r3 = open(&(0x7f0000000240)='./file1\x00', 0x14d142, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000002f000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ftruncate(r3, 0x2007ffc) 1.329836674s ago: executing program 1 (id=2125): socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x55, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0xffffffff, 0x200000, 0x8000}, 0x50) close(0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000002c0), 0x10000, r8, 0x0, 0x1c000000007400}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) sendmsg$unix(r10, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x4000, &(0x7f0000000240)={[{@noinit_itable}]}, 0x1, 0x512, &(0x7f0000000c40)="$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") socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x80, 0x0, 0x7ffc1ffb}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 815.058972ms ago: executing program 2 (id=2135): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x7e) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x318, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x248, 0xffffffff, 0xffffffff, 0x248, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @empty}, @rand_addr=' \x01\x00', [0xff, 0x0, 0xffffffff, 0xff000000], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0x100, 0x170, 0x0, {}, [@common=@ah={{0x30}, {[0x4d4, 0x4d6], 0x7, 0xdc, 0x3}}, @common=@inet=@tos={{0x28}, {0x9, 0x2, 0x1}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0xffffffff, 0x3, 0x4, 0x1, 0x0, "8441551c2beb99882c35486dace533d4e68ad600a483484a4d43642995cc848efb94f4fda3ad3806b052bd687fcbf8f944c85de542d030fa9b1575a53cdee96d"}}}, {{@ipv6={@remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0x0, 0xffffff00], [], 'erspan0\x00', 'gre0\x00', {}, {}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x5, 0x4000}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x378) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) listen(r2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cred={{0x20}}], 0x20, 0x40044}}], 0x1, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8902, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0xfffffffffffffffd, &(0x7f00000004c0)) quotactl$Q_GETINFO(0xffffffff80000500, &(0x7f0000000380)=@rnullb, 0x0, &(0x7f0000000500)) socket$unix(0x1, 0x4, 0x0) 814.504672ms ago: executing program 3 (id=2137): r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0, 0xa4ff, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r0}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}], 0x40}}], 0x1, 0x20048400) 798.293063ms ago: executing program 2 (id=2138): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x3e, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20, 0x80, 0x1c, {0xffff, 0x8000, 0x4, 0x7, 0x3, 0xf, 0xe95e, 0x200, 0x0, 0xaff5, 0xfffe, 0x3}}, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r2 = io_uring_setup(0x524, &(0x7f0000000040)={0x0, 0x3cb1, 0x1c080, 0xa, 0x20002f7}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'wlan1\x00', 0x0}) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x5, 0x0, 0x0, 0x6, 0x3}}) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="3800000002010102000500f20000000000000016e9a26f3d5174ff427f0bb92041050800084000000adb1c0010800800034000000006080003400000596e08000340000010002c2441fcd914fcc04c187bc74ceea5752ef166d0f5b647705aaf80896ab443534bf7ce1a2821"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x44000001) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file1\x00', 0x1004081, &(0x7f0000000280)=ANY=[], 0x2, 0x826, &(0x7f0000000280)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x6000) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20004081) 776.876943ms ago: executing program 3 (id=2139): r0 = socket(0x2b, 0x1, 0x1) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r1 = socket$qrtr(0x2a, 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)={r1, r2}) r3 = socket$nl_generic(0x10, 0x3, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), r3) r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000300000014000b00fc020000000000000000000000000000080002000000000008000400ac1414bb08000700", @ANYRES32=r5, @ANYBLOB="08000500e0000002f1df0c86a26ba54d2825143461d94c114d33ae7a555a1c35e842422cacdf3c618c6d8901e14113358a27910c10fb38c1aaa0a71600373a59231636a100fcc9dc44b8f6b63f6a43fa91c26267672f31c1b3b6b5de35d279520295d4e5192775fd67779e42bf42de0149d70d5367632965a1ae9cd196d97f5f4fa8e67b2d952edea95d63b656571e1d079ec9532e15c2d549a6d9eae4b75095d189ee0e3cc7ae4ec85ca3b3765a74a4e530e5aef18c50ed476f05d8e507046b34"], 0x48}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) uname(&(0x7f00000000c0)=""/107) modify_ldt$write2(0x11, 0x0, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e1f, 0x2, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e5b, 0x80000000, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x5}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000140)=0xfb78, 0x4) 698.960726ms ago: executing program 3 (id=2140): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x34, r1, 0x1, 0x70bd2b, 0x25dedbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x20009815}, 0x4000080) ioctl$OCFS2_IOC_UNRESVSP(r0, 0x40305829, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x5, 0x401, 0xfffffb4b}) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) syz_emit_ethernet(0x12c, &(0x7f0000000180)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x7, 0x6, "1000", 0xf6, 0x2f, 0x1, @local, @mcast2, {[@srh={0x3a, 0x14, 0x4, 0xa, 0x73, 0x38, 0xe7c, [@private0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x22}, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @remote}, @private0, @private2, @remote]}, @srh={0x33, 0x0, 0x4, 0x0, 0x7, 0x28, 0x9ab8}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x3}, {0x0, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x86dd, [0x2]}, {0x6488, 0x88be, 0x4, {{0x5, 0x1, 0x3, 0x3, 0x1, 0x0, 0x0, 0x35}, 0x1, {0x4c289}}}, {0x8, 0x22eb, 0x1, {{0xe, 0x2, 0x0, 0x1, 0x0, 0x3, 0x1, 0x4}, 0x2, {0x200004, 0x2, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1}}}, {0x8, 0x6558, 0x4}}}}}}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000000)={0x38, r4, 0x1, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x38}}, 0x30004004) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r6, &(0x7f0000000640)={&(0x7f0000000380)=@xdp={0x2c, 0x8, r7, 0x40}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="27030200000314000e00203c0024000000000006", 0x14}], 0x1}, 0x4041) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)=@bridge_delneigh={0x74, 0x1d, 0x1, 0x70bd2d, 0x25dfdbfd, {0x1c, 0x0, 0x0, 0x0, 0x80, 0x82, 0x1}, [@NDA_IFINDEX={0x8}, @NDA_IFINDEX={0x8, 0x8, r7}, @NDA_FLAGS_EXT={0x8}, @NDA_LINK_NETNSID={0x8, 0xa, 0x80}, @NDA_DST_MAC={0xa, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NDA_FLAGS_EXT={0x8}, @NDA_VNI={0x8, 0x7, 0x9}, @NDA_VLAN={0x6, 0x5, 0x1}, @NDA_VLAN={0x6, 0x5, 0x2}, @NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x54, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x8c, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r8, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) r9 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f00000001c0)={0x1d, r10, 0x0, {0x2, 0xff, 0x6}, 0xfe}, 0x18) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000700)={'erspan0\x00', &(0x7f0000000640)={'syztnl0\x00', 0x0, 0xf, 0xe5fa8cbfa44cbdec, 0x7, 0x2, {{0x19, 0x4, 0x1, 0x4, 0x64, 0x67, 0x0, 0x3, 0x2f, 0x0, @remote, @remote, {[@cipso={0x86, 0x3d, 0x2, [{0x6, 0x11, "aab7824ae98f93417a019ca0192050"}, {0x0, 0xb, "4ef86b8ff460d678e1"}, {0x5, 0xa, "fbd2a8f0604c178a"}, {0x6, 0x11, "d61f2d6836754a14786fd077665f19"}]}, @timestamp_prespec={0x44, 0xc, 0xb8, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x2c}, 0x3}]}, @generic={0x89, 0x6, "77284289"}]}}}}}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r11, &(0x7f0000000000), 0x208e24b) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r11) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r3, &(0x7f0000000c40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x2d4, r12, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x8000, 0x3b}}}}, [@NL80211_ATTR_NAN_FUNC={0x4c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5, 0x7, 0x2}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x34, 0xd, 0x0, 0x1, [{0x2e, 0x0, "60c05d2469ed705ee029e85077c005b7d44f1203414d002af181a0e3ffef77942413a4e47c35c7cd0044"}]}, @NL80211_NAN_FUNC_CLOSE_RANGE={0x4}]}, @NL80211_ATTR_NAN_FUNC={0x160, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TYPE={0x5, 0x1, 0x2}, @NL80211_NAN_FUNC_TTL={0x8, 0xa, 0x3}, @NL80211_NAN_FUNC_TERM_REASON={0x5, 0x10, 0x7}, @NL80211_NAN_FUNC_SRF={0x144, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x1}, @NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x5}, @NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x8}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_MAC_ADDRS={0x1c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_INCLUDE={0x4}]}]}, @NL80211_ATTR_NAN_FUNC={0xec, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_RX_MATCH_FILTER={0xe8, 0xd, 0x0, 0x1, [{0xe3, 0x0, "cbd61f274f0b3e7c389b8154024417219beed11221a7ceb494f47a70b01cd6cbeb57df6de37dbbe464ef648fcf8b823cb839ba8f479e3aa9ae36f9f5e324897099e17cc590bdfe8db8d7612f9e789edcdf44f1662c59400b5882301d21a3b14e6b211ba5a57ffe72eefac8242ae5612a0e897742a5c60c628d78f10769c561ba5aae6227dfd138422162401c65f12ddd0d89efbc8491eb1e8d2e2b66a65971283d5e7c21387354165a065474620dfee295970b5a4d0cf19e4c7ce973b0853ca633eb2894a56c5f04609edad0aa06eb51919c304332025f6ab238e2d515a82b"}]}]}, @NL80211_ATTR_NAN_FUNC={0x1c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_CLOSE_RANGE={0x4}, @NL80211_NAN_FUNC_TERM_REASON={0x5, 0x10, 0x9}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @device_b}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) ioctl$SG_BLKTRACESTOP(r2, 0x1275, 0x0) 479.843854ms ago: executing program 0 (id=2141): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000000000000000000000408500000e6d0000001801000020786c0500000000c42020207b1af8ff00000000bfa10000a790720c07010000f8ffffffb702000008009b00008895000f0000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x28}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x520, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa98, 0x3}, 0x0, 0xfffd, 0x4202, 0x5, 0x1, 0x10e, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffeffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2, 0x3, 0x2) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x2, 0x0, 0x9, "c46e9fd1a84b7fefa0bf2cca6beb9363a680b652a86bcf56a1b9f4e6b54cc6beca5462202c484c10ca5386103a5ccbe47b7b9aa6d8d701a3ba6a6c0ce8b978", 0x1}, 0x60) r2 = dup(r1) sendmsg$sock(r2, &(0x7f0000000180)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x5, {0xa, 0x4e22, 0x2, @local, 0x10001}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000740)="94bcfeb7bbb15f0bad1d1e1424b8b7c6974b7f05db47c4a7da72112bedd6c6c0f504e971add221efbd81a839de16aac303bb453468667ff514a1039317f637c97ee8c420a7b1ff59dc182cb0a5ab43ae9192b017a8c3c6928f5254b6c231a682b84ad00b0bc523f8e3c19aa37d5ff8e93274e08258f8ba4f90a198dc1623ce687344c0dce69c300b742a30aee9a4124bd92fdcf3c829c46c1e393e0b6a33a2b8de2a594b40ed77d34a50", 0xaa}, {&(0x7f0000000380)}, {&(0x7f0000000840)="60d97b99ba3ef63c0c42d06e11e1991f7c436597f4f9aa5912b8c6401ea7c403af6688a697f5f05fee554baa4a313a7bfe95c7259b4889ba3a360b5c8c056d2847099f0c318e798fbfde1901a47b145d8266b1f88922ade02e82468adf3c191f76aa954da38951ac09d540", 0x6b}], 0x3}, 0xc004000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002440)=@bpf_tracing={0x1a, 0x1b, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018220000", @ANYRES32=r2, @ANYBLOB="000000000c7000009500000000000000"], &(0x7f0000000d00)='GPL\x00', 0x5, 0x1000, &(0x7f0000001300)=""/4096, 0x41100, 0x8, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002300)={0x5, 0x3, 0x5, 0x3}, 0x10, 0x1ce46, r2, 0x9, &(0x7f0000002340)=[r2, r2, r2, r2], &(0x7f0000002380)=[{0x5, 0x4, 0xd, 0xc}, {0x0, 0x3, 0x1, 0x8}, {0x1, 0x1, 0xa, 0x3}, {0x0, 0x5, 0xc, 0x1}, {0x3, 0x5, 0x2}, {0x5, 0x3, 0x0, 0x4}, {0x4, 0x5, 0x10}, {0x2, 0x2, 0xb, 0xa}, {0x1, 0x2, 0xa, 0x4}], 0x10, 0x7fffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = socket$pppl2tp(0x18, 0x1, 0x1) unshare(0x22020600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, @value=r2}, 0x28) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x2}}, 0x2e) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000008c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)='P', 0x1}], 0x1}, 0x8001) ioctl$SIOCSIFHWADDR(r6, 0x8905, &(0x7f0000000340)={'pim6reg0\x00', @remote}) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010028bd701004000000050000000600010005000000080009000400000008000b0000000000dbb7909f03000000140008006d616373656330f50b000000000000000c001000ffffffffffffffff"], 0x54}, 0x1, 0x0, 0x0, 0x20008000}, 0x30) mount(&(0x7f00000000c0)=@md0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140)='sysfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r5) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'ip6tnl0\x00', 0x0, 0x2f, 0x81, 0x1, 0x7ff, 0x0, @mcast1, @local, 0x40, 0x10, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'ip6tnl0\x00', 0x0, 0x38, 0x2, 0x7f, 0x9, 0x2, @private1, @empty, 0x10, 0x80, 0x363c, 0x1}}) r8 = socket(0xb, 0x803, 0xaf) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@gettclass={0x24, 0x2a, 0x200, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x3, 0x8}, {0xfff3, 0xc}, {0x1, 0xb}}, ["", "", "", "", "", ""]}, 0x24}}, 0xc840) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, 0xfffffffffffffffd, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newtfilter={0x60, 0x2c, 0xd2b, 0x70bd2c, 0x25dfdbf8, {0x0, 0x0, 0x0, r9, {0xa, 0xffe0}, {}, {0x7, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd}, {0x2c, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xd, 0xffe0}}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x9, 0xc}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x7, 0xfff1}}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0xfff1, 0x6}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4084}, 0x24040094) r10 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) 462.015774ms ago: executing program 1 (id=2142): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x1008490, &(0x7f00000010c0)={[{@bsdgroups}, {@grpquota}, {@resuid}]}, 0x4, 0x4ed, &(0x7f0000001540)="$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") r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x20000, 0x400, {0x0, 0x0, 0x0, 0x0, 0x8003, 0x4e310}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x8001}, @IFLA_GTP_FD0={0x8, 0x1, @udp6=r2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x240008c4}, 0x4054) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000800)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000004000480080002000100000008000100000000000400088030000c800c000b80080009"], 0x5c}, 0x1, 0x0, 0x0, 0x40000044}, 0x404c884) unshare(0x2040400) set_mempolicy(0x8000, &(0x7f0000000100)=0x1020fff, 0x6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000001200)={[{@nodiscard}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@nobarrier}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xeb}}, {@abort}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x1, 0x55f, &(0x7f0000000580)="$eJzs3d9rU+cbAPDnpK2/v18riGxjjIIXczhT2+6Hg124y7HJhO3ehfZYpKmRJhXbCdOLebObIYMxJozdb/e7lP0D+yuETZAhZbvYTcZJT2q0SRNrtNF8PnDkfXNO+p4n73le35M3IQEMrYnsn0LEyxHxTRJxMCKSfN9o5Dsn1o9bu391NtuSqNc//StpHJfVm3+r+bz9eeWliPjtq4jjhc3tVldWF0rlcrqU1ydri5cmqyurJy4slubT+fTi9MzMqbdnpt97952+xfrG2X++/+T2h6e+Prr23S93D91M4nQcyPe1xvEErrVWJmIif03G4vQjB071obFBkuz0CbAtI3mej0U2BhyMkTzrgRfflxFRB4ZUIv9hSDXnAc17+z7dBz837n2wfgO0Of7R9fdGYk/j3mjfWvLQnVF2vzveh/azNn7989bNbIv+vQ8B0NW16xFxcnR08/iX5OPf9p3s4ZhH2zD+wbNzO5v/vNlu/lPYmP9Em/nP/ja5ux3d879wtw/NdJTN/95vO//dWLQaH8lr/2vM+caS8xfKaTa2/T8ijsXY7qy+1XrOqbU79U77Wud/2Za135wL5udxd3T3w8+ZK9VKTxJzq3vXI15pO/9NNvo/adP/2etxtsc2jqS3Xuu0r3v8T1f9p4jX2/b/gxWtZOv1ycnG9TDZvCo2+/vGkd87tb/T8Wf9v2/r+MeT1vXa6uO38eOef9NO+x6KP3q//nclnzXKu/LHrpRqtaWpiF3Jx5sfn37w3Ga9eXwW/7GjW49/7a7/vRHxeY/x3zj886s9xd+t/5/CImsW/9xj9f/jF+589MUP248/6/+3GqVj+SO9jH+9nuCTvHYAAAAAAAAwaAoRcSCSQnGjXCgUi+uf7zgc+wrlSrV2/Hxl+eJcNL4rOx5jheZK98GWz0NM5Z+HbdanH6nPRMShiPh2ZG+jXpytlOd2OngAAAAAAAAAAAAAAAAAAAAYEPs7fP8/88fITp8d8NT5yW8YXl3zvx+/9AQMJP//w/CS/zC85D8ML/kPw0v+w/CS/zC85D8ML/kPAAAAAAAAAAAAAAAAAAAAAAAAAAAAfXX2zJlsq6/dvzqb1ecurywvVC6fmEurC8XF5dnibGXpUnG+Upkvp8XZymK3v1euVC5NTcfylclaWq1NVldWzy1Wli/Wzl1YLM2n59KxZxIVAAAAAAAAAAAAAAAAAAAAPF+qK6sLpXI5XVJQ2FZhdDBOY3UhYiBO40Up7PTIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP/BcAAP//8NI25Q==") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r5) sendmsg$IEEE802154_LLSEC_SETPARAMS(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000003c0)={0x14, r6, 0x5, 0x0, 0xfffffffe, {0x22}}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) r7 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000001, 0x1}, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r7, 0x0) r8 = socket(0xa, 0x5, 0x0) listen(r8, 0x100) r9 = dup(r8) sendmsg$inet_sctp(r9, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x18}, 0x8050) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r4}, 0x4) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001500), 0x501, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r10, 0x400c330d, &(0x7f0000001080)={0x6, 0x203}) syz_emit_ethernet(0xc3, &(0x7f0000000f80)={@broadcast, @broadcast, @val={@void, {0x8100, 0x5, 0x1, 0x4}}, {@generic={0x9100, "23d34b77ababd30d30cbfc1d6cbb134d34ac2edaa55315d0433de8e32c83ae16dfd67384c574a5644adba03e25b39e747f87c9de6883411b9b9ac1d1461ae2439aa4687f8f2b4a1883502bc32a9dc4f15214882d6ac5a0ae3028397ea51bc0aa45f097c1b3be2dab5e3cdc213d115b97167c9aaee5f33784a664ba0901e19549bf63261967b1103527e7b294d63a4e54bf81dcb15770c35362b2f4aa9816dca5fdccee721cfc75dbc95cd1c0ce68d4c219"}}}, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x11, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfefff963}, [@call={0x85, 0x0, 0x0, 0xbc}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$XFS_IOC_FD_TO_HANDLE(0xffffffffffffffff, 0xc038586a, &(0x7f0000000500)={r11, &(0x7f0000000200)='dioread_lock', 0x800, &(0x7f00000002c0)={@align=0xe8, {0x2, 0x7, 0xcd93}}, 0x1, &(0x7f0000000300), &(0x7f0000000480)=0x6}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r12, 0x0, 0x0, 0x2e, &(0x7f0000000100), 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) getxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0xfffffc81) openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x20) 398.915156ms ago: executing program 0 (id=2143): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000100001042dbd7000000000000000ffff", @ANYRES32=0x0, @ANYBLOB="000000000000000024001280090001007866726d000000001400028008000200ea0000000800010001000000140003007866726d300000000000000002000000"], 0x58}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ptrace$peeksig(0x4209, 0x0, 0x0, &(0x7f0000000300)=[{}, {}, {}]) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_io_uring_setup(0x47a8, &(0x7f0000000740)={0x0, 0x46b6, 0x8, 0x80000, 0x200}, &(0x7f0000000180), &(0x7f0000000700), &(0x7f0000000000)) io_setup(0x239f, 0x0) syz_io_uring_setup(0x10278e, &(0x7f0000000000)={0x0, 0x4c1f, 0x10, 0x0, 0x200004}, &(0x7f0000000200), 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000000)={0x3, 0x0, 0xc52}) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x30da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {0x9, 0x1}, 0x3, 0x4, &(0x7f0000000040)={0x5, 0x17, 0x84b6, 0x4, 0x4}, 0x8, 0x7, 0x0, 0x0, 0x8001, 0x0, &(0x7f0000000100)}) r6 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757813"], 0x65) getpgrp(0x0) gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x182, 0x6}, 0x110020, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000001, 0x4c032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4) accept$unix(r2, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) 377.682367ms ago: executing program 1 (id=2144): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) io_setup(0xb, &(0x7f00000003c0)) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[], 0xff2e) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x80042, 0x0) ioctl$PTP_PEROUT_REQUEST2(r1, 0x40383d0c, &(0x7f0000000040)={{0xfffffffffffffffd, 0x4}, {0xffffffff, 0x20000201}, 0x1, 0x2}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3000490, &(0x7f00000002c0), 0x45, 0x7b1, &(0x7f0000000c80)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r3, &(0x7f0000000a00)="c7", 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_INPUT(r4, &(0x7f0000010140)={0x8, {"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", 0x1000}}, 0x1006) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r4, 0x0) sendfile(r3, r2, 0x0, 0x3ffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@gettaction={0x18, 0x32, 0xe72c5f922f23cad9, 0x70bd28, 0x25dfdbf7, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xc1920335b598980a}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, 0x0}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FIONREAD(r5, 0x541b, &(0x7f0000000180)) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a32000000002c0003800800014000000000180003801400010076657468315f00005f626f6e64000000080002400000000064000000160a0101000b000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00038014"], 0x104}, 0x1, 0x0, 0x0, 0x10004000}, 0x20004080) 323.193709ms ago: executing program 3 (id=2145): timer_create(0x2, 0x0, &(0x7f0000000600)=0x0) timer_settime(r0, 0x1, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) syz_clone3(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x0], 0x1}, 0x58) timer_settime(r0, 0xca9a3b, &(0x7f0000000200), &(0x7f00000002c0)) 167.181505ms ago: executing program 2 (id=2146): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x7, 0x7ffc0001}]}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x1}, 0x204, 0x0, 0xfff, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 166.651395ms ago: executing program 2 (id=2147): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) unshare(0x22020400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x6, 0x9, &(0x7f0000001080)={{0x1d, @multicast2, 0x4e22, 0x0, 'ovf\x00', 0x17, 0x5, 0x58}, {@broadcast, 0x2, 0x2000, 0x7ffffff, 0x0, 0x20100}}, 0x44) 63.184478ms ago: executing program 2 (id=2148): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="24000000390009000000000000000000010000000400000004000180080002"], 0x24}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="000022f0bae5670bc70eaaaaaaaaaabb86dd615efdc2001c2c00fe880000000000000000000000000001ff0100000000000000000000000000012f"], 0x56) 62.601348ms ago: executing program 3 (id=2149): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0600000004030000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007baaf8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x94) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x6a) write$binfmt_elf32(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="7f454c460007ff84ff7f0000000000000300060003000000a400000038000000aa00000007000000a70b2000010026840400000000000000030000000700020000000000ff070000c300"], 0x58) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x5, 0xe, 0x0, &(0x7f0000000380)="2eb33d2ab87cded491710d000000", 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3c) close(r1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @empty}, &(0x7f0000000080)=0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_setup(0x5f8d, &(0x7f00000000c0)={0x0, 0x4178, 0x10, 0x8009002, 0x34b}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x7, 0x6, "efc3d3", 0x40, 0x3a, 0xff, @ipv4={'\x00', '\xff\xff', @local}, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0xffff, {0x5, 0x6, "5436ea", 0x400, 0x88, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00', [@dstopts={0x0, 0x0, '\x00', [@padn, @pad1]}]}}}}}}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="df33c98e16a6009e62476f000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) 23.97274ms ago: executing program 3 (id=2150): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x3, 0x10616, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100, 0x2}, 0x200, 0x1fb, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @rand_addr=0x64010102}}}], 0x20}}], 0x1, 0x20010) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) splice(r5, 0x0, r6, 0x0, 0xf3a, 0x0) tee(r2, r6, 0x8f5, 0x100000000000000) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, 0x0) write(r4, 0x0, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x20, 0xa, 0xa, 0x801, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x16) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027f"], 0x57) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 0s ago: executing program 2 (id=2151): r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800, 0x0, 0x2000000000903, 0x1, 0x0, 0x3}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='smaps_rollup\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/28, 0x1c}], 0x1, 0x300, 0x0) listen(r1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)="5c00000012006bab9e3fe3d86e6c1d000014a10d00000000000004b68675f8001d000a00a0e69ee517d34460bc24eab556a705251e6182949a36c23d3b48dffefffffffffffffff60a64c9f4080003fe060100000400020015b53631", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x44010) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000600)={{r3}, "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"}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e23, 0x6, @remote, 0x4}, 0x1c) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x4e22, 0x80000003, @empty, 0x8}, 0x1c) listen(r4, 0x200204) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x5}}}}}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xefff, 0x1040}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'ip6gre0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000140)) 0s ago: executing program 3 (id=2152): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800700, &(0x7f00000007c0)={[{@nodioread_nolock}, {@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@nouid32}, {@resgid}, {@acl}, {}]}, 0x1, 0x47d, &(0x7f0000000200)="$eJzs281rHOUfAPDvTF7a/vqS/Gp9aa0aLUJQTJq0agUvioJIRUEP9RiTbQndNtJEsbXYVMSTIAU9ingU/Qu8iSDqSfDqyZMUivbS1lNkZmfSzXa3sWbTicnnA7N5npln93m+mbdnn2c2gA1rKHtJIrZFxK8RMdDILi0w1Phz9fLZyWuXz04msbDw6h9JXu7K5bOTZdHyfVuLzHAakX6QFJUsNXv6zPGJer12qsiPzp14c3T29JnH3j4xcax2rHZy/NChgwfGnnxi/PGuxJnFdWXPezN7d7/w+oWXJo9ceOPHr7P2biu2N8fRLUNZ4H8u5Fq3Pdztyiq2vSmd9FbYEG5JT0Rku6svP/8Hoieu77yBeP79ShsHrKrs3rSp8+b5BWAdS6LqFgDVKG/02fffcrlNXY814dIzjS9AWdxXi6WxpTfSokxfy/fbbhqKiCPzf32eLbFK4xAAAM0+mvz0cH9EvHvtqxezvsdARJTjQXflr7/lrzuKOZTBiPh/ROyMiDsiYldE3FmUvTsi7llhe27s/6QX25V7Kl1hRYWs//d0Mbe1tP+3WMFgT5Hbnsfflxydrtf2F/+T4ejblOXHblLHt8/98nGnbc39v2zJ6i/7gkU7Lva2DNBNTcxN5J3SLrh0PmJPb7v4k8WZgCQidkfEnvYf8VmHj95RJqYf+XJvp/qXj/8mujDPtPBFFt58Fv98tMRfSprnJ6dvmJ8c3Rz12v7R8qi40U8/f/hKp/pXFH8XXKo1/jbt/9Yig0nzfO1sd+v/l8d/2p+8ls8z9xfr3pmYmzs1FtGfHM7zS9aPX39vmS/LZ8f/8L725//O4j1Z/PdGRHYQ3xcR90fEA0XbH4yIhyJi301i/OHZ5eOPtKL9fz5iqu31b/H4b9n/t57oOf79N53q/2f7/2CeGi7W5Ne/ZbRrTna5aG3gSv53AAAA8F+R5s/AJ+nIYjpNR0Yaz/Dviv+l9ZnZuUePzrx1cqrxrPxg9KXlSNdAMR5an67XxpL54hMb46PjxVhxOV56oBg3/qRnS54fmZypT1UcO2x0Wzuc/5nfe6puHbDKtrRdO95/2xsCVKB1Hr3l2YpzL4eLAaxXfq8NG9cy53/z72CAdcb9Hzauduf/uZa8uQBYn9z/YeO6hfPfGACsJ+l3VbcAqJD+P2xIK/ld/yomNq+NZlSTWKs7JU9ElIm061VErIEAJRqJqq9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3fF3AAAA//8g5+aQ") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x4, 0x3c, 0x67, 0x0, 0x3, 0x6, 0x0, @loopback, @multicast2}, @payload_named={{{{{0x28, 0x0, 0x0, 0x1, 0x1, 0xa, 0x2, 0x2, 0xfff9, 0x0, 0x2, 0x9, 0x5, 0x2, 0xd04, 0x6, 0x3, 0x4e22, 0x4e24}, 0x4, 0x1}, 0x3, 0x1}}}}}}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01002dbd7040fcdbdf251b00000008009a00"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800700, &(0x7f00000007c0)={[{@nodioread_nolock}, {@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@nouid32}, {@resgid}, {@acl}, {}]}, 0x1, 0x47d, &(0x7f0000000200)="$eJzs281rHOUfAPDvTF7a/vqS/Gp9aa0aLUJQTJq0agUvioJIRUEP9RiTbQndNtJEsbXYVMSTIAU9ingU/Qu8iSDqSfDqyZMUivbS1lNkZmfSzXa3sWbTicnnA7N5npln93m+mbdnn2c2gA1rKHtJIrZFxK8RMdDILi0w1Phz9fLZyWuXz04msbDw6h9JXu7K5bOTZdHyfVuLzHAakX6QFJUsNXv6zPGJer12qsiPzp14c3T29JnH3j4xcax2rHZy/NChgwfGnnxi/PGuxJnFdWXPezN7d7/w+oWXJo9ceOPHr7P2biu2N8fRLUNZ4H8u5Fq3Pdztyiq2vSmd9FbYEG5JT0Rku6svP/8Hoieu77yBeP79ShsHrKrs3rSp8+b5BWAdS6LqFgDVKG/02fffcrlNXY814dIzjS9AWdxXi6WxpTfSokxfy/fbbhqKiCPzf32eLbFK4xAAAM0+mvz0cH9EvHvtqxezvsdARJTjQXflr7/lrzuKOZTBiPh/ROyMiDsiYldE3FmUvTsi7llhe27s/6QX25V7Kl1hRYWs//d0Mbe1tP+3WMFgT5Hbnsfflxydrtf2F/+T4ejblOXHblLHt8/98nGnbc39v2zJ6i/7gkU7Lva2DNBNTcxN5J3SLrh0PmJPb7v4k8WZgCQidkfEnvYf8VmHj95RJqYf+XJvp/qXj/8mujDPtPBFFt58Fv98tMRfSprnJ6dvmJ8c3Rz12v7R8qi40U8/f/hKp/pXFH8XXKo1/jbt/9Yig0nzfO1sd+v/l8d/2p+8ls8z9xfr3pmYmzs1FtGfHM7zS9aPX39vmS/LZ8f/8L725//O4j1Z/PdGRHYQ3xcR90fEA0XbH4yIhyJi301i/OHZ5eOPtKL9fz5iqu31b/H4b9n/t57oOf79N53q/2f7/2CeGi7W5Ne/ZbRrTna5aG3gSv53AAAA8F+R5s/AJ+nIYjpNR0Yaz/Dviv+l9ZnZuUePzrx1cqrxrPxg9KXlSNdAMR5an67XxpL54hMb46PjxVhxOV56oBg3/qRnS54fmZypT1UcO2x0Wzuc/5nfe6puHbDKtrRdO95/2xsCVKB1Hr3l2YpzL4eLAaxXfq8NG9cy53/z72CAdcb9Hzauduf/uZa8uQBYn9z/YeO6hfPfGACsJ+l3VbcAqJD+P2xIK/ld/yomNq+NZlSTWKs7JU9ElIm061VErIEAJRqJqq9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3fF3AAAA//8g5+aQ") (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x4, 0x3c, 0x67, 0x0, 0x3, 0x6, 0x0, @loopback, @multicast2}, @payload_named={{{{{0x28, 0x0, 0x0, 0x1, 0x1, 0xa, 0x2, 0x2, 0xfff9, 0x0, 0x2, 0x9, 0x5, 0x2, 0xd04, 0x6, 0x3, 0x4e22, 0x4e24}, 0x4, 0x1}, 0x3, 0x1}}}}}}}, 0x0) (async) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01002dbd7040fcdbdf251b00000008009a00"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) (async) kernel console output (not intermixed with test programs): 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 231.051995][ T7712] RSP: 002b:00007fd79005f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 231.052016][ T7712] RAX: ffffffffffffffda RBX: 00007fd791885fa0 RCX: 00007fd79160c819 [ 231.052028][ T7712] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 231.052039][ T7712] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 231.052050][ T7712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.052061][ T7712] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 231.052080][ T7712] [ 231.448482][ T7720] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1123'. [ 231.457614][ T7720] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1123'. [ 231.474426][ T7720] gretap0: entered promiscuous mode [ 231.483456][ T7720] gretap0: left promiscuous mode [ 231.648447][ T7726] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1123'. [ 231.657523][ T7726] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1123'. [ 232.793486][ T7770] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1141'. [ 232.822583][ T7770] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1141'. [ 233.068274][ T7783] FAULT_INJECTION: forcing a failure. [ 233.068274][ T7783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.107332][ T7783] CPU: 0 UID: 0 PID: 7783 Comm: syz.2.1146 Not tainted syzkaller #0 PREEMPT(full) [ 233.107361][ T7783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 233.107389][ T7783] Call Trace: [ 233.107398][ T7783] [ 233.107406][ T7783] __dump_stack+0x1d/0x30 [ 233.107431][ T7783] dump_stack_lvl+0x95/0xd0 [ 233.107450][ T7783] dump_stack+0x15/0x1b [ 233.107469][ T7783] should_fail_ex+0x263/0x280 [ 233.107548][ T7783] should_fail+0xb/0x20 [ 233.107571][ T7783] should_fail_usercopy+0x1a/0x20 [ 233.107640][ T7783] _copy_to_user+0x20/0xa0 [ 233.107750][ T7783] simple_read_from_buffer+0xb5/0x130 [ 233.107776][ T7783] proc_fail_nth_read+0x10e/0x150 [ 233.107802][ T7783] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 233.107886][ T7783] vfs_read+0x1ab/0x7f0 [ 233.107906][ T7783] ? kmem_cache_free+0xc8/0x380 [ 233.107948][ T7783] ? putname+0x7c/0xc0 [ 233.107970][ T7783] ksys_read+0xdc/0x1a0 [ 233.107986][ T7783] __x64_sys_read+0x40/0x50 [ 233.108002][ T7783] x64_sys_call+0x2886/0x3020 [ 233.108062][ T7783] do_syscall_64+0x12c/0x370 [ 233.108206][ T7783] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.108357][ T7783] RIP: 0033:0x7f52e70cd04e [ 233.108375][ T7783] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 233.108392][ T7783] RSP: 002b:00007f52e5b5efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 233.108473][ T7783] RAX: ffffffffffffffda RBX: 00007f52e5b5f6c0 RCX: 00007f52e70cd04e [ 233.108488][ T7783] RDX: 000000000000000f RSI: 00007f52e5b5f0a0 RDI: 0000000000000003 [ 233.108535][ T7783] RBP: 00007f52e5b5f090 R08: 0000000000000000 R09: 0000000000000000 [ 233.108546][ T7783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.108631][ T7783] R13: 00007f52e7386038 R14: 00007f52e7385fa0 R15: 00007ffd6b70a428 [ 233.108652][ T7783] [ 233.335968][ T7791] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1150'. [ 233.364604][ T7791] FAULT_INJECTION: forcing a failure. [ 233.364604][ T7791] name failslab, interval 1, probability 0, space 0, times 0 [ 233.399108][ T7791] CPU: 0 UID: 0 PID: 7791 Comm: syz.1.1150 Not tainted syzkaller #0 PREEMPT(full) [ 233.399154][ T7791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 233.399167][ T7791] Call Trace: [ 233.399175][ T7791] [ 233.399183][ T7791] __dump_stack+0x1d/0x30 [ 233.399211][ T7791] dump_stack_lvl+0x95/0xd0 [ 233.399310][ T7791] dump_stack+0x15/0x1b [ 233.399327][ T7791] should_fail_ex+0x263/0x280 [ 233.399353][ T7791] ? alloc_netdev_mqs+0x7cc/0xa40 [ 233.399411][ T7791] should_failslab+0x8c/0xb0 [ 233.399430][ T7791] __kmalloc_cache_noprof+0x5f/0x410 [ 233.399456][ T7791] alloc_netdev_mqs+0x7cc/0xa40 [ 233.399545][ T7791] rtnl_create_link+0x239/0x720 [ 233.399648][ T7791] rtnl_newlink_create+0x174/0x650 [ 233.399713][ T7791] ? security_capable+0x7b/0x90 [ 233.399763][ T7791] ? netlink_ns_capable+0x86/0xa0 [ 233.399809][ T7791] rtnl_newlink+0x10a0/0x1330 [ 233.399840][ T7791] ? __memcg_slab_free_hook+0x14b/0x240 [ 233.399871][ T7791] ? __rcu_read_unlock+0x4e/0x70 [ 233.399939][ T7791] ? avc_has_perm_noaudit+0xab/0x130 [ 233.399983][ T7791] ? cred_has_capability+0x224/0x2a0 [ 233.400012][ T7791] ? selinux_capable+0x31/0x40 [ 233.400043][ T7791] ? security_capable+0x7b/0x90 [ 233.400070][ T7791] ? ns_capable+0x7c/0xb0 [ 233.400117][ T7791] ? __pfx_rtnl_newlink+0x10/0x10 [ 233.400149][ T7791] rtnetlink_rcv_msg+0x64b/0x720 [ 233.400175][ T7791] netlink_rcv_skb+0x123/0x220 [ 233.400205][ T7791] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 233.400307][ T7791] rtnetlink_rcv+0x1c/0x30 [ 233.400328][ T7791] netlink_unicast+0x5c0/0x690 [ 233.400358][ T7791] netlink_sendmsg+0x5c8/0x6f0 [ 233.400405][ T7791] ? __pfx_netlink_sendmsg+0x10/0x10 [ 233.400425][ T7791] ____sys_sendmsg+0x563/0x5b0 [ 233.400501][ T7791] ___sys_sendmsg+0x195/0x1e0 [ 233.400531][ T7791] __x64_sys_sendmsg+0xd4/0x160 [ 233.400642][ T7791] x64_sys_call+0x194c/0x3020 [ 233.400686][ T7791] do_syscall_64+0x12c/0x370 [ 233.400714][ T7791] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.400752][ T7791] RIP: 0033:0x7fbbf962c819 [ 233.400770][ T7791] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 233.400790][ T7791] RSP: 002b:00007fbbf807f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.400813][ T7791] RAX: ffffffffffffffda RBX: 00007fbbf98a5fa0 RCX: 00007fbbf962c819 [ 233.400829][ T7791] RDX: 0000000020040000 RSI: 0000200000000000 RDI: 0000000000000003 [ 233.400856][ T7791] RBP: 00007fbbf807f090 R08: 0000000000000000 R09: 0000000000000000 [ 233.400896][ T7791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.400910][ T7791] R13: 00007fbbf98a6038 R14: 00007fbbf98a5fa0 R15: 00007ffeba4e16e8 [ 233.400929][ T7791] [ 233.766446][ T7805] FAULT_INJECTION: forcing a failure. [ 233.766446][ T7805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.812297][ T7805] CPU: 0 UID: 0 PID: 7805 Comm: syz.3.1156 Not tainted syzkaller #0 PREEMPT(full) [ 233.812326][ T7805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 233.812350][ T7805] Call Trace: [ 233.812356][ T7805] [ 233.812364][ T7805] __dump_stack+0x1d/0x30 [ 233.812391][ T7805] dump_stack_lvl+0x95/0xd0 [ 233.812411][ T7805] dump_stack+0x15/0x1b [ 233.812488][ T7805] should_fail_ex+0x263/0x280 [ 233.812553][ T7805] should_fail+0xb/0x20 [ 233.812572][ T7805] should_fail_usercopy+0x1a/0x20 [ 233.812621][ T7805] _copy_to_user+0x20/0xa0 [ 233.812649][ T7805] put_itimerspec64+0x72/0x130 [ 233.812670][ T7805] __x64_sys_timer_settime+0x11a/0x160 [ 233.812721][ T7805] x64_sys_call+0x284f/0x3020 [ 233.812743][ T7805] do_syscall_64+0x12c/0x370 [ 233.812767][ T7805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.812805][ T7805] RIP: 0033:0x7f4437dbc819 [ 233.812819][ T7805] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 233.812845][ T7805] RSP: 002b:00007f443680f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 233.812865][ T7805] RAX: ffffffffffffffda RBX: 00007f4438035fa0 RCX: 00007f4437dbc819 [ 233.812877][ T7805] RDX: 0000200000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 233.812906][ T7805] RBP: 00007f443680f090 R08: 0000000000000000 R09: 0000000000000000 [ 233.812917][ T7805] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 233.812929][ T7805] R13: 00007f4438036038 R14: 00007f4438035fa0 R15: 00007fffbbb53c28 [ 233.812945][ T7805] [ 234.469703][ T7841] FAULT_INJECTION: forcing a failure. [ 234.469703][ T7841] name failslab, interval 1, probability 0, space 0, times 0 [ 234.510118][ T7841] CPU: 1 UID: 0 PID: 7841 Comm: syz.0.1170 Not tainted syzkaller #0 PREEMPT(full) [ 234.510177][ T7841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 234.510188][ T7841] Call Trace: [ 234.510196][ T7841] [ 234.510204][ T7841] __dump_stack+0x1d/0x30 [ 234.510230][ T7841] dump_stack_lvl+0x95/0xd0 [ 234.510254][ T7841] dump_stack+0x15/0x1b [ 234.510311][ T7841] should_fail_ex+0x263/0x280 [ 234.510336][ T7841] should_failslab+0x8c/0xb0 [ 234.510361][ T7841] kmem_cache_alloc_noprof+0x66/0x400 [ 234.510385][ T7841] ? audit_log_start+0x34c/0x730 [ 234.510441][ T7841] audit_log_start+0x34c/0x730 [ 234.510459][ T7841] ? kstrtouint_from_user+0xa8/0xf0 [ 234.510586][ T7841] audit_seccomp+0x47/0x100 [ 234.510617][ T7841] ? __seccomp_filter+0x8db/0x1350 [ 234.510645][ T7841] __seccomp_filter+0x8ec/0x1350 [ 234.510685][ T7841] ? __rcu_read_unlock+0x4e/0x70 [ 234.510714][ T7841] ? __fget_files+0x184/0x1c0 [ 234.510738][ T7841] ? mutex_lock+0x57/0x90 [ 234.510757][ T7841] ? mutex_unlock+0x4e/0x90 [ 234.510823][ T7841] __secure_computing+0x81/0x150 [ 234.510905][ T7841] do_syscall_64+0xd3/0x370 [ 234.510993][ T7841] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 234.511035][ T7841] RIP: 0033:0x7fd79160c819 [ 234.511058][ T7841] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 234.511080][ T7841] RSP: 002b:00007fd79005f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000041 [ 234.511102][ T7841] RAX: ffffffffffffffda RBX: 00007fd791885fa0 RCX: 00007fd79160c819 [ 234.511115][ T7841] RDX: 0000000000000001 RSI: 0000200000000340 RDI: 0000000000000000 [ 234.511127][ T7841] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 234.511155][ T7841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.511167][ T7841] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 234.511186][ T7841] [ 234.513221][ T7841] audit_log_lost: 575 callbacks suppressed [ 234.513255][ T7841] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 234.558009][ T28] audit: type=1326 audit(1775602503.572:2625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd79160c819 code=0x7ffc0000 [ 234.632378][ T7841] audit: out of memory in audit_log_start [ 234.655896][ T28] audit: type=1326 audit(1775602503.572:2626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd79160c819 code=0x7ffc0000 [ 234.775675][ T28] audit: type=1326 audit(1775602503.572:2627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd79160c819 code=0x7ffc0000 [ 234.799432][ T28] audit: type=1326 audit(1775602503.572:2628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd79160c819 code=0x7ffc0000 [ 234.823116][ T28] audit: type=1326 audit(1775602503.572:2629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd79160c819 code=0x7ffc0000 [ 234.846720][ T28] audit: type=1326 audit(1775602503.572:2630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd7915cd04e code=0x7ffc0000 [ 234.870487][ T28] audit: type=1326 audit(1775602503.572:2631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd7915cd04e code=0x7ffc0000 [ 234.894844][ T28] audit: type=1326 audit(1775602503.572:2632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1170" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd7915cd04e code=0x7ffc0000 [ 234.971862][ T7846] xt_CT: No such helper "pptp" [ 235.034872][ T7853] FAULT_INJECTION: forcing a failure. [ 235.034872][ T7853] name failslab, interval 1, probability 0, space 0, times 0 [ 235.061232][ T7853] CPU: 0 UID: 0 PID: 7853 Comm: syz.1.1175 Not tainted syzkaller #0 PREEMPT(full) [ 235.061315][ T7853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 235.061325][ T7853] Call Trace: [ 235.061333][ T7853] [ 235.061342][ T7853] __dump_stack+0x1d/0x30 [ 235.061367][ T7853] dump_stack_lvl+0x95/0xd0 [ 235.061388][ T7853] dump_stack+0x15/0x1b [ 235.061462][ T7853] should_fail_ex+0x263/0x280 [ 235.061490][ T7853] should_failslab+0x8c/0xb0 [ 235.061560][ T7853] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 235.061669][ T7853] ? sidtab_sid2str_get+0xa0/0x130 [ 235.061754][ T7853] ? sidtab_sid2str_put+0x1b5/0x360 [ 235.061779][ T7853] kmemdup_noprof+0x2b/0x70 [ 235.061796][ T7853] sidtab_sid2str_get+0xa0/0x130 [ 235.061847][ T7853] security_sid_to_context_core+0x1eb/0x2e0 [ 235.061872][ T7853] security_sid_to_context+0x27/0x40 [ 235.061895][ T7853] avc_audit_post_callback+0x10f/0x540 [ 235.061934][ T7853] ? audit_log_lsm_data+0x700/0xbb0 [ 235.061954][ T7853] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 235.062003][ T7853] common_lsm_audit+0x1ba/0x230 [ 235.062061][ T7853] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 235.062126][ T7853] slow_avc_audit+0x14c/0x190 [ 235.062217][ T7853] avc_has_perm+0x144/0x190 [ 235.062307][ T7853] selinux_mount+0x2a3/0x2f0 [ 235.062330][ T7853] security_sb_mount+0x5b/0xa0 [ 235.062390][ T7853] ? path_mount+0x89/0xbc0 [ 235.062408][ T7853] path_mount+0xa9/0xbc0 [ 235.062455][ T7853] __se_sys_mount+0x28c/0x2e0 [ 235.062547][ T7853] ? fput+0x8f/0xc0 [ 235.062570][ T7853] __x64_sys_mount+0x67/0x80 [ 235.062589][ T7853] x64_sys_call+0x2d61/0x3020 [ 235.062615][ T7853] do_syscall_64+0x12c/0x370 [ 235.062681][ T7853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 235.062701][ T7853] RIP: 0033:0x7fbbf962c819 [ 235.062719][ T7853] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.062742][ T7853] RSP: 002b:00007fbbf807f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.062764][ T7853] RAX: ffffffffffffffda RBX: 00007fbbf98a5fa0 RCX: 00007fbbf962c819 [ 235.062815][ T7853] RDX: 0000200000004500 RSI: 00002000000000c0 RDI: 0000000000000000 [ 235.062826][ T7853] RBP: 00007fbbf807f090 R08: 0000200000000580 R09: 0000000000000000 [ 235.062838][ T7853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.062849][ T7853] R13: 00007fbbf98a6038 R14: 00007fbbf98a5fa0 R15: 00007ffeba4e16e8 [ 235.062865][ T7853] [ 235.333463][ T7856] IPv6: Can't replace route, no match found [ 235.407155][ T7863] netlink: 56 bytes leftover after parsing attributes in process `syz.1.1179'. [ 235.556210][ T7869] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1182'. [ 235.584795][ T7869] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1182'. [ 235.593856][ T7869] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1182'. [ 235.635170][ T7869] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1182'. [ 235.645262][ T7869] netlink: 'syz.1.1182': attribute type 6 has an invalid length. [ 236.075031][ T7894] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 236.104254][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.118933][ T7894] bridge_slave_1: left allmulticast mode [ 236.135023][ T7894] bridge_slave_1: left promiscuous mode [ 236.145266][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.170649][ T7894] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 236.791879][ T7929] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1205'. [ 236.837939][ T7934] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1206'. [ 236.851315][ T7934] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1206'. [ 238.957693][ T7937] Bluetooth: hci0: command 0x1003 tx timeout [ 238.963861][ T3919] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 239.580501][ T28] kauditd_printk_skb: 601 callbacks suppressed [ 239.580518][ T28] audit: type=1400 audit(1775602508.597:3234): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.615206][ T28] audit: type=1400 audit(1775602508.637:3235): avc: denied { watch watch_reads } for pid=8017 comm="syz.0.1237" path="/243" dev="tmpfs" ino=1290 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 239.639239][ T28] audit: type=1400 audit(1775602508.657:3236): avc: denied { prog_load } for pid=8021 comm="syz.3.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.659623][ T28] audit: type=1400 audit(1775602508.657:3237): avc: denied { prog_load } for pid=8021 comm="syz.3.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.679934][ T28] audit: type=1400 audit(1775602508.657:3238): avc: denied { open } for pid=8021 comm="syz.3.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 239.700102][ T28] audit: type=1400 audit(1775602508.657:3239): avc: denied { read write } for pid=8021 comm="syz.3.1238" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 239.724252][ T28] audit: type=1400 audit(1775602508.657:3240): avc: denied { open } for pid=8021 comm="syz.3.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 239.744686][ T28] audit: type=1400 audit(1775602508.667:3241): avc: denied { read write } for pid=8021 comm="syz.3.1238" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.770346][ T28] audit: type=1400 audit(1775602508.766:3242): avc: denied { create } for pid=8021 comm="syz.3.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 239.953075][ T28] audit: type=1400 audit(1775602508.965:3243): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 240.934600][ T3319] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 240.979006][ T3319] CPU: 1 UID: 0 PID: 3319 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) [ 240.979035][ T3319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 240.979049][ T3319] Call Trace: [ 240.979057][ T3319] [ 240.979066][ T3319] __dump_stack+0x1d/0x30 [ 240.979103][ T3319] dump_stack_lvl+0x95/0xd0 [ 240.979123][ T3319] dump_stack+0x15/0x1b [ 240.979145][ T3319] dump_header+0x80/0x240 [ 240.979170][ T3319] oom_kill_process+0x295/0x350 [ 240.979194][ T3319] out_of_memory+0x97d/0xb80 [ 240.979253][ T3319] try_charge_memcg+0x62e/0xa10 [ 240.979296][ T3319] mem_cgroup_swapin_charge_folio+0x103/0x1f0 [ 240.979377][ T3319] __swap_cache_prepare_and_add+0x67/0x460 [ 240.979409][ T3319] ? alloc_pages_mpol+0x217/0x260 [ 240.979472][ T3319] swap_cache_alloc_folio+0xa2/0x120 [ 240.979502][ T3319] swap_cluster_readahead+0x26e/0x3d0 [ 240.979536][ T3319] swapin_readahead+0xde/0x840 [ 240.979621][ T3319] ? __rcu_read_unlock+0x4e/0x70 [ 240.979644][ T3319] ? __perf_event_task_sched_in+0xa65/0xad0 [ 240.979670][ T3319] ? __list_add_valid_or_report+0x38/0xe0 [ 240.979693][ T3319] ? __rcu_read_unlock+0x4e/0x70 [ 240.979815][ T3319] ? swap_cache_get_folio+0x26f/0x280 [ 240.979838][ T3319] do_swap_page+0x2fe/0x21e0 [ 240.979864][ T3319] ? __schedule+0x93c/0xd40 [ 240.979893][ T3319] ? __rcu_read_lock+0x36/0x50 [ 240.979970][ T3319] ? pte_offset_map_rw_nolock+0x19e/0x200 [ 240.979999][ T3319] handle_mm_fault+0xb46/0x3020 [ 240.980026][ T3319] ? vma_start_read+0x1c7/0x2c0 [ 240.980120][ T3319] do_user_addr_fault+0x62f/0x1050 [ 240.980149][ T3319] ? trace_page_fault_user+0x1f/0xe0 [ 240.980302][ T3319] exc_page_fault+0x62/0xa0 [ 240.980320][ T3319] asm_exc_page_fault+0x26/0x30 [ 240.980340][ T3319] RIP: 0033:0x7fd7915c7997 [ 240.980410][ T3319] Code: 48 89 fa 4c 89 df e8 a8 56 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 240.980425][ T3319] RSP: 002b:00007ffcb8d186d0 EFLAGS: 00010202 [ 240.980442][ T3319] RAX: 0000000000000000 RBX: 0000555567dce500 RCX: 00007fd7915c7997 [ 240.980533][ T3319] RDX: 00007ffcb8d18710 RSI: 0000000000000000 RDI: 0000000000000000 [ 240.980544][ T3319] RBP: 00007ffcb8d1877c R08: 0000000000000000 R09: 0000000000000000 [ 240.980557][ T3319] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 240.980568][ T3319] R13: 00000000000927c0 R14: 000000000003adae R15: 00007ffcb8d187d0 [ 240.980585][ T3319] [ 241.262697][ T3319] memory: usage 44880kB, limit 307200kB, failcnt 93 [ 241.289227][ T3319] memory+swap: usage 75436kB, limit 9007199254740988kB, failcnt 0 [ 241.384502][ T3319] kmem: usage 92244kB, limit 9007199254740988kB, failcnt 0 [ 241.441243][ T3319] Memory cgroup stats for /syz0: [ 241.441570][ T3319] cache 602112 [ 241.566010][ T3319] rss 65536 [ 241.589254][ T3319] shmem 0 [ 241.612806][ T3319] mapped_file 81920 [ 241.641511][ T3319] dirty 4096 [ 241.662353][ T3319] writeback 0 [ 241.692973][ T3319] workingset_refault_anon 37 [ 241.718314][ T3319] workingset_refault_file 119 [ 241.723053][ T3319] swap 839680 [ 241.728433][ T3319] swapcached 1064960 [ 241.732332][ T3319] pgpgin 226870 [ 241.745699][ T3319] pgpgout 226705 [ 241.749315][ T3319] pgfault 285061 [ 241.752898][ T3319] pgmajfault 32 [ 241.786103][ T3319] inactive_anon 0 [ 241.816192][ T3319] active_anon 73728 [ 241.820024][ T3319] inactive_file 77824 [ 241.834442][ T3319] active_file 524288 [ 241.839968][ T3319] unevictable 0 [ 241.843699][ T3319] hierarchical_memory_limit 314572800 [ 241.858977][ T3319] hierarchical_memsw_limit 9223372036854771712 [ 241.865258][ T3319] total_cache 602112 [ 241.869459][ T3319] total_rss 65536 [ 241.873519][ T3319] total_shmem 0 [ 241.877245][ T3319] total_mapped_file 81920 [ 241.881730][ T3319] total_dirty 4096 [ 241.890367][ T3319] total_writeback 0 [ 241.894508][ T3319] total_workingset_refault_anon 37 [ 241.906726][ T3319] total_workingset_refault_file 119 [ 241.918007][ T3319] total_swap 839680 [ 241.922590][ T3319] total_swapcached 1064960 [ 241.933132][ T3319] total_pgpgin 226870 [ 241.937937][ T3319] total_pgpgout 226705 [ 241.947246][ T3319] total_pgfault 285061 [ 241.951323][ T3319] total_pgmajfault 32 [ 241.987756][ T3319] total_inactive_anon 0 [ 241.992123][ T3319] total_active_anon 73728 [ 242.015692][ T3319] total_inactive_file 77824 [ 242.022473][ T3319] total_active_file 524288 [ 242.026936][ T3319] total_unevictable 0 [ 242.057709][ T3319] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.1247,pid=8045,uid=0 [ 242.102941][ T3319] Memory cgroup out of memory: OOM victim 8045 (syz.0.1247) is already exiting. Skip killing the task [ 242.321720][ T8085] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1260'. [ 242.331733][ T8085] netlink: 'syz.2.1260': attribute type 13 has an invalid length. [ 242.343075][ T8085] netlink: 'syz.2.1260': attribute type 17 has an invalid length. [ 242.461457][ T8098] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1264'. [ 242.504100][ T8098] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1264'. [ 242.529549][ T8098] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1264'. [ 242.538786][ T8098] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1264'. [ 242.547869][ T8098] netlink: 'syz.2.1264': attribute type 6 has an invalid length. [ 242.912998][ T8108] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1267'. [ 243.477483][ T8143] FAULT_INJECTION: forcing a failure. [ 243.477483][ T8143] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 243.507575][ T8143] CPU: 1 UID: 0 PID: 8143 Comm: syz.4.1280 Not tainted syzkaller #0 PREEMPT(full) [ 243.507680][ T8143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 243.507692][ T8143] Call Trace: [ 243.507698][ T8143] [ 243.507765][ T8143] __dump_stack+0x1d/0x30 [ 243.507806][ T8143] dump_stack_lvl+0x95/0xd0 [ 243.507860][ T8143] dump_stack+0x15/0x1b [ 243.507882][ T8143] should_fail_ex+0x263/0x280 [ 243.507916][ T8143] should_fail_alloc_page+0xf2/0x100 [ 243.507959][ T8143] __alloc_frozen_pages_noprof+0x108/0x360 [ 243.507995][ T8143] alloc_pages_mpol+0xb3/0x260 [ 243.508039][ T8143] ? css_rstat_updated+0xbb/0x280 [ 243.508057][ T8143] vma_alloc_folio_noprof+0x1a9/0x2f0 [ 243.508114][ T8143] handle_mm_fault+0x1129/0x3020 [ 243.508140][ T8143] ? vma_start_read+0x1c7/0x2c0 [ 243.508244][ T8143] do_user_addr_fault+0x62f/0x1050 [ 243.508346][ T8143] ? ksys_mmap_pgoff+0xc1/0x310 [ 243.508371][ T8143] ? fpregs_assert_state_consistent+0xb3/0xe0 [ 243.508400][ T8143] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 243.508424][ T8143] ? trace_page_fault_user+0x1f/0xe0 [ 243.508525][ T8143] exc_page_fault+0x62/0xa0 [ 243.508555][ T8143] asm_exc_page_fault+0x26/0x30 [ 243.508622][ T8143] RIP: 0033:0x7f197d443b98 [ 243.508638][ T8143] Code: 85 ed 74 3b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 243.508657][ T8143] RSP: 002b:00007f197bfde470 EFLAGS: 00010286 [ 243.508672][ T8143] RAX: 0000000000001000 RBX: 00007f197bfde530 RCX: 0000000000000001 [ 243.508754][ T8143] RDX: 0000000000000009 RSI: 0000000000000001 RDI: 00007f197bfde5d0 [ 243.508769][ T8143] RBP: 00000000000000db R08: 00007f1973bbf000 R09: 00000000000000ff [ 243.508783][ T8143] R10: 0000000000000000 R11: 00007f197bfde540 R12: 0000000000000001 [ 243.508797][ T8143] R13: 00007f197d642600 R14: 0000000000000000 R15: 00007f197bfde5d0 [ 243.508815][ T8143] [ 243.508924][ T8143] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 243.772990][ T8161] FAULT_INJECTION: forcing a failure. [ 243.772990][ T8161] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.786210][ T8161] CPU: 1 UID: 0 PID: 8161 Comm: syz.4.1287 Not tainted syzkaller #0 PREEMPT(full) [ 243.786268][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 243.786403][ T8161] Call Trace: [ 243.786410][ T8161] [ 243.786419][ T8161] __dump_stack+0x1d/0x30 [ 243.786446][ T8161] dump_stack_lvl+0x95/0xd0 [ 243.786470][ T8161] dump_stack+0x15/0x1b [ 243.786487][ T8161] should_fail_ex+0x263/0x280 [ 243.786532][ T8161] should_fail+0xb/0x20 [ 243.786615][ T8161] should_fail_usercopy+0x1a/0x20 [ 243.786642][ T8161] _copy_from_user+0x1c/0xb0 [ 243.786667][ T8161] kstrtouint_from_user+0x69/0xf0 [ 243.786776][ T8161] proc_fail_nth_write+0x50/0x160 [ 243.786808][ T8161] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 243.786840][ T8161] vfs_write+0x269/0x9f0 [ 243.786859][ T8161] ? __rcu_read_unlock+0x4e/0x70 [ 243.786881][ T8161] ? __fget_files+0x184/0x1c0 [ 243.786913][ T8161] ? mutex_lock+0x57/0x90 [ 243.786934][ T8161] ksys_write+0xdc/0x1a0 [ 243.786950][ T8161] __x64_sys_write+0x40/0x50 [ 243.786978][ T8161] x64_sys_call+0x27e1/0x3020 [ 243.786999][ T8161] do_syscall_64+0x12c/0x370 [ 243.787023][ T8161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 243.787126][ T8161] RIP: 0033:0x7f197d54d04e [ 243.787141][ T8161] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 243.787180][ T8161] RSP: 002b:00007f197bfdefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.787200][ T8161] RAX: ffffffffffffffda RBX: 00007f197bfdf6c0 RCX: 00007f197d54d04e [ 243.787214][ T8161] RDX: 0000000000000001 RSI: 00007f197bfdf0a0 RDI: 0000000000000003 [ 243.787225][ T8161] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 243.787252][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 243.787264][ T8161] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 243.787285][ T8161] [ 244.449547][ T8186] IPVS: set_ctl: invalid protocol: 58 172.20.20.187:20000 [ 244.616023][ T28] kauditd_printk_skb: 478 callbacks suppressed [ 244.616040][ T28] audit: type=1400 audit(1775602513.605:3722): avc: denied { name_bind } for pid=8171 comm="syz.3.1291" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 244.869661][ T28] audit: type=1400 audit(1775602513.655:3723): avc: denied { create } for pid=8190 comm="syz.4.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 244.966844][ T8201] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 244.973675][ T28] audit: type=1400 audit(1775602513.754:3724): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.128151][ T28] audit: type=1400 audit(1775602513.884:3725): avc: denied { execmem } for pid=8197 comm="syz.1.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 245.177867][ T28] audit: type=1400 audit(1775602513.903:3726): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.262873][ T28] audit: type=1400 audit(1775602513.903:3727): avc: denied { prog_load } for pid=8199 comm="syz.4.1300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.311490][ T28] audit: type=1400 audit(1775602513.903:3728): avc: denied { prog_load } for pid=8199 comm="syz.4.1300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.361809][ T28] audit: type=1400 audit(1775602513.903:3729): avc: denied { open } for pid=8199 comm="syz.4.1300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 245.406056][ T28] audit: type=1400 audit(1775602513.943:3730): avc: denied { prog_load } for pid=8197 comm="syz.1.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.464666][ T28] audit: type=1400 audit(1775602513.943:3731): avc: denied { prog_load } for pid=8197 comm="syz.1.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.528688][ T8238] netlink: 'syz.3.1312': attribute type 1 has an invalid length. [ 246.569736][ T8243] netlink: 'syz.4.1314': attribute type 8 has an invalid length. [ 246.577815][ T8243] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1314'. [ 246.605964][ T8238] veth3: entered promiscuous mode [ 246.612896][ T8238] bond2: (slave veth3): Enslaving as a backup interface with a down link [ 246.625733][ T8244] netlink: 'syz.4.1314': attribute type 8 has an invalid length. [ 246.663718][ T8245] netlink: 'syz.4.1314': attribute type 8 has an invalid length. [ 246.671627][ T8245] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1314'. [ 246.673879][ T8243] bond0: entered promiscuous mode [ 246.686061][ T8244] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1314'. [ 246.727731][ T8243] bond_slave_0: entered promiscuous mode [ 246.733755][ T8243] bond_slave_1: entered promiscuous mode [ 246.807564][ T8243] gretap0: entered promiscuous mode [ 246.838852][ T8243] batadv0: entered promiscuous mode [ 246.866980][ T8243] hsr1: entered promiscuous mode [ 248.605369][ T8337] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1350'. [ 248.615147][ T8337] FAULT_INJECTION: forcing a failure. [ 248.615147][ T8337] name fail_futex, interval 1, probability 0, space 0, times 1 [ 248.628624][ T8337] CPU: 0 UID: 0 PID: 8337 Comm: syz.4.1350 Not tainted syzkaller #0 PREEMPT(full) [ 248.628714][ T8337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 248.628726][ T8337] Call Trace: [ 248.628733][ T8337] [ 248.628741][ T8337] __dump_stack+0x1d/0x30 [ 248.628766][ T8337] dump_stack_lvl+0x95/0xd0 [ 248.628785][ T8337] dump_stack+0x15/0x1b [ 248.628843][ T8337] should_fail_ex+0x263/0x280 [ 248.628869][ T8337] should_fail+0xb/0x20 [ 248.628890][ T8337] get_futex_key+0x12f/0xbe0 [ 248.628914][ T8337] futex_wake_op+0xa3/0xa70 [ 248.628976][ T8337] ? kstrtouint_from_user+0xa8/0xf0 [ 248.629002][ T8337] do_futex+0x348/0x380 [ 248.629024][ T8337] __se_sys_futex+0x2f6/0x370 [ 248.629096][ T8337] ? mutex_unlock+0x4e/0x90 [ 248.629139][ T8337] __x64_sys_futex+0x78/0x90 [ 248.629162][ T8337] x64_sys_call+0x24ab/0x3020 [ 248.629183][ T8337] do_syscall_64+0x12c/0x370 [ 248.629237][ T8337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 248.629256][ T8337] RIP: 0033:0x7f197d58c819 [ 248.629271][ T8337] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 248.629290][ T8337] RSP: 002b:00007f197bfdf028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 248.629307][ T8337] RAX: ffffffffffffffda RBX: 00007f197d805fa0 RCX: 00007f197d58c819 [ 248.629320][ T8337] RDX: 0000000000000000 RSI: 0000000000000085 RDI: 0000000000000000 [ 248.629352][ T8337] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 00000000c5fffffd [ 248.629363][ T8337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.629466][ T8337] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 248.629483][ T8337] [ 248.640081][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.451798][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.483174][ T8361] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.491446][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.499801][ T8361] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.508392][ T12] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.522655][ T8361] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.530944][ T12] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.653230][ T28] kauditd_printk_skb: 340 callbacks suppressed [ 249.653258][ T28] audit: type=1400 audit(1775602518.596:4070): avc: denied { create } for pid=8363 comm="syz.3.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 249.686208][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 249.735331][ T28] audit: type=1400 audit(1775602518.596:4071): avc: denied { read } for pid=8363 comm="syz.3.1357" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 249.759411][ T28] audit: type=1400 audit(1775602518.596:4072): avc: denied { create } for pid=8363 comm="syz.3.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 249.780658][ T28] audit: type=1400 audit(1775602518.596:4073): avc: denied { create } for pid=8363 comm="syz.3.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 249.831899][ T28] audit: type=1400 audit(1775602518.596:4074): avc: denied { create } for pid=8363 comm="syz.3.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 249.902399][ T28] audit: type=1400 audit(1775602518.596:4075): avc: denied { module_request } for pid=8363 comm="syz.3.1357" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 249.943181][ T28] audit: type=1400 audit(1775602518.596:4076): avc: denied { sys_module } for pid=8363 comm="syz.3.1357" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 249.995153][ T8381] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 250.002302][ T28] audit: type=1400 audit(1775602518.596:4077): avc: denied { create } for pid=8363 comm="syz.3.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 250.002980][ T8381] audit: out of memory in audit_log_start [ 250.746707][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 251.058799][ T8417] syzkaller0: entered promiscuous mode [ 251.064540][ T8417] syzkaller0: entered allmulticast mode [ 251.116331][ T8421] FAULT_INJECTION: forcing a failure. [ 251.116331][ T8421] name failslab, interval 1, probability 0, space 0, times 0 [ 251.208251][ T8421] CPU: 1 UID: 0 PID: 8421 Comm: syz.4.1377 Not tainted syzkaller #0 PREEMPT(full) [ 251.208281][ T8421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 251.208294][ T8421] Call Trace: [ 251.208302][ T8421] [ 251.208310][ T8421] __dump_stack+0x1d/0x30 [ 251.208337][ T8421] dump_stack_lvl+0x95/0xd0 [ 251.208409][ T8421] dump_stack+0x15/0x1b [ 251.208507][ T8421] should_fail_ex+0x263/0x280 [ 251.208533][ T8421] should_failslab+0x8c/0xb0 [ 251.208567][ T8421] __kmalloc_noprof+0xb8/0x4e0 [ 251.208588][ T8421] ? iter_file_splice_write+0x101/0xa80 [ 251.208658][ T8421] iter_file_splice_write+0x101/0xa80 [ 251.208682][ T8421] ? atime_needs_update+0x3be/0x3e0 [ 251.208816][ T8421] ? shmem_file_splice_read+0x5c2/0x600 [ 251.208851][ T8421] ? __pfx_iter_file_splice_write+0x10/0x10 [ 251.208869][ T8421] direct_splice_actor+0x156/0x2a0 [ 251.208960][ T8421] ? shmem_file_write_iter+0xb1/0xf0 [ 251.208989][ T8421] splice_direct_to_actor+0x311/0x670 [ 251.209010][ T8421] ? __pfx_direct_splice_actor+0x10/0x10 [ 251.209065][ T8421] do_splice_direct+0x119/0x1a0 [ 251.209082][ T8421] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 251.209103][ T8421] do_sendfile+0x382/0x650 [ 251.209193][ T8421] __x64_sys_sendfile64+0xb8/0x150 [ 251.209271][ T8421] x64_sys_call+0x2dc4/0x3020 [ 251.209292][ T8421] do_syscall_64+0x12c/0x370 [ 251.209316][ T8421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 251.209395][ T8421] RIP: 0033:0x7f197d58c819 [ 251.209412][ T8421] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 251.209427][ T8421] RSP: 002b:00007f197bfdf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 251.209515][ T8421] RAX: ffffffffffffffda RBX: 00007f197d805fa0 RCX: 00007f197d58c819 [ 251.209528][ T8421] RDX: 0000200000001000 RSI: 0000000000000004 RDI: 0000000000000004 [ 251.209542][ T8421] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 251.209557][ T8421] R10: 0000000000000fec R11: 0000000000000246 R12: 0000000000000002 [ 251.209574][ T8421] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 251.209594][ T8421] [ 252.317160][ T8457] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1390'. [ 252.394793][ T8461] FAULT_INJECTION: forcing a failure. [ 252.394793][ T8461] name failslab, interval 1, probability 0, space 0, times 0 [ 252.408108][ T8457] netlink: 'syz.4.1390': attribute type 7 has an invalid length. [ 252.416109][ T8457] netlink: 'syz.4.1390': attribute type 8 has an invalid length. [ 252.424344][ T8457] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1390'. [ 252.437687][ T8461] CPU: 0 UID: 0 PID: 8461 Comm: syz.2.1391 Not tainted syzkaller #0 PREEMPT(full) [ 252.437716][ T8461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 252.437730][ T8461] Call Trace: [ 252.437798][ T8461] [ 252.437807][ T8461] __dump_stack+0x1d/0x30 [ 252.437834][ T8461] dump_stack_lvl+0x95/0xd0 [ 252.437855][ T8461] dump_stack+0x15/0x1b [ 252.437872][ T8461] should_fail_ex+0x263/0x280 [ 252.437940][ T8461] should_failslab+0x8c/0xb0 [ 252.437986][ T8461] kmem_cache_alloc_noprof+0x66/0x400 [ 252.438008][ T8461] ? do_getname+0x2e/0x1c0 [ 252.438030][ T8461] do_getname+0x2e/0x1c0 [ 252.438050][ T8461] user_path_at+0x28/0x100 [ 252.438140][ T8461] __se_sys_mount+0x25b/0x2e0 [ 252.438277][ T8461] ? fput+0x8f/0xc0 [ 252.438302][ T8461] __x64_sys_mount+0x67/0x80 [ 252.438321][ T8461] x64_sys_call+0x2d61/0x3020 [ 252.438343][ T8461] do_syscall_64+0x12c/0x370 [ 252.438431][ T8461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 252.438454][ T8461] RIP: 0033:0x7f52e710c819 [ 252.438468][ T8461] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 252.438483][ T8461] RSP: 002b:00007f52e5b5f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 252.438563][ T8461] RAX: ffffffffffffffda RBX: 00007f52e7385fa0 RCX: 00007f52e710c819 [ 252.438620][ T8461] RDX: 0000200000000040 RSI: 0000200000000100 RDI: 0000000000000000 [ 252.438634][ T8461] RBP: 00007f52e5b5f090 R08: 0000200000000180 R09: 0000000000000000 [ 252.438647][ T8461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.438660][ T8461] R13: 00007f52e7386038 R14: 00007f52e7385fa0 R15: 00007ffd6b70a428 [ 252.438677][ T8461] [ 253.252504][ T8498] batadv0: entered promiscuous mode [ 253.259309][ T8498] batadv0: left promiscuous mode [ 253.813245][ T8512] FAULT_INJECTION: forcing a failure. [ 253.813245][ T8512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 253.826455][ T8512] CPU: 1 UID: 0 PID: 8512 Comm: syz.0.1405 Not tainted syzkaller #0 PREEMPT(full) [ 253.826485][ T8512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 253.826497][ T8512] Call Trace: [ 253.826505][ T8512] [ 253.826512][ T8512] __dump_stack+0x1d/0x30 [ 253.826587][ T8512] dump_stack_lvl+0x95/0xd0 [ 253.826608][ T8512] dump_stack+0x15/0x1b [ 253.826625][ T8512] should_fail_ex+0x263/0x280 [ 253.826720][ T8512] should_fail+0xb/0x20 [ 253.826757][ T8512] should_fail_usercopy+0x1a/0x20 [ 253.826780][ T8512] _copy_from_user+0x1c/0xb0 [ 253.826865][ T8512] __sys_bind+0x106/0x290 [ 253.826957][ T8512] __x64_sys_bind+0x3f/0x50 [ 253.826986][ T8512] x64_sys_call+0x2b30/0x3020 [ 253.827013][ T8512] do_syscall_64+0x12c/0x370 [ 253.827042][ T8512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 253.827064][ T8512] RIP: 0033:0x7fd79160c819 [ 253.827142][ T8512] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.827208][ T8512] RSP: 002b:00007fd79001d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 253.827253][ T8512] RAX: ffffffffffffffda RBX: 00007fd791886180 RCX: 00007fd79160c819 [ 253.827268][ T8512] RDX: 000000000000001c RSI: 0000200000000040 RDI: 0000000000000007 [ 253.827282][ T8512] RBP: 00007fd79001d090 R08: 0000000000000000 R09: 0000000000000000 [ 253.827357][ T8512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.827369][ T8512] R13: 00007fd791886218 R14: 00007fd791886180 R15: 00007ffcb8d183d8 [ 253.827385][ T8512] [ 253.832893][ T8512] batadv0: entered promiscuous mode [ 253.999503][ T3638] net_ratelimit: 9 callbacks suppressed [ 253.999548][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 254.026963][ T8514] futex_wake_op: syz.3.1408 tries to shift op by -1; fix this program [ 254.042913][ T8514] FAULT_INJECTION: forcing a failure. [ 254.042913][ T8514] name failslab, interval 1, probability 0, space 0, times 0 [ 254.055562][ T8514] CPU: 1 UID: 0 PID: 8514 Comm: syz.3.1408 Not tainted syzkaller #0 PREEMPT(full) [ 254.055661][ T8514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 254.055672][ T8514] Call Trace: [ 254.055680][ T8514] [ 254.055689][ T8514] __dump_stack+0x1d/0x30 [ 254.055716][ T8514] dump_stack_lvl+0x95/0xd0 [ 254.055740][ T8514] dump_stack+0x15/0x1b [ 254.055812][ T8514] should_fail_ex+0x263/0x280 [ 254.055841][ T8514] should_failslab+0x8c/0xb0 [ 254.055865][ T8514] kmem_cache_alloc_noprof+0x66/0x400 [ 254.055970][ T8514] ? do_getname+0x2e/0x1c0 [ 254.056004][ T8514] do_getname+0x2e/0x1c0 [ 254.056027][ T8514] getname_flags+0x1d/0x30 [ 254.056076][ T8514] do_sys_openat2+0x60/0x130 [ 254.056175][ T8514] __x64_sys_openat+0xf2/0x120 [ 254.056200][ T8514] x64_sys_call+0x1e39/0x3020 [ 254.056226][ T8514] do_syscall_64+0x12c/0x370 [ 254.056277][ T8514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 254.056352][ T8514] RIP: 0033:0x7f4437dbc819 [ 254.056370][ T8514] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 254.056389][ T8514] RSP: 002b:00007f443680f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 254.056448][ T8514] RAX: ffffffffffffffda RBX: 00007f4438035fa0 RCX: 00007f4437dbc819 [ 254.056498][ T8514] RDX: 0000000000008042 RSI: 0000200000000d80 RDI: ffffffffffffff9c [ 254.056513][ T8514] RBP: 00007f443680f090 R08: 0000000000000000 R09: 0000000000000000 [ 254.056557][ T8514] R10: 0000000000000060 R11: 0000000000000246 R12: 0000000000000001 [ 254.056567][ T8514] R13: 00007f4438036038 R14: 00007f4438035fa0 R15: 00007fffbbb53c28 [ 254.056584][ T8514] [ 254.227646][ T8512] batadv0: left promiscuous mode [ 254.361329][ T8523] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1410'. [ 254.392687][ T8523] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1410'. [ 254.402471][ T8523] futex_wake_op: syz.3.1410 tries to shift op by -1; fix this program [ 254.645604][ T8530] netlink: 'syz.3.1412': attribute type 10 has an invalid length. [ 254.710698][ T28] kauditd_printk_skb: 313 callbacks suppressed [ 254.710795][ T28] audit: type=1400 audit(1775602523.569:4391): avc: denied { create } for pid=8527 comm="syz.3.1412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 254.755804][ T28] audit: type=1400 audit(1775602523.589:4392): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 254.806421][ T28] audit: type=1400 audit(1775602523.599:4393): avc: denied { create } for pid=8527 comm="syz.3.1412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 254.846711][ T28] audit: type=1400 audit(1775602523.599:4394): avc: denied { create } for pid=8527 comm="syz.3.1412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 254.977022][ T28] audit: type=1400 audit(1775602523.599:4395): avc: denied { write } for pid=8527 comm="syz.3.1412" name="igmp6" dev="proc" ino=4026532463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 255.040455][ T28] audit: type=1400 audit(1775602523.609:4396): avc: denied { prog_load } for pid=8527 comm="syz.3.1412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 255.217922][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 255.251925][ T8539] batadv0: entered promiscuous mode [ 255.519077][ T28] audit: type=1400 audit(1775602523.629:4397): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.560480][ T8539] batadv0: left promiscuous mode [ 255.568069][ T28] audit: type=1400 audit(1775602523.669:4398): avc: denied { execmem } for pid=8531 comm="syz.2.1414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 255.594709][ T28] audit: type=1400 audit(1775602523.728:4399): avc: denied { allowed } for pid=8531 comm="syz.2.1414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 255.614374][ T28] audit: type=1400 audit(1775602523.738:4400): avc: denied { open } for pid=8531 comm="syz.2.1414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 255.695389][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 255.921939][ T8560] IPVS: set_ctl: invalid protocol: 2 10.1.1.2:19999 [ 256.271415][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 256.328279][ T8569] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1425'. [ 256.731808][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 256.827453][ T8582] netlink: 'syz.3.1430': attribute type 1 has an invalid length. [ 257.316703][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 258.361370][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 258.641308][ T8631] FAULT_INJECTION: forcing a failure. [ 258.641308][ T8631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 258.656799][ T8631] CPU: 0 UID: 0 PID: 8631 Comm: syz.4.1447 Not tainted syzkaller #0 PREEMPT(full) [ 258.656901][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 258.656913][ T8631] Call Trace: [ 258.656919][ T8631] [ 258.656927][ T8631] __dump_stack+0x1d/0x30 [ 258.656955][ T8631] dump_stack_lvl+0x95/0xd0 [ 258.656974][ T8631] dump_stack+0x15/0x1b [ 258.657039][ T8631] should_fail_ex+0x263/0x280 [ 258.657073][ T8631] should_fail+0xb/0x20 [ 258.657148][ T8631] should_fail_usercopy+0x1a/0x20 [ 258.657176][ T8631] _copy_to_user+0x20/0xa0 [ 258.657269][ T8631] simple_read_from_buffer+0xb5/0x130 [ 258.657312][ T8631] proc_fail_nth_read+0x10e/0x150 [ 258.657344][ T8631] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 258.657464][ T8631] vfs_read+0x1ab/0x7f0 [ 258.657496][ T8631] ksys_read+0xdc/0x1a0 [ 258.657516][ T8631] __x64_sys_read+0x40/0x50 [ 258.657536][ T8631] x64_sys_call+0x2886/0x3020 [ 258.657558][ T8631] do_syscall_64+0x12c/0x370 [ 258.657586][ T8631] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.657649][ T8631] RIP: 0033:0x7f197d54d04e [ 258.657667][ T8631] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 258.657687][ T8631] RSP: 002b:00007f197bfdefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 258.657708][ T8631] RAX: ffffffffffffffda RBX: 00007f197bfdf6c0 RCX: 00007f197d54d04e [ 258.657727][ T8631] RDX: 000000000000000f RSI: 00007f197bfdf0a0 RDI: 0000000000000005 [ 258.657739][ T8631] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 258.657767][ T8631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.657784][ T8631] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 258.657803][ T8631] [ 258.844019][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 258.901616][ T8633] netlink: 'syz.4.1448': attribute type 1 has an invalid length. [ 259.126287][ T8639] 8021q: adding VLAN 0 to HW filter on device bond2 [ 259.155670][ T8650] netlink: 'syz.4.1453': attribute type 39 has an invalid length. [ 259.315932][ T8656] netlink: 'syz.1.1455': attribute type 27 has an invalid length. [ 259.323954][ T8655] netlink: 'syz.1.1455': attribute type 27 has an invalid length. [ 259.351883][ T8655] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.396121][ T8655] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 259.396439][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 259.405991][ T8655] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 259.421759][ T8659] FAULT_INJECTION: forcing a failure. [ 259.421759][ T8659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.477025][ T8655] ip6erspan0: left promiscuous mode [ 259.483738][ T8659] CPU: 0 UID: 0 PID: 8659 Comm: syz.4.1456 Not tainted syzkaller #0 PREEMPT(full) [ 259.483768][ T8659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 259.483779][ T8659] Call Trace: [ 259.483785][ T8659] [ 259.483793][ T8659] __dump_stack+0x1d/0x30 [ 259.483820][ T8659] dump_stack_lvl+0x95/0xd0 [ 259.483907][ T8659] dump_stack+0x15/0x1b [ 259.483926][ T8659] should_fail_ex+0x263/0x280 [ 259.484006][ T8659] should_fail+0xb/0x20 [ 259.484025][ T8659] should_fail_usercopy+0x1a/0x20 [ 259.484054][ T8659] _copy_to_user+0x20/0xa0 [ 259.484138][ T8659] simple_read_from_buffer+0xb5/0x130 [ 259.484164][ T8659] proc_fail_nth_read+0x10e/0x150 [ 259.484194][ T8659] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 259.484222][ T8659] vfs_read+0x1ab/0x7f0 [ 259.484292][ T8659] ? __rcu_read_unlock+0x4e/0x70 [ 259.484344][ T8659] ? __fget_files+0x184/0x1c0 [ 259.484364][ T8659] ? mutex_lock+0x57/0x90 [ 259.484384][ T8659] ksys_read+0xdc/0x1a0 [ 259.484405][ T8659] __x64_sys_read+0x40/0x50 [ 259.484424][ T8659] x64_sys_call+0x2886/0x3020 [ 259.484481][ T8659] do_syscall_64+0x12c/0x370 [ 259.484509][ T8659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.484531][ T8659] RIP: 0033:0x7f197d54d04e [ 259.484591][ T8659] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 259.484611][ T8659] RSP: 002b:00007f197bfdefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 259.484634][ T8659] RAX: ffffffffffffffda RBX: 00007f197bfdf6c0 RCX: 00007f197d54d04e [ 259.484650][ T8659] RDX: 000000000000000f RSI: 00007f197bfdf0a0 RDI: 0000000000000005 [ 259.484664][ T8659] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 259.484677][ T8659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.484730][ T8659] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 259.484747][ T8659] [ 259.703597][ T350] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.712679][ T350] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.725076][ T350] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.734148][ T350] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.748439][ T28] kauditd_printk_skb: 319 callbacks suppressed [ 259.748453][ T28] audit: type=1400 audit(1775602528.654:4720): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 259.799586][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 259.839046][ T28] audit: type=1400 audit(1775602528.703:4721): avc: denied { create } for pid=8666 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 259.900313][ T28] audit: type=1400 audit(1775602528.713:4722): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 259.995667][ T28] audit: type=1400 audit(1775602528.713:4723): avc: denied { create } for pid=8666 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 260.007041][ T8676] @ÿ: renamed from bond_slave_0 [ 260.048261][ T28] audit: type=1400 audit(1775602528.723:4724): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.074922][ T8676] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1461'. [ 260.084480][ T8678] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1462'. [ 260.101548][ T8676] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 260.116939][ T28] audit: type=1400 audit(1775602528.733:4725): avc: denied { create } for pid=8668 comm="syz.4.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 260.177523][ T28] audit: type=1400 audit(1775602528.743:4726): avc: denied { create } for pid=8668 comm="syz.4.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 260.217461][ T28] audit: type=1400 audit(1775602528.743:4727): avc: denied { read } for pid=8668 comm="syz.4.1459" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 260.272143][ T28] audit: type=1400 audit(1775602528.743:4728): avc: denied { create } for pid=8668 comm="syz.4.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 260.313142][ T28] audit: type=1400 audit(1775602528.743:4729): avc: denied { create } for pid=8668 comm="syz.4.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 260.441052][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 261.540736][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 261.746425][ T8719] bond0: entered promiscuous mode [ 261.764306][ T8719] bond_slave_0: entered promiscuous mode [ 261.770415][ T8719] bond_slave_1: entered promiscuous mode [ 261.780574][ T8719] netdevsim netdevsim2 netdevsim1: entered promiscuous mode [ 261.800285][ T8719] batadv0: entered promiscuous mode [ 261.846621][ T8719] debugfs: 'hsr1' already exists in 'hsr' [ 261.846641][ T8719] Cannot create hsr debugfs directory [ 261.847036][ T8719] 8021q: adding VLAN 0 to HW filter on device hsr1 [ 261.905350][ T8719] bond0: left promiscuous mode [ 261.905372][ T8719] bond_slave_0: left promiscuous mode [ 261.905457][ T8719] bond_slave_1: left promiscuous mode [ 261.905515][ T8719] netdevsim netdevsim2 netdevsim1: left promiscuous mode [ 261.925350][ T8719] batadv0: left promiscuous mode [ 262.313750][ T8681] netlink: 'syz.3.1463': attribute type 13 has an invalid length. [ 262.322197][ T8681] netlink: 'syz.3.1463': attribute type 17 has an invalid length. [ 262.381415][ T8681] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 262.623371][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 262.858263][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 263.212432][ T8787] netlink: 'syz.0.1498': attribute type 41 has an invalid length. [ 263.656021][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 263.891522][ T8821] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1509'. [ 263.904584][ T8821] geneve2: entered promiscuous mode [ 263.913036][ T41] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 20000 - 0 [ 263.940863][ T41] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 20000 - 0 [ 263.990261][ T41] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 20000 - 0 [ 264.009822][ T8828] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1514'. [ 264.020239][ T41] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 20000 - 0 [ 264.041759][ T8828] hsr_slave_1 (unregistering): left promiscuous mode [ 264.132159][ T8842] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 264.140522][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 264.364202][ T8860] netlink: 'syz.3.1525': attribute type 16 has an invalid length. [ 264.503705][ T8861] team0 (unregistering): Port device team_slave_0 removed [ 264.532263][ T8861] team0 (unregistering): Port device team_slave_1 removed [ 264.701032][ T1507] net_ratelimit: 6 callbacks suppressed [ 264.701047][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 264.779367][ T28] kauditd_printk_skb: 10916 callbacks suppressed [ 264.779384][ T28] audit: type=1400 audit(1775602533.651:13189): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.779411][ T28] audit: type=1400 audit(1775602533.660:13190): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.779579][ T28] audit: type=1400 audit(1775602533.660:13191): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.779707][ T28] audit: type=1400 audit(1775602533.660:13192): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.779755][ T28] audit: type=1400 audit(1775602533.660:13193): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.779874][ T28] audit: type=1400 audit(1775602533.660:13194): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.779964][ T28] audit: type=1400 audit(1775602533.660:13195): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.780067][ T28] audit: type=1400 audit(1775602533.660:13196): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.780215][ T28] audit: type=1400 audit(1775602533.660:13197): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.780362][ T28] audit: type=1400 audit(1775602533.660:13198): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.846150][ T8883] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.044544][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.068076][ T8883] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.068361][ T41] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.068472][ T8883] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.068563][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.510174][ T8910] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.518776][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 265.537723][ T8910] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 266.466562][ T8960] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1560'. [ 269.689135][ T9065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14385 sclass=netlink_route_socket pid=9065 comm=syz.0.1601 [ 269.729191][ T9068] FAULT_INJECTION: forcing a failure. [ 269.729191][ T9068] name failslab, interval 1, probability 0, space 0, times 0 [ 269.755434][ T9068] CPU: 0 UID: 0 PID: 9068 Comm: syz.3.1603 Not tainted syzkaller #0 PREEMPT(full) [ 269.755463][ T9068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 269.755477][ T9068] Call Trace: [ 269.755486][ T9068] [ 269.755495][ T9068] __dump_stack+0x1d/0x30 [ 269.755525][ T9068] dump_stack_lvl+0x95/0xd0 [ 269.755562][ T9068] dump_stack+0x15/0x1b [ 269.755582][ T9068] should_fail_ex+0x263/0x280 [ 269.755606][ T9068] should_failslab+0x8c/0xb0 [ 269.755626][ T9068] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 269.755682][ T9068] ? __alloc_skb+0x2d6/0x690 [ 269.755705][ T9068] __alloc_skb+0x2d6/0x690 [ 269.755774][ T9068] ? __alloc_skb+0x200/0x690 [ 269.755798][ T9068] netlink_alloc_large_skb+0xbf/0xf0 [ 269.755830][ T9068] netlink_sendmsg+0x40c/0x6f0 [ 269.755853][ T9068] ? __pfx_netlink_sendmsg+0x10/0x10 [ 269.755925][ T9068] ____sys_sendmsg+0x563/0x5b0 [ 269.755954][ T9068] ___sys_sendmsg+0x195/0x1e0 [ 269.755971][ T9068] ? path_openat+0x1b01/0x2050 [ 269.756035][ T9068] __sys_sendmmsg+0x185/0x320 [ 269.756064][ T9068] __x64_sys_sendmmsg+0x57/0x70 [ 269.756120][ T9068] x64_sys_call+0x27aa/0x3020 [ 269.756142][ T9068] do_syscall_64+0x12c/0x370 [ 269.756173][ T9068] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 269.756198][ T9068] RIP: 0033:0x7f4437dbc819 [ 269.756214][ T9068] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 269.756230][ T9068] RSP: 002b:00007f443680f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 269.756298][ T9068] RAX: ffffffffffffffda RBX: 00007f4438035fa0 RCX: 00007f4437dbc819 [ 269.756356][ T9068] RDX: 0000000000000002 RSI: 00002000000094c0 RDI: 0000000000000003 [ 269.756367][ T9068] RBP: 00007f443680f090 R08: 0000000000000000 R09: 0000000000000000 [ 269.756379][ T9068] R10: 0000000000000010 R11: 0000000000000246 R12: 0000000000000001 [ 269.756434][ T9068] R13: 00007f4438036038 R14: 00007f4438035fa0 R15: 00007fffbbb53c28 [ 269.756450][ T9068] [ 269.959205][ T28] kauditd_printk_skb: 20850 callbacks suppressed [ 269.959220][ T28] audit: type=1400 audit(1775602538.818:32993): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 269.991745][ T28] audit: type=1400 audit(1775602538.818:32994): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.014623][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.024077][ T3039] audit: audit_lost=1185 audit_rate_limit=0 audit_backlog_limit=64 [ 270.032267][ T28] audit: type=1400 audit(1775602538.818:32995): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.059602][ T3039] audit: backlog limit exceeded [ 270.064949][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.071748][ T9071] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.078813][ T3039] audit: audit_lost=1186 audit_rate_limit=0 audit_backlog_limit=64 [ 270.086875][ T28] audit: type=1400 audit(1775602538.818:32996): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.161608][ T1507] net_ratelimit: 26 callbacks suppressed [ 270.161623][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 270.482536][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 270.939408][ T9130] FAULT_INJECTION: forcing a failure. [ 270.939408][ T9130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.996349][ T9130] CPU: 1 UID: 0 PID: 9130 Comm: syz.4.1629 Not tainted syzkaller #0 PREEMPT(full) [ 270.996380][ T9130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 270.996394][ T9130] Call Trace: [ 270.996402][ T9130] [ 270.996411][ T9130] __dump_stack+0x1d/0x30 [ 270.996492][ T9130] dump_stack_lvl+0x95/0xd0 [ 270.996510][ T9130] dump_stack+0x15/0x1b [ 270.996531][ T9130] should_fail_ex+0x263/0x280 [ 270.996559][ T9130] should_fail+0xb/0x20 [ 270.996684][ T9130] should_fail_usercopy+0x1a/0x20 [ 270.996770][ T9130] _copy_from_user+0x1c/0xb0 [ 270.996827][ T9130] kstrtouint_from_user+0x69/0xf0 [ 270.996925][ T9130] proc_fail_nth_write+0x50/0x160 [ 270.996950][ T9130] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 270.996977][ T9130] vfs_write+0x269/0x9f0 [ 270.997019][ T9130] ? __rcu_read_unlock+0x4e/0x70 [ 270.997038][ T9130] ? __fget_files+0x184/0x1c0 [ 270.997059][ T9130] ? mutex_lock+0x57/0x90 [ 270.997150][ T9130] ksys_write+0xdc/0x1a0 [ 270.997170][ T9130] __x64_sys_write+0x40/0x50 [ 270.997190][ T9130] x64_sys_call+0x27e1/0x3020 [ 270.997217][ T9130] do_syscall_64+0x12c/0x370 [ 270.997268][ T9130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.997287][ T9130] RIP: 0033:0x7f197d54d04e [ 270.997304][ T9130] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 270.997323][ T9130] RSP: 002b:00007f197bfdefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 270.997345][ T9130] RAX: ffffffffffffffda RBX: 00007f197bfdf6c0 RCX: 00007f197d54d04e [ 270.997359][ T9130] RDX: 0000000000000001 RSI: 00007f197bfdf0a0 RDI: 0000000000000003 [ 270.997371][ T9130] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 270.997382][ T9130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.997393][ T9130] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 270.997443][ T9130] [ 271.115110][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 271.205488][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 271.210602][ T9133] netlink: 32 bytes leftover after parsing attributes in process `syz.3.1630'. [ 272.009006][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 272.077824][ T9171] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1639'. [ 272.250005][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 272.492283][ T9183] FAULT_INJECTION: forcing a failure. [ 272.492283][ T9183] name failslab, interval 1, probability 0, space 0, times 0 [ 272.515800][ T9183] CPU: 0 UID: 0 PID: 9183 Comm: syz.3.1646 Not tainted syzkaller #0 PREEMPT(full) [ 272.515880][ T9183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 272.515894][ T9183] Call Trace: [ 272.515902][ T9183] [ 272.515909][ T9183] __dump_stack+0x1d/0x30 [ 272.515993][ T9183] dump_stack_lvl+0x95/0xd0 [ 272.516012][ T9183] dump_stack+0x15/0x1b [ 272.516029][ T9183] should_fail_ex+0x263/0x280 [ 272.516062][ T9183] should_failslab+0x8c/0xb0 [ 272.516084][ T9183] kmem_cache_alloc_noprof+0x66/0x400 [ 272.516109][ T9183] ? do_getname+0x2e/0x1c0 [ 272.516134][ T9183] do_getname+0x2e/0x1c0 [ 272.516163][ T9183] getname_flags+0x1d/0x30 [ 272.516183][ T9183] do_sys_openat2+0x60/0x130 [ 272.516206][ T9183] __x64_sys_openat+0xf2/0x120 [ 272.516302][ T9183] x64_sys_call+0x1e39/0x3020 [ 272.516325][ T9183] do_syscall_64+0x12c/0x370 [ 272.516349][ T9183] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.516423][ T9183] RIP: 0033:0x7f4437d7d04e [ 272.516438][ T9183] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 272.516453][ T9183] RSP: 002b:00007f443680eb28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 272.516471][ T9183] RAX: ffffffffffffffda RBX: 00007f443680f6c0 RCX: 00007f4437d7d04e [ 272.516483][ T9183] RDX: 0000000000002082 RSI: 00007f443680ec00 RDI: ffffffffffffff9c [ 272.516577][ T9183] RBP: 00007f443680ec00 R08: 0000000000000000 R09: 0000000000000000 [ 272.516595][ T9183] R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd [ 272.516606][ T9183] R13: 00007f4438036038 R14: 00007f4438035fa0 R15: 00007fffbbb53c28 [ 272.516626][ T9183] [ 273.367791][ T9204] FAULT_INJECTION: forcing a failure. [ 273.367791][ T9204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.403711][ T9204] CPU: 1 UID: 0 PID: 9204 Comm: syz.4.1655 Not tainted syzkaller #0 PREEMPT(full) [ 273.403790][ T9204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 273.403801][ T9204] Call Trace: [ 273.403810][ T9204] [ 273.403820][ T9204] __dump_stack+0x1d/0x30 [ 273.403847][ T9204] dump_stack_lvl+0x95/0xd0 [ 273.403927][ T9204] dump_stack+0x15/0x1b [ 273.403948][ T9204] should_fail_ex+0x263/0x280 [ 273.404033][ T9204] should_fail_alloc_page+0xf2/0x100 [ 273.404054][ T9204] __alloc_frozen_pages_noprof+0x108/0x360 [ 273.404107][ T9204] alloc_pages_mpol+0xb3/0x260 [ 273.404172][ T9204] alloc_pages_noprof+0x8f/0x140 [ 273.404251][ T9204] get_free_pages_noprof+0xc/0x40 [ 273.404273][ T9204] sel_read_avc_hash_stats+0x27/0xb0 [ 273.404306][ T9204] ? __pfx_sel_read_avc_hash_stats+0x10/0x10 [ 273.404334][ T9204] vfs_read+0x1ab/0x7f0 [ 273.404380][ T9204] ? __rcu_read_unlock+0x4e/0x70 [ 273.404399][ T9204] ? __fget_files+0x184/0x1c0 [ 273.404420][ T9204] ? mutex_lock+0x57/0x90 [ 273.404437][ T9204] ksys_read+0xdc/0x1a0 [ 273.404467][ T9204] __x64_sys_read+0x40/0x50 [ 273.404527][ T9204] x64_sys_call+0x2886/0x3020 [ 273.404560][ T9204] do_syscall_64+0x12c/0x370 [ 273.404583][ T9204] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 273.404603][ T9204] RIP: 0033:0x7f197d58c819 [ 273.404618][ T9204] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 273.404634][ T9204] RSP: 002b:00007f197bfdf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 273.404660][ T9204] RAX: ffffffffffffffda RBX: 00007f197d805fa0 RCX: 00007f197d58c819 [ 273.404673][ T9204] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 273.404683][ T9204] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 273.404694][ T9204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.404705][ T9204] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 273.404787][ T9204] [ 273.603710][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 273.967406][ T9244] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1670'. [ 274.177487][ T9253] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9253 comm=syz.2.1674 [ 274.633698][ T9276] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1682'. [ 274.669326][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 274.980963][ T28] kauditd_printk_skb: 27328 callbacks suppressed [ 274.980980][ T28] audit: type=1400 audit(1775602543.819:46862): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.026012][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.029494][ T9297] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.032964][ T3039] audit: audit_lost=5675 audit_rate_limit=0 audit_backlog_limit=64 [ 275.039235][ T9297] audit: audit_lost=5676 audit_rate_limit=0 audit_backlog_limit=64 [ 275.039250][ T9297] audit: backlog limit exceeded [ 275.060812][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 275.070773][ T28] audit: type=1400 audit(1775602543.819:46863): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.092942][ T28] audit: type=1400 audit(1775602543.819:46864): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.103025][ T9298] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.115092][ T3039] audit: backlog limit exceeded [ 275.128548][ T9297] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1689'. [ 275.528667][ T9310] netlink: 48 bytes leftover after parsing attributes in process `syz.3.1694'. [ 275.558408][ T9310] FAULT_INJECTION: forcing a failure. [ 275.558408][ T9310] name failslab, interval 1, probability 0, space 0, times 0 [ 275.623334][ T9310] CPU: 1 UID: 0 PID: 9310 Comm: syz.3.1694 Not tainted syzkaller #0 PREEMPT(full) [ 275.623363][ T9310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 275.623437][ T9310] Call Trace: [ 275.623446][ T9310] [ 275.623454][ T9310] __dump_stack+0x1d/0x30 [ 275.623483][ T9310] dump_stack_lvl+0x95/0xd0 [ 275.623550][ T9310] dump_stack+0x15/0x1b [ 275.623582][ T9310] should_fail_ex+0x263/0x280 [ 275.623605][ T9310] ? __hw_addr_add_ex+0x15b/0x3b0 [ 275.623704][ T9310] should_failslab+0x8c/0xb0 [ 275.623726][ T9310] __kmalloc_cache_noprof+0x5f/0x410 [ 275.623790][ T9310] __hw_addr_add_ex+0x15b/0x3b0 [ 275.623884][ T9310] ? __pfx_xfrmi_dev_setup+0x10/0x10 [ 275.623987][ T9310] dev_addr_init+0xb1/0x120 [ 275.624080][ T9310] alloc_netdev_mqs+0x1ca/0xa40 [ 275.624143][ T9310] rtnl_create_link+0x239/0x720 [ 275.624261][ T9310] rtnl_newlink_create+0x174/0x650 [ 275.624347][ T9310] ? security_capable+0x7b/0x90 [ 275.624479][ T9310] ? netlink_ns_capable+0x86/0xa0 [ 275.624638][ T9310] rtnl_newlink+0x10a0/0x1330 [ 275.624667][ T9310] ? css_rstat_updated+0xbb/0x280 [ 275.624697][ T9310] ? __memcg_slab_free_hook+0x14b/0x240 [ 275.624722][ T9310] ? __rcu_read_unlock+0x4e/0x70 [ 275.624740][ T9310] ? avc_has_perm_noaudit+0xab/0x130 [ 275.624766][ T9310] ? cred_has_capability+0x224/0x2a0 [ 275.624869][ T9310] ? selinux_capable+0x31/0x40 [ 275.624894][ T9310] ? security_capable+0x7b/0x90 [ 275.625004][ T9310] ? ns_capable+0x7c/0xb0 [ 275.625021][ T9310] ? __pfx_rtnl_newlink+0x10/0x10 [ 275.625040][ T9310] rtnetlink_rcv_msg+0x64b/0x720 [ 275.625064][ T9310] netlink_rcv_skb+0x123/0x220 [ 275.625102][ T9310] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 275.625126][ T9310] rtnetlink_rcv+0x1c/0x30 [ 275.625144][ T9310] netlink_unicast+0x5c0/0x690 [ 275.625200][ T9310] netlink_sendmsg+0x5c8/0x6f0 [ 275.625235][ T9310] ? __pfx_netlink_sendmsg+0x10/0x10 [ 275.625254][ T9310] ____sys_sendmsg+0x563/0x5b0 [ 275.625304][ T9310] ___sys_sendmsg+0x195/0x1e0 [ 275.625328][ T9310] __x64_sys_sendmsg+0xd4/0x160 [ 275.625355][ T9310] x64_sys_call+0x194c/0x3020 [ 275.625396][ T9310] do_syscall_64+0x12c/0x370 [ 275.625485][ T9310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 275.625551][ T9310] RIP: 0033:0x7f4437dbc819 [ 275.625568][ T9310] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 275.625628][ T9310] RSP: 002b:00007f443680f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 275.625704][ T9310] RAX: ffffffffffffffda RBX: 00007f4438035fa0 RCX: 00007f4437dbc819 [ 275.625742][ T9310] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 275.625756][ T9310] RBP: 00007f443680f090 R08: 0000000000000000 R09: 0000000000000000 [ 275.625769][ T9310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 275.625801][ T9310] R13: 00007f4438036038 R14: 00007f4438035fa0 R15: 00007fffbbb53c28 [ 275.625818][ T9310] [ 275.923806][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 275.932100][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 275.969496][ T9321] FAULT_INJECTION: forcing a failure. [ 275.969496][ T9321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.982821][ T9321] CPU: 1 UID: 0 PID: 9321 Comm: syz.3.1698 Not tainted syzkaller #0 PREEMPT(full) [ 275.982846][ T9321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 275.982859][ T9321] Call Trace: [ 275.982912][ T9321] [ 275.982920][ T9321] __dump_stack+0x1d/0x30 [ 275.982945][ T9321] dump_stack_lvl+0x95/0xd0 [ 275.982964][ T9321] dump_stack+0x15/0x1b [ 275.982981][ T9321] should_fail_ex+0x263/0x280 [ 275.983078][ T9321] should_fail+0xb/0x20 [ 275.983100][ T9321] should_fail_usercopy+0x1a/0x20 [ 275.983124][ T9321] _copy_to_user+0x20/0xa0 [ 275.983257][ T9321] simple_read_from_buffer+0xb5/0x130 [ 275.983283][ T9321] proc_fail_nth_read+0x10e/0x150 [ 275.983312][ T9321] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 275.983336][ T9321] vfs_read+0x1ab/0x7f0 [ 275.983423][ T9321] ? __rcu_read_unlock+0x4e/0x70 [ 275.983491][ T9321] ? __fget_files+0x184/0x1c0 [ 275.983516][ T9321] ? mutex_lock+0x57/0x90 [ 275.983557][ T9321] ksys_read+0xdc/0x1a0 [ 275.983590][ T9321] __x64_sys_read+0x40/0x50 [ 275.983606][ T9321] x64_sys_call+0x2886/0x3020 [ 275.983627][ T9321] do_syscall_64+0x12c/0x370 [ 275.983689][ T9321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 275.983712][ T9321] RIP: 0033:0x7f4437d7d04e [ 275.983729][ T9321] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 275.983744][ T9321] RSP: 002b:00007f443680efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 275.983840][ T9321] RAX: ffffffffffffffda RBX: 00007f443680f6c0 RCX: 00007f4437d7d04e [ 275.983853][ T9321] RDX: 000000000000000f RSI: 00007f443680f0a0 RDI: 0000000000000004 [ 275.983864][ T9321] RBP: 00007f443680f090 R08: 0000000000000000 R09: 0000000000000000 [ 275.983927][ T9321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.983938][ T9321] R13: 00007f4438036038 R14: 00007f4438035fa0 R15: 00007fffbbb53c28 [ 275.983955][ T9321] [ 276.207048][ T9329] xt_hashlimit: max too large, truncated to 1048576 [ 276.219667][ T9329] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1702'. [ 276.296539][ T9337] netlink: 'syz.0.1699': attribute type 36 has an invalid length. [ 276.357545][ T9337] bridge2: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 276.365727][ T9345] netlink: 'syz.0.1699': attribute type 10 has an invalid length. [ 276.455408][ T9337] bridge2: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 276.594266][ T9345] macvlan1: entered allmulticast mode [ 276.619080][ T9345] veth1_vlan: entered allmulticast mode [ 276.666629][ T9345] team0: Port device macvlan1 added [ 277.027654][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 277.057578][ T9359] bond3: entered allmulticast mode [ 277.098799][ T9360] bridge1: entered promiscuous mode [ 277.119307][ T9360] bridge1: entered allmulticast mode [ 277.132614][ T9360] bond3: (slave bridge1): Enslaving as an active interface with an up link [ 278.111657][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 278.121703][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 278.287001][ T9414] ip6gre2: entered promiscuous mode [ 278.292506][ T9414] ip6gre2: entered allmulticast mode [ 278.546828][ T9418] ipvlan2: entered promiscuous mode [ 278.563036][ T9418] team0: Device ipvlan2 failed to register rx_handler [ 278.640251][ T9422] tc_dump_action: action bad kind [ 278.725607][ T9426] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 278.734027][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 278.778244][ T9426] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 278.786703][ T12] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 278.803989][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 280.008212][ T28] kauditd_printk_skb: 29456 callbacks suppressed [ 280.008228][ T28] audit: type=1400 audit(1775602548.821:60734): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.043421][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.043504][ T3039] audit: audit_lost=10873 audit_rate_limit=0 audit_backlog_limit=64 [ 280.043516][ T3039] audit: backlog limit exceeded [ 280.043541][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.043551][ T3039] audit: audit_lost=10874 audit_rate_limit=0 audit_backlog_limit=64 [ 280.043745][ T3039] audit: backlog limit exceeded [ 280.043821][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.043833][ T3039] audit: audit_lost=10875 audit_rate_limit=0 audit_backlog_limit=64 [ 280.043845][ T3039] audit: backlog limit exceeded [ 280.309828][ T9473] FAULT_INJECTION: forcing a failure. [ 280.309828][ T9473] name failslab, interval 1, probability 0, space 0, times 0 [ 280.309861][ T9473] CPU: 0 UID: 0 PID: 9473 Comm: syz.3.1755 Not tainted syzkaller #0 PREEMPT(full) [ 280.309963][ T9473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 280.309976][ T9473] Call Trace: [ 280.309984][ T9473] [ 280.309992][ T9473] __dump_stack+0x1d/0x30 [ 280.310047][ T9473] dump_stack_lvl+0x95/0xd0 [ 280.310070][ T9473] dump_stack+0x15/0x1b [ 280.310148][ T9473] should_fail_ex+0x263/0x280 [ 280.310178][ T9473] should_failslab+0x8c/0xb0 [ 280.310201][ T9473] kmem_cache_alloc_noprof+0x66/0x400 [ 280.310226][ T9473] ? alloc_empty_file+0x76/0x200 [ 280.310253][ T9473] alloc_empty_file+0x76/0x200 [ 280.310368][ T9473] alloc_file_pseudo+0xf6/0x190 [ 280.310463][ T9473] __shmem_file_setup+0x1dd/0x210 [ 280.310523][ T9473] shmem_file_setup+0x3b/0x50 [ 280.310547][ T9473] memfd_alloc_file+0x4e/0x300 [ 280.310579][ T9473] __se_sys_memfd_create+0x2e1/0x3b0 [ 280.310672][ T9473] __x64_sys_memfd_create+0x31/0x40 [ 280.310702][ T9473] x64_sys_call+0x1f22/0x3020 [ 280.310772][ T9473] do_syscall_64+0x12c/0x370 [ 280.310799][ T9473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.310823][ T9473] RIP: 0033:0x7f4437dbc819 [ 280.310840][ T9473] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 280.310857][ T9473] RSP: 002b:00007f443680ee08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 280.310920][ T9473] RAX: ffffffffffffffda RBX: 000000000000061b RCX: 00007f4437dbc819 [ 280.311007][ T9473] RDX: 00007f443680eee0 RSI: 0000000000000000 RDI: 00007f4437e52e71 [ 280.311022][ T9473] RBP: 0000200000001480 R08: 00000000ffffffff R09: 0000000000000000 [ 280.311094][ T9473] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000280 [ 280.311113][ T9473] R13: 00007f443680eee0 R14: 00007f443680eea0 R15: 0000200000000b80 [ 280.311132][ T9473] [ 281.078157][ T9498] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1763'. [ 281.169377][ T3503] net_ratelimit: 7 callbacks suppressed [ 281.169389][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 281.346134][ T9516] C: renamed from team_slave_0 [ 281.357426][ T9509] IPVS: set_ctl: invalid protocol: 22 224.0.0.2:20000 [ 281.368575][ T9516] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1770'. [ 281.398183][ T9519] xt_connbytes: Forcing CT accounting to be enabled [ 281.405331][ T9519] xt_CT: You must specify a L4 protocol and not use inversions on it [ 281.479302][ T9523] xt_TPROXY: Can be used only with -p tcp or -p udp [ 281.657248][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 281.757117][ T9542] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1780'. [ 281.905415][ T9559] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1788'. [ 281.914767][ T9559] FAULT_INJECTION: forcing a failure. [ 281.914767][ T9559] name failslab, interval 1, probability 0, space 0, times 0 [ 281.927620][ T9559] CPU: 1 UID: 0 PID: 9559 Comm: syz.4.1788 Not tainted syzkaller #0 PREEMPT(full) [ 281.927651][ T9559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 281.927709][ T9559] Call Trace: [ 281.927718][ T9559] [ 281.927727][ T9559] __dump_stack+0x1d/0x30 [ 281.927811][ T9559] dump_stack_lvl+0x95/0xd0 [ 281.927836][ T9559] dump_stack+0x15/0x1b [ 281.927856][ T9559] should_fail_ex+0x263/0x280 [ 281.927880][ T9559] ? alloc_netdev_mqs+0x7cc/0xa40 [ 281.927950][ T9559] should_failslab+0x8c/0xb0 [ 281.927979][ T9559] __kmalloc_cache_noprof+0x5f/0x410 [ 281.928008][ T9559] alloc_netdev_mqs+0x7cc/0xa40 [ 281.928074][ T9559] rtnl_create_link+0x239/0x720 [ 281.928100][ T9559] rtnl_newlink_create+0x174/0x650 [ 281.928127][ T9559] ? security_capable+0x7b/0x90 [ 281.928206][ T9559] ? netlink_ns_capable+0x86/0xa0 [ 281.928311][ T9559] rtnl_newlink+0x10a0/0x1330 [ 281.928337][ T9559] ? __rcu_read_unlock+0x4e/0x70 [ 281.928355][ T9559] ? css_rstat_updated+0xbb/0x280 [ 281.928390][ T9559] ? __account_obj_stock+0x211/0x350 [ 281.928412][ T9559] ? __rcu_read_unlock+0x4e/0x70 [ 281.928429][ T9559] ? avc_has_perm_noaudit+0xab/0x130 [ 281.928471][ T9559] ? cred_has_capability+0x224/0x2a0 [ 281.928574][ T9559] ? selinux_capable+0x31/0x40 [ 281.928677][ T9559] ? security_capable+0x7b/0x90 [ 281.928704][ T9559] ? ns_capable+0x7c/0xb0 [ 281.928722][ T9559] ? __pfx_rtnl_newlink+0x10/0x10 [ 281.928742][ T9559] rtnetlink_rcv_msg+0x64b/0x720 [ 281.928787][ T9559] ? avc_has_perm_noaudit+0xab/0x130 [ 281.928815][ T9559] netlink_rcv_skb+0x123/0x220 [ 281.928840][ T9559] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 281.928861][ T9559] rtnetlink_rcv+0x1c/0x30 [ 281.928949][ T9559] netlink_unicast+0x5c0/0x690 [ 281.929025][ T9559] netlink_sendmsg+0x5c8/0x6f0 [ 281.929047][ T9559] ? __pfx_netlink_sendmsg+0x10/0x10 [ 281.929066][ T9559] ____sys_sendmsg+0x563/0x5b0 [ 281.929118][ T9559] ___sys_sendmsg+0x195/0x1e0 [ 281.929146][ T9559] __x64_sys_sendmsg+0xd4/0x160 [ 281.929225][ T9559] x64_sys_call+0x194c/0x3020 [ 281.929246][ T9559] do_syscall_64+0x12c/0x370 [ 281.929339][ T9559] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.929363][ T9559] RIP: 0033:0x7f197d58c819 [ 281.929381][ T9559] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 281.929398][ T9559] RSP: 002b:00007f197bfdf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 281.929439][ T9559] RAX: ffffffffffffffda RBX: 00007f197d805fa0 RCX: 00007f197d58c819 [ 281.929451][ T9559] RDX: 0000000020040000 RSI: 0000200000000000 RDI: 0000000000000003 [ 281.929463][ T9559] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 281.929594][ T9559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 281.929607][ T9559] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 281.929626][ T9559] [ 282.275032][ T9563] futex_wake_op: syz.4.1790 tries to shift op by 32; fix this program [ 282.497180][ T9581] FAULT_INJECTION: forcing a failure. [ 282.497180][ T9581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.516687][ T9581] CPU: 0 UID: 0 PID: 9581 Comm: syz.0.1794 Not tainted syzkaller #0 PREEMPT(full) [ 282.516863][ T9581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 282.516924][ T9581] Call Trace: [ 282.516931][ T9581] [ 282.516939][ T9581] __dump_stack+0x1d/0x30 [ 282.516963][ T9581] dump_stack_lvl+0x95/0xd0 [ 282.516982][ T9581] dump_stack+0x15/0x1b [ 282.517024][ T9581] should_fail_ex+0x263/0x280 [ 282.517051][ T9581] should_fail+0xb/0x20 [ 282.517070][ T9581] should_fail_usercopy+0x1a/0x20 [ 282.517093][ T9581] _copy_to_user+0x20/0xa0 [ 282.517181][ T9581] put_itimerspec64+0xe7/0x130 [ 282.517204][ T9581] __x64_sys_timer_settime+0x11a/0x160 [ 282.517232][ T9581] x64_sys_call+0x284f/0x3020 [ 282.517307][ T9581] do_syscall_64+0x12c/0x370 [ 282.517330][ T9581] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.517359][ T9581] RIP: 0033:0x7fd79160c819 [ 282.517377][ T9581] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.517443][ T9581] RSP: 002b:00007fd79005f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 282.517517][ T9581] RAX: ffffffffffffffda RBX: 00007fd791885fa0 RCX: 00007fd79160c819 [ 282.517534][ T9581] RDX: 0000200000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 282.517548][ T9581] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 282.517560][ T9581] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 282.517571][ T9581] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 282.517587][ T9581] [ 282.691900][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 282.795089][ T9597] FAULT_INJECTION: forcing a failure. [ 282.795089][ T9597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.809284][ T9597] CPU: 1 UID: 0 PID: 9597 Comm: syz.0.1802 Not tainted syzkaller #0 PREEMPT(full) [ 282.809309][ T9597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 282.809320][ T9597] Call Trace: [ 282.809326][ T9597] [ 282.809333][ T9597] __dump_stack+0x1d/0x30 [ 282.809426][ T9597] dump_stack_lvl+0x95/0xd0 [ 282.809500][ T9597] dump_stack+0x15/0x1b [ 282.809563][ T9597] should_fail_ex+0x263/0x280 [ 282.809591][ T9597] should_fail+0xb/0x20 [ 282.809611][ T9597] should_fail_usercopy+0x1a/0x20 [ 282.809640][ T9597] _copy_to_user+0x20/0xa0 [ 282.809669][ T9597] simple_read_from_buffer+0xb5/0x130 [ 282.809691][ T9597] proc_fail_nth_read+0x10e/0x150 [ 282.809722][ T9597] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 282.809783][ T9597] vfs_read+0x1ab/0x7f0 [ 282.809802][ T9597] ? __rcu_read_unlock+0x4e/0x70 [ 282.809826][ T9597] ? __fget_files+0x184/0x1c0 [ 282.809851][ T9597] ? mutex_lock+0x57/0x90 [ 282.809949][ T9597] ksys_read+0xdc/0x1a0 [ 282.809970][ T9597] __x64_sys_read+0x40/0x50 [ 282.809989][ T9597] x64_sys_call+0x2886/0x3020 [ 282.810015][ T9597] do_syscall_64+0x12c/0x370 [ 282.810076][ T9597] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.810100][ T9597] RIP: 0033:0x7fd7915cd04e [ 282.810119][ T9597] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 282.810137][ T9597] RSP: 002b:00007fd79005efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.810159][ T9597] RAX: ffffffffffffffda RBX: 00007fd79005f6c0 RCX: 00007fd7915cd04e [ 282.810232][ T9597] RDX: 000000000000000f RSI: 00007fd79005f0a0 RDI: 0000000000000007 [ 282.810246][ T9597] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 282.810260][ T9597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 282.810320][ T9597] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 282.810393][ T9597] [ 283.064892][ T9603] IPv6: Can't replace route, no match found [ 283.271578][ T9629] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.279757][ T9629] bridge_slave_1: left allmulticast mode [ 283.285633][ T9629] bridge_slave_1: left promiscuous mode [ 283.291558][ T9629] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.315971][ T9629] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 283.444937][ T9612] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1810'. [ 283.454146][ T9612] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1810'. [ 283.463318][ T9612] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1810'. [ 283.472438][ T9612] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1810'. [ 283.500070][ T9612] netlink: 'syz.4.1810': attribute type 6 has an invalid length. [ 283.733627][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 283.789336][ T9643] netlink: 'syz.2.1822': attribute type 1 has an invalid length. [ 283.841040][ T9643] 8021q: adding VLAN 0 to HW filter on device bond3 [ 283.859081][ T9643] bond2: (slave bond3): making interface the new active one [ 283.883368][ T9643] bond2: (slave bond3): Enslaving as an active interface with an up link [ 283.899860][ T9643] bond2: (slave gretap1): Enslaving as a backup interface with an up link [ 283.972571][ T9651] FAULT_INJECTION: forcing a failure. [ 283.972571][ T9651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.986734][ T9651] CPU: 1 UID: 0 PID: 9651 Comm: syz.0.1825 Not tainted syzkaller #0 PREEMPT(full) [ 283.986814][ T9651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 283.986828][ T9651] Call Trace: [ 283.986835][ T9651] [ 283.986844][ T9651] __dump_stack+0x1d/0x30 [ 283.986872][ T9651] dump_stack_lvl+0x95/0xd0 [ 283.986907][ T9651] dump_stack+0x15/0x1b [ 283.986925][ T9651] should_fail_ex+0x263/0x280 [ 283.986964][ T9651] should_fail+0xb/0x20 [ 283.986985][ T9651] should_fail_usercopy+0x1a/0x20 [ 283.987067][ T9651] strncpy_from_user+0x27/0x250 [ 283.987092][ T9651] __x64_sys_lgetxattr+0xa5/0x150 [ 283.987155][ T9651] x64_sys_call+0x2ecc/0x3020 [ 283.987178][ T9651] do_syscall_64+0x12c/0x370 [ 283.987206][ T9651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.987259][ T9651] RIP: 0033:0x7fd79160c819 [ 283.987281][ T9651] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 283.987301][ T9651] RSP: 002b:00007fd79005f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 283.987322][ T9651] RAX: ffffffffffffffda RBX: 00007fd791885fa0 RCX: 00007fd79160c819 [ 283.987335][ T9651] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000200000000380 [ 283.987348][ T9651] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 283.987359][ T9651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.987463][ T9651] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 283.987484][ T9651] [ 284.212466][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 284.326498][ T9669] sit0: entered promiscuous mode [ 284.336894][ T9669] netlink: 'syz.2.1833': attribute type 1 has an invalid length. [ 284.352075][ T9669] netlink: 1 bytes leftover after parsing attributes in process `syz.2.1833'. [ 284.379546][ T9669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9669 comm=syz.2.1833 [ 284.395932][ T9671] netlink: 'syz.4.1834': attribute type 13 has an invalid length. [ 284.413881][ T9671] netlink: 'syz.4.1834': attribute type 17 has an invalid length. [ 284.479559][ T9671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.488279][ T9671] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.501724][ T9671] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 284.541200][ T9677] netlink: 'syz.2.1836': attribute type 13 has an invalid length. [ 284.605152][ T9680] bridge_slave_1: entered promiscuous mode [ 284.632281][ T9680] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 284.787061][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 285.035054][ T28] kauditd_printk_skb: 18947 callbacks suppressed [ 285.035071][ T28] audit: type=1400 audit(1775602553.834:75671): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.090083][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.096747][ T3039] audit: audit_lost=12213 audit_rate_limit=0 audit_backlog_limit=64 [ 285.104912][ T3039] audit: backlog limit exceeded [ 285.116023][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.122674][ T28] audit: type=1400 audit(1775602553.874:75672): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.144172][ T3039] audit: audit_lost=12214 audit_rate_limit=0 audit_backlog_limit=64 [ 285.158930][ T3039] audit: backlog limit exceeded [ 285.164463][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.175718][ T28] audit: type=1400 audit(1775602553.874:75673): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.231011][ T9702] FAULT_INJECTION: forcing a failure. [ 285.231011][ T9702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.278794][ T9702] CPU: 1 UID: 0 PID: 9702 Comm: syz.4.1845 Not tainted syzkaller #0 PREEMPT(full) [ 285.278879][ T9702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 285.278893][ T9702] Call Trace: [ 285.278970][ T9702] [ 285.278979][ T9702] __dump_stack+0x1d/0x30 [ 285.279042][ T9702] dump_stack_lvl+0x95/0xd0 [ 285.279066][ T9702] dump_stack+0x15/0x1b [ 285.279087][ T9702] should_fail_ex+0x263/0x280 [ 285.279166][ T9702] should_fail+0xb/0x20 [ 285.279185][ T9702] should_fail_usercopy+0x1a/0x20 [ 285.279207][ T9702] _copy_from_user+0x1c/0xb0 [ 285.279267][ T9702] ___sys_sendmsg+0xc1/0x1e0 [ 285.279285][ T9702] ? path_openat+0x1b01/0x2050 [ 285.279327][ T9702] __sys_sendmmsg+0x185/0x320 [ 285.279350][ T9702] __x64_sys_sendmmsg+0x57/0x70 [ 285.279448][ T9702] x64_sys_call+0x27aa/0x3020 [ 285.279473][ T9702] do_syscall_64+0x12c/0x370 [ 285.279501][ T9702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.279523][ T9702] RIP: 0033:0x7f197d58c819 [ 285.279601][ T9702] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 285.279619][ T9702] RSP: 002b:00007f197bfdf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 285.279641][ T9702] RAX: ffffffffffffffda RBX: 00007f197d805fa0 RCX: 00007f197d58c819 [ 285.279657][ T9702] RDX: 0000000000000001 RSI: 0000200000008080 RDI: 0000000000000003 [ 285.279697][ T9702] RBP: 00007f197bfdf090 R08: 0000000000000000 R09: 0000000000000000 [ 285.279711][ T9702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.279725][ T9702] R13: 00007f197d806038 R14: 00007f197d805fa0 R15: 00007ffd9a5b65c8 [ 285.279742][ T9702] [ 285.689977][ T9717] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.733937][ T9717] bridge_slave_1: left allmulticast mode [ 285.747465][ T9717] bridge_slave_1: left promiscuous mode [ 285.762211][ T9717] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.785644][ T9717] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 285.810281][ T9719] @0Ù: renamed from bond_slave_1 (while UP) [ 285.820776][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 286.217944][ T9731] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 286.226262][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 286.562682][ T9751] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 286.571479][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 286.873761][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 287.265200][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 287.415007][ T9799] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1886'. [ 287.592655][ T9818] FAULT_INJECTION: forcing a failure. [ 287.592655][ T9818] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.607113][ T9818] CPU: 1 UID: 0 PID: 9818 Comm: syz.0.1895 Not tainted syzkaller #0 PREEMPT(full) [ 287.607175][ T9818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 287.607266][ T9818] Call Trace: [ 287.607274][ T9818] [ 287.607282][ T9818] __dump_stack+0x1d/0x30 [ 287.607327][ T9818] dump_stack_lvl+0x95/0xd0 [ 287.607351][ T9818] dump_stack+0x15/0x1b [ 287.607372][ T9818] should_fail_ex+0x263/0x280 [ 287.607397][ T9818] should_fail_alloc_page+0xf2/0x100 [ 287.607417][ T9818] __alloc_frozen_pages_noprof+0x108/0x360 [ 287.607486][ T9818] alloc_pages_mpol+0xb3/0x260 [ 287.607515][ T9818] vma_alloc_folio_noprof+0x1a9/0x2f0 [ 287.607541][ T9818] handle_mm_fault+0x1129/0x3020 [ 287.607584][ T9818] ? vma_start_read+0x1c7/0x2c0 [ 287.607659][ T9818] do_user_addr_fault+0x62f/0x1050 [ 287.607690][ T9818] ? arch_exit_work+0x30/0x40 [ 287.607713][ T9818] ? irqentry_exit+0x3c/0x520 [ 287.607741][ T9818] ? trace_page_fault_user+0x1f/0xe0 [ 287.607771][ T9818] exc_page_fault+0x62/0xa0 [ 287.607791][ T9818] asm_exc_page_fault+0x26/0x30 [ 287.607809][ T9818] RIP: 0033:0x7fd7914c3ae3 [ 287.607856][ T9818] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 287.607872][ T9818] RSP: 002b:00007fd79005e470 EFLAGS: 00010206 [ 287.607922][ T9818] RAX: 0000000000002000 RBX: 00007fd79005e530 RCX: 00007fd787c3f000 [ 287.607934][ T9818] RDX: 00007fd79005e6d0 RSI: 0000000000000027 RDI: 00007fd79005e5d0 [ 287.608006][ T9818] RBP: 0000000000000043 R08: 0000000000000009 R09: 00000000000001a0 [ 287.608019][ T9818] R10: 00000000000001ae R11: 00007fd79005e530 R12: 0000000000000001 [ 287.608033][ T9818] R13: 00007fd7916c2600 R14: 00000000000000ed R15: 00007fd79005e5d0 [ 287.608050][ T9818] [ 287.608129][ T9818] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 287.857966][ T9836] x_tables: ip6_tables: SNPT target: used from hooks FORWARD, but only usable from INPUT/POSTROUTING [ 287.894051][ T9836] ipip0: entered promiscuous mode [ 287.894593][ T9840] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 287.907881][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 287.916891][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 287.956630][ T9840] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 288.055694][ T9852] x_tables: duplicate underflow at hook 2 [ 288.430648][ T9878] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 288.463217][ T9878] block device autoloading is deprecated and will be removed. [ 288.766076][ T9896] netlink: 'syz.0.1924': attribute type 21 has an invalid length. [ 288.793276][ T9896] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1924'. [ 288.794575][ T9894] team_slave_0: entered promiscuous mode [ 288.808208][ T9894] team_slave_1: entered promiscuous mode [ 288.850029][ T9894] macvtap1: entered promiscuous mode [ 288.867280][ T9894] team0: entered promiscuous mode [ 288.877540][ T9894] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 288.915134][ T9894] team0: Device macvtap1 is already an upper device of the team interface [ 288.946395][ T9894] team0: left promiscuous mode [ 288.962065][ T9894] team_slave_0: left promiscuous mode [ 288.967526][ T9894] team_slave_1: left promiscuous mode [ 289.086900][ T9914] netlink: 'syz.0.1932': attribute type 10 has an invalid length. [ 289.111657][ T9914] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1932'. [ 289.136498][ T9914] macvlan0: entered promiscuous mode [ 289.156785][ T9914] batman_adv: batadv0: Adding interface: macvlan0 [ 289.178280][ T9914] batman_adv: batadv0: The MTU of interface macvlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 289.218170][ T9914] batman_adv: batadv0: Interface activated: macvlan0 [ 289.660226][ T9942] tap0: tun_chr_ioctl cmd 1074025681 [ 289.700583][ T9942] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1943'. [ 290.060790][ T28] kauditd_printk_skb: 25413 callbacks suppressed [ 290.060808][ T28] audit: type=1400 audit(1775602558.848:98146): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.089264][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.091602][ T3310] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.106559][ T3039] audit: audit_lost=13196 audit_rate_limit=0 audit_backlog_limit=64 [ 290.110859][ T3310] audit: audit_lost=13197 audit_rate_limit=0 audit_backlog_limit=64 [ 290.135409][ T3310] audit: backlog limit exceeded [ 290.136966][ T3039] audit: backlog limit exceeded [ 290.142569][ T28] audit: type=1400 audit(1775602558.858:98147): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.167742][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.181013][ T9971] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.717854][ T9979] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1958'. [ 291.326620][ T9993] FAULT_INJECTION: forcing a failure. [ 291.326620][ T9993] name failslab, interval 1, probability 0, space 0, times 0 [ 291.343566][ T9996] netlink: 'syz.1.1965': attribute type 4 has an invalid length. [ 291.351906][ T9993] CPU: 1 UID: 0 PID: 9993 Comm: syz.0.1964 Not tainted syzkaller #0 PREEMPT(full) [ 291.351936][ T9993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 291.351975][ T9993] Call Trace: [ 291.351983][ T9993] [ 291.352016][ T9993] __dump_stack+0x1d/0x30 [ 291.352085][ T9993] dump_stack_lvl+0x95/0xd0 [ 291.352109][ T9993] dump_stack+0x15/0x1b [ 291.352133][ T9993] should_fail_ex+0x263/0x280 [ 291.352158][ T9993] should_failslab+0x8c/0xb0 [ 291.352182][ T9993] kmem_cache_alloc_noprof+0x66/0x400 [ 291.352222][ T9993] ? io_submit_one+0xcf/0x1350 [ 291.352253][ T9993] io_submit_one+0xcf/0x1350 [ 291.352362][ T9993] __se_sys_io_submit+0xfb/0x280 [ 291.352386][ T9993] __x64_sys_io_submit+0x43/0x50 [ 291.352411][ T9993] x64_sys_call+0x19d5/0x3020 [ 291.352435][ T9993] do_syscall_64+0x12c/0x370 [ 291.352491][ T9993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.352513][ T9993] RIP: 0033:0x7fd79160c819 [ 291.352572][ T9993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 291.352587][ T9993] RSP: 002b:00007fd79005f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 291.352610][ T9993] RAX: ffffffffffffffda RBX: 00007fd791885fa0 RCX: 00007fd79160c819 [ 291.352625][ T9993] RDX: 0000200000000880 RSI: 0000000000000002 RDI: 00007fd79185f000 [ 291.352639][ T9993] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 291.352661][ T9993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.352674][ T9993] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 291.352694][ T9993] [ 291.521809][ T9997] netlink: 'syz.1.1965': attribute type 4 has an invalid length. [ 291.713842][T10007] netlink: 'syz.2.1970': attribute type 4 has an invalid length. [ 291.749428][T10007] netlink: 'syz.2.1970': attribute type 4 has an invalid length. [ 291.852209][T10020] bond4: entered allmulticast mode [ 291.890132][T10023] futex_wake_op: syz.2.1975 tries to shift op by -1; fix this program [ 291.944714][T10027] IPVS: length: 1152 != 8 [ 292.089218][ T1507] net_ratelimit: 25 callbacks suppressed [ 292.089246][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 292.682958][T10053] FAULT_INJECTION: forcing a failure. [ 292.682958][T10053] name failslab, interval 1, probability 0, space 0, times 0 [ 292.722290][T10053] CPU: 1 UID: 0 PID: 10053 Comm: syz.0.1987 Not tainted syzkaller #0 PREEMPT(full) [ 292.722317][T10053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 292.722348][T10053] Call Trace: [ 292.722355][T10053] [ 292.722364][T10053] __dump_stack+0x1d/0x30 [ 292.722394][T10053] dump_stack_lvl+0x95/0xd0 [ 292.722433][T10053] dump_stack+0x15/0x1b [ 292.722512][T10053] should_fail_ex+0x263/0x280 [ 292.722565][T10053] should_failslab+0x8c/0xb0 [ 292.722631][T10053] __kmalloc_noprof+0xb8/0x4e0 [ 292.722652][T10053] ? iter_file_splice_write+0x101/0xa80 [ 292.722697][T10053] iter_file_splice_write+0x101/0xa80 [ 292.722770][T10053] ? atime_needs_update+0x3be/0x3e0 [ 292.722797][T10053] ? shmem_file_splice_read+0x5c2/0x600 [ 292.722896][T10053] ? __pfx_iter_file_splice_write+0x10/0x10 [ 292.722920][T10053] direct_splice_actor+0x156/0x2a0 [ 292.722943][T10053] ? shmem_file_write_iter+0xb1/0xf0 [ 292.723052][T10053] splice_direct_to_actor+0x311/0x670 [ 292.723071][T10053] ? __pfx_direct_splice_actor+0x10/0x10 [ 292.723096][T10053] do_splice_direct+0x119/0x1a0 [ 292.723114][T10053] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 292.723170][T10053] do_sendfile+0x382/0x650 [ 292.723196][T10053] __x64_sys_sendfile64+0xb8/0x150 [ 292.723244][T10053] x64_sys_call+0x2dc4/0x3020 [ 292.723267][T10053] do_syscall_64+0x12c/0x370 [ 292.723295][T10053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.723394][T10053] RIP: 0033:0x7fd79160c819 [ 292.723410][T10053] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 292.723427][T10053] RSP: 002b:00007fd79005f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 292.723504][T10053] RAX: ffffffffffffffda RBX: 00007fd791885fa0 RCX: 00007fd79160c819 [ 292.723555][T10053] RDX: 0000200000001000 RSI: 0000000000000004 RDI: 0000000000000004 [ 292.723567][T10053] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 292.723632][T10053] R10: 0000000000000fec R11: 0000000000000246 R12: 0000000000000002 [ 292.723646][T10053] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 292.723662][T10053] [ 293.122249][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 293.520744][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 293.683556][T10094] FAULT_INJECTION: forcing a failure. [ 293.683556][T10094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 293.735106][T10094] CPU: 1 UID: 0 PID: 10094 Comm: syz.2.2003 Not tainted syzkaller #0 PREEMPT(full) [ 293.735141][T10094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 293.735212][T10094] Call Trace: [ 293.735220][T10094] [ 293.735228][T10094] __dump_stack+0x1d/0x30 [ 293.735301][T10094] dump_stack_lvl+0x95/0xd0 [ 293.735391][T10094] dump_stack+0x15/0x1b [ 293.735521][T10094] should_fail_ex+0x263/0x280 [ 293.735545][T10094] should_fail+0xb/0x20 [ 293.735567][T10094] should_fail_usercopy+0x1a/0x20 [ 293.735650][T10094] _copy_from_user+0x1c/0xb0 [ 293.735676][T10094] kstrtouint_from_user+0x69/0xf0 [ 293.735763][T10094] proc_fail_nth_write+0x50/0x160 [ 293.735829][T10094] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 293.735859][T10094] vfs_write+0x269/0x9f0 [ 293.735876][T10094] ? __rcu_read_unlock+0x4e/0x70 [ 293.735936][T10094] ? __fget_files+0x184/0x1c0 [ 293.735959][T10094] ? mutex_lock+0x57/0x90 [ 293.735977][T10094] ksys_write+0xdc/0x1a0 [ 293.735993][T10094] __x64_sys_write+0x40/0x50 [ 293.736061][T10094] x64_sys_call+0x27e1/0x3020 [ 293.736084][T10094] do_syscall_64+0x12c/0x370 [ 293.736109][T10094] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.736133][T10094] RIP: 0033:0x7f52e70cd04e [ 293.736151][T10094] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 293.736240][T10094] RSP: 002b:00007f52e5b5efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 293.736262][T10094] RAX: ffffffffffffffda RBX: 00007f52e5b5f6c0 RCX: 00007f52e70cd04e [ 293.736278][T10094] RDX: 0000000000000001 RSI: 00007f52e5b5f0a0 RDI: 0000000000000003 [ 293.736289][T10094] RBP: 00007f52e5b5f090 R08: 0000000000000000 R09: 0000000000000000 [ 293.736301][T10094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.736356][T10094] R13: 00007f52e7386038 R14: 00007f52e7385fa0 R15: 00007ffd6b70a428 [ 293.736377][T10094] [ 294.164877][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 294.255901][T10115] netlink: 'syz.2.2011': attribute type 39 has an invalid length. [ 294.433876][T10123] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2015'. [ 294.470717][T10125] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2015'. [ 294.806918][T10139] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2021'. [ 294.845309][T10139] futex_wake_op: syz.2.2021 tries to shift op by -1; fix this program [ 295.085047][ T28] kauditd_printk_skb: 27546 callbacks suppressed [ 295.085066][ T28] audit: type=1400 audit(1775602563.854:115680): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 295.095416][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.142973][ T3039] audit: audit_lost=16537 audit_rate_limit=0 audit_backlog_limit=64 [ 295.143626][ T3319] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.151225][ T3039] audit: backlog limit exceeded [ 295.162810][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.168086][ T28] audit: type=1400 audit(1775602563.864:115681): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 295.169953][ T3319] audit: audit_lost=16538 audit_rate_limit=0 audit_backlog_limit=64 [ 295.199396][ T3039] audit: audit_lost=16539 audit_rate_limit=0 audit_backlog_limit=64 [ 295.210133][ T3638] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 295.218610][ T3039] audit: backlog limit exceeded [ 295.402635][T10155] batadv0: entered promiscuous mode [ 295.435062][T10155] batadv0: left promiscuous mode [ 296.074173][T10178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=10178 comm=syz.4.2036 [ 296.119198][T10178] netlink: 7 bytes leftover after parsing attributes in process `syz.4.2036'. [ 296.205225][T10189] FAULT_INJECTION: forcing a failure. [ 296.205225][T10189] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.237629][T10189] CPU: 1 UID: 0 PID: 10189 Comm: syz.0.2041 Not tainted syzkaller #0 PREEMPT(full) [ 296.237656][T10189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 296.237668][T10189] Call Trace: [ 296.237674][T10189] [ 296.237682][T10189] __dump_stack+0x1d/0x30 [ 296.237819][T10189] dump_stack_lvl+0x95/0xd0 [ 296.237846][T10189] dump_stack+0x15/0x1b [ 296.237889][T10189] should_fail_ex+0x263/0x280 [ 296.237925][T10189] should_fail+0xb/0x20 [ 296.237950][T10189] should_fail_usercopy+0x1a/0x20 [ 296.238004][T10189] _copy_from_user+0x1c/0xb0 [ 296.238035][T10189] kstrtouint_from_user+0x69/0xf0 [ 296.238157][T10189] proc_fail_nth_write+0x50/0x160 [ 296.238195][T10189] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 296.238229][T10189] vfs_write+0x269/0x9f0 [ 296.238383][T10189] ? __rcu_read_unlock+0x4e/0x70 [ 296.238404][T10189] ? __fget_files+0x184/0x1c0 [ 296.238428][T10189] ? mutex_lock+0x57/0x90 [ 296.238576][T10189] ksys_write+0xdc/0x1a0 [ 296.238648][T10189] __x64_sys_write+0x40/0x50 [ 296.238667][T10189] x64_sys_call+0x27e1/0x3020 [ 296.238693][T10189] do_syscall_64+0x12c/0x370 [ 296.238750][T10189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.238775][T10189] RIP: 0033:0x7fd7915cd04e [ 296.238794][T10189] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 296.238882][T10189] RSP: 002b:00007fd79005efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 296.238943][T10189] RAX: ffffffffffffffda RBX: 00007fd79005f6c0 RCX: 00007fd7915cd04e [ 296.238975][T10189] RDX: 0000000000000001 RSI: 00007fd79005f0a0 RDI: 0000000000000003 [ 296.239034][T10189] RBP: 00007fd79005f090 R08: 0000000000000000 R09: 0000000000000000 [ 296.239048][T10189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 296.239062][T10189] R13: 00007fd791886038 R14: 00007fd791885fa0 R15: 00007ffcb8d183d8 [ 296.239083][T10189] [ 296.456004][ T3419] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 296.565006][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 297.164403][T10224] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2053'. [ 297.167867][T10226] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 297.181961][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 297.224464][T10224] futex_wake_op: syz.4.2053 tries to shift op by -1; fix this program [ 297.519886][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 298.551273][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 299.487025][T10300] ªªªªªª: renamed from vlan0 [ 299.580441][ T3503] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 299.590432][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 299.598710][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 299.740983][T10308] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2085'. [ 299.776979][T10308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7696 sclass=netlink_route_socket pid=10308 comm=syz.4.2085 [ 299.837857][T10308] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2085'. [ 300.066444][ T28] kauditd_printk_skb: 19503 callbacks suppressed [ 300.066461][ T28] audit: type=1400 audit(1775602824.863:133978): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 300.086566][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.124982][ T3039] audit: audit_lost=16942 audit_rate_limit=0 audit_backlog_limit=64 [ 300.149218][ T3039] audit: backlog limit exceeded [ 300.160884][ T28] audit: type=1400 audit(1775602824.873:133979): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 300.174560][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.192436][T10315] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.198789][ T3319] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.205333][T10315] audit: audit_lost=16943 audit_rate_limit=0 audit_backlog_limit=64 [ 300.215526][ T3039] audit: audit_lost=16944 audit_rate_limit=0 audit_backlog_limit=64 [ 300.602017][T10334] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2093'. [ 300.615525][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 300.619351][T10334] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2093'. [ 300.633290][T10334] 8021q: VLANs not supported on sit0 [ 300.663083][T10324] netlink: 'syz.0.2090': attribute type 1 has an invalid length. [ 301.095291][T10356] ip6_tunnel: non-ECT from fe88:0000:0000:0000:0000:0000:0000:0101 with DS=0x85 [ 301.127454][T10360] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 301.153404][T10366] sit1: entered allmulticast mode [ 302.596951][ T9] net_ratelimit: 2 callbacks suppressed [ 302.596967][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 302.681435][ T1507] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 302.887188][T10472] netlink: 'syz.3.2150': attribute type 4 has an invalid length. [ 302.904622][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 303.090800][T10479] netlink: 'syz.3.2150': attribute type 4 has an invalid length. [ 303.192392][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 303.237996][T10481] ================================================================== [ 303.246382][T10481] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 303.253763][T10481] [ 303.256085][T10481] write to 0xffff8881048da100 of 8 bytes by task 10480 on cpu 1: [ 303.263928][T10481] mas_wmb_replace+0x20d/0x1610 [ 303.268795][T10481] mas_wr_store_entry+0x16b6/0x2ed0 [ 303.274123][T10481] mas_store_prealloc+0x72e/0xa70 [ 303.279153][T10481] mmap_region+0x1b3b/0x2050 [ 303.283768][T10481] do_mmap+0x9b2/0xbd0 [ 303.287865][T10481] vm_mmap_pgoff+0x183/0x2d0 [ 303.292469][T10481] ksys_mmap_pgoff+0xc1/0x310 [ 303.297161][T10481] x64_sys_call+0x14df/0x3020 [ 303.302197][T10481] do_syscall_64+0x12c/0x370 [ 303.306967][T10481] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.312866][T10481] [ 303.315284][T10481] read to 0xffff8881048da100 of 8 bytes by task 10481 on cpu 0: [ 303.323012][T10481] mas_state_walk+0x485/0x650 [ 303.327793][T10481] mas_walk+0x60/0x150 [ 303.332041][T10481] lock_vma_under_rcu+0xc9/0x210 [ 303.337249][T10481] do_user_addr_fault+0x232/0x1050 [ 303.342372][T10481] exc_page_fault+0x62/0xa0 [ 303.347063][T10481] asm_exc_page_fault+0x26/0x30 [ 303.352196][T10481] [ 303.354514][T10481] value changed: 0xffff8881052b7301 -> 0xffff8881048da100 [ 303.361889][T10481] [ 303.364226][T10481] Reported by Kernel Concurrency Sanitizer on: [ 303.371076][T10481] CPU: 0 UID: 0 PID: 10481 Comm: syz.3.2152 Not tainted syzkaller #0 PREEMPT(full) [ 303.380463][T10481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 303.390794][T10481] ================================================================== [ 304.105552][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 305.038576][ T28] kauditd_printk_skb: 34239 callbacks suppressed [ 305.038593][ T28] audit: type=1400 audit(1775602829.870:166856): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 305.045200][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 305.045216][ T3039] audit: audit_lost=17399 audit_rate_limit=0 audit_backlog_limit=64 [ 305.045303][ T3039] audit: backlog limit exceeded [ 305.070594][ T28] audit: type=1400 audit(1775602829.870:166857): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 305.075094][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 305.082807][ T28] audit: type=1400 audit(1775602829.881:166858): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 305.087585][ T3039] audit: audit_lost=17400 audit_rate_limit=0 audit_backlog_limit=64 [ 305.108698][ T28] audit: type=1400 audit(1775602829.881:166859): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 305.115523][ T3039] audit: backlog limit exceeded [ 309.109682][ T3398] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 310.013419][ T28] kauditd_printk_skb: 52712 callbacks suppressed [ 310.013536][ T28] audit: type=1400 audit(1775602834.896:219572): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.029092][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 310.041472][ T28] audit: type=1400 audit(1775602834.896:219573): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.047805][ T3039] audit: audit_lost=17401 audit_rate_limit=0 audit_backlog_limit=64 [ 310.069190][ T28] audit: type=1400 audit(1775602834.896:219574): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.077403][ T3039] audit: backlog limit exceeded [ 310.099187][ T28] audit: type=1400 audit(1775602834.896:219575): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.104897][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 310.125792][ T28] audit: type=1400 audit(1775602834.896:219576): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.133865][ T3039] audit: audit_lost=17402 audit_rate_limit=0 audit_backlog_limit=64 [ 310.410235][ T3398] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog