last executing test programs: 9.636032581s ago: executing program 1 (id=2619): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000e40), 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000380)={0x2, 0x4e25, @remote}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='mm_page_alloc\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t r'], 0x27) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f00000001c0)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r7, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r7, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x0, r9}, 0x10) r10 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r10, &(0x7f0000000140)=[{&(0x7f0000000240)="480000001400190d09004beafd0d8c562c84ed7a80ffe05e959126dda8900db462060f000000000000a2bc5603ca00000f7f8900000ec00000000101ff0000000309ff5bffff00c7", 0x48}], 0x1) sendmsg$can_bcm(r1, &(0x7f0000001080)={&(0x7f0000000f40), 0x10, &(0x7f0000001040)={&(0x7f0000000fc0)={0x7, 0x0, 0xf7, {}, {}, {0x4, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x2a, 0xf88a56b80fc47ccd, 0x0, 0x0, "e347fe286691cd99b20e3d386d8dee03b6696aab1b0546033fd06d5aae906d06fa1f3a1b14b8d95476bdb4c19bf125cd862a89bee527213f81c68b2e619f5105"}}, 0x80}, 0x1, 0x0, 0x0, 0x4008051}, 0x24044004) r11 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000009c0)={'syztnl1\x00', 0x0, 0x0, 0x4, 0x1, 0xf, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x4}, 0x0, 0x8000, 0x0, 0x2}}) 9.325167706s ago: executing program 1 (id=2621): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x11bb19af, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x1ff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0x0, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000c5000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000fbb703000000e31f008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa3) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000000203050000000000000000000700000a07ffe34000000022a42405400d0000183beca59b82af58bfbb848b82c9d57807c89495f2fce0654b09dfdbb6bc7871b0e6a9d51037ad7b8089a3634f6656a3923882"], 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r5}, 0x10) r6 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r7 = fcntl$dupfd(r6, 0x0, r6) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8042, &(0x7f0000000380)={[{@grpjquota}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@dioread_nolock}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7fffffff}}]}, 0x3, 0x4f3, &(0x7f00000012c0)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x103042, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x8004587d, &(0x7f0000000340)={0x2, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0) read$usbfs(r7, &(0x7f0000001040)=""/192, 0xc0) write$tun(r7, &(0x7f0000000400)=ANY=[], 0xa2) syz_io_uring_setup(0x80005112, &(0x7f00000000c0)={0x0, 0x4aa, 0x0, 0x2, 0x311, 0x0, r7}, &(0x7f0000000140), &(0x7f00000001c0)) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) llistxattr(0x0, 0x0, 0x0) r9 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x6c2742) writev(r9, &(0x7f0000000440)=[{&(0x7f00000004c0)="03e6b107e445a7d8276efefff13dfeff50e9d3d14a90a55ec1b3726eb4c0838db63c3594182fdcdf2fcc333c99c565920c0a", 0x32}], 0x1) 9.253052967s ago: executing program 1 (id=2626): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000e80)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f192838b490541a18774566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000080)={0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x44000800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="fc010068abfa9291c5fc4fd162008e4eb08ef93eb36871f777a841d0035ecc5df0bba6b467eac7da83d940a79ee5811e3079096787e209ddf8bf3a7b7d4b8e4ae1b823b691ce830f90e32fa52b11b096d1e667a97a78209fe3b0be98a25f60ef93ce3cae0e410c4809e7e49ebc8312d67587e179a2fc324a4731a5fbe4b4ba77db7a9a5dfd2bb6eeb63ddadb1bf7255b805b780aa79a30cae3bc7a6d471ab9f8ae6e6559d23360610069ba952c07b0b1513c01ae31391b980a6b72e5a8fe11bf7e3fc8e0e9f6ee8e647c8928e66ef5fb230ef3a250d7dc79bd4de2c693fd94e97b7c47313ebd1875a8a74f5dbb8f03c22ed01674ff293badee3f8bb50688ec77869900"/274, @ANYRES16, @ANYBLOB="04002cbd7000fcdbdf250a00000028000180140002000000000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000a001028089000500d7781c01c630674533387dde5c60ef10e5062ccb1faf3e585aee84a83a5717a19b286eae8af8fdd0782645bc9ddde89e15154aad8ae89aab017e853a662557cc509b893465b9f188be410e149e3fcc1ab4a7bd226b5704ab2dd836fce824e13381f3087a04d5e92ffcb9abd349149256b016891bb872cae2c96735234f263d10a14ad24de600000004000100db00050098f8576a32802d7eea6b7d11338a760f222d963c80e94ca90d1276a6717627f3d2687f458bfff53d636b75bfde225cfd7945ce5a9aa96c11308012e2e66bef10e1e918bf05cf7cffbbecb0851c3d45e851c1242c69865e7f6eff16270e39e27655c4bb7c5d700655b76268cdda8ad9a6c18a5e97e8d0a840415f560eea0acd943fb4636bc99128fac185f0d1a0a84d309f49d726507998190e7fcfde25a0957d83da7e6e44819ad1db13dfddfe0fb1b020f69a4ad0a8b139f44bf9adcb8967a943b4fd1898be746900cb5408e546ea9699ed488d26a5f400040001002c000500fb9658dee12595922b0ca98a6d37a91f3740edffa67369ec74b7586e1f552d2ff4dc4ed523535a042000028018000380140001800a0002002c2f2b2d210000000400030004000100"], 0x1fc}, 0x1, 0x0, 0x0, 0x28004080}, 0x4040014) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r5, 0x0, 0x9}, 0x18) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000740)={'ip_vti0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x700, 0x10, 0xbe, 0x6, {{0x2c, 0x4, 0x2, 0x3, 0xb0, 0x65, 0x0, 0x0, 0xa01688ca26ee7b6, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, {[@cipso={0x86, 0x27, 0x1, [{0x2, 0x9, "8f815efc698030"}, {0x5, 0x3, "e7"}, {0x4, 0x6, "8cf5c0ed"}, {0x5, 0xf, "a40f0674e712fbd101c4354fdb"}]}, @cipso={0x86, 0x72, 0x3, [{0x7, 0xc, "7f5d6ae2b0d7a5b80e0e"}, {0x0, 0xb, "47ebd440c1fe1dc96e"}, {0x6, 0x4, "7494"}, {0x6, 0x11, "e8e519001be1081619b9e78075cba3"}, {0x5, 0xa, "a94cc327519d8d86"}, {0x2, 0x4, 'e_'}, {0x2, 0x11, "837dc00e4223ffa777060b9cb00db2"}, {0x2, 0xd, "8fa00ec787a12da7fe9c80"}, {0x1, 0x2}, {0x0, 0x12, "8f57acf894cffdf9321937313287c79e"}]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=@gettfilter={0x24, 0x2e, 0x300, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0x2, 0x1}, {0xe, 0xffff}, {0xf, 0xffe0}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x84) r8 = syz_open_procfs(0x0, &(0x7f0000003700)='gid_map\x00') pread64(r8, &(0x7f00000000c0)=""/94, 0x5e, 0x2) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000c40)='./file0\x00', 0x808080, &(0x7f0000000c80)={[{@discard}, {@bh}, {@noblock_validity}]}, 0x2c, 0x52c, &(0x7f0000000640)="$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") r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 9.227577667s ago: executing program 1 (id=2629): syz_mount_image$ext4(&(0x7f00000007c0)='ext4\x00', &(0x7f00000006c0)='./file1\x00', 0x40, &(0x7f00000000c0)={[{@user_xattr}, {@nodioread_nolock}]}, 0x1, 0x576, &(0x7f0000000140)="$eJzs3T1sG2UfAPD/neO3X3nf9JXeVwLUoQKkIlV1kn5AYWpXRKVKHZBYIHLcqIoTV7EDTZQh3StEBwSoS9lgYAQxMCAWRlYWEDNSRSOQmg5g5K80TZzglDouud9POvuee87+P8+d/499pzs5gMw62nhII56OiItJxMi6uqFoVx5trbe6slS8v7JUTKJev/RLEklE3FtZKnbWT9rPhyJiOSKeiohv8hHH081xqwuL0xPlcmmuXR6tzVwdrS4snrgyMzFVmirNnnrp5TNnT58ZPzm+/mX36+tL+Z319caPN9+98d2rt29++tmR5eL7E0mci+F23fp+PE6tbZKPcxuWn+5HsAFKBt0AHkmuneeNVPp/jESunfXd1Ed2tWlAn9X3RdSBjErkP2RU53dA4/i3M+3m748751sHII24q+2pVTPUOjcR+5vHJgd/TR46Mmkcbx7ezYayJy1fj4ixoaHNn/+k/fl7dGOPo4H01dfnWztq8/5P18af6DL+DHfOnf5NnfFvddP49yB+bovx72KPMX5/46ePtox/PeKZrvGTtfhJl/hpRLzVY/xbr395dqu6+scRx6J7/I5k+/PDo5evlEtjrceuMb46duSV7fp/cIv4rXO2+5tfM922f5fT2l198e3nzy5vE/+F57bf/922/4GIeK/H+P+998lrW9XduZ7cbfwK2On+TyIft3uM/+K5oz/0uCoAAAAAAAAAALADafNatiQtrM2naaHQuof3f3EwLVeqteOXK/Ozk61r3g5HPu1caTXSKieN8nj7etxO+eSG8qlcO2DuQLNcKFbKkwPuOwAAAAAAAAAAAAAAAAAAADwpDm24//+3XPP+/41/Vw3sVVv/5Tew18l/yK6H8z8ZWDuA3ef7HzKrLv8hu+Q/ZJf8h+yS/5Bd8h+yS/5Ddsl/AAAAAAAAAAAAAAAAAAAAAAAAAADoi4sXLjSm+v2VpWKjPDm0MD9defvEZKk6XZiZLxaKlbmrhalKZapcKhQrM3/1fkmlcnUsZuevjdZK1dpodWHxzZnK/GznP0VL+b73CAAAAAAAAAAAAAAAAAAAAP55hptTkhYiIm3Op2mhEPHviDicRHL5Srk0FhH/iYjvc/l9jfL4oBsNAAAAAAAAAAAAAAAAAAAAe0x1YXF6olwuzWVkZmgnK0fE8uNtRuMdd/yqfHtfPSnb0EwWZgY8MAEAAAAAAAAAAAAAAAAAQAY9uOm311f80d8GAQAAAAAAAAAAAAAAAAAAQCalPycR0ZiOjTw/vLH2X8lqrvkcEe/cuvTBtYlabW68sfzu2vLah+3lJwfRfqBXnTzt5DEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwQHVhcXqiXC7N9XFm0H0EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeBR/BgAA///eANcP") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000005c0)='\"', 0x1, 0x4fed0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000740)=0xbf14) socket$inet6(0xa, 0x2, 0x0) sendfile(r0, r0, 0x0, 0xe3aa6ea) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX=r0, @ANYBLOB="a279fd16cb97f2c639c0b5a6b1e55f6f47b1b93a3213f22cefc1c86b33782c2181d131bdd3b28d1a0c5046a73bda6dd265fe2dae02ce6e238ef9dcbc65f8a642ff84206581f44adec030fcbe8eca61b1316afaf650d8d7151d9629bf3f00f8243845ba09348d42393ab88696e28bd0aae8e27a0db481aea32fc7da6a6e59499149716b805071ca6c88cbfbb621e22b92aea01d7ae8e831cb4e8ce966e16054e0e75a096108b9a11af96677ba98de575674347d5bf8b69f6596d7aa15ef1d172b228e9a70bf26d793057dc06cc54ce08461bc472b083a8ee6e2", @ANYRES64=r0], 0x50) mount(0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1d, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r3, 0x13) ptrace(0x10, r3) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000480)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x2f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$getregset(0x4205, r6, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000009c, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000000700)=[{}, {}], 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xbb, 0x8, 0x8}}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r5, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file3\x00', 0x4) 8.563707548s ago: executing program 1 (id=2637): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x20048a, &(0x7f00000001c0)={[{@grpjquota}, {@noinit_itable}, {@abort}, {@bsdgroups}]}, 0x12, 0x51a, &(0x7f0000001200)="$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") pread64(r0, &(0x7f0000002280)=""/4096, 0x1000, 0xd33) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0xff}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x18) r4 = socket$inet_smc(0x2b, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) (async) r5 = socket$netlink(0x10, 0x3, 0x0) setresuid(0x0, 0xee00, 0x0) ioctl$sock_SIOCBRDELBR(r5, 0x89a2, 0x0) (async) ioctl$sock_SIOCBRDELBR(r5, 0x89a2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r4, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa212000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffc8) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa212000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffc8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f000000000000000014000200e72f57e30882e55d00000000000000000d0001007564703a73"], 0x54}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000006cfa000018120000", @ANYRESHEX=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64=r6, @ANYRES16=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7}, 0x18) 7.605193604s ago: executing program 1 (id=2656): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x18) sendmsg$inet(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000140)}, 0x41) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x2) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x2, 0x53a, &(0x7f0000000c80)="$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") perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000680), 0x4) r6 = socket(0x2, 0x3, 0xff) bind$inet(r6, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0xe, 0x0, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1001f0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000080)={0x3920e, r7, 0x2, 0x0, 0x2}) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r7, 0x40049366, &(0x7f0000000040)=0x2) 7.604470114s ago: executing program 32 (id=2656): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x18) sendmsg$inet(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000140)}, 0x41) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x2) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x2, 0x53a, &(0x7f0000000c80)="$eJzs3c9vI1cdAPDvOPHmR7NNCj0AArqUwoJW6yTeNqp6YXsBoaoSouLEYRsSN4pir6PYK5qwh+yReyVW4gT8B9w4IPXEgRs3kDj0Ug5IC6xADRIHoxlPEjexE7dJ7ST+fKTJzHszO9/34n3veV5kvwBG1o2I2I2IaxHxdkTM5vlJvsXd9pZe99HThyt7Tx+uJNFqvfXPJDuf5kXHv0k9k99zMiJ++L2InyTH4za2dzaWq9XKVp6eb9Y25xvbO7fXC3lOeWlxaeHVO6+Uz62uL9R+++S762/86Pe/+8qHf9r99s/SYs38/Hp2rrMeh4pnjpnk95npyBuPiDfOfOeLYzz//8Plk7a2z0XEi1n7n42x7NUEAK6yVms2WrOdaQDgqkuf/2ciKZTyuYCZKBRKpfYc3vMxXajWG81bs/UH91cjm8Oai2LhnfVqZSGfK5yLYpKmF7Pjw3T5Y+n3Knci4rmIeG9iKjtfWqlXV4f5xgcARtgzR8b//0y0x/9OZ/8rGABw4UwOuwAAwMB1jP9zwywHADA4nv8BYPR8gvHfpwMB4Irw/A8Ao8f4DwCj59Tx/9FgygEADMQP3nwz3Vp77e+/3v+m7turlcZGqfZgpbRS39osrdXra9VKaaXVOu1+1Xp9c/Hlg2Rje+derf7gfvPeem15rXKv4rsEAGD4nnvh/b+kg/7ua1PZFh1rORir4WorDLsAwNCMDbsAwND4PA+Mrj6e8U0DwBXXZYnetnyCIOl1wWOLv8JldfOL5v9hVJ1l/t/cAVxun27+/zvnXg5g8IzhMLparcSa/wAwYszxAz3//p/r+RUhj/u4+d1PXh4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4DGayLSmUsrXAd9OfhVIp4npEzEUxeWe9WlmIiGcj4s8TxYk0vTjsQgMAZ1T4e5Kv/3Vz9qWZo2evJf+dyPYR8dNfvvWLd5ebza3FNP9fB/nNx2n+VHOrfG0YFQAAOu2vu/nBYVY2fpfzfceD/EdPH67sb4Ms4pPXI2JyKou/l2/tM+Mxnu0noxgR0/9O8nRb+n5l7Bzi7z6KiC/s138y3u2IMJPNgbRXPj0aP419/dzjd/7+j8YvfKy+hexcui9mv4vPx5HCAad6//V2P5m3vbSJ5+2vEDeyfff2P5n1UGeX9n9pc9071v8VDvq/sWPxk6zN3zhIn1ySJy//4fvHMluz7XOPIr403i1+chA/6d7/Fl/qs44ffPmrL/Y61/pVxM2u9d9fkbqWdbPzzdrmfGN75/Z6bXmtsla5Xy4vLS4tvHrnlfJ8Nkfd/vnHbjH+8dqtZ3vFT+s/3SP+5Mn1j2/0Wf9f/+/tH3/thPjf+nr31//5E+KnY+I3+4y/PH235/LdafzVHvU/5fWPW33G//BvO6t9XgoADEBje2djuVqtbJ1ykL7XPO0aB/0fpM/2F6AY2UHsRpzXDbNJiYjoek36jvpiVPmzOkiGFv03533DYfdMwGftsNH3vuavgywQAAAAAAAAAAAAAABwTGN7Z2Oi+6e1zu1g2HUEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg6vp/AAAA//9W1cZQ") perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000680), 0x4) r6 = socket(0x2, 0x3, 0xff) bind$inet(r6, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0xe, 0x0, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1001f0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000080)={0x3920e, r7, 0x2, 0x0, 0x2}) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r7, 0x40049366, &(0x7f0000000040)=0x2) 5.959511471s ago: executing program 2 (id=2671): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0xec, 0x7, 0x40, 0x7, 0x0, 0x0, 0xd000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x2}, 0x986, 0xf8, 0x4, 0x0, 0x81, 0x9, 0x5, 0x0, 0x0, 0x0, 0x2}, r0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = io_uring_setup(0x7ffd, &(0x7f00000004c0)={0x0, 0x5bf, 0x8000, 0x1, 0x62}) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x16, &(0x7f0000000340)={&(0x7f0000001000)={[{0x0, 0x0, 0x1}, {0x0, 0x0, 0x3}, {&(0x7f0000000780)="18f6960c06be837b06e29b4051850016cbeb8915173ec670c3a985c9007b7f55cd78c3fa7378e9481e7cd4ca34067c36545cb8403c321fa25300764f5d4a1c", 0x3f, 0x1}, {&(0x7f0000000800)="1583dc05c710fbdeeb4e1e1be48af236c18f74890ec954088e70e5b272bda56c83856b992f4ed6ff678f52710388a1a8ddd2ae28d13b5956c64687b33fdc9316339c60ebe070362c3e307370b8c12e7778a436e02198c62912b46ca4b0b985639381bb1e04076499096e0b2adeb1432adf050337fb", 0x75, 0x3}, {&(0x7f0000000940), 0x0, 0x3}, {&(0x7f0000000a00)="4339b20811e16724e1663fe932b70a37168c0a4cf7f18d1f43d7c01860be9b1e2acb24c0076c44602836af413b53ae947ed025803d02dbe2149991a0c032228277b70b247eafa21729ade623865c63c0048c51db18c01c10e5fc16b863a85118a19697f1e95d5f98c89209ce", 0x6c, 0x1}]}, 0x6, 0x3}, 0x1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x4800}, 0x80) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0xc, 0xd, 0xffffe5a7, 0xffffffbe, 0x9, 0x3, 0x6, r7}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={r7, 0x2d, "5b23f6ec1bd4ab3cf4dfc5bc16708cb7608a2ca80ae43fc427aee368e78202ef744281ea465e316ebc03ae7dab"}, &(0x7f0000000180)=0x35) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="6386e3b0e5496188a53ec48a74e35ea1575af54589402d58d789ab327d52e761cf9a776b9ffe7a8c9aad795b4d2f947891d8253e16af39d627e0f9c9369f4da0a2c139e6108822b880e5d4bdda14147e87abb4351ba38a345ffd86b6af091b9a7a28c8ba82d4577ff61dfd60fcfd10cf05de17b9fbe538f79a69e25ac1bbcc64"], 0x58}, 0x1, 0x0, 0x0, 0x600}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000004000000450000008814"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r8, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r6) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f00000006c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)={0x88, r9, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xce}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffffff81}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x680000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x10000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}]}, 0x88}}, 0x11) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000001304000000000020c7aa516112636cebb97fe10bfdee58356bcc703baab71a080f0efcf34efead4155f40d161f69ef37d639cc000000"], 0x0, 0x26}, 0x20) 5.955580211s ago: executing program 4 (id=2673): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket(0x10, 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r9}, 0x10) io_cancel(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r7, 0x89f3, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0x2, 0x4fd, &(0x7f0000000b00)="$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") syz_clone3(&(0x7f00000008c0)={0x14860000, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r0], 0x1}, 0x58) 5.897159802s ago: executing program 2 (id=2674): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_delrule={0x38, 0x21, 0x1, 0x0, 0x25dfdbfd, {0xa, 0x20, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x10}, [@FRA_DST={0x14, 0x1, @loopback}, @FIB_RULE_POLICY=@FRA_PROTOCOL={0x5, 0x15, 0x4}]}, 0x38}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000285000000170000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095"], 0x0, 0xffffffff}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0}, 0x90) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), &(0x7f0000000580)=r8}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f0000000780)}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x2}, 0x4192}) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2d41, 0x0) close_range(r9, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000b7080000000000007b8af8ff40629c04bfa21c00000000000702000000b70400bf0000000100000095f578bfc6"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'ipvlan1\x00', 0x100}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) 5.223103164s ago: executing program 2 (id=2676): lgetxattr(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000100), 0x1, 0x599, &(0x7f0000000540)="$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") openat$hwrng(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xf7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x786, &(0x7f0000001900)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, 0x0) setreuid(r2, 0x0) setresuid(r2, 0xffffffffffffffff, 0xee01) msgget(0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) utime(&(0x7f0000000000)='.\x00', 0x0) 5.222706334s ago: executing program 3 (id=2677): syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$eJzs3MFqE18Ux/Hzb/pv0pQ2EURQUA+60c3QxgfQIC2IAaU2RV0IUzvRkDEpM0MlIjYbcetzFJfuBPUFuhE37t0VQXDThTjiTKZN2rSmbdLE9PuBck9y7o+5bdNyUuis3339pFRwjYLpyVBCZUikJhsi6T9V3X/1dSioR6RRTS6P/fhy9s69+zezudz0rOpMdu5KRlUnzr9/+vzNhY/e2PzbiXdxWUs/WP+e+bp2au30+q+5x0VXi66WK56aulCpeOaCbeli0S0Zqrdty3QtLZZdy2nqF+zK0lJVzfLieHLJsVxXzXJVS1ZVvYp6TlXNR2axrIZh6HhSjrfhNvbkV2dnzeyubT/W0ROh60ZbPek42VrrZn71CM4EAAD6zN7zfzjr7z7/5+bDtcPzvwjzf5fUmh79Zf7HQHCcrJms//w2Y/4HAAAAAAAAAAAAAAAAAAAAAOBfsOH7Kd/3U9EafcRFJCEi0eNenxPdccDv/9UeHRcd1vCPewkR+9VyfjkfrmE/W5Ci2GLJpKTkZ/B6qAvrmRu56UkNpOWDvVLPryznYxKP8pF0q/y5E1NhXpvz/0uy8foZScnJ1tfPtMyPyKWLDXlDUvLpoVTElsXgdb2VfzGlev1Wblt+NNgHAAAAAMAgMHTTjvfvQT/YkJCd/TC/j78PbHt/PSxn2rlFJQAAAAAAODS3+qxk2rblHKCIi8gh4oNaxKQvjrGtuCYifXCMoyoSIhI+oweJf9uMt5Xy29gzLCI9/7Lso+j1byYAAAAAnbY19O8j9PllF08EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx0+79wKL9O1pRY494w+ViR/4JAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH3kdwAAAP//R8IgDA==") (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000060a66c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff16e684e2af03c5a3b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb708000000b703000000000000000000100000000011bef0f48b9fa39985e8cb9f11081d58b5e8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000003c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="196cef08122fc9b9f7001a83d7e1da91a7f783e445ccdce23b3b4e477ae62e2732f0688514f7ec7729f87eeed9d3e207df6890b9241622222078028e1a75311c0e32a68789ff132e740c95a930ef8b363d44f74e6506afaf6fc1746fe7da41c5db8932e55767041903d072ec4a5b4ec0ef1e307cbbdb5b9c1b63031ba2cffbccdad0a9a3ba56b5340eddde2f4770f236050b8e446ed88305986b"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40080) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) mknod$loop(&(0x7f00000002c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) sysinfo(&(0x7f0000000480)=""/133) r1 = creat(&(0x7f0000000d80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x12, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x31, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x12, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x31, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000080)={'dummy0\x00', 0x8}) (async) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000080)={'dummy0\x00', 0x8}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x18) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000004000000060000009200000000106efac5bed5b20ee7dd27829002dae7618fae28d42b64af48b48536ed3d9116274f514d259498a76c6c5b792fcc7edaa6ebaa31447dd14d3b5ce4f2de43eea71e85f310efccf8053b58435bdc6fa105f2eb6732308f358373e29e2b06084e4ba8c4b0ec25fbf9a715c37d583242da5ecceb5cd6900753289961375bcbe79353580ce56bd914069da4ee14a4cff7f21eb4dc06d5589a9622b8a2f62a54d5ab7b05e3ba3840b9bef92d1338"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000004000000060000009200000000106efac5bed5b20ee7dd27829002dae7618fae28d42b64af48b48536ed3d9116274f514d259498a76c6c5b792fcc7edaa6ebaa31447dd14d3b5ce4f2de43eea71e85f310efccf8053b58435bdc6fa105f2eb6732308f358373e29e2b06084e4ba8c4b0ec25fbf9a715c37d583242da5ecceb5cd6900753289961375bcbe79353580ce56bd914069da4ee14a4cff7f21eb4dc06d5589a9622b8a2f62a54d5ab7b05e3ba3840b9bef92d1338"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0700000000000000b7080000000000000000010000000000000000f8ffffffb703000008000000b7040000ce53be0f483d7d3070325900007d99bd6b185e3b51ad"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0700000000000000b7080000000000000000010000000000000000f8ffffffb703000008000000b7040000ce53be0f483d7d3070325900007d99bd6b185e3b51ad"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r4) ptrace$peeksig(0x4209, r4, &(0x7f00000000c0)={0x1, 0x1, 0xffffffffffffff8c}, &(0x7f00000002c0)) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000200)=ANY=[@ANYBLOB="2f000200000000000000bb23060098cc191e6b7e6bfa242178d59627da3d64aaa51af889ba83e076a927eebf"]) (async) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000200)=ANY=[@ANYBLOB="2f000200000000000000bb23060098cc191e6b7e6bfa242178d59627da3d64aaa51af889ba83e076a927eebf"]) bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='f2fs_unlink_enter\x00', 0xffffffffffffffff, 0x0, 0x200000000000}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='f2fs_unlink_enter\x00', 0xffffffffffffffff, 0x0, 0x200000000000}, 0x18) execve(0x0, 0x0, 0x0) 4.397088867s ago: executing program 0 (id=2678): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000780)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000000c0)=""/35, 0x23, 0x0, 0x0, 0x0, 0x800}}, 0x120) 4.396057217s ago: executing program 2 (id=2679): r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x7f, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x7a, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x9) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r3) keyctl$clear(0x5, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000880)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, r4) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x3, @empty, 0x1}, 0x1c) syz_usb_connect(0x5, 0x2d, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r8 = syz_io_uring_setup(0x12ab, &(0x7f0000000140)={0x0, 0x7495, 0x0, 0x2, 0x1f7}, &(0x7f0000000380)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x68, 0x1, r0, 0x0, &(0x7f00000008c0)={&(0x7f0000000200)=@tipc, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000400)=""/226, 0xe2}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f0000000680)=""/191, 0xbf}, {&(0x7f0000000740)=""/149, 0x95}, {&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000000800)=""/114, 0x72}, {&(0x7f0000000a80)=""/171, 0xab}, {&(0x7f0000000b40)=""/133, 0x85}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000300)=""/61, 0x3d}], 0xa, &(0x7f0000001cc0)=""/253, 0xfd}, 0x0, 0x40000042, 0x1}) io_uring_enter(r8, 0x3516, 0x0, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) listen(r5, 0x1) r11 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r11, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) accept(r5, 0x0, 0x0) 4.391835118s ago: executing program 3 (id=2680): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0xfffffffd, 0x0, 0x18, "0040001e1d11fb801f5d6000"}) syz_open_pts(r0, 0x0) r1 = syz_io_uring_setup(0x9e, &(0x7f0000000640)={0x0, 0x936, 0x0, 0x0, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000480)}) io_uring_enter(r1, 0x47ba, 0x0, 0x0, 0x0, 0x0) 4.380399438s ago: executing program 4 (id=2681): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000e80)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f192838b490541a18774566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000080)={0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x44000800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"/274, @ANYRES16, @ANYBLOB="04002cbd7000fcdbdf250a00000028000180140002000000000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x1fc}, 0x1, 0x0, 0x0, 0x28004080}, 0x4040014) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r5, 0x0, 0x9}, 0x18) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000740)={'ip_vti0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x700, 0x10, 0xbe, 0x6, {{0x2c, 0x4, 0x2, 0x3, 0xb0, 0x65, 0x0, 0x0, 0xa01688ca26ee7b6, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, {[@cipso={0x86, 0x27, 0x1, [{0x2, 0x9, "8f815efc698030"}, {0x5, 0x3, "e7"}, {0x4, 0x6, "8cf5c0ed"}, {0x5, 0xf, "a40f0674e712fbd101c4354fdb"}]}, @cipso={0x86, 0x72, 0x3, [{0x7, 0xc, "7f5d6ae2b0d7a5b80e0e"}, {0x0, 0xb, "47ebd440c1fe1dc96e"}, {0x6, 0x4, "7494"}, {0x6, 0x11, "e8e519001be1081619b9e78075cba3"}, {0x5, 0xa, "a94cc327519d8d86"}, {0x2, 0x4, 'e_'}, {0x2, 0x11, "837dc00e4223ffa777060b9cb00db2"}, {0x2, 0xd, "8fa00ec787a12da7fe9c80"}, {0x1, 0x2}, {0x0, 0x12, "8f57acf894cffdf9321937313287c79e"}]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=@gettfilter={0x24, 0x2e, 0x300, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0x2, 0x1}, {0xe, 0xffff}, {0xf, 0xffe0}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x84) r8 = syz_open_procfs(0x0, &(0x7f0000003700)='gid_map\x00') pread64(r8, &(0x7f00000000c0)=""/94, 0x5e, 0x2) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000c40)='./file0\x00', 0x808080, &(0x7f0000000c80)={[{@discard}, {@bh}, {@noblock_validity}]}, 0x2c, 0x52c, &(0x7f0000000640)="$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") socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.379879598s ago: executing program 0 (id=2682): syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xa, 0x2c2, &(0x7f00000008c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x106) renameat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0xffffffffffffffff, &(0x7f0000000100)='./mnt\x00') openat(0xffffffffffffffff, &(0x7f0000000300)='./mnt\x00', 0x24000, 0x2) socket(0x80000000000000a, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r1}, 0x10) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000400)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan0\x00'}) 3.464270693s ago: executing program 0 (id=2683): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0xfffffffd, 0x0, 0x18, "0040001e1d11fb801f5d6000"}) syz_open_pts(r0, 0x0) r1 = syz_io_uring_setup(0x9e, &(0x7f0000000640)={0x0, 0x936, 0x0, 0x0, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000480)}) io_uring_enter(r1, 0x47ba, 0x0, 0x0, 0x0, 0x0) 3.464049173s ago: executing program 3 (id=2684): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0x5ccc6e75, @rand_addr, 0x3}, 0x1c) listen(r3, 0x3) close_range(r3, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000400)='.\x00', 0xa4000021) close(r5) 3.461008283s ago: executing program 4 (id=2685): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_delrule={0x38, 0x21, 0x1, 0x0, 0x25dfdbfd, {0xa, 0x20, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x10}, [@FRA_DST={0x14, 0x1, @loopback}, @FIB_RULE_POLICY=@FRA_PROTOCOL={0x5, 0x15, 0x4}]}, 0x38}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000285000000170000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095"], 0x0, 0xffffffff}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0}, 0x90) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), &(0x7f0000000580)=r8}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f0000000780)}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x2}, 0x4192}) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2d41, 0x0) close_range(r9, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000b7080000000000007b8af8ff40629c04bfa21c00000000000702000000b70400bf0000000100000095f578bfc6"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'ipvlan1\x00', 0x100}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) 2.42513621s ago: executing program 0 (id=2686): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000e40), 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000380)={0x2, 0x4e25, @remote}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='mm_page_alloc\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t r'], 0x27) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f00000001c0)=0x2, 0x4) setsockopt$XDP_UMEM_FILL_RING(r7, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x0, r9}, 0x10) clock_gettime(0x0, &(0x7f0000000f80)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000001080)={&(0x7f0000000f40), 0x10, &(0x7f0000001040)={&(0x7f0000000fc0)={0x7, 0x0, 0xf7, {}, {r10, r11/1000+10000}, {0x4, 0x0, 0x1, 0x1}, 0x1, @canfd={{}, 0x2a, 0xf88a56b80fc47ccd, 0x0, 0x0, "e347fe286691cd99b20e3d386d8dee03b6696aab1b0546033fd06d5aae906d06fa1f3a1b14b8d95476bdb4c19bf125cd862a89bee527213f81c68b2e619f5105"}}, 0x80}, 0x1, 0x0, 0x0, 0x4008051}, 0x24044004) r12 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r12, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000009c0)={'syztnl1\x00', 0x0, 0x0, 0x4, 0x1, 0xf, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x4}, 0x0, 0x8000, 0x0, 0x2}}) 2.42459528s ago: executing program 3 (id=2687): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000004c0)='kfree\x00', r0, 0x0, 0x8000006}, 0x18) openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0), 0x8000, 0x0) r1 = socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000640)=[{&(0x7f00000005c0)="a50dafd420eb8e3705e0a5d6796dc8d44b5b043fb599dbdb450d4c8af4f84e9aed36c1092e750a2f4937dc3b565b63a2eafddca1e023f482421f8a0d94f9b79b", 0x40}, {&(0x7f0000000600)="1c089a", 0x3}], 0x2, 0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) splice(r3, 0x0, r5, 0x0, 0x2000000002ffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) memfd_secret(0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='workqueue_queue_work\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$netlink(0x10, 0x3, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000001400000008000a00fc00000018000180140002006e657464657673696d300000000000000800050000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES16=r6], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 2.4242967s ago: executing program 4 (id=2688): r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000002d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x6, @loopback, 0x8}, 0x1c, 0x0, 0x0, &(0x7f0000002940)=[@flowinfo={{0x14, 0x29, 0xb, 0x7}}], 0x18}}], 0x2, 0x8004) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f0000000540)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16, @ANYRES64=0x0, @ANYRES32=r4, @ANYBLOB="440002804000011024"], 0x60}, 0x1, 0x0, 0x0, 0x4000401}, 0x44084) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x41, 0x553, &(0x7f0000001a00)="$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") r5 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) sendfile(r5, r5, 0x0, 0x800000009) 1.308609008s ago: executing program 0 (id=2689): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xa90bfe986567845f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbff, 0x2ffffffff}, 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd308", 0x14, 0x6, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x2}}}}}}}, 0x0) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) 1.307663228s ago: executing program 2 (id=2690): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000400)='.\x00', 0xa4000021) close(r2) 1.307085438s ago: executing program 3 (id=2691): bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRESDEC, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="20942400", @ANYRES16=r3, @ANYBLOB="01002cbd7000fddbdf25070000000c00018006000100049f0000"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r6, 0x10c, 0x3, &(0x7f0000000340)=0x9, 0x4) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r7 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") fadvise64(r7, 0xfffffffffffffffd, 0x0, 0x1) 1.306768738s ago: executing program 4 (id=2692): syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xa, 0x2c2, &(0x7f00000008c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x106) renameat(0xffffffffffffffff, &(0x7f0000000080)='./mnt\x00', 0xffffffffffffffff, &(0x7f0000000100)='./mnt\x00') openat(0xffffffffffffffff, &(0x7f0000000300)='./mnt\x00', 0x24000, 0x2) socket(0x80000000000000a, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r1}, 0x10) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000400)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan0\x00'}) 1.39561ms ago: executing program 0 (id=2693): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRES32], 0x52) syz_usbip_server_init(0x1) syz_usbip_server_init(0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000f40)={'filter\x00', 0x10, 0x4, 0x3f0, 0x110, 0x0, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="e5fce0c960bc", @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x1e}, 0xf, 0xffffffff}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @broadcast, @loopback, 0x1, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) syz_usbip_server_init(0x2) syz_usbip_server_init(0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x3) syz_usbip_server_init(0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='oom_adj\x00') mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ee0000/0x3000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) read$rfkill(r4, 0x0, 0x300) syz_usbip_server_init(0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)=ANY=[]) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x0, 0x9, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, 0x700, 0x10, 0x7, 0x9}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000400)={'gretap0\x00', r5, 0x7800, 0x700, 0x76, 0x7, {{0x1b, 0x4, 0x0, 0x1e, 0x6c, 0x66, 0x0, 0xa, 0x0, 0x0, @empty, @empty, {[@timestamp_prespec={0x44, 0x24, 0x3e, 0x3, 0x3, [{@rand_addr=0x64010100, 0x3}, {@rand_addr=0x64010100, 0x8}, {@multicast1, 0x9}, {@multicast1, 0x9}]}, @timestamp_addr={0x44, 0x34, 0x87, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0x3b}, 0x6}, {@remote, 0x8001}, {@loopback, 0x2}, {@local, 0xa5}, {@remote, 0xfffffffa}, {@rand_addr=0x64010100, 0x1}]}]}}}}}) 682.5µs ago: executing program 2 (id=2694): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0xfffffffd, 0x0, 0x18, "0040001e1d11fb801f5d6000"}) syz_open_pts(r0, 0x0) r1 = syz_io_uring_setup(0x9e, &(0x7f0000000640)={0x0, 0x936, 0x0, 0x0, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000480)=[{0x0}], 0x1}) io_uring_enter(r1, 0x47ba, 0x0, 0x0, 0x0, 0x0) 357.92µs ago: executing program 3 (id=2695): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x3c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x13) r1 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0207e80702"], 0x10}}, 0x40044) r2 = socket$inet6(0xa, 0x3, 0x81) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@private2, @in6=@remote, 0x0, 0x56, 0x2, 0x0, 0x2}, {0x2, 0x0, 0xffffdffffffffffd, 0x0, 0xfbfffffffffffffb, 0x2000000, 0x2}, {0xcb5, 0x0, 0xd}, 0x1, 0x0, 0x1}, {{@in=@local, 0x4d3, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x3507, 0x4, 0x0, 0x0, 0xffffffff, 0x0, 0x4}}, 0xe8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @multicast}) write$tun(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="000386dd0a00100014004000000060ec970200140400fb8000000000000000000000000000aaff020000000000000000000000000001"], 0xffe) 0s ago: executing program 4 (id=2696): socket$inet_tcp(0x2, 0x1, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x21) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x2, 0x20400) ioctl$BLKRASET(r0, 0x1262, &(0x7f00000000c0)=0x5eaf) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x2, 0x0) waitid(0x2, 0x0, 0x0, 0x4100000e, 0x0) syz_clone3(&(0x7f000000dd80)={0xa00400, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = open(&(0x7f0000000300)='./file0\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r2, r2, 0x0, 0x800000009) kernel console output (not intermixed with test programs): 555] dump_stack_lvl+0xe8/0x140 [ 131.077462][ T9555] dump_stack+0x15/0x1b [ 131.077482][ T9555] should_fail_ex+0x265/0x280 [ 131.077541][ T9555] should_fail_alloc_page+0xf2/0x100 [ 131.077567][ T9555] __alloc_frozen_pages_noprof+0xff/0x360 [ 131.077609][ T9555] alloc_pages_mpol+0xb3/0x250 [ 131.077644][ T9555] vma_alloc_folio_noprof+0x1aa/0x300 [ 131.077724][ T9555] handle_mm_fault+0xec2/0x2be0 [ 131.077750][ T9555] ? mas_walk+0xf2/0x120 [ 131.077795][ T9555] do_user_addr_fault+0x636/0x1090 [ 131.077837][ T9555] exc_page_fault+0x62/0xa0 [ 131.077873][ T9555] asm_exc_page_fault+0x26/0x30 [ 131.077897][ T9555] RIP: 0033:0x7f82c8e30ca3 [ 131.077914][ T9555] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 131.077950][ T9555] RSP: 002b:00007f82c75b54a0 EFLAGS: 00010206 [ 131.077966][ T9555] RAX: 0000000000001000 RBX: 00007f82c75b5540 RCX: 00007f82bf196000 [ 131.077978][ T9555] RDX: 00007f82c75b56e0 RSI: 0000000000000001 RDI: 00007f82c75b55e0 [ 131.078055][ T9555] RBP: 00000000000000b7 R08: 0000000000000007 R09: 0000000000000046 [ 131.078069][ T9555] R10: 0000000000000050 R11: 00007f82c75b5540 R12: 0000000000000001 [ 131.078082][ T9555] R13: 00007f82c900c7c0 R14: 00000000000000ff R15: 00007f82c75b55e0 [ 131.078100][ T9555] [ 131.078120][ T9555] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 132.341798][ T9609] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 132.348415][ T9609] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 132.355972][ T9609] vhci_hcd vhci_hcd.0: Device attached [ 132.416876][ T9610] vhci_hcd: connection closed [ 132.417041][ T1453] vhci_hcd: stop threads [ 132.426097][ T1453] vhci_hcd: release socket [ 132.430627][ T1453] vhci_hcd: disconnect device [ 132.778712][ T9618] ALSA: seq fatal error: cannot create timer (-19) [ 132.861518][ T9620] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 132.868246][ T9620] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 132.875938][ T9620] vhci_hcd vhci_hcd.0: Device attached [ 132.905694][ T9621] vhci_hcd: connection closed [ 132.905936][ T41] vhci_hcd: stop threads [ 132.914942][ T41] vhci_hcd: release socket [ 132.919396][ T41] vhci_hcd: disconnect device [ 132.952118][ T9626] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2148'. [ 132.961178][ T9626] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2148'. [ 133.004076][ T9631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9631 comm=syz.2.2149 [ 133.045833][ T9635] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2152'. [ 133.082055][ T9635] FAULT_INJECTION: forcing a failure. [ 133.082055][ T9635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.095265][ T9635] CPU: 1 UID: 0 PID: 9635 Comm: syz.0.2152 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 133.095294][ T9635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 133.095342][ T9635] Call Trace: [ 133.095350][ T9635] [ 133.095359][ T9635] __dump_stack+0x1d/0x30 [ 133.095384][ T9635] dump_stack_lvl+0xe8/0x140 [ 133.095486][ T9635] dump_stack+0x15/0x1b [ 133.095503][ T9635] should_fail_ex+0x265/0x280 [ 133.095571][ T9635] should_fail+0xb/0x20 [ 133.095604][ T9635] should_fail_usercopy+0x1a/0x20 [ 133.095714][ T9635] _copy_from_user+0x1c/0xb0 [ 133.095737][ T9635] ___sys_sendmsg+0xc1/0x1d0 [ 133.095806][ T9635] __x64_sys_sendmsg+0xd4/0x160 [ 133.095845][ T9635] x64_sys_call+0x2999/0x2fb0 [ 133.095912][ T9635] do_syscall_64+0xd2/0x200 [ 133.095933][ T9635] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 133.095964][ T9635] ? clear_bhb_loop+0x40/0x90 [ 133.095990][ T9635] ? clear_bhb_loop+0x40/0x90 [ 133.096042][ T9635] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.096068][ T9635] RIP: 0033:0x7f082262e9a9 [ 133.096083][ T9635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.096108][ T9635] RSP: 002b:00007f0820c97038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.096130][ T9635] RAX: ffffffffffffffda RBX: 00007f0822855fa0 RCX: 00007f082262e9a9 [ 133.096145][ T9635] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000004 [ 133.096211][ T9635] RBP: 00007f0820c97090 R08: 0000000000000000 R09: 0000000000000000 [ 133.096242][ T9635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.096254][ T9635] R13: 0000000000000000 R14: 00007f0822855fa0 R15: 00007ffebe149568 [ 133.096276][ T9635] [ 133.479419][ T29] kauditd_printk_skb: 25861 callbacks suppressed [ 133.479436][ T29] audit: type=1400 audit(1752942321.664:124166): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.492198][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.507010][ T29] audit: type=1400 audit(1752942321.664:124167): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.513512][ T3034] audit: audit_lost=19889 audit_rate_limit=0 audit_backlog_limit=64 [ 133.534691][ T29] audit: type=1400 audit(1752942321.664:124168): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.542734][ T3034] audit: backlog limit exceeded [ 133.544659][ T9665] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.564226][ T29] audit: type=1400 audit(1752942321.664:124169): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.568889][ T9665] audit: audit_lost=19890 audit_rate_limit=0 audit_backlog_limit=64 [ 133.575392][ T29] audit: type=1400 audit(1752942321.664:124170): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.652201][ T9667] FAULT_INJECTION: forcing a failure. [ 133.652201][ T9667] name failslab, interval 1, probability 0, space 0, times 0 [ 133.664970][ T9667] CPU: 0 UID: 0 PID: 9667 Comm: syz.4.2157 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 133.665004][ T9667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 133.665019][ T9667] Call Trace: [ 133.665027][ T9667] [ 133.665036][ T9667] __dump_stack+0x1d/0x30 [ 133.665095][ T9667] dump_stack_lvl+0xe8/0x140 [ 133.665120][ T9667] dump_stack+0x15/0x1b [ 133.665140][ T9667] should_fail_ex+0x265/0x280 [ 133.665172][ T9667] should_failslab+0x8c/0xb0 [ 133.665195][ T9667] kmem_cache_alloc_noprof+0x50/0x310 [ 133.665301][ T9667] ? getname_flags+0x80/0x3b0 [ 133.665330][ T9667] getname_flags+0x80/0x3b0 [ 133.665353][ T9667] __x64_sys_link+0x33/0x70 [ 133.665390][ T9667] x64_sys_call+0x2af9/0x2fb0 [ 133.665449][ T9667] do_syscall_64+0xd2/0x200 [ 133.665472][ T9667] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 133.665558][ T9667] ? clear_bhb_loop+0x40/0x90 [ 133.665584][ T9667] ? clear_bhb_loop+0x40/0x90 [ 133.665609][ T9667] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.665631][ T9667] RIP: 0033:0x7f8d7f1be9a9 [ 133.665650][ T9667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.665702][ T9667] RSP: 002b:00007f8d7d81f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 133.665792][ T9667] RAX: ffffffffffffffda RBX: 00007f8d7f3e5fa0 RCX: 00007f8d7f1be9a9 [ 133.665808][ T9667] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000200000000040 [ 133.665823][ T9667] RBP: 00007f8d7d81f090 R08: 0000000000000000 R09: 0000000000000000 [ 133.665836][ T9667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.665848][ T9667] R13: 0000000000000000 R14: 00007f8d7f3e5fa0 R15: 00007ffea71faeb8 [ 133.665896][ T9667] [ 133.916597][ T9670] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 133.923168][ T9670] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 133.930728][ T9670] vhci_hcd vhci_hcd.0: Device attached [ 133.962001][ T9673] vhci_hcd: connection closed [ 133.962202][ T416] vhci_hcd: stop threads [ 133.971318][ T416] vhci_hcd: release socket [ 133.975755][ T416] vhci_hcd: disconnect device [ 134.134885][ T9696] bond5: entered promiscuous mode [ 134.140049][ T9696] bond5: entered allmulticast mode [ 134.145475][ T9696] 8021q: adding VLAN 0 to HW filter on device bond5 [ 134.156181][ T9696] bond5 (unregistering): Released all slaves [ 134.265802][ T9775] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 134.679687][ T9800] FAULT_INJECTION: forcing a failure. [ 134.679687][ T9800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.692880][ T9800] CPU: 0 UID: 0 PID: 9800 Comm: syz.1.2182 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 134.692908][ T9800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 134.692921][ T9800] Call Trace: [ 134.692927][ T9800] [ 134.692935][ T9800] __dump_stack+0x1d/0x30 [ 134.693027][ T9800] dump_stack_lvl+0xe8/0x140 [ 134.693047][ T9800] dump_stack+0x15/0x1b [ 134.693063][ T9800] should_fail_ex+0x265/0x280 [ 134.693095][ T9800] should_fail+0xb/0x20 [ 134.693160][ T9800] should_fail_usercopy+0x1a/0x20 [ 134.693255][ T9800] _copy_from_user+0x1c/0xb0 [ 134.693280][ T9800] do_ip6t_set_ctl+0x3a9/0x840 [ 134.693315][ T9800] nf_setsockopt+0x196/0x1b0 [ 134.693372][ T9800] ipv6_setsockopt+0x11a/0x130 [ 134.693400][ T9800] udpv6_setsockopt+0x99/0xb0 [ 134.693438][ T9800] sock_common_setsockopt+0x69/0x80 [ 134.693469][ T9800] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 134.693556][ T9800] __sys_setsockopt+0x184/0x200 [ 134.693592][ T9800] __x64_sys_setsockopt+0x64/0x80 [ 134.693705][ T9800] x64_sys_call+0x2bd5/0x2fb0 [ 134.693802][ T9800] do_syscall_64+0xd2/0x200 [ 134.693824][ T9800] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 134.693857][ T9800] ? clear_bhb_loop+0x40/0x90 [ 134.693880][ T9800] ? clear_bhb_loop+0x40/0x90 [ 134.693910][ T9800] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 134.694002][ T9800] RIP: 0033:0x7fdd89a5e9a9 [ 134.694020][ T9800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.694042][ T9800] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 134.694061][ T9800] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 134.694073][ T9800] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 134.694087][ T9800] RBP: 00007fdd880c7090 R08: 0000000000000470 R09: 0000000000000000 [ 134.694150][ T9800] R10: 0000200000000500 R11: 0000000000000246 R12: 0000000000000001 [ 134.694163][ T9800] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 134.694183][ T9800] [ 135.025045][ T9810] FAULT_INJECTION: forcing a failure. [ 135.025045][ T9810] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.038208][ T9810] CPU: 1 UID: 0 PID: 9810 Comm: syz.4.2185 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 135.038241][ T9810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 135.038257][ T9810] Call Trace: [ 135.038264][ T9810] [ 135.038273][ T9810] __dump_stack+0x1d/0x30 [ 135.038296][ T9810] dump_stack_lvl+0xe8/0x140 [ 135.038320][ T9810] dump_stack+0x15/0x1b [ 135.038340][ T9810] should_fail_ex+0x265/0x280 [ 135.038379][ T9810] should_fail+0xb/0x20 [ 135.038475][ T9810] should_fail_usercopy+0x1a/0x20 [ 135.038571][ T9810] _copy_from_user+0x1c/0xb0 [ 135.038595][ T9810] kstrtouint_from_user+0x69/0xf0 [ 135.038631][ T9810] ? 0xffffffff81000000 [ 135.038644][ T9810] ? selinux_file_permission+0x1e4/0x320 [ 135.038714][ T9810] proc_fail_nth_write+0x50/0x160 [ 135.038806][ T9810] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 135.038846][ T9810] vfs_write+0x266/0x8e0 [ 135.038918][ T9810] ? vfs_read+0x47f/0x6f0 [ 135.038950][ T9810] ? __rcu_read_unlock+0x4f/0x70 [ 135.038976][ T9810] ? __fget_files+0x184/0x1c0 [ 135.039035][ T9810] ksys_write+0xda/0x1a0 [ 135.039140][ T9810] __x64_sys_write+0x40/0x50 [ 135.039178][ T9810] x64_sys_call+0x2cdd/0x2fb0 [ 135.039281][ T9810] do_syscall_64+0xd2/0x200 [ 135.039303][ T9810] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 135.039329][ T9810] ? clear_bhb_loop+0x40/0x90 [ 135.039366][ T9810] ? clear_bhb_loop+0x40/0x90 [ 135.039391][ T9810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.039416][ T9810] RIP: 0033:0x7f8d7f1bd45f [ 135.039460][ T9810] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 135.039480][ T9810] RSP: 002b:00007f8d7d7fe030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 135.039498][ T9810] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d7f1bd45f [ 135.039511][ T9810] RDX: 0000000000000001 RSI: 00007f8d7d7fe0a0 RDI: 0000000000000003 [ 135.039524][ T9810] RBP: 00007f8d7d7fe090 R08: 0000000000000000 R09: 0000000000000000 [ 135.039577][ T9810] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 135.039590][ T9810] R13: 0000000000000000 R14: 00007f8d7f3e6080 R15: 00007ffea71faeb8 [ 135.039611][ T9810] [ 135.327239][ T9819] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2190'. [ 135.369669][ T9817] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 135.376437][ T9817] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 135.384046][ T9817] vhci_hcd vhci_hcd.0: Device attached [ 135.426070][ T9824] vhci_hcd: connection closed [ 135.426308][ T1453] vhci_hcd: stop threads [ 135.435359][ T1453] vhci_hcd: release socket [ 135.440029][ T1453] vhci_hcd: disconnect device [ 135.563221][ T9850] syz_tun: entered promiscuous mode [ 135.569753][ T9850] batadv_slave_0: entered promiscuous mode [ 135.576063][ T9850] hsr1: Slave A (syz_tun) is not up; please bring it up to get a fully working HSR network [ 135.586228][ T9850] hsr1: Slave B (batadv_slave_0) is not up; please bring it up to get a fully working HSR network [ 135.614724][ T9850] hsr1: entered allmulticast mode [ 135.614741][ T9850] syz_tun: entered allmulticast mode [ 135.614754][ T9850] batadv_slave_0: entered allmulticast mode [ 135.647252][ T9860] FAULT_INJECTION: forcing a failure. [ 135.647252][ T9860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.647342][ T9860] CPU: 0 UID: 0 PID: 9860 Comm: syz.4.2207 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 135.647373][ T9860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 135.647388][ T9860] Call Trace: [ 135.647395][ T9860] [ 135.647403][ T9860] __dump_stack+0x1d/0x30 [ 135.647425][ T9860] dump_stack_lvl+0xe8/0x140 [ 135.647453][ T9860] dump_stack+0x15/0x1b [ 135.647472][ T9860] should_fail_ex+0x265/0x280 [ 135.647537][ T9860] should_fail+0xb/0x20 [ 135.647585][ T9860] should_fail_usercopy+0x1a/0x20 [ 135.647623][ T9860] _copy_from_user+0x1c/0xb0 [ 135.647647][ T9860] kstrtouint_from_user+0x69/0xf0 [ 135.647746][ T9860] ? 0xffffffff81000000 [ 135.647759][ T9860] ? selinux_file_permission+0x1e4/0x320 [ 135.647853][ T9860] proc_fail_nth_write+0x50/0x160 [ 135.647894][ T9860] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 135.647988][ T9860] vfs_write+0x266/0x8e0 [ 135.648024][ T9860] ? vfs_read+0x47f/0x6f0 [ 135.648139][ T9860] ? __rcu_read_unlock+0x4f/0x70 [ 135.648166][ T9860] ? __fget_files+0x184/0x1c0 [ 135.648192][ T9860] ksys_write+0xda/0x1a0 [ 135.648254][ T9860] __x64_sys_write+0x40/0x50 [ 135.648294][ T9860] x64_sys_call+0x2cdd/0x2fb0 [ 135.648319][ T9860] do_syscall_64+0xd2/0x200 [ 135.648340][ T9860] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 135.648425][ T9860] ? clear_bhb_loop+0x40/0x90 [ 135.648449][ T9860] ? clear_bhb_loop+0x40/0x90 [ 135.648561][ T9860] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.648619][ T9860] RIP: 0033:0x7f8d7f1bd45f [ 135.648702][ T9860] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 135.648721][ T9860] RSP: 002b:00007f8d7d81f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 135.648741][ T9860] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d7f1bd45f [ 135.648756][ T9860] RDX: 0000000000000001 RSI: 00007f8d7d81f0a0 RDI: 0000000000000004 [ 135.648771][ T9860] RBP: 00007f8d7d81f090 R08: 0000000000000000 R09: 0000000000000000 [ 135.648783][ T9860] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 135.648795][ T9860] R13: 0000000000000000 R14: 00007f8d7f3e5fa0 R15: 00007ffea71faeb8 [ 135.648852][ T9860] [ 136.012550][ T9887] FAULT_INJECTION: forcing a failure. [ 136.012550][ T9887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.012583][ T9887] CPU: 1 UID: 0 PID: 9887 Comm: syz.0.2217 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 136.012625][ T9887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 136.012641][ T9887] Call Trace: [ 136.012648][ T9887] [ 136.012658][ T9887] __dump_stack+0x1d/0x30 [ 136.012683][ T9887] dump_stack_lvl+0xe8/0x140 [ 136.012761][ T9887] dump_stack+0x15/0x1b [ 136.012779][ T9887] should_fail_ex+0x265/0x280 [ 136.012814][ T9887] should_fail+0xb/0x20 [ 136.012879][ T9887] should_fail_usercopy+0x1a/0x20 [ 136.012917][ T9887] _copy_from_user+0x1c/0xb0 [ 136.012941][ T9887] __sys_bpf+0x178/0x790 [ 136.012998][ T9887] __x64_sys_bpf+0x41/0x50 [ 136.013031][ T9887] x64_sys_call+0x2478/0x2fb0 [ 136.013058][ T9887] do_syscall_64+0xd2/0x200 [ 136.013079][ T9887] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 136.013128][ T9887] ? clear_bhb_loop+0x40/0x90 [ 136.013150][ T9887] ? clear_bhb_loop+0x40/0x90 [ 136.013238][ T9887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.013309][ T9887] RIP: 0033:0x7f082262e9a9 [ 136.013326][ T9887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.013349][ T9887] RSP: 002b:00007f0820c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 136.013370][ T9887] RAX: ffffffffffffffda RBX: 00007f0822855fa0 RCX: 00007f082262e9a9 [ 136.013383][ T9887] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 136.013395][ T9887] RBP: 00007f0820c97090 R08: 0000000000000000 R09: 0000000000000000 [ 136.013410][ T9887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.013433][ T9887] R13: 0000000000000000 R14: 00007f0822855fa0 R15: 00007ffebe149568 [ 136.013455][ T9887] [ 136.074349][ T9895] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 136.145376][ T9900] netlink: 'syz.0.2221': attribute type 27 has an invalid length. [ 136.164393][ T9874] netlink: 'syz.3.2212': attribute type 13 has an invalid length. [ 136.197699][ T9900] lo: left promiscuous mode [ 136.199107][ T9874] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2212'. [ 136.385383][ T9900] tunl0: left promiscuous mode [ 136.390266][ T9900] gre0: left promiscuous mode [ 136.395215][ T9900] gretap0: left promiscuous mode [ 136.400291][ T9900] erspan0: left promiscuous mode [ 136.405361][ T9900] ip_vti0: left promiscuous mode [ 136.410407][ T9900] ip6_vti0: left promiscuous mode [ 136.415558][ T9900] sit0: left promiscuous mode [ 136.420400][ T9900] ip6tnl0: left promiscuous mode [ 136.425429][ T9900] ip6gre0: left promiscuous mode [ 136.430457][ T9900] syz_tun: left promiscuous mode [ 136.435468][ T9900] ip6gretap0: left promiscuous mode [ 136.440791][ T9900] bridge0: left promiscuous mode [ 136.445803][ T9900] vcan0: left promiscuous mode [ 136.450637][ T9900] bond0: left promiscuous mode [ 136.456123][ T9900] dummy0: left promiscuous mode [ 136.461237][ T9900] nlmon0: left promiscuous mode [ 136.466195][ T9900] caif0: left promiscuous mode [ 136.471070][ T9900] vxcan0: left promiscuous mode [ 136.476002][ T9900] vxcan1: left promiscuous mode [ 136.480934][ T9900] veth0: left promiscuous mode [ 136.485876][ T9900] veth1: left promiscuous mode [ 136.490698][ T9900] wg0: left promiscuous mode [ 136.495363][ T9900] wg1: left promiscuous mode [ 136.500018][ T9900] wg2: left promiscuous mode [ 136.504739][ T9900] veth0_to_bridge: left promiscuous mode [ 136.510589][ T9900] bridge_slave_0: left promiscuous mode [ 136.516242][ T9900] veth1_to_bridge: left promiscuous mode [ 136.521962][ T9900] bridge_slave_1: left promiscuous mode [ 136.527667][ T9900] veth0_to_bond: left promiscuous mode [ 136.533306][ T9900] bond_slave_0: left promiscuous mode [ 136.538727][ T9900] veth1_to_bond: left promiscuous mode [ 136.544279][ T9900] bond_slave_1: left promiscuous mode [ 136.549861][ T9900] veth0_to_team: left promiscuous mode [ 136.555425][ T9900] team_slave_0: left promiscuous mode [ 136.560993][ T9900] veth1_to_team: left promiscuous mode [ 136.566539][ T9900] team_slave_1: left promiscuous mode [ 136.572073][ T9900] veth0_to_batadv: left promiscuous mode [ 136.577889][ T9900] batadv_slave_0: left promiscuous mode [ 136.583623][ T9900] veth1_to_batadv: left promiscuous mode [ 136.589383][ T9900] batadv_slave_1: left promiscuous mode [ 136.595044][ T9900] xfrm0: left promiscuous mode [ 136.599920][ T9900] veth0_to_hsr: left promiscuous mode [ 136.605445][ T9900] veth1_to_hsr: left promiscuous mode [ 136.611166][ T9900] hsr0: left promiscuous mode [ 136.616055][ T9900] veth1_virt_wifi: left promiscuous mode [ 136.621767][ T9900] veth0_virt_wifi: left promiscuous mode [ 136.627571][ T9900] vlan0: left promiscuous mode [ 136.632697][ T9900] vlan1: left promiscuous mode [ 136.637555][ T9900] macvlan0: left promiscuous mode [ 136.642827][ T9900] macvlan1: left promiscuous mode [ 136.648022][ T9900] ipvlan0: left promiscuous mode [ 136.653090][ T9900] ipvlan1: left promiscuous mode [ 136.658373][ T9900] macvtap0: left promiscuous mode [ 136.663488][ T9900] macsec0: left promiscuous mode [ 136.668565][ T9900] geneve0: left promiscuous mode [ 136.673624][ T9900] geneve1: left promiscuous mode [ 136.679097][ T9900] netdevsim netdevsim0 netdevsim0: left promiscuous mode [ 136.686508][ T9900] netdevsim netdevsim0 netdevsim1: left promiscuous mode [ 136.693794][ T9900] netdevsim netdevsim0 netdevsim2: left promiscuous mode [ 136.701176][ T9900] netdevsim netdevsim0 netdevsim3: left promiscuous mode [ 136.708258][ T9900] vxcan2: left promiscuous mode [ 136.713258][ T9900] vxcan3: left promiscuous mode [ 136.718205][ T9900] ip6_vti1: left promiscuous mode [ 136.723304][ T9900] vxcan4: left promiscuous mode [ 136.728191][ T9900] vxcan5: left promiscuous mode [ 136.733126][ T9900] bridge1: left promiscuous mode [ 136.738187][ T9900] vxcan6: left promiscuous mode [ 136.743220][ T9900] vxcan7: left promiscuous mode [ 136.748176][ T9900] syztnl0: left promiscuous mode [ 136.753247][ T9900] bond1: left promiscuous mode [ 136.758132][ T9900] vxcan8: left promiscuous mode [ 136.763078][ T9900] vxcan9: left promiscuous mode [ 136.768558][ T9874] erspan0: refused to change device tx_queue_len [ 136.775552][ T9874] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 136.874185][ T9912] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 136.880859][ T9912] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 136.888563][ T9912] vhci_hcd vhci_hcd.0: Device attached [ 136.899338][ T9918] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2227'. [ 136.919820][ T9919] vhci_hcd: connection closed [ 136.928254][ T9926] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 136.939501][ T9926] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 136.947137][ T9926] vhci_hcd vhci_hcd.0: Device attached [ 136.949406][ T1453] vhci_hcd: stop threads [ 136.956928][ T1453] vhci_hcd: release socket [ 136.961378][ T1453] vhci_hcd: disconnect device [ 136.982281][ T9927] vhci_hcd: connection closed [ 136.982462][ T1453] vhci_hcd: stop threads [ 136.991720][ T1453] vhci_hcd: release socket [ 136.996157][ T1453] vhci_hcd: disconnect device [ 137.019819][ T9939] FAULT_INJECTION: forcing a failure. [ 137.019819][ T9939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.033014][ T9939] CPU: 1 UID: 0 PID: 9939 Comm: syz.3.2235 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 137.033044][ T9939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.033058][ T9939] Call Trace: [ 137.033064][ T9939] [ 137.033119][ T9939] __dump_stack+0x1d/0x30 [ 137.033144][ T9939] dump_stack_lvl+0xe8/0x140 [ 137.033167][ T9939] dump_stack+0x15/0x1b [ 137.033188][ T9939] should_fail_ex+0x265/0x280 [ 137.033230][ T9939] should_fail+0xb/0x20 [ 137.033263][ T9939] should_fail_usercopy+0x1a/0x20 [ 137.033374][ T9939] strncpy_from_user+0x25/0x230 [ 137.033405][ T9939] __x64_sys_getxattr+0xa5/0x140 [ 137.033444][ T9939] x64_sys_call+0x2f5b/0x2fb0 [ 137.033468][ T9939] do_syscall_64+0xd2/0x200 [ 137.033529][ T9939] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 137.033573][ T9939] ? clear_bhb_loop+0x40/0x90 [ 137.033596][ T9939] ? clear_bhb_loop+0x40/0x90 [ 137.033623][ T9939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.033714][ T9939] RIP: 0033:0x7f82c8f6e9a9 [ 137.033731][ T9939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.033752][ T9939] RSP: 002b:00007f82c75d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 137.033773][ T9939] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6e9a9 [ 137.033786][ T9939] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000200000000000 [ 137.033799][ T9939] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 137.033812][ T9939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.033825][ T9939] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 137.033859][ T9939] [ 137.221324][ T9934] can0: slcan on ttyS3. [ 137.252328][ T9954] FAULT_INJECTION: forcing a failure. [ 137.252328][ T9954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.265532][ T9954] CPU: 0 UID: 0 PID: 9954 Comm: syz.3.2239 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 137.265567][ T9954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.265583][ T9954] Call Trace: [ 137.265589][ T9954] [ 137.265597][ T9954] __dump_stack+0x1d/0x30 [ 137.265697][ T9954] dump_stack_lvl+0xe8/0x140 [ 137.265721][ T9954] dump_stack+0x15/0x1b [ 137.265742][ T9954] should_fail_ex+0x265/0x280 [ 137.265834][ T9954] should_fail+0xb/0x20 [ 137.265867][ T9954] should_fail_usercopy+0x1a/0x20 [ 137.265921][ T9954] _copy_to_user+0x20/0xa0 [ 137.265944][ T9954] simple_read_from_buffer+0xb5/0x130 [ 137.266005][ T9954] proc_fail_nth_read+0x100/0x140 [ 137.266081][ T9954] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 137.266126][ T9954] vfs_read+0x1a0/0x6f0 [ 137.266193][ T9954] ? __rcu_read_unlock+0x4f/0x70 [ 137.266293][ T9954] ? __rcu_read_unlock+0x4f/0x70 [ 137.266314][ T9954] ? __fget_files+0x184/0x1c0 [ 137.266336][ T9954] ksys_read+0xda/0x1a0 [ 137.266418][ T9954] __x64_sys_read+0x40/0x50 [ 137.266551][ T9954] x64_sys_call+0x2d77/0x2fb0 [ 137.266584][ T9954] do_syscall_64+0xd2/0x200 [ 137.266606][ T9954] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 137.266639][ T9954] ? clear_bhb_loop+0x40/0x90 [ 137.266666][ T9954] ? clear_bhb_loop+0x40/0x90 [ 137.266759][ T9954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.266785][ T9954] RIP: 0033:0x7f82c8f6d3bc [ 137.266803][ T9954] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 137.266859][ T9954] RSP: 002b:00007f82c75d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 137.266880][ T9954] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6d3bc [ 137.266893][ T9954] RDX: 000000000000000f RSI: 00007f82c75d70a0 RDI: 0000000000000003 [ 137.266985][ T9954] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 137.266997][ T9954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.267009][ T9954] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 137.267029][ T9954] [ 137.326796][ T9960] syzkaller0: entered promiscuous mode [ 137.330871][ T9942] can0 (unregistered): slcan off ttyS3. [ 137.334746][ T9960] syzkaller0: entered allmulticast mode [ 137.380704][ T9966] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2244'. [ 137.507994][ T9969] SELinux: syz.2.2245 (9969) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 137.571505][ T9975] FAULT_INJECTION: forcing a failure. [ 137.571505][ T9975] name failslab, interval 1, probability 0, space 0, times 0 [ 137.584245][ T9975] CPU: 0 UID: 0 PID: 9975 Comm: syz.3.2246 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 137.584276][ T9975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.584290][ T9975] Call Trace: [ 137.584297][ T9975] [ 137.584305][ T9975] __dump_stack+0x1d/0x30 [ 137.584422][ T9975] dump_stack_lvl+0xe8/0x140 [ 137.584445][ T9975] dump_stack+0x15/0x1b [ 137.584464][ T9975] should_fail_ex+0x265/0x280 [ 137.584500][ T9975] should_failslab+0x8c/0xb0 [ 137.584526][ T9975] kmem_cache_alloc_node_noprof+0x57/0x320 [ 137.584615][ T9975] ? __alloc_skb+0x101/0x320 [ 137.584648][ T9975] __alloc_skb+0x101/0x320 [ 137.584678][ T9975] netlink_alloc_large_skb+0xba/0xf0 [ 137.584774][ T9975] netlink_sendmsg+0x3cf/0x6b0 [ 137.584802][ T9975] ? __pfx_netlink_sendmsg+0x10/0x10 [ 137.584825][ T9975] __sock_sendmsg+0x142/0x180 [ 137.584862][ T9975] sock_write_iter+0x165/0x1b0 [ 137.584889][ T9975] do_iter_readv_writev+0x421/0x4c0 [ 137.584931][ T9975] vfs_writev+0x2df/0x8b0 [ 137.585015][ T9975] do_writev+0xe7/0x210 [ 137.585116][ T9975] __x64_sys_writev+0x45/0x50 [ 137.585135][ T9975] x64_sys_call+0x2006/0x2fb0 [ 137.585158][ T9975] do_syscall_64+0xd2/0x200 [ 137.585177][ T9975] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 137.585248][ T9975] ? clear_bhb_loop+0x40/0x90 [ 137.585273][ T9975] ? clear_bhb_loop+0x40/0x90 [ 137.585296][ T9975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.585384][ T9975] RIP: 0033:0x7f82c8f6e9a9 [ 137.585402][ T9975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.585423][ T9975] RSP: 002b:00007f82c75d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 137.585441][ T9975] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6e9a9 [ 137.585455][ T9975] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 0000000000000003 [ 137.585469][ T9975] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 137.585522][ T9975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.585537][ T9975] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 137.585559][ T9975] [ 137.896424][ T9986] FAULT_INJECTION: forcing a failure. [ 137.896424][ T9986] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.909647][ T9986] CPU: 1 UID: 0 PID: 9986 Comm: syz.2.2252 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 137.909728][ T9986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.909742][ T9986] Call Trace: [ 137.909748][ T9986] [ 137.909755][ T9986] __dump_stack+0x1d/0x30 [ 137.909776][ T9986] dump_stack_lvl+0xe8/0x140 [ 137.909855][ T9986] dump_stack+0x15/0x1b [ 137.909953][ T9986] should_fail_ex+0x265/0x280 [ 137.909990][ T9986] should_fail+0xb/0x20 [ 137.910079][ T9986] should_fail_usercopy+0x1a/0x20 [ 137.910195][ T9986] _copy_to_user+0x20/0xa0 [ 137.910219][ T9986] simple_read_from_buffer+0xb5/0x130 [ 137.910259][ T9986] proc_fail_nth_read+0x100/0x140 [ 137.910371][ T9986] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 137.910436][ T9986] vfs_read+0x1a0/0x6f0 [ 137.910519][ T9986] ? __rcu_read_unlock+0x4f/0x70 [ 137.910569][ T9986] ? __rcu_read_unlock+0x4f/0x70 [ 137.910623][ T9986] ? __fget_files+0x184/0x1c0 [ 137.910649][ T9986] ksys_read+0xda/0x1a0 [ 137.910688][ T9986] __x64_sys_read+0x40/0x50 [ 137.910720][ T9986] x64_sys_call+0x2d77/0x2fb0 [ 137.910810][ T9986] do_syscall_64+0xd2/0x200 [ 137.910827][ T9986] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 137.910864][ T9986] ? clear_bhb_loop+0x40/0x90 [ 137.910889][ T9986] ? clear_bhb_loop+0x40/0x90 [ 137.910920][ T9986] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.910946][ T9986] RIP: 0033:0x7f5c4ef3d3bc [ 137.910963][ T9986] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 137.911049][ T9986] RSP: 002b:00007f5c4d59f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 137.911106][ T9986] RAX: ffffffffffffffda RBX: 00007f5c4f165fa0 RCX: 00007f5c4ef3d3bc [ 137.911121][ T9986] RDX: 000000000000000f RSI: 00007f5c4d59f0a0 RDI: 0000000000000003 [ 137.911135][ T9986] RBP: 00007f5c4d59f090 R08: 0000000000000000 R09: 0000000000000000 [ 137.911149][ T9986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.911163][ T9986] R13: 0000000000000000 R14: 00007f5c4f165fa0 R15: 00007ffe43310f28 [ 137.911186][ T9986] [ 137.917430][ T9981] lo speed is unknown, defaulting to 1000 [ 138.109958][ T9997] netlink: 'syz.4.2247': attribute type 39 has an invalid length. [ 138.130192][ T9983] lo speed is unknown, defaulting to 1000 [ 138.489645][ T29] kauditd_printk_skb: 29157 callbacks suppressed [ 138.489667][ T29] audit: type=1400 audit(1752942326.684:139383): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.543311][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 138.549877][ T3034] audit: audit_lost=24539 audit_rate_limit=0 audit_backlog_limit=64 [ 138.557873][ T3034] audit: backlog limit exceeded [ 138.563099][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 138.569685][ T3034] audit: audit_lost=24540 audit_rate_limit=0 audit_backlog_limit=64 [ 138.572697][ T29] audit: type=1400 audit(1752942326.704:139384): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.577704][ T3034] audit: backlog limit exceeded [ 138.598997][ T29] audit: type=1400 audit(1752942326.704:139385): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.625147][ T29] audit: type=1400 audit(1752942326.704:139386): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.698243][T10048] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2257'. [ 138.780582][T10052] FAULT_INJECTION: forcing a failure. [ 138.780582][T10052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 138.793780][T10052] CPU: 1 UID: 0 PID: 10052 Comm: syz.3.2259 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 138.793811][T10052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 138.793833][T10052] Call Trace: [ 138.793841][T10052] [ 138.793849][T10052] __dump_stack+0x1d/0x30 [ 138.793914][T10052] dump_stack_lvl+0xe8/0x140 [ 138.793937][T10052] dump_stack+0x15/0x1b [ 138.793958][T10052] should_fail_ex+0x265/0x280 [ 138.793998][T10052] should_fail+0xb/0x20 [ 138.794099][T10052] should_fail_usercopy+0x1a/0x20 [ 138.794139][T10052] _copy_from_iter+0xcf/0xe40 [ 138.794181][T10052] ? tun_get_user+0xb1/0x2500 [ 138.794213][T10052] tun_get_user+0x144/0x2500 [ 138.794324][T10052] ? ref_tracker_alloc+0x1f2/0x2f0 [ 138.794361][T10052] ? selinux_file_permission+0x1e4/0x320 [ 138.794404][T10052] tun_chr_write_iter+0x15e/0x210 [ 138.794443][T10052] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 138.794472][T10052] vfs_write+0x4a0/0x8e0 [ 138.794512][T10052] ksys_write+0xda/0x1a0 [ 138.794552][T10052] __x64_sys_write+0x40/0x50 [ 138.794626][T10052] x64_sys_call+0x2cdd/0x2fb0 [ 138.794648][T10052] do_syscall_64+0xd2/0x200 [ 138.794666][T10052] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 138.794717][T10052] ? clear_bhb_loop+0x40/0x90 [ 138.794739][T10052] ? clear_bhb_loop+0x40/0x90 [ 138.794764][T10052] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 138.794843][T10052] RIP: 0033:0x7f82c8f6e9a9 [ 138.794861][T10052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.794917][T10052] RSP: 002b:00007f82c75d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 138.794940][T10052] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6e9a9 [ 138.794963][T10052] RDX: 000000000000003b RSI: 0000200000000100 RDI: 0000000000000003 [ 138.794978][T10052] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 138.795049][T10052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 138.795062][T10052] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 138.795084][T10052] [ 139.094345][T10063] FAULT_INJECTION: forcing a failure. [ 139.094345][T10063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.107533][T10063] CPU: 1 UID: 0 PID: 10063 Comm: syz.2.2262 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 139.107565][T10063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 139.107579][T10063] Call Trace: [ 139.107585][T10063] [ 139.107592][T10063] __dump_stack+0x1d/0x30 [ 139.107666][T10063] dump_stack_lvl+0xe8/0x140 [ 139.107750][T10063] dump_stack+0x15/0x1b [ 139.107769][T10063] should_fail_ex+0x265/0x280 [ 139.107822][T10063] should_fail+0xb/0x20 [ 139.107851][T10063] should_fail_usercopy+0x1a/0x20 [ 139.107976][T10063] _copy_from_iter+0xcf/0xe40 [ 139.108090][T10063] ? mntput+0x4b/0x80 [ 139.108115][T10063] ? terminate_walk+0x27f/0x2a0 [ 139.108138][T10063] tun_get_user+0x144/0x2500 [ 139.108179][T10063] ? ref_tracker_alloc+0x1f2/0x2f0 [ 139.108275][T10063] ? selinux_file_permission+0x1e4/0x320 [ 139.108304][T10063] tun_chr_write_iter+0x15e/0x210 [ 139.108332][T10063] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 139.108361][T10063] vfs_write+0x4a0/0x8e0 [ 139.108469][T10063] ksys_write+0xda/0x1a0 [ 139.108590][T10063] __x64_sys_write+0x40/0x50 [ 139.108630][T10063] x64_sys_call+0x2cdd/0x2fb0 [ 139.108657][T10063] do_syscall_64+0xd2/0x200 [ 139.108676][T10063] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 139.108782][T10063] ? clear_bhb_loop+0x40/0x90 [ 139.108809][T10063] ? clear_bhb_loop+0x40/0x90 [ 139.108866][T10063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.108896][T10063] RIP: 0033:0x7f5c4ef3e9a9 [ 139.108914][T10063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.108935][T10063] RSP: 002b:00007f5c4d59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 139.108955][T10063] RAX: ffffffffffffffda RBX: 00007f5c4f165fa0 RCX: 00007f5c4ef3e9a9 [ 139.108969][T10063] RDX: 0000000000000036 RSI: 0000200000000100 RDI: 0000000000000003 [ 139.108985][T10063] RBP: 00007f5c4d59f090 R08: 0000000000000000 R09: 0000000000000000 [ 139.108997][T10063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.109067][T10063] R13: 0000000000000000 R14: 00007f5c4f165fa0 R15: 00007ffe43310f28 [ 139.109088][T10063] [ 139.338441][T10088] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2268'. [ 139.348159][T10082] FAULT_INJECTION: forcing a failure. [ 139.348159][T10082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.361296][T10082] CPU: 0 UID: 0 PID: 10082 Comm: syz.3.2270 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 139.361329][T10082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 139.361343][T10082] Call Trace: [ 139.361399][T10082] [ 139.361408][T10082] __dump_stack+0x1d/0x30 [ 139.361431][T10082] dump_stack_lvl+0xe8/0x140 [ 139.361484][T10082] dump_stack+0x15/0x1b [ 139.361503][T10082] should_fail_ex+0x265/0x280 [ 139.361556][T10082] should_fail+0xb/0x20 [ 139.361584][T10082] should_fail_usercopy+0x1a/0x20 [ 139.361618][T10082] _copy_to_user+0x20/0xa0 [ 139.361642][T10082] simple_read_from_buffer+0xb5/0x130 [ 139.361737][T10082] proc_fail_nth_read+0x100/0x140 [ 139.361832][T10082] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 139.361924][T10082] vfs_read+0x1a0/0x6f0 [ 139.361959][T10082] ? __rcu_read_unlock+0x4f/0x70 [ 139.361987][T10082] ? __rcu_read_unlock+0x4f/0x70 [ 139.362008][T10082] ? __fget_files+0x184/0x1c0 [ 139.362030][T10082] ksys_read+0xda/0x1a0 [ 139.362132][T10082] __x64_sys_read+0x40/0x50 [ 139.362168][T10082] x64_sys_call+0x2d77/0x2fb0 [ 139.362194][T10082] do_syscall_64+0xd2/0x200 [ 139.362212][T10082] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 139.362292][T10082] ? clear_bhb_loop+0x40/0x90 [ 139.362318][T10082] ? clear_bhb_loop+0x40/0x90 [ 139.362344][T10082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.362413][T10082] RIP: 0033:0x7f82c8f6d3bc [ 139.362430][T10082] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 139.362451][T10082] RSP: 002b:00007f82c75d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 139.362501][T10082] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6d3bc [ 139.362559][T10082] RDX: 000000000000000f RSI: 00007f82c75d70a0 RDI: 0000000000000003 [ 139.362573][T10082] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 139.362587][T10082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.362609][T10082] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 139.362629][T10082] [ 139.648905][T10107] FAULT_INJECTION: forcing a failure. [ 139.648905][T10107] name failslab, interval 1, probability 0, space 0, times 0 [ 139.661837][T10107] CPU: 1 UID: 0 PID: 10107 Comm: syz.3.2272 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 139.661872][T10107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 139.661948][T10107] Call Trace: [ 139.661956][T10107] [ 139.661966][T10107] __dump_stack+0x1d/0x30 [ 139.662002][T10107] dump_stack_lvl+0xe8/0x140 [ 139.662025][T10107] dump_stack+0x15/0x1b [ 139.662045][T10107] should_fail_ex+0x265/0x280 [ 139.662087][T10107] should_failslab+0x8c/0xb0 [ 139.662257][T10107] kmem_cache_alloc_noprof+0x50/0x310 [ 139.662285][T10107] ? getname_flags+0x80/0x3b0 [ 139.662309][T10107] getname_flags+0x80/0x3b0 [ 139.662331][T10107] do_sys_openat2+0x60/0x110 [ 139.662360][T10107] __x64_sys_openat+0xf2/0x120 [ 139.662442][T10107] x64_sys_call+0x1af/0x2fb0 [ 139.662463][T10107] do_syscall_64+0xd2/0x200 [ 139.662481][T10107] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 139.662576][T10107] ? clear_bhb_loop+0x40/0x90 [ 139.662598][T10107] ? clear_bhb_loop+0x40/0x90 [ 139.662620][T10107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.662642][T10107] RIP: 0033:0x7f82c8f6e9a9 [ 139.662692][T10107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.662714][T10107] RSP: 002b:00007f82c75b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 139.662732][T10107] RAX: ffffffffffffffda RBX: 00007f82c9196080 RCX: 00007f82c8f6e9a9 [ 139.662759][T10107] RDX: 0000000000000100 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 139.662771][T10107] RBP: 00007f82c75b6090 R08: 0000000000000000 R09: 0000000000000000 [ 139.662784][T10107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.662843][T10107] R13: 0000000000000000 R14: 00007f82c9196080 R15: 00007fffbbe5bc78 [ 139.662867][T10107] [ 139.923611][T10126] netlink: 'syz.3.2280': attribute type 4 has an invalid length. [ 139.935043][T10126] netlink: 'syz.3.2280': attribute type 4 has an invalid length. [ 139.961897][T10128] SELinux: syz.2.2281 (10128) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 140.065319][T10137] FAULT_INJECTION: forcing a failure. [ 140.065319][T10137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.078512][T10137] CPU: 0 UID: 0 PID: 10137 Comm: syz.3.2283 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 140.078621][T10137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 140.078680][T10137] Call Trace: [ 140.078688][T10137] [ 140.078696][T10137] __dump_stack+0x1d/0x30 [ 140.078718][T10137] dump_stack_lvl+0xe8/0x140 [ 140.078738][T10137] dump_stack+0x15/0x1b [ 140.078756][T10137] should_fail_ex+0x265/0x280 [ 140.078791][T10137] should_fail+0xb/0x20 [ 140.078894][T10137] should_fail_usercopy+0x1a/0x20 [ 140.078932][T10137] _copy_to_user+0x20/0xa0 [ 140.078956][T10137] simple_read_from_buffer+0xb5/0x130 [ 140.079066][T10137] proc_fail_nth_read+0x100/0x140 [ 140.079110][T10137] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 140.079200][T10137] vfs_read+0x1a0/0x6f0 [ 140.079235][T10137] ? __rcu_read_unlock+0x4f/0x70 [ 140.079259][T10137] ? __rcu_read_unlock+0x4f/0x70 [ 140.079386][T10137] ? __fget_files+0x184/0x1c0 [ 140.079410][T10137] ksys_read+0xda/0x1a0 [ 140.079444][T10137] __x64_sys_read+0x40/0x50 [ 140.079495][T10137] x64_sys_call+0x2d77/0x2fb0 [ 140.079521][T10137] do_syscall_64+0xd2/0x200 [ 140.079542][T10137] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 140.079633][T10137] ? clear_bhb_loop+0x40/0x90 [ 140.079657][T10137] ? clear_bhb_loop+0x40/0x90 [ 140.079680][T10137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.079781][T10137] RIP: 0033:0x7f82c8f6d3bc [ 140.079799][T10137] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 140.079819][T10137] RSP: 002b:00007f82c75b6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 140.079840][T10137] RAX: ffffffffffffffda RBX: 00007f82c9196080 RCX: 00007f82c8f6d3bc [ 140.079854][T10137] RDX: 000000000000000f RSI: 00007f82c75b60a0 RDI: 0000000000000005 [ 140.079868][T10137] RBP: 00007f82c75b6090 R08: 0000000000000000 R09: 0000000000000000 [ 140.079924][T10137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.079935][T10137] R13: 0000000000000000 R14: 00007f82c9196080 R15: 00007fffbbe5bc78 [ 140.079965][T10137] [ 140.392058][T10143] FAULT_INJECTION: forcing a failure. [ 140.392058][T10143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.401737][T10151] FAULT_INJECTION: forcing a failure. [ 140.401737][T10151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.405182][T10143] CPU: 1 UID: 0 PID: 10143 Comm: syz.1.2288 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 140.405214][T10143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 140.405227][T10143] Call Trace: [ 140.405233][T10143] [ 140.405242][T10143] __dump_stack+0x1d/0x30 [ 140.405266][T10143] dump_stack_lvl+0xe8/0x140 [ 140.405288][T10143] dump_stack+0x15/0x1b [ 140.405344][T10143] should_fail_ex+0x265/0x280 [ 140.405380][T10143] should_fail+0xb/0x20 [ 140.405430][T10143] should_fail_usercopy+0x1a/0x20 [ 140.405660][T10143] _copy_to_user+0x20/0xa0 [ 140.405682][T10143] copy_siginfo_to_user+0x22/0xb0 [ 140.405735][T10143] x64_setup_rt_frame+0x2b5/0x580 [ 140.405761][T10143] arch_do_signal_or_restart+0x27c/0x480 [ 140.405789][T10143] exit_to_user_mode_loop+0x7a/0x100 [ 140.405875][T10143] do_syscall_64+0x1d6/0x200 [ 140.405895][T10143] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 140.405925][T10143] ? clear_bhb_loop+0x40/0x90 [ 140.405957][T10143] ? clear_bhb_loop+0x40/0x90 [ 140.406037][T10143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.406067][T10143] RIP: 0033:0x7fdd89a5e9a7 [ 140.406088][T10143] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 140.406108][T10143] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 140.406130][T10143] RAX: 0000000000000000 RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 140.406143][T10143] RDX: 0000000000001000 RSI: 0000200000000bc0 RDI: 0000000000000003 [ 140.406157][T10143] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 140.406221][T10143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.406234][T10143] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 140.406288][T10143] [ 140.602940][T10151] CPU: 0 UID: 0 PID: 10151 Comm: syz.2.2292 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 140.603076][T10151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 140.603090][T10151] Call Trace: [ 140.603097][T10151] [ 140.603105][T10151] __dump_stack+0x1d/0x30 [ 140.603181][T10151] dump_stack_lvl+0xe8/0x140 [ 140.603203][T10151] dump_stack+0x15/0x1b [ 140.603236][T10151] should_fail_ex+0x265/0x280 [ 140.603270][T10151] should_fail+0xb/0x20 [ 140.603299][T10151] should_fail_usercopy+0x1a/0x20 [ 140.603350][T10151] _copy_to_user+0x20/0xa0 [ 140.603380][T10151] simple_read_from_buffer+0xb5/0x130 [ 140.603416][T10151] proc_fail_nth_read+0x100/0x140 [ 140.603485][T10151] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 140.603522][T10151] vfs_read+0x1a0/0x6f0 [ 140.603554][T10151] ? __rcu_read_unlock+0x4f/0x70 [ 140.603635][T10151] ? __rcu_read_unlock+0x4f/0x70 [ 140.603731][T10151] ? __fget_files+0x184/0x1c0 [ 140.603752][T10151] ksys_read+0xda/0x1a0 [ 140.603821][T10151] __x64_sys_read+0x40/0x50 [ 140.603853][T10151] x64_sys_call+0x2d77/0x2fb0 [ 140.603885][T10151] do_syscall_64+0xd2/0x200 [ 140.603907][T10151] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 140.603936][T10151] ? clear_bhb_loop+0x40/0x90 [ 140.603962][T10151] ? clear_bhb_loop+0x40/0x90 [ 140.603989][T10151] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.604015][T10151] RIP: 0033:0x7f5c4ef3d3bc [ 140.604031][T10151] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 140.604052][T10151] RSP: 002b:00007f5c4d59f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 140.604088][T10151] RAX: ffffffffffffffda RBX: 00007f5c4f165fa0 RCX: 00007f5c4ef3d3bc [ 140.604119][T10151] RDX: 000000000000000f RSI: 00007f5c4d59f0a0 RDI: 0000000000000007 [ 140.604134][T10151] RBP: 00007f5c4d59f090 R08: 0000000000000000 R09: 0000000000000000 [ 140.604149][T10151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.604165][T10151] R13: 0000000000000000 R14: 00007f5c4f165fa0 R15: 00007ffe43310f28 [ 140.604189][T10151] [ 140.615839][T10157] SELinux: syz.1.2294 (10157) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 140.875627][T10167] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 140.882257][T10167] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 140.889919][T10167] vhci_hcd vhci_hcd.0: Device attached [ 140.912082][T10168] vhci_hcd: connection closed [ 140.912353][ T31] vhci_hcd: stop threads [ 140.921424][ T31] vhci_hcd: release socket [ 140.925842][ T31] vhci_hcd: disconnect device [ 141.070642][T10181] FAULT_INJECTION: forcing a failure. [ 141.070642][T10181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.083979][T10181] CPU: 1 UID: 0 PID: 10181 Comm: syz.3.2303 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 141.084012][T10181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 141.084095][T10181] Call Trace: [ 141.084122][T10181] [ 141.084146][T10181] __dump_stack+0x1d/0x30 [ 141.084217][T10181] dump_stack_lvl+0xe8/0x140 [ 141.084342][T10181] dump_stack+0x15/0x1b [ 141.084359][T10181] should_fail_ex+0x265/0x280 [ 141.084392][T10181] should_fail+0xb/0x20 [ 141.084423][T10181] should_fail_usercopy+0x1a/0x20 [ 141.084540][T10181] _copy_from_user+0x1c/0xb0 [ 141.084562][T10181] kstrtouint_from_user+0x69/0xf0 [ 141.084597][T10181] ? 0xffffffff81000000 [ 141.084612][T10181] ? selinux_file_permission+0x1e4/0x320 [ 141.084642][T10181] proc_fail_nth_write+0x50/0x160 [ 141.084770][T10181] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 141.084804][T10181] vfs_write+0x266/0x8e0 [ 141.084836][T10181] ? vfs_read+0x47f/0x6f0 [ 141.084886][T10181] ? __rcu_read_unlock+0x4f/0x70 [ 141.084909][T10181] ? __fget_files+0x184/0x1c0 [ 141.084931][T10181] ksys_write+0xda/0x1a0 [ 141.084969][T10181] __x64_sys_write+0x40/0x50 [ 141.085084][T10181] x64_sys_call+0x2cdd/0x2fb0 [ 141.085106][T10181] do_syscall_64+0xd2/0x200 [ 141.085124][T10181] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 141.085156][T10181] ? clear_bhb_loop+0x40/0x90 [ 141.085224][T10181] ? clear_bhb_loop+0x40/0x90 [ 141.085247][T10181] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.085270][T10181] RIP: 0033:0x7f82c8f6d45f [ 141.085285][T10181] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 141.085307][T10181] RSP: 002b:00007f82c75d7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 141.085414][T10181] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82c8f6d45f [ 141.085429][T10181] RDX: 0000000000000001 RSI: 00007f82c75d70a0 RDI: 0000000000000004 [ 141.085441][T10181] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 141.085517][T10181] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 141.085531][T10181] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 141.085552][T10181] [ 141.427108][T10188] Cannot find add_set index 0 as target [ 141.513791][T10197] FAULT_INJECTION: forcing a failure. [ 141.513791][T10197] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.526965][T10197] CPU: 0 UID: 0 PID: 10197 Comm: syz.0.2310 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 141.526998][T10197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 141.527032][T10197] Call Trace: [ 141.527038][T10197] [ 141.527047][T10197] __dump_stack+0x1d/0x30 [ 141.527070][T10197] dump_stack_lvl+0xe8/0x140 [ 141.527091][T10197] dump_stack+0x15/0x1b [ 141.527110][T10197] should_fail_ex+0x265/0x280 [ 141.527228][T10197] should_fail+0xb/0x20 [ 141.527260][T10197] should_fail_usercopy+0x1a/0x20 [ 141.527342][T10197] _copy_to_user+0x20/0xa0 [ 141.527362][T10197] simple_read_from_buffer+0xb5/0x130 [ 141.527397][T10197] proc_fail_nth_read+0x100/0x140 [ 141.527465][T10197] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 141.527552][T10197] vfs_read+0x1a0/0x6f0 [ 141.527585][T10197] ? __rcu_read_unlock+0x4f/0x70 [ 141.527611][T10197] ? __rcu_read_unlock+0x4f/0x70 [ 141.527674][T10197] ? __fget_files+0x184/0x1c0 [ 141.527699][T10197] ksys_read+0xda/0x1a0 [ 141.527735][T10197] __x64_sys_read+0x40/0x50 [ 141.527838][T10197] x64_sys_call+0x2d77/0x2fb0 [ 141.527860][T10197] do_syscall_64+0xd2/0x200 [ 141.527883][T10197] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 141.527910][T10197] ? clear_bhb_loop+0x40/0x90 [ 141.527935][T10197] ? clear_bhb_loop+0x40/0x90 [ 141.527997][T10197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.528021][T10197] RIP: 0033:0x7f082262d3bc [ 141.528039][T10197] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 141.528122][T10197] RSP: 002b:00007f0820c97030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 141.528141][T10197] RAX: ffffffffffffffda RBX: 00007f0822855fa0 RCX: 00007f082262d3bc [ 141.528154][T10197] RDX: 000000000000000f RSI: 00007f0820c970a0 RDI: 0000000000000003 [ 141.528267][T10197] RBP: 00007f0820c97090 R08: 0000000000000000 R09: 0000000000000000 [ 141.528279][T10197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.528291][T10197] R13: 0000000000000000 R14: 00007f0822855fa0 R15: 00007ffebe149568 [ 141.528313][T10197] [ 141.866906][T10219] tun0: tun_chr_ioctl cmd 1074025677 [ 141.884403][T10219] tun0: linktype set to 774 [ 141.908074][T10225] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2321'. [ 141.962047][T10233] netlink: 'syz.2.2324': attribute type 39 has an invalid length. [ 142.016326][T10241] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 142.170308][T10249] SET target dimension over the limit! [ 142.231429][T10255] SELinux: syz.4.2331 (10255) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 142.375622][T10266] lo speed is unknown, defaulting to 1000 [ 142.899680][T10339] FAULT_INJECTION: forcing a failure. [ 142.899680][T10339] name failslab, interval 1, probability 0, space 0, times 0 [ 142.912382][T10339] CPU: 1 UID: 0 PID: 10339 Comm: syz.1.2358 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 142.912414][T10339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 142.912428][T10339] Call Trace: [ 142.912434][T10339] [ 142.912442][T10339] __dump_stack+0x1d/0x30 [ 142.912474][T10339] dump_stack_lvl+0xe8/0x140 [ 142.912535][T10339] dump_stack+0x15/0x1b [ 142.912556][T10339] should_fail_ex+0x265/0x280 [ 142.912588][T10339] should_failslab+0x8c/0xb0 [ 142.912610][T10339] kmem_cache_alloc_noprof+0x50/0x310 [ 142.912731][T10339] ? getname_flags+0x80/0x3b0 [ 142.912754][T10339] ? kstrtouint+0x76/0xc0 [ 142.912786][T10339] getname_flags+0x80/0x3b0 [ 142.912812][T10339] user_path_at+0x28/0x130 [ 142.912865][T10339] user_statfs+0x4d/0x110 [ 142.912891][T10339] __x64_sys_statfs+0x65/0xf0 [ 142.912925][T10339] ? __bpf_trace_sys_enter+0x10/0x30 [ 142.912951][T10339] ? trace_sys_enter+0xd0/0x110 [ 142.913024][T10339] ? syscall_trace_enter+0x102/0x1e0 [ 142.913054][T10339] x64_sys_call+0x1edd/0x2fb0 [ 142.913081][T10339] do_syscall_64+0xd2/0x200 [ 142.913154][T10339] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 142.913186][T10339] ? clear_bhb_loop+0x40/0x90 [ 142.913213][T10339] ? clear_bhb_loop+0x40/0x90 [ 142.913282][T10339] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 142.913309][T10339] RIP: 0033:0x7fdd89a5e9a9 [ 142.913327][T10339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.913349][T10339] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 142.913404][T10339] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 142.913480][T10339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000001c0 [ 142.913496][T10339] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 142.913511][T10339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.913526][T10339] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 142.913578][T10339] [ 143.272613][T10373] lo speed is unknown, defaulting to 1000 [ 143.496958][T10418] wireguard0: entered promiscuous mode [ 143.502605][T10418] wireguard0: entered allmulticast mode [ 143.510385][ T29] kauditd_printk_skb: 44892 callbacks suppressed [ 143.510399][ T29] audit: type=1400 audit(1752942331.704:158122): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.517412][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 143.544698][ T3034] audit: audit_lost=33260 audit_rate_limit=0 audit_backlog_limit=64 [ 143.552811][ T3034] audit: backlog limit exceeded [ 143.558159][T10422] audit: audit_backlog=65 > audit_backlog_limit=64 [ 143.564730][T10422] audit: audit_lost=33261 audit_rate_limit=0 audit_backlog_limit=64 [ 143.572807][T10422] audit: backlog limit exceeded [ 143.579278][T10423] audit: audit_backlog=65 > audit_backlog_limit=64 [ 143.585848][T10423] audit: audit_lost=33262 audit_rate_limit=0 audit_backlog_limit=64 [ 143.593973][T10423] audit: backlog limit exceeded [ 143.699607][T10424] Falling back ldisc for ttyS3. [ 143.799322][T10442] SELinux: syz.4.2381 (10442) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 143.854591][T10446] wg2: entered promiscuous mode [ 143.859671][T10446] wg2: entered allmulticast mode [ 144.648153][T10479] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10479 comm=syz.2.2398 [ 144.740982][T10489] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2401'. [ 144.750009][T10489] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2401'. [ 144.989667][T10504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41664 sclass=netlink_route_socket pid=10504 comm=syz.3.2406 [ 145.092334][T10515] FAULT_INJECTION: forcing a failure. [ 145.092334][T10515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.105455][T10515] CPU: 1 UID: 0 PID: 10515 Comm: syz.1.2411 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 145.105496][T10515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.105511][T10515] Call Trace: [ 145.105518][T10515] [ 145.105526][T10515] __dump_stack+0x1d/0x30 [ 145.105548][T10515] dump_stack_lvl+0xe8/0x140 [ 145.105569][T10515] dump_stack+0x15/0x1b [ 145.105658][T10515] should_fail_ex+0x265/0x280 [ 145.105714][T10515] should_fail+0xb/0x20 [ 145.105743][T10515] should_fail_usercopy+0x1a/0x20 [ 145.105777][T10515] _copy_from_user+0x1c/0xb0 [ 145.105799][T10515] memdup_user_nul+0x5f/0xe0 [ 145.105894][T10515] sel_commit_bools_write+0xd2/0x270 [ 145.105928][T10515] vfs_writev+0x403/0x8b0 [ 145.105954][T10515] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 145.106025][T10515] ? mutex_lock+0xd/0x30 [ 145.106054][T10515] do_writev+0xe7/0x210 [ 145.106110][T10515] __x64_sys_writev+0x45/0x50 [ 145.106132][T10515] x64_sys_call+0x2006/0x2fb0 [ 145.106156][T10515] do_syscall_64+0xd2/0x200 [ 145.106251][T10515] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 145.106283][T10515] ? clear_bhb_loop+0x40/0x90 [ 145.106349][T10515] ? clear_bhb_loop+0x40/0x90 [ 145.106374][T10515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.106437][T10515] RIP: 0033:0x7fdd89a5e9a9 [ 145.106452][T10515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.106509][T10515] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 145.106550][T10515] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 145.106562][T10515] RDX: 0000000000000001 RSI: 0000200000000000 RDI: 0000000000000003 [ 145.106576][T10515] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 145.106589][T10515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.106602][T10515] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 145.106624][T10515] [ 145.357357][T10522] FAULT_INJECTION: forcing a failure. [ 145.357357][T10522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.370521][T10522] CPU: 1 UID: 0 PID: 10522 Comm: syz.2.2416 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 145.370603][T10522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.370619][T10522] Call Trace: [ 145.370627][T10522] [ 145.370636][T10522] __dump_stack+0x1d/0x30 [ 145.370675][T10522] dump_stack_lvl+0xe8/0x140 [ 145.370700][T10522] dump_stack+0x15/0x1b [ 145.370720][T10522] should_fail_ex+0x265/0x280 [ 145.370813][T10522] should_fail+0xb/0x20 [ 145.370840][T10522] should_fail_usercopy+0x1a/0x20 [ 145.370878][T10522] _copy_to_user+0x20/0xa0 [ 145.370902][T10522] do_fcntl+0x8b2/0xdf0 [ 145.370958][T10522] ? selinux_file_fcntl+0x1cb/0x1e0 [ 145.370985][T10522] __se_sys_fcntl+0xb1/0x120 [ 145.371009][T10522] __x64_sys_fcntl+0x43/0x50 [ 145.371038][T10522] x64_sys_call+0x1f1d/0x2fb0 [ 145.371104][T10522] do_syscall_64+0xd2/0x200 [ 145.371125][T10522] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 145.371165][T10522] ? clear_bhb_loop+0x40/0x90 [ 145.371191][T10522] ? clear_bhb_loop+0x40/0x90 [ 145.371224][T10522] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.371314][T10522] RIP: 0033:0x7f5c4ef3e9a9 [ 145.371332][T10522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.371370][T10522] RSP: 002b:00007f5c4d59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 145.371418][T10522] RAX: ffffffffffffffda RBX: 00007f5c4f165fa0 RCX: 00007f5c4ef3e9a9 [ 145.371431][T10522] RDX: 0000200000000180 RSI: 0000000000000024 RDI: 0000000000000003 [ 145.371445][T10522] RBP: 00007f5c4d59f090 R08: 0000000000000000 R09: 0000000000000000 [ 145.371520][T10522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.371534][T10522] R13: 0000000000000000 R14: 00007f5c4f165fa0 R15: 00007ffe43310f28 [ 145.371555][T10522] [ 145.434558][T10536] FAULT_INJECTION: forcing a failure. [ 145.434558][T10536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.577908][T10536] CPU: 0 UID: 0 PID: 10536 Comm: syz.1.2420 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 145.578013][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.578028][T10536] Call Trace: [ 145.578034][T10536] [ 145.578042][T10536] __dump_stack+0x1d/0x30 [ 145.578063][T10536] dump_stack_lvl+0xe8/0x140 [ 145.578085][T10536] dump_stack+0x15/0x1b [ 145.578105][T10536] should_fail_ex+0x265/0x280 [ 145.578220][T10536] should_fail+0xb/0x20 [ 145.578269][T10536] should_fail_usercopy+0x1a/0x20 [ 145.578381][T10536] _copy_from_user+0x1c/0xb0 [ 145.578401][T10536] get_user_ifreq+0x53/0x110 [ 145.578422][T10536] sock_ioctl+0x54e/0x610 [ 145.578452][T10536] ? __pfx_sock_ioctl+0x10/0x10 [ 145.578500][T10536] __se_sys_ioctl+0xce/0x140 [ 145.578537][T10536] __x64_sys_ioctl+0x43/0x50 [ 145.578628][T10536] x64_sys_call+0x19a8/0x2fb0 [ 145.578704][T10536] do_syscall_64+0xd2/0x200 [ 145.578726][T10536] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 145.578757][T10536] ? clear_bhb_loop+0x40/0x90 [ 145.578784][T10536] ? clear_bhb_loop+0x40/0x90 [ 145.578868][T10536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.578906][T10536] RIP: 0033:0x7fdd89a5e9a9 [ 145.578921][T10536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.578939][T10536] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.578960][T10536] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 145.578975][T10536] RDX: 0000200000000140 RSI: 00000000000089f1 RDI: 0000000000000003 [ 145.578989][T10536] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 145.579003][T10536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.579018][T10536] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 145.579062][T10536] [ 145.791142][T10541] FAULT_INJECTION: forcing a failure. [ 145.791142][T10541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.804256][T10541] CPU: 1 UID: 0 PID: 10541 Comm: syz.3.2422 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 145.804353][T10541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.804367][T10541] Call Trace: [ 145.804374][T10541] [ 145.804382][T10541] __dump_stack+0x1d/0x30 [ 145.804403][T10541] dump_stack_lvl+0xe8/0x140 [ 145.804423][T10541] dump_stack+0x15/0x1b [ 145.804441][T10541] should_fail_ex+0x265/0x280 [ 145.804541][T10541] should_fail+0xb/0x20 [ 145.804569][T10541] should_fail_usercopy+0x1a/0x20 [ 145.804601][T10541] _copy_to_user+0x20/0xa0 [ 145.804626][T10541] simple_read_from_buffer+0xb5/0x130 [ 145.804723][T10541] proc_fail_nth_read+0x100/0x140 [ 145.804820][T10541] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 145.804858][T10541] vfs_read+0x1a0/0x6f0 [ 145.804893][T10541] ? __rcu_read_unlock+0x4f/0x70 [ 145.804917][T10541] ? __rcu_read_unlock+0x4f/0x70 [ 145.805014][T10541] ? __fget_files+0x184/0x1c0 [ 145.805060][T10541] ksys_read+0xda/0x1a0 [ 145.805104][T10541] __x64_sys_read+0x40/0x50 [ 145.805145][T10541] x64_sys_call+0x2d77/0x2fb0 [ 145.805252][T10541] do_syscall_64+0xd2/0x200 [ 145.805302][T10541] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 145.805333][T10541] ? clear_bhb_loop+0x40/0x90 [ 145.805369][T10541] ? clear_bhb_loop+0x40/0x90 [ 145.805391][T10541] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.805474][T10541] RIP: 0033:0x7f82c8f6d3bc [ 145.805489][T10541] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 145.805512][T10541] RSP: 002b:00007f82c75d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 145.805531][T10541] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6d3bc [ 145.805589][T10541] RDX: 000000000000000f RSI: 00007f82c75d70a0 RDI: 0000000000000003 [ 145.805602][T10541] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 145.805617][T10541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.805631][T10541] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 145.805654][T10541] [ 146.192710][T10560] FAULT_INJECTION: forcing a failure. [ 146.192710][T10560] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.205987][T10560] CPU: 1 UID: 0 PID: 10560 Comm: syz.0.2429 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 146.206019][T10560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 146.206034][T10560] Call Trace: [ 146.206041][T10560] [ 146.206049][T10560] __dump_stack+0x1d/0x30 [ 146.206121][T10560] dump_stack_lvl+0xe8/0x140 [ 146.206144][T10560] dump_stack+0x15/0x1b [ 146.206161][T10560] should_fail_ex+0x265/0x280 [ 146.206195][T10560] should_fail+0xb/0x20 [ 146.206256][T10560] should_fail_usercopy+0x1a/0x20 [ 146.206290][T10560] _copy_to_user+0x20/0xa0 [ 146.206310][T10560] simple_read_from_buffer+0xb5/0x130 [ 146.206422][T10560] proc_fail_nth_read+0x100/0x140 [ 146.206487][T10560] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 146.206521][T10560] vfs_read+0x1a0/0x6f0 [ 146.206627][T10560] ? __rcu_read_unlock+0x4f/0x70 [ 146.206651][T10560] ? __rcu_read_unlock+0x4f/0x70 [ 146.206673][T10560] ? __fget_files+0x184/0x1c0 [ 146.206694][T10560] ksys_read+0xda/0x1a0 [ 146.206801][T10560] __x64_sys_read+0x40/0x50 [ 146.206836][T10560] x64_sys_call+0x2d77/0x2fb0 [ 146.206858][T10560] do_syscall_64+0xd2/0x200 [ 146.206876][T10560] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 146.206940][T10560] ? clear_bhb_loop+0x40/0x90 [ 146.206967][T10560] ? clear_bhb_loop+0x40/0x90 [ 146.206993][T10560] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.207018][T10560] RIP: 0033:0x7f082262d3bc [ 146.207034][T10560] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 146.207103][T10560] RSP: 002b:00007f0820c97030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 146.207122][T10560] RAX: ffffffffffffffda RBX: 00007f0822855fa0 RCX: 00007f082262d3bc [ 146.207135][T10560] RDX: 000000000000000f RSI: 00007f0820c970a0 RDI: 0000000000000003 [ 146.207148][T10560] RBP: 00007f0820c97090 R08: 0000000000000000 R09: 0000000000000000 [ 146.207162][T10560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.207176][T10560] R13: 0000000000000000 R14: 00007f0822855fa0 R15: 00007ffebe149568 [ 146.207201][T10560] [ 146.489387][T10567] FAULT_INJECTION: forcing a failure. [ 146.489387][T10567] name failslab, interval 1, probability 0, space 0, times 0 [ 146.502210][T10567] CPU: 0 UID: 0 PID: 10567 Comm: syz.3.2432 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 146.502239][T10567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 146.502305][T10567] Call Trace: [ 146.502311][T10567] [ 146.502319][T10567] __dump_stack+0x1d/0x30 [ 146.502341][T10567] dump_stack_lvl+0xe8/0x140 [ 146.502362][T10567] dump_stack+0x15/0x1b [ 146.502383][T10567] should_fail_ex+0x265/0x280 [ 146.502421][T10567] should_failslab+0x8c/0xb0 [ 146.502472][T10567] kmem_cache_alloc_node_noprof+0x57/0x320 [ 146.502504][T10567] ? __alloc_skb+0x101/0x320 [ 146.502541][T10567] __alloc_skb+0x101/0x320 [ 146.502573][T10567] netlink_alloc_large_skb+0xba/0xf0 [ 146.502675][T10567] netlink_sendmsg+0x3cf/0x6b0 [ 146.502753][T10567] ? __pfx_netlink_sendmsg+0x10/0x10 [ 146.502802][T10567] __sock_sendmsg+0x142/0x180 [ 146.502832][T10567] ____sys_sendmsg+0x31e/0x4e0 [ 146.502875][T10567] ___sys_sendmsg+0x17b/0x1d0 [ 146.502926][T10567] __x64_sys_sendmsg+0xd4/0x160 [ 146.502983][T10567] x64_sys_call+0x2999/0x2fb0 [ 146.503089][T10567] do_syscall_64+0xd2/0x200 [ 146.503108][T10567] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 146.503137][T10567] ? clear_bhb_loop+0x40/0x90 [ 146.503163][T10567] ? clear_bhb_loop+0x40/0x90 [ 146.503200][T10567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.503225][T10567] RIP: 0033:0x7f82c8f6e9a9 [ 146.503242][T10567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.503261][T10567] RSP: 002b:00007f82c75d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 146.503279][T10567] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6e9a9 [ 146.503292][T10567] RDX: 0000000000000000 RSI: 0000200000006280 RDI: 0000000000000003 [ 146.503381][T10567] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 146.503395][T10567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.503411][T10567] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 146.503435][T10567] [ 146.781088][T10577] FAULT_INJECTION: forcing a failure. [ 146.781088][T10577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.794357][T10577] CPU: 0 UID: 0 PID: 10577 Comm: syz.3.2435 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 146.794387][T10577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 146.794402][T10577] Call Trace: [ 146.794409][T10577] [ 146.794418][T10577] __dump_stack+0x1d/0x30 [ 146.794572][T10577] dump_stack_lvl+0xe8/0x140 [ 146.794633][T10577] dump_stack+0x15/0x1b [ 146.794649][T10577] should_fail_ex+0x265/0x280 [ 146.794683][T10577] should_fail+0xb/0x20 [ 146.794710][T10577] should_fail_usercopy+0x1a/0x20 [ 146.794831][T10577] _copy_to_user+0x20/0xa0 [ 146.794856][T10577] simple_read_from_buffer+0xb5/0x130 [ 146.794893][T10577] proc_fail_nth_read+0x100/0x140 [ 146.794993][T10577] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 146.795026][T10577] vfs_read+0x1a0/0x6f0 [ 146.795059][T10577] ? __rcu_read_unlock+0x4f/0x70 [ 146.795084][T10577] ? __rcu_read_unlock+0x4f/0x70 [ 146.795189][T10577] ? __fget_files+0x184/0x1c0 [ 146.795213][T10577] ksys_read+0xda/0x1a0 [ 146.795247][T10577] __x64_sys_read+0x40/0x50 [ 146.795296][T10577] x64_sys_call+0x2d77/0x2fb0 [ 146.795322][T10577] do_syscall_64+0xd2/0x200 [ 146.795343][T10577] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 146.795446][T10577] ? clear_bhb_loop+0x40/0x90 [ 146.795468][T10577] ? clear_bhb_loop+0x40/0x90 [ 146.795490][T10577] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.795514][T10577] RIP: 0033:0x7f82c8f6d3bc [ 146.795532][T10577] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 146.795593][T10577] RSP: 002b:00007f82c75d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 146.795617][T10577] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6d3bc [ 146.795630][T10577] RDX: 000000000000000f RSI: 00007f82c75d70a0 RDI: 0000000000000007 [ 146.795642][T10577] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 146.795655][T10577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.795669][T10577] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 146.795693][T10577] [ 147.437102][T10599] SELinux: syz.3.2444 (10599) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 147.701283][T10627] FAULT_INJECTION: forcing a failure. [ 147.701283][T10627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.714428][T10627] CPU: 0 UID: 0 PID: 10627 Comm: syz.4.2458 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 147.714461][T10627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 147.714475][T10627] Call Trace: [ 147.714482][T10627] [ 147.714490][T10627] __dump_stack+0x1d/0x30 [ 147.714511][T10627] dump_stack_lvl+0xe8/0x140 [ 147.714531][T10627] dump_stack+0x15/0x1b [ 147.714593][T10627] should_fail_ex+0x265/0x280 [ 147.714625][T10627] should_fail+0xb/0x20 [ 147.714657][T10627] should_fail_usercopy+0x1a/0x20 [ 147.714694][T10627] _copy_from_user+0x1c/0xb0 [ 147.714718][T10627] kstrtouint_from_user+0x69/0xf0 [ 147.714828][T10627] ? 0xffffffff81000000 [ 147.714863][T10627] ? selinux_file_permission+0x1e4/0x320 [ 147.714892][T10627] proc_fail_nth_write+0x50/0x160 [ 147.715005][T10627] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 147.715041][T10627] vfs_write+0x266/0x8e0 [ 147.715111][T10627] ? vfs_read+0x47f/0x6f0 [ 147.715144][T10627] ? __rcu_read_unlock+0x4f/0x70 [ 147.715299][T10627] ? __fget_files+0x184/0x1c0 [ 147.715325][T10627] ksys_write+0xda/0x1a0 [ 147.715365][T10627] __x64_sys_write+0x40/0x50 [ 147.715506][T10627] x64_sys_call+0x2cdd/0x2fb0 [ 147.715529][T10627] do_syscall_64+0xd2/0x200 [ 147.715548][T10627] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 147.715629][T10627] ? clear_bhb_loop+0x40/0x90 [ 147.715651][T10627] ? clear_bhb_loop+0x40/0x90 [ 147.715676][T10627] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.715699][T10627] RIP: 0033:0x7f8d7f1bd45f [ 147.715714][T10627] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 147.715791][T10627] RSP: 002b:00007f8d7d81f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 147.715859][T10627] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d7f1bd45f [ 147.715872][T10627] RDX: 0000000000000001 RSI: 00007f8d7d81f0a0 RDI: 0000000000000003 [ 147.715884][T10627] RBP: 00007f8d7d81f090 R08: 0000000000000000 R09: 0000000000000000 [ 147.715968][T10627] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 147.715994][T10627] R13: 0000000000000000 R14: 00007f8d7f3e5fa0 R15: 00007ffea71faeb8 [ 147.716014][T10627] [ 148.263051][T10655] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 148.269600][T10655] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 148.277208][T10655] vhci_hcd vhci_hcd.0: Device attached [ 148.292073][T10660] vhci_hcd: connection closed [ 148.292331][ T31] vhci_hcd: stop threads [ 148.301354][ T31] vhci_hcd: release socket [ 148.305801][ T31] vhci_hcd: disconnect device [ 148.320542][T10665] FAULT_INJECTION: forcing a failure. [ 148.320542][T10665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.333688][T10665] CPU: 1 UID: 0 PID: 10665 Comm: syz.0.2473 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 148.333717][T10665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 148.333760][T10665] Call Trace: [ 148.333765][T10665] [ 148.333773][T10665] __dump_stack+0x1d/0x30 [ 148.333795][T10665] dump_stack_lvl+0xe8/0x140 [ 148.333837][T10665] dump_stack+0x15/0x1b [ 148.333855][T10665] should_fail_ex+0x265/0x280 [ 148.333892][T10665] should_fail+0xb/0x20 [ 148.333920][T10665] should_fail_usercopy+0x1a/0x20 [ 148.334064][T10665] _copy_from_user+0x1c/0xb0 [ 148.334141][T10665] ___sys_recvmsg+0xaa/0x370 [ 148.334174][T10665] ? set_normalized_timespec64+0xe0/0x110 [ 148.334223][T10665] do_recvmmsg+0x1ef/0x540 [ 148.334254][T10665] __x64_sys_recvmmsg+0xfb/0x170 [ 148.334340][T10665] x64_sys_call+0x1c6a/0x2fb0 [ 148.334365][T10665] do_syscall_64+0xd2/0x200 [ 148.334385][T10665] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 148.334415][T10665] ? clear_bhb_loop+0x40/0x90 [ 148.334513][T10665] ? clear_bhb_loop+0x40/0x90 [ 148.334539][T10665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.334578][T10665] RIP: 0033:0x7f082262e9a9 [ 148.334595][T10665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.334617][T10665] RSP: 002b:00007f0820c97038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 148.334637][T10665] RAX: ffffffffffffffda RBX: 00007f0822855fa0 RCX: 00007f082262e9a9 [ 148.334650][T10665] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 148.334664][T10665] RBP: 00007f0820c97090 R08: 0000200000003700 R09: 0000000000000000 [ 148.334677][T10665] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000002 [ 148.334689][T10665] R13: 0000000000000000 R14: 00007f0822855fa0 R15: 00007ffebe149568 [ 148.334750][T10665] [ 148.546166][ T29] kauditd_printk_skb: 20072 callbacks suppressed [ 148.546183][ T29] audit: type=1400 audit(1752942336.734:176512): avc: denied { create } for pid=10671 comm="syz.0.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 148.572562][ T29] audit: type=1400 audit(1752942336.734:176513): avc: denied { map_create } for pid=10671 comm="syz.0.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.575087][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 148.591955][ T29] audit: type=1400 audit(1752942336.734:176514): avc: denied { prog_load } for pid=10671 comm="syz.0.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.591982][ T29] audit: type=1400 audit(1752942336.734:176515): avc: denied { prog_load } for pid=10671 comm="syz.0.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.592006][ T29] audit: type=1400 audit(1752942336.734:176516): avc: denied { create } for pid=10671 comm="syz.0.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 148.598513][ T3034] audit: audit_lost=33824 audit_rate_limit=0 audit_backlog_limit=64 [ 148.618153][ T29] audit: type=1400 audit(1752942336.734:176517): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 148.637045][ T3034] audit: backlog limit exceeded [ 148.694181][ T29] audit: type=1400 audit(1752942336.744:176518): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.803372][T10688] lo speed is unknown, defaulting to 1000 [ 148.933896][T10719] FAULT_INJECTION: forcing a failure. [ 148.933896][T10719] name failslab, interval 1, probability 0, space 0, times 0 [ 148.946628][T10719] CPU: 0 UID: 0 PID: 10719 Comm: syz.1.2489 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 148.946726][T10719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 148.946739][T10719] Call Trace: [ 148.946745][T10719] [ 148.946753][T10719] __dump_stack+0x1d/0x30 [ 148.946773][T10719] dump_stack_lvl+0xe8/0x140 [ 148.946858][T10719] dump_stack+0x15/0x1b [ 148.946875][T10719] should_fail_ex+0x265/0x280 [ 148.946978][T10719] should_failslab+0x8c/0xb0 [ 148.947000][T10719] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 148.947034][T10719] ? sidtab_sid2str_get+0xa0/0x130 [ 148.947060][T10719] kmemdup_noprof+0x2b/0x70 [ 148.947083][T10719] sidtab_sid2str_get+0xa0/0x130 [ 148.947184][T10719] security_sid_to_context_core+0x1eb/0x2e0 [ 148.947211][T10719] security_sid_to_context+0x27/0x40 [ 148.947237][T10719] avc_audit_post_callback+0x10f/0x520 [ 148.947341][T10719] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 148.947369][T10719] common_lsm_audit+0x1bb/0x230 [ 148.947388][T10719] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 148.947446][T10719] slow_avc_audit+0x104/0x140 [ 148.947479][T10719] avc_has_perm+0x128/0x150 [ 148.947513][T10719] selinux_mount+0x2ba/0x310 [ 148.947588][T10719] security_sb_mount+0x5f/0xb0 [ 148.947617][T10719] ? path_mount+0x89/0xb20 [ 148.947672][T10719] path_mount+0xa9/0xb20 [ 148.947724][T10719] ? user_path_at+0x109/0x130 [ 148.947751][T10719] __se_sys_mount+0x28f/0x2e0 [ 148.947823][T10719] __x64_sys_mount+0x67/0x80 [ 148.947861][T10719] x64_sys_call+0xd36/0x2fb0 [ 148.947893][T10719] do_syscall_64+0xd2/0x200 [ 148.947999][T10719] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 148.948027][T10719] ? clear_bhb_loop+0x40/0x90 [ 148.948048][T10719] ? clear_bhb_loop+0x40/0x90 [ 148.948070][T10719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.948120][T10719] RIP: 0033:0x7fdd89a5e9a9 [ 148.948204][T10719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.948223][T10719] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 148.948244][T10719] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 148.948256][T10719] RDX: 00002000000000c0 RSI: 00002000000006c0 RDI: 0000000000000000 [ 148.948268][T10719] RBP: 00007fdd880c7090 R08: 0000200000000240 R09: 0000000000000000 [ 148.948290][T10719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.948302][T10719] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 148.948322][T10719] [ 149.327798][T10744] FAULT_INJECTION: forcing a failure. [ 149.327798][T10744] name failslab, interval 1, probability 0, space 0, times 0 [ 149.340474][T10744] CPU: 1 UID: 0 PID: 10744 Comm: syz.1.2497 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 149.340559][T10744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 149.340573][T10744] Call Trace: [ 149.340578][T10744] [ 149.340585][T10744] __dump_stack+0x1d/0x30 [ 149.340608][T10744] dump_stack_lvl+0xe8/0x140 [ 149.340630][T10744] dump_stack+0x15/0x1b [ 149.340705][T10744] should_fail_ex+0x265/0x280 [ 149.340744][T10744] should_failslab+0x8c/0xb0 [ 149.340772][T10744] kmem_cache_alloc_node_noprof+0x57/0x320 [ 149.340884][T10744] ? __alloc_skb+0x101/0x320 [ 149.340918][T10744] __alloc_skb+0x101/0x320 [ 149.340958][T10744] netlink_alloc_large_skb+0xba/0xf0 [ 149.340996][T10744] netlink_sendmsg+0x3cf/0x6b0 [ 149.341026][T10744] ? __pfx_netlink_sendmsg+0x10/0x10 [ 149.341046][T10744] __sock_sendmsg+0x142/0x180 [ 149.341078][T10744] ____sys_sendmsg+0x31e/0x4e0 [ 149.341134][T10744] ___sys_sendmsg+0x17b/0x1d0 [ 149.341216][T10744] __x64_sys_sendmsg+0xd4/0x160 [ 149.341262][T10744] x64_sys_call+0x2999/0x2fb0 [ 149.341355][T10744] do_syscall_64+0xd2/0x200 [ 149.341373][T10744] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 149.341405][T10744] ? clear_bhb_loop+0x40/0x90 [ 149.341432][T10744] ? clear_bhb_loop+0x40/0x90 [ 149.341481][T10744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.341504][T10744] RIP: 0033:0x7fdd89a5e9a9 [ 149.341522][T10744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.341544][T10744] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.341566][T10744] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 149.341653][T10744] RDX: 0000000000044080 RSI: 0000200000000040 RDI: 0000000000000007 [ 149.341666][T10744] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 149.341678][T10744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.341693][T10744] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 149.341762][T10744] [ 149.561808][T10748] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10748 comm=syz.3.2501 [ 149.575563][T10750] xt_CHECKSUM: unsupported CHECKSUM operation 68 [ 149.578193][T10748] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10748 comm=syz.3.2501 [ 149.800001][T10773] FAULT_INJECTION: forcing a failure. [ 149.800001][T10773] name failslab, interval 1, probability 0, space 0, times 0 [ 149.812718][T10773] CPU: 1 UID: 0 PID: 10773 Comm: syz.4.2511 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 149.812810][T10773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 149.812823][T10773] Call Trace: [ 149.812829][T10773] [ 149.812836][T10773] __dump_stack+0x1d/0x30 [ 149.812860][T10773] dump_stack_lvl+0xe8/0x140 [ 149.812926][T10773] dump_stack+0x15/0x1b [ 149.812946][T10773] should_fail_ex+0x265/0x280 [ 149.813039][T10773] should_failslab+0x8c/0xb0 [ 149.813066][T10773] __kvmalloc_node_noprof+0x123/0x4e0 [ 149.813238][T10773] ? __se_sys_add_key+0x1e9/0x350 [ 149.813269][T10773] __se_sys_add_key+0x1e9/0x350 [ 149.813332][T10773] __x64_sys_add_key+0x67/0x80 [ 149.813358][T10773] x64_sys_call+0x1d0d/0x2fb0 [ 149.813384][T10773] do_syscall_64+0xd2/0x200 [ 149.813405][T10773] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 149.813450][T10773] ? clear_bhb_loop+0x40/0x90 [ 149.813472][T10773] ? clear_bhb_loop+0x40/0x90 [ 149.813494][T10773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.813596][T10773] RIP: 0033:0x7f8d7f1be9a9 [ 149.813614][T10773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.813662][T10773] RSP: 002b:00007f8d7d81f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 149.813688][T10775] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2512'. [ 149.813682][T10773] RAX: ffffffffffffffda RBX: 00007f8d7f3e5fa0 RCX: 00007f8d7f1be9a9 [ 149.813772][T10773] RDX: 00002000000000c0 RSI: 0000000000000000 RDI: 0000200000000040 [ 149.813794][T10773] RBP: 00007f8d7d81f090 R08: fffffffffffffffd R09: 0000000000000000 [ 149.813833][T10773] R10: 000000000000001c R11: 0000000000000246 R12: 0000000000000001 [ 149.813846][T10773] R13: 0000000000000001 R14: 00007f8d7f3e5fa0 R15: 00007ffea71faeb8 [ 149.813869][T10773] [ 150.078191][T10795] FAULT_INJECTION: forcing a failure. [ 150.078191][T10795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.091534][T10795] CPU: 1 UID: 0 PID: 10795 Comm: syz.4.2520 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 150.091598][T10795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 150.091610][T10795] Call Trace: [ 150.091617][T10795] [ 150.091641][T10795] __dump_stack+0x1d/0x30 [ 150.091693][T10795] dump_stack_lvl+0xe8/0x140 [ 150.091713][T10795] dump_stack+0x15/0x1b [ 150.091729][T10795] should_fail_ex+0x265/0x280 [ 150.091771][T10795] should_fail+0xb/0x20 [ 150.091875][T10795] should_fail_usercopy+0x1a/0x20 [ 150.091913][T10795] _copy_from_user+0x1c/0xb0 [ 150.091937][T10795] kstrtouint_from_user+0x69/0xf0 [ 150.091975][T10795] ? 0xffffffff81000000 [ 150.092015][T10795] ? selinux_file_permission+0x1e4/0x320 [ 150.092069][T10795] proc_fail_nth_write+0x50/0x160 [ 150.092109][T10795] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 150.092208][T10795] vfs_write+0x266/0x8e0 [ 150.092245][T10795] ? vfs_read+0x47f/0x6f0 [ 150.092282][T10795] ? __rcu_read_unlock+0x4f/0x70 [ 150.092312][T10795] ? __fget_files+0x184/0x1c0 [ 150.092337][T10795] ksys_write+0xda/0x1a0 [ 150.092379][T10795] __x64_sys_write+0x40/0x50 [ 150.092557][T10795] x64_sys_call+0x2cdd/0x2fb0 [ 150.092583][T10795] do_syscall_64+0xd2/0x200 [ 150.092602][T10795] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 150.092629][T10795] ? clear_bhb_loop+0x40/0x90 [ 150.092771][T10795] ? clear_bhb_loop+0x40/0x90 [ 150.092798][T10795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 150.092824][T10795] RIP: 0033:0x7f8d7f1bd45f [ 150.092841][T10795] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 150.092862][T10795] RSP: 002b:00007f8d7d81f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 150.092885][T10795] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d7f1bd45f [ 150.092909][T10795] RDX: 0000000000000001 RSI: 00007f8d7d81f0a0 RDI: 0000000000000003 [ 150.092931][T10795] RBP: 00007f8d7d81f090 R08: 0000000000000000 R09: 0000000000000000 [ 150.092946][T10795] R10: 0000000000028011 R11: 0000000000000293 R12: 0000000000000001 [ 150.092962][T10795] R13: 0000000000000000 R14: 00007f8d7f3e5fa0 R15: 00007ffea71faeb8 [ 150.092986][T10795] [ 150.096919][T10788] lo speed is unknown, defaulting to 1000 [ 150.102255][T10783] netlink: 'syz.0.2515': attribute type 4 has an invalid length. [ 150.209767][T10804] netlink: 'syz.0.2515': attribute type 4 has an invalid length. [ 150.361496][T10832] FAULT_INJECTION: forcing a failure. [ 150.361496][T10832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.374668][T10832] CPU: 1 UID: 0 PID: 10832 Comm: syz.3.2526 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 150.374701][T10832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 150.374716][T10832] Call Trace: [ 150.374722][T10832] [ 150.374729][T10832] __dump_stack+0x1d/0x30 [ 150.374758][T10832] dump_stack_lvl+0xe8/0x140 [ 150.374780][T10832] dump_stack+0x15/0x1b [ 150.374812][T10832] should_fail_ex+0x265/0x280 [ 150.374844][T10832] should_fail+0xb/0x20 [ 150.374872][T10832] should_fail_usercopy+0x1a/0x20 [ 150.374909][T10832] _copy_to_user+0x20/0xa0 [ 150.374998][T10832] simple_read_from_buffer+0xb5/0x130 [ 150.375036][T10832] proc_fail_nth_read+0x100/0x140 [ 150.375075][T10832] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 150.375113][T10832] vfs_read+0x1a0/0x6f0 [ 150.375193][T10832] ? __rcu_read_unlock+0x4f/0x70 [ 150.375220][T10832] ? __rcu_read_unlock+0x4f/0x70 [ 150.375293][T10832] ? __fget_files+0x184/0x1c0 [ 150.375317][T10832] ksys_read+0xda/0x1a0 [ 150.375391][T10832] __x64_sys_read+0x40/0x50 [ 150.375450][T10832] x64_sys_call+0x2d77/0x2fb0 [ 150.375473][T10832] do_syscall_64+0xd2/0x200 [ 150.375494][T10832] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 150.375524][T10832] ? clear_bhb_loop+0x40/0x90 [ 150.375621][T10832] ? clear_bhb_loop+0x40/0x90 [ 150.375643][T10832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 150.375665][T10832] RIP: 0033:0x7f82c8f6d3bc [ 150.375679][T10832] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 150.375699][T10832] RSP: 002b:00007f82c75d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 150.375720][T10832] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6d3bc [ 150.375811][T10832] RDX: 000000000000000f RSI: 00007f82c75d70a0 RDI: 0000000000000003 [ 150.375878][T10832] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 150.375893][T10832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.375908][T10832] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 150.375931][T10832] [ 150.654996][T10841] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 150.661552][T10841] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 150.669244][T10841] vhci_hcd vhci_hcd.0: Device attached [ 150.681303][T10846] vhci_hcd: connection closed [ 150.690587][ T416] vhci_hcd: stop threads [ 150.699783][ T416] vhci_hcd: release socket [ 150.704216][ T416] vhci_hcd: disconnect device [ 150.720885][T10845] SELinux: syz.0.2532 (10845) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 151.093146][T10888] SELinux: syz.0.2547 (10888) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 151.209967][T10892] SELinux: syz.1.2549 (10892) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 151.293798][T10902] FAULT_INJECTION: forcing a failure. [ 151.293798][T10902] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.307066][T10902] CPU: 1 UID: 0 PID: 10902 Comm: syz.1.2554 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 151.307166][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 151.307255][T10902] Call Trace: [ 151.307261][T10902] [ 151.307270][T10902] __dump_stack+0x1d/0x30 [ 151.307293][T10902] dump_stack_lvl+0xe8/0x140 [ 151.307315][T10902] dump_stack+0x15/0x1b [ 151.307335][T10902] should_fail_ex+0x265/0x280 [ 151.307371][T10902] should_fail+0xb/0x20 [ 151.307434][T10902] should_fail_usercopy+0x1a/0x20 [ 151.307471][T10902] strncpy_from_user+0x25/0x230 [ 151.307499][T10902] ? kmem_cache_alloc_noprof+0x186/0x310 [ 151.307583][T10902] ? getname_flags+0x80/0x3b0 [ 151.307685][T10902] getname_flags+0xae/0x3b0 [ 151.307710][T10902] user_path_at+0x28/0x130 [ 151.307739][T10902] __x64_sys_umount+0x85/0xe0 [ 151.307839][T10902] x64_sys_call+0x2915/0x2fb0 [ 151.307925][T10902] do_syscall_64+0xd2/0x200 [ 151.307949][T10902] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 151.307977][T10902] ? clear_bhb_loop+0x40/0x90 [ 151.308000][T10902] ? clear_bhb_loop+0x40/0x90 [ 151.308088][T10902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.308113][T10902] RIP: 0033:0x7fdd89a5e9a9 [ 151.308135][T10902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.308155][T10902] RSP: 002b:00007fdd880c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 151.308173][T10902] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5e9a9 [ 151.308186][T10902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000280 [ 151.308199][T10902] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 151.308231][T10902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.308302][T10902] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 151.308357][T10902] [ 151.567640][T10910] SELinux: syz.0.2558 (10910) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 151.783671][T10942] SELinux: syz.4.2571 (10942) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 151.798688][T10945] xt_policy: too many policy elements [ 151.865297][T10950] lo speed is unknown, defaulting to 1000 [ 152.563925][T10998] SELinux: syz.1.2582 (10998) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 152.924697][T11022] lo speed is unknown, defaulting to 1000 [ 152.943412][T11027] SELinux: syz.1.2594 (11027) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 152.962547][T11034] netlink: 'syz.3.2595': attribute type 1 has an invalid length. [ 152.987139][T11034] bond1: entered promiscuous mode [ 153.001666][T11034] 8021q: adding VLAN 0 to HW filter on device bond1 [ 153.454426][T11111] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 153.461055][T11111] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 153.468809][T11111] vhci_hcd vhci_hcd.0: Device attached [ 153.502721][T11113] vhci_hcd: connection closed [ 153.505686][ T3329] vhci_hcd: stop threads [ 153.514686][ T3329] vhci_hcd: release socket [ 153.519148][ T3329] vhci_hcd: disconnect device [ 153.534758][T11118] FAULT_INJECTION: forcing a failure. [ 153.534758][T11118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.547964][T11118] CPU: 0 UID: 0 PID: 11118 Comm: syz.3.2605 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 153.547996][T11118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 153.548009][T11118] Call Trace: [ 153.548018][T11118] [ 153.548028][T11118] __dump_stack+0x1d/0x30 [ 153.548054][T11118] dump_stack_lvl+0xe8/0x140 [ 153.548086][T11118] dump_stack+0x15/0x1b [ 153.548107][T11118] should_fail_ex+0x265/0x280 [ 153.548146][T11118] should_fail+0xb/0x20 [ 153.548176][T11118] should_fail_usercopy+0x1a/0x20 [ 153.548212][T11118] _copy_from_user+0x1c/0xb0 [ 153.548243][T11118] get_user_ifreq+0x53/0x110 [ 153.548335][T11118] sock_ioctl+0x54e/0x610 [ 153.548358][T11118] ? __pfx_sock_ioctl+0x10/0x10 [ 153.548385][T11118] __se_sys_ioctl+0xce/0x140 [ 153.548455][T11118] __x64_sys_ioctl+0x43/0x50 [ 153.548488][T11118] x64_sys_call+0x19a8/0x2fb0 [ 153.548514][T11118] do_syscall_64+0xd2/0x200 [ 153.548535][T11118] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 153.548645][T11118] ? clear_bhb_loop+0x40/0x90 [ 153.548672][T11118] ? clear_bhb_loop+0x40/0x90 [ 153.548698][T11118] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.548725][T11118] RIP: 0033:0x7f82c8f6e9a9 [ 153.548742][T11118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.548856][T11118] RSP: 002b:00007f82c75d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.548875][T11118] RAX: ffffffffffffffda RBX: 00007f82c9195fa0 RCX: 00007f82c8f6e9a9 [ 153.548965][T11118] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000003 [ 153.548978][T11118] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 153.549031][T11118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.549047][T11118] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 153.549072][T11118] [ 153.766363][T11120] SELinux: syz.0.2606 (11120) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 153.780110][ T29] kauditd_printk_skb: 27888 callbacks suppressed [ 153.780124][ T29] audit: type=1400 audit(1752942341.954:199929): avc: denied { create } for pid=11119 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 153.806247][ T29] audit: type=1400 audit(1752942341.954:199930): avc: denied { prog_load } for pid=11119 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.825676][ T29] audit: type=1400 audit(1752942341.954:199931): avc: denied { prog_load } for pid=11119 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.828194][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 153.845054][ T29] audit: type=1400 audit(1752942341.954:199932): avc: denied { map_create } for pid=11119 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.845082][ T29] audit: type=1400 audit(1752942341.954:199933): avc: denied { prog_load } for pid=11119 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.890485][ T3034] audit: audit_lost=35318 audit_rate_limit=0 audit_backlog_limit=64 [ 153.891033][ T3304] audit: audit_backlog=65 > audit_backlog_limit=64 [ 153.898461][ T3034] audit: backlog limit exceeded [ 153.900194][ T29] audit: type=1400 audit(1752942341.974:199934): avc: denied { write } for pid=11121 comm="syz.3.2607" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=0 [ 154.067548][T11144] FAULT_INJECTION: forcing a failure. [ 154.067548][T11144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.080774][T11144] CPU: 1 UID: 0 PID: 11144 Comm: syz.1.2615 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 154.080806][T11144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 154.080821][T11144] Call Trace: [ 154.080830][T11144] [ 154.080839][T11144] __dump_stack+0x1d/0x30 [ 154.080864][T11144] dump_stack_lvl+0xe8/0x140 [ 154.080887][T11144] dump_stack+0x15/0x1b [ 154.080914][T11144] should_fail_ex+0x265/0x280 [ 154.080947][T11144] should_fail+0xb/0x20 [ 154.080975][T11144] should_fail_usercopy+0x1a/0x20 [ 154.081090][T11144] _copy_to_user+0x20/0xa0 [ 154.081115][T11144] simple_read_from_buffer+0xb5/0x130 [ 154.081191][T11144] proc_fail_nth_read+0x100/0x140 [ 154.081261][T11144] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 154.081366][T11144] vfs_read+0x1a0/0x6f0 [ 154.081438][T11144] ? __rcu_read_unlock+0x4f/0x70 [ 154.081475][T11144] ? __rcu_read_unlock+0x4f/0x70 [ 154.081502][T11144] ? __fget_files+0x184/0x1c0 [ 154.081543][T11144] ksys_read+0xda/0x1a0 [ 154.081580][T11144] __x64_sys_read+0x40/0x50 [ 154.081617][T11144] x64_sys_call+0x2d77/0x2fb0 [ 154.081644][T11144] do_syscall_64+0xd2/0x200 [ 154.081674][T11144] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 154.081703][T11144] ? clear_bhb_loop+0x40/0x90 [ 154.081729][T11144] ? clear_bhb_loop+0x40/0x90 [ 154.081803][T11144] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.081827][T11144] RIP: 0033:0x7fdd89a5d3bc [ 154.081844][T11144] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 154.081866][T11144] RSP: 002b:00007fdd880c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 154.081893][T11144] RAX: ffffffffffffffda RBX: 00007fdd89c85fa0 RCX: 00007fdd89a5d3bc [ 154.081963][T11144] RDX: 000000000000000f RSI: 00007fdd880c70a0 RDI: 0000000000000006 [ 154.081978][T11144] RBP: 00007fdd880c7090 R08: 0000000000000000 R09: 0000000000000000 [ 154.081992][T11144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.082005][T11144] R13: 0000000000000000 R14: 00007fdd89c85fa0 R15: 00007fff7b9e64c8 [ 154.082086][T11144] [ 154.384827][T11151] FAULT_INJECTION: forcing a failure. [ 154.384827][T11151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.398002][T11151] CPU: 0 UID: 0 PID: 11151 Comm: syz.3.2620 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 154.398038][T11151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 154.398054][T11151] Call Trace: [ 154.398062][T11151] [ 154.398070][T11151] __dump_stack+0x1d/0x30 [ 154.398091][T11151] dump_stack_lvl+0xe8/0x140 [ 154.398165][T11151] dump_stack+0x15/0x1b [ 154.398185][T11151] should_fail_ex+0x265/0x280 [ 154.398218][T11151] should_fail+0xb/0x20 [ 154.398283][T11151] should_fail_usercopy+0x1a/0x20 [ 154.398336][T11151] _copy_from_user+0x1c/0xb0 [ 154.398359][T11151] kstrtouint_from_user+0x69/0xf0 [ 154.398397][T11151] ? 0xffffffff81000000 [ 154.398413][T11151] ? selinux_file_permission+0x1e4/0x320 [ 154.398459][T11151] proc_fail_nth_write+0x50/0x160 [ 154.398498][T11151] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 154.398532][T11151] vfs_write+0x266/0x8e0 [ 154.398568][T11151] ? vfs_read+0x47f/0x6f0 [ 154.398695][T11151] ? __rcu_read_unlock+0x4f/0x70 [ 154.398721][T11151] ? __fget_files+0x184/0x1c0 [ 154.398743][T11151] ksys_write+0xda/0x1a0 [ 154.398777][T11151] __x64_sys_write+0x40/0x50 [ 154.398891][T11151] x64_sys_call+0x2cdd/0x2fb0 [ 154.398916][T11151] do_syscall_64+0xd2/0x200 [ 154.398938][T11151] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 154.398971][T11151] ? clear_bhb_loop+0x40/0x90 [ 154.398998][T11151] ? clear_bhb_loop+0x40/0x90 [ 154.399080][T11151] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.399103][T11151] RIP: 0033:0x7f82c8f6d45f [ 154.399121][T11151] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 154.399143][T11151] RSP: 002b:00007f82c75d7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 154.399162][T11151] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82c8f6d45f [ 154.399181][T11151] RDX: 0000000000000001 RSI: 00007f82c75d70a0 RDI: 0000000000000003 [ 154.399194][T11151] RBP: 00007f82c75d7090 R08: 0000000000000000 R09: 0000000000000000 [ 154.399210][T11151] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 154.399226][T11151] R13: 0000000000000000 R14: 00007f82c9195fa0 R15: 00007fffbbe5bc78 [ 154.399247][T11151] [ 154.620143][T11159] SELinux: syz.1.2619 (11159) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 154.670586][T11164] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 154.802770][T11180] FAULT_INJECTION: forcing a failure. [ 154.802770][T11180] name failslab, interval 1, probability 0, space 0, times 0 [ 154.815596][T11180] CPU: 0 UID: 0 PID: 11180 Comm: syz.4.2628 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 154.815629][T11180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 154.815690][T11180] Call Trace: [ 154.815698][T11180] [ 154.815706][T11180] __dump_stack+0x1d/0x30 [ 154.815729][T11180] dump_stack_lvl+0xe8/0x140 [ 154.815773][T11180] dump_stack+0x15/0x1b [ 154.815792][T11180] should_fail_ex+0x265/0x280 [ 154.815830][T11180] ? audit_log_d_path+0x8d/0x150 [ 154.815941][T11180] should_failslab+0x8c/0xb0 [ 154.815964][T11180] __kmalloc_cache_noprof+0x4c/0x320 [ 154.815998][T11180] audit_log_d_path+0x8d/0x150 [ 154.816067][T11180] audit_log_d_path_exe+0x42/0x70 [ 154.816174][T11180] audit_log_task+0x1e9/0x250 [ 154.816211][T11180] audit_seccomp+0x61/0x100 [ 154.816314][T11180] ? __seccomp_filter+0x68c/0x10d0 [ 154.816341][T11180] __seccomp_filter+0x69d/0x10d0 [ 154.816426][T11180] ? alloc_file_pseudo+0x129/0x160 [ 154.816543][T11180] __secure_computing+0x82/0x150 [ 154.816568][T11180] syscall_trace_enter+0xcf/0x1e0 [ 154.816634][T11180] do_syscall_64+0xac/0x200 [ 154.816653][T11180] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 154.816683][T11180] ? clear_bhb_loop+0x40/0x90 [ 154.816706][T11180] ? clear_bhb_loop+0x40/0x90 [ 154.816807][T11180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.816862][T11180] RIP: 0033:0x7f8d7f1be9e3 [ 154.816878][T11180] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 154.816899][T11180] RSP: 002b:00007f8d7d81ee18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 154.816921][T11180] RAX: ffffffffffffffda RBX: 0000000000000565 RCX: 00007f8d7f1be9e3 [ 154.816936][T11180] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 154.816951][T11180] RBP: 0000200000001082 R08: 00000000ffffffff R09: 0000000000000000 [ 154.817021][T11180] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000007 [ 154.817036][T11180] R13: 00007f8d7d81eef0 R14: 00007f8d7d81eeb0 R15: 00002000000007c0 [ 154.817060][T11180] [ 155.113256][T11186] lo speed is unknown, defaulting to 1000 [ 155.278701][T11222] netlink: 'syz.4.2634': attribute type 3 has an invalid length. [ 155.635679][T11256] FAULT_INJECTION: forcing a failure. [ 155.635679][T11256] name failslab, interval 1, probability 0, space 0, times 0 [ 155.648428][T11256] CPU: 1 UID: 0 PID: 11256 Comm: syz.0.2644 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 155.648457][T11256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 155.648546][T11256] Call Trace: [ 155.648554][T11256] [ 155.648562][T11256] __dump_stack+0x1d/0x30 [ 155.648640][T11256] dump_stack_lvl+0xe8/0x140 [ 155.648732][T11256] dump_stack+0x15/0x1b [ 155.648750][T11256] should_fail_ex+0x265/0x280 [ 155.648788][T11256] should_failslab+0x8c/0xb0 [ 155.648815][T11256] kmem_cache_alloc_node_noprof+0x57/0x320 [ 155.648890][T11256] ? __alloc_skb+0x101/0x320 [ 155.648921][T11256] __alloc_skb+0x101/0x320 [ 155.649037][T11256] rtmsg_ifinfo_build_skb+0x5f/0x1b0 [ 155.649088][T11256] ? __rcu_read_unlock+0x4f/0x70 [ 155.649111][T11256] ? __pfx_rtnetlink_event+0x10/0x10 [ 155.649212][T11256] rtnetlink_event+0x18c/0x200 [ 155.649238][T11256] raw_notifier_call_chain+0x6c/0x1b0 [ 155.649263][T11256] ? call_netdevice_notifiers_info+0x9c/0x100 [ 155.649304][T11256] call_netdevice_notifiers_info+0xae/0x100 [ 155.649341][T11256] netif_set_mac_address+0x204/0x260 [ 155.649435][T11256] dev_set_mac_address_user+0xd7/0x190 [ 155.649467][T11256] dev_ifsioc+0x9b3/0xaa0 [ 155.649484][T11256] ? __rcu_read_unlock+0x4f/0x70 [ 155.649548][T11256] dev_ioctl+0x70a/0x960 [ 155.649570][T11256] sock_do_ioctl+0x197/0x220 [ 155.649600][T11256] sock_ioctl+0x41b/0x610 [ 155.649651][T11256] ? __pfx_sock_ioctl+0x10/0x10 [ 155.649680][T11256] __se_sys_ioctl+0xce/0x140 [ 155.649793][T11256] __x64_sys_ioctl+0x43/0x50 [ 155.649826][T11256] x64_sys_call+0x19a8/0x2fb0 [ 155.649850][T11256] do_syscall_64+0xd2/0x200 [ 155.649871][T11256] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 155.649936][T11256] ? clear_bhb_loop+0x40/0x90 [ 155.649962][T11256] ? clear_bhb_loop+0x40/0x90 [ 155.649988][T11256] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.650009][T11256] RIP: 0033:0x7f082262e9a9 [ 155.650026][T11256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.650049][T11256] RSP: 002b:00007f0820c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 155.650144][T11256] RAX: ffffffffffffffda RBX: 00007f0822855fa0 RCX: 00007f082262e9a9 [ 155.650160][T11256] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000004 [ 155.650175][T11256] RBP: 00007f0820c97090 R08: 0000000000000000 R09: 0000000000000000 [ 155.650191][T11256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.650206][T11256] R13: 0000000000000000 R14: 00007f0822855fa0 R15: 00007ffebe149568 [ 155.650254][T11256] [ 155.927487][T11261] selection: kmalloc() failed [ 155.983896][T11263] netlink: 27 bytes leftover after parsing attributes in process `syz.0.2649'. [ 155.999468][T11267] FAULT_INJECTION: forcing a failure. [ 155.999468][T11267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.012836][T11267] CPU: 1 UID: 0 PID: 11267 Comm: syz.2.2651 Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 156.012942][T11267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 156.012956][T11267] Call Trace: [ 156.012963][T11267] [ 156.012971][T11267] __dump_stack+0x1d/0x30 [ 156.012993][T11267] dump_stack_lvl+0xe8/0x140 [ 156.013014][T11267] dump_stack+0x15/0x1b [ 156.013117][T11267] should_fail_ex+0x265/0x280 [ 156.013149][T11267] should_fail_alloc_page+0xf2/0x100 [ 156.013185][T11267] __alloc_frozen_pages_noprof+0xff/0x360 [ 156.013229][T11267] alloc_pages_mpol+0xb3/0x250 [ 156.013375][T11267] alloc_pages_noprof+0x90/0x130 [ 156.013481][T11267] __pmd_alloc+0x47/0x470 [ 156.013510][T11267] handle_mm_fault+0x19d1/0x2be0 [ 156.013533][T11267] ? __rcu_read_unlock+0x4f/0x70 [ 156.013570][T11267] do_user_addr_fault+0x3fe/0x1090 [ 156.013639][T11267] ? __rcu_read_unlock+0x4f/0x70 [ 156.013701][T11267] exc_page_fault+0x62/0xa0 [ 156.013744][T11267] asm_exc_page_fault+0x26/0x30 [ 156.013800][T11267] RIP: 0010:__put_user_4+0xd/0x20 [ 156.013876][T11267] Code: 66 89 01 31 c9 0f 01 ca e9 d0 7d 01 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 [ 156.013898][T11267] RSP: 0018:ffffc900126ffe78 EFLAGS: 00050202 [ 156.013916][T11267] RAX: 0000000000000004 RBX: 0000000000000000 RCX: 0000200000000040 [ 156.013931][T11267] RDX: ffff8881037d1040 RSI: 0000000000000005 RDI: 0000000000000000 [ 156.013946][T11267] RBP: 0000000000000004 R08: 0001ffff86848aff R09: 0000000000000000 [ 156.013961][T11267] R10: 0001888118d1d680 R11: 0001888118d1d687 R12: 0000200000000040 [ 156.013975][T11267] R13: 0000000000000002 R14: 0000000000000023 R15: 0000000000000000 [ 156.014073][T11267] __sys_socketpair+0xa6/0x430 [ 156.014101][T11267] ? ksys_write+0x192/0x1a0 [ 156.014138][T11267] __x64_sys_socketpair+0x52/0x60 [ 156.014195][T11267] x64_sys_call+0x23f2/0x2fb0 [ 156.014218][T11267] do_syscall_64+0xd2/0x200 [ 156.014238][T11267] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 156.014324][T11267] ? clear_bhb_loop+0x40/0x90 [ 156.014346][T11267] ? clear_bhb_loop+0x40/0x90 [ 156.014483][T11267] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.014507][T11267] RIP: 0033:0x7f5c4ef3e9a9 [ 156.014522][T11267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.014541][T11267] RSP: 002b:00007f5c4d59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 156.014588][T11267] RAX: ffffffffffffffda RBX: 00007f5c4f165fa0 RCX: 00007f5c4ef3e9a9 [ 156.014601][T11267] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000023 [ 156.014614][T11267] RBP: 00007f5c4d59f090 R08: 0000000000000000 R09: 0000000000000000 [ 156.014675][T11267] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 156.014688][T11267] R13: 0000000000000001 R14: 00007f5c4f165fa0 R15: 00007ffe43310f28 [ 156.014708][T11267] [ 156.438676][T11292] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2661'. [ 156.686886][ T31] bond0 (unregistering): Released all slaves [ 156.695748][ T31] bond1 (unregistering): Released all slaves [ 156.704360][ T31] bond2 (unregistering): Released all slaves [ 156.712764][ T31] bond3 (unregistering): Released all slaves [ 156.721312][ T31] bond4 (unregistering): Released all slaves [ 156.860775][ T23] lo speed is unknown, defaulting to 1000 [ 156.866572][ T23] infiniband syz0: ib_query_port failed (-19) [ 158.087844][T11342] geneve2: entered promiscuous mode [ 158.093289][T11342] geneve2: entered allmulticast mode [ 158.819946][ T29] kauditd_printk_skb: 39991 callbacks suppressed [ 158.819962][ T29] audit: type=1400 audit(1752942346.967:229808): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 158.872012][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 158.873838][ T29] audit: type=1326 audit(1752942346.977:229809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11357 comm="syz.3.2677" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82c8f6e9a9 code=0x7ffc0000 [ 158.878543][ T3034] audit: audit_lost=38692 audit_rate_limit=0 audit_backlog_limit=64 [ 158.902224][ T29] audit: type=1326 audit(1752942346.977:229810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11357 comm="syz.3.2677" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82c8f6e9a9 code=0x7ffc0000 [ 158.910211][ T3034] audit: backlog limit exceeded [ 158.910880][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 158.933853][ T29] audit: type=1326 audit(1752942346.977:229811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11357 comm="syz.3.2677" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82c8f6e9a9 code=0x7ffc0000 [ 158.938674][ T3034] audit: audit_lost=38693 audit_rate_limit=0 audit_backlog_limit=64 [ 158.945318][ T29] audit: type=1400 audit(1752942346.977:229812): avc: denied { map_create } for pid=11357 comm="syz.3.2677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.600975][T11391] SELinux: syz.0.2686 (11391) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 163.865939][ T29] kauditd_printk_skb: 55712 callbacks suppressed [ 163.865957][ T29] audit: type=1400 audit(1752942351.991:282854): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.872901][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 163.894449][ T29] audit: type=1400 audit(1752942351.991:282855): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.900014][ T3034] audit: audit_lost=39584 audit_rate_limit=0 audit_backlog_limit=64 [ 163.900032][ T3034] audit: backlog limit exceeded [ 163.921332][ T29] audit: type=1400 audit(1752942351.991:282856): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.929688][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 163.934122][ T29] audit: type=1400 audit(1752942351.991:282857): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.955320][ T3034] audit: audit_lost=39585 audit_rate_limit=0 audit_backlog_limit=64 [ 163.961831][ T29] audit: type=1400 audit(1752942351.991:282858): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 164.043522][T11408] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 164.050098][T11408] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 164.057745][T11408] vhci_hcd vhci_hcd.0: Device attached [ 164.064343][T11408] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(8) [ 164.070882][T11408] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 164.078417][T11408] vhci_hcd vhci_hcd.0: Device attached [ 164.085072][T11408] vhci_hcd vhci_hcd.0: pdev(0) rhport(2) sockfd(10) [ 164.091702][T11408] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 164.099401][T11408] vhci_hcd vhci_hcd.0: Device attached [ 164.105938][T11408] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 164.126065][T11408] vhci_hcd vhci_hcd.0: pdev(0) rhport(4) sockfd(14) [ 164.132702][T11408] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 164.140223][T11408] vhci_hcd vhci_hcd.0: Device attached [ 164.151085][T11408] vhci_hcd vhci_hcd.0: pdev(0) rhport(5) sockfd(16) [ 164.157714][T11408] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 164.165451][T11408] vhci_hcd vhci_hcd.0: Device attached [ 164.171856][T11408] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 164.232540][T11431] vhci_hcd vhci_hcd.0: pdev(0) rhport(7) sockfd(21) [ 164.239240][T11431] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 164.246905][T11431] vhci_hcd vhci_hcd.0: Device attached [ 164.318922][ T10] usb 1-1: new low-speed USB device number 3 using vhci_hcd [ 164.862808][T11432] vhci_hcd: connection closed [ 164.862910][T11425] ================================================================== [ 164.862987][T11427] vhci_hcd: connection closed [ 164.868149][T11425] BUG: KCSAN: data-race in data_alloc / prb_reserve [ 164.887445][T11425] [ 164.889768][T11425] write to 0xffffffff8686b200 of 8 bytes by task 11432 on cpu 0: [ 164.897491][T11425] data_alloc+0x27d/0x2b0 [ 164.901843][T11425] prb_reserve+0x808/0xaf0 [ 164.906283][T11425] vprintk_store+0x56d/0x860 [ 164.910877][T11425] vprintk_emit+0x178/0x650 [ 164.915390][T11425] vprintk_default+0x26/0x30 [ 164.919985][T11425] vprintk+0x1d/0x30 [ 164.923890][T11425] _printk+0x79/0xa0 [ 164.927802][T11425] vhci_rx_loop+0x4a5/0x5f0 [ 164.932319][T11425] kthread+0x489/0x510 [ 164.936397][T11425] ret_from_fork+0xda/0x150 [ 164.940906][T11425] ret_from_fork_asm+0x1a/0x30 [ 164.945686][T11425] [ 164.948014][T11425] read to 0xffffffff8686b200 of 8 bytes by task 11425 on cpu 1: [ 164.955643][T11425] prb_reserve+0x221/0xaf0 [ 164.960075][T11425] vprintk_store+0x56d/0x860 [ 164.964671][T11425] vprintk_emit+0x178/0x650 [ 164.969187][T11425] vprintk_default+0x26/0x30 [ 164.973779][T11425] vprintk+0x1d/0x30 [ 164.977682][T11425] _printk+0x79/0xa0 [ 164.981601][T11425] vhci_rx_loop+0x4a5/0x5f0 [ 164.986119][T11425] kthread+0x489/0x510 [ 164.990191][T11425] ret_from_fork+0xda/0x150 [ 164.994705][T11425] ret_from_fork_asm+0x1a/0x30 [ 164.999490][T11425] [ 165.001815][T11425] value changed: 0xfffffffffffc5c38 -> 0x000000000004fc70 [ 165.008926][T11425] [ 165.011261][T11425] Reported by Kernel Concurrency Sanitizer on: [ 165.017419][T11425] CPU: 1 UID: 0 PID: 11425 Comm: vhci_rx Not tainted 6.16.0-rc6-syzkaller-00253-g4871b7cb27f4 #0 PREEMPT(voluntary) [ 165.029674][T11425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 165.039740][T11425] ================================================================== [ 164.862787][T11425] vhci_hcd: connection closed [ 165.049281][T11417] vhci_hcd: connection reset by peer [ 165.059618][ T31] vhci_hcd: stop threads [ 165.063959][ T31] vhci_hcd: release socket [ 165.068398][ T31] vhci_hcd: disconnect device [ 165.073341][ T31] vhci_hcd: stop threads [ 165.077628][ T31] vhci_hcd: release socket [ 165.082040][ T31] vhci_hcd: disconnect device [ 165.084236][T11421] vhci_hcd: connection closed [ 165.086915][T11419] vhci_hcd: connection closed [ 165.087182][ T31] vhci_hcd: stop threads [ 165.100583][ T31] vhci_hcd: release socket [ 165.105058][ T31] vhci_hcd: disconnect device [ 165.135035][ T31] vhci_hcd: stop threads [ 165.139318][ T31] vhci_hcd: release socket [ 165.143731][ T31] vhci_hcd: disconnect device [ 165.154681][ T31] vhci_hcd: stop threads [ 165.158957][ T31] vhci_hcd: release socket [ 165.163367][ T31] vhci_hcd: disconnect device [ 165.169141][ T31] vhci_hcd: stop threads [ 165.173391][ T31] vhci_hcd: release socket [ 165.177867][ T31] vhci_hcd: disconnect device [ 165.574655][ T51] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.629413][ T4547] syz_tun (unregistering): left promiscuous mode [ 165.651184][ T51] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.774072][ T51] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.822708][ T51] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.920298][ T51] bond0: left allmulticast mode [ 165.925372][ T51] bond0: left promiscuous mode [ 165.930386][ T51] bridge0: port 1(bond0) entered disabled state [ 166.012586][ T51] bond0 (unregistering): Released all slaves [ 166.021510][ T51] bond1 (unregistering): Released all slaves [ 166.061100][ T51] tipc: Disabling bearer [ 166.066075][ T51] tipc: Left network mode [ 166.088228][ T51] hsr_slave_0: left promiscuous mode [ 166.094109][ T51] hsr_slave_1: left promiscuous mode [ 166.102981][ T51] veth1_macvtap: left promiscuous mode [ 166.108475][ T51] veth0_macvtap: left promiscuous mode [ 166.115657][ T51] veth1_vlan: left promiscuous mode [ 166.120964][ T51] veth0_vlan: left promiscuous mode [ 166.425311][ T51] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.475091][ T51] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.525269][ T51] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.595638][ T51] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.098203][ T51] bridge_slave_0: left allmulticast mode [ 167.103880][ T51] bridge_slave_0: left promiscuous mode [ 167.109589][ T51] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.250287][ T51] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 167.260333][ T51] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 167.270415][ T51] bond0 (unregistering): Released all slaves [ 167.278991][ T51] bond1 (unregistering): Released all slaves [ 167.393072][ T51] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 167.401564][ T51] bond0 (unregistering): Released all slaves [ 167.410736][ T51] bond1 (unregistering): Released all slaves [ 167.521509][ T51] bond0 (unregistering): Released all slaves [ 167.529280][ T51] bond1 (unregistering): Released all slaves [ 167.540897][ T7311] syz2: Port: 1 Link DOWN [ 167.573691][ T51] tipc: Left network mode [ 167.629813][ T51] hsr_slave_1: left promiscuous mode [ 167.639565][ T51] batadv_slave_0: left promiscuous mode [ 167.648161][ T51] hsr_slave_0: left promiscuous mode [ 167.654051][ T51] hsr_slave_1: left promiscuous mode [ 167.662144][ T51] hsr_slave_0: left promiscuous mode [ 167.667855][ T51] hsr_slave_1: left promiscuous mode [ 167.676337][ T51] veth1_macvtap: left promiscuous mode [ 167.682161][ T51] veth0_macvtap: left promiscuous mode [ 167.687845][ T51] veth1_vlan: left promiscuous mode [ 167.693378][ T51] veth0_vlan: left promiscuous mode [ 167.769928][ T3329] smc: removing ib device syz2 [ 168.909051][ T29] kauditd_printk_skb: 59893 callbacks suppressed [ 168.909068][ T29] audit: type=1400 audit(1752942356.998:327412): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.915616][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 168.937069][ T29] audit: type=1400 audit(1752942356.998:327413): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.943351][ T3034] audit: audit_lost=44699 audit_rate_limit=0 audit_backlog_limit=64 [ 168.964602][ T29] audit: type=1400 audit(1752942356.998:327414): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.964653][ T29] audit: type=1400 audit(1752942356.998:327415): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.972654][ T3034] audit: backlog limit exceeded [ 168.973179][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 168.993849][ T29] audit: type=1400 audit(1752942356.998:327416): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 169.015018][ T3034] audit: audit_lost=44700 audit_rate_limit=0 audit_backlog_limit=64 [ 169.391987][ T10] usb 1-1: enqueue for inactive port 0 [ 169.397808][ T10] usb 1-1: enqueue for inactive port 0 [ 169.482588][ T10] vhci_hcd: vhci_device speed not set [ 173.949648][ T29] kauditd_printk_skb: 54735 callbacks suppressed [ 173.949665][ T29] audit: type=1400 audit(1752942361.997:382151): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 173.956421][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 173.977478][ T29] audit: type=1400 audit(1752942362.007:382152): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 173.983774][ T3034] audit: audit_lost=44701 audit_rate_limit=0 audit_backlog_limit=64 [ 174.004970][ T29] audit: type=1400 audit(1752942362.007:382153): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.012942][ T3034] audit: backlog limit exceeded [ 174.034131][ T29] audit: type=1400 audit(1752942362.007:382154): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.039528][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 174.060199][ T29] audit: type=1400 audit(1752942362.007:382155): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.067032][ T3034] audit: audit_lost=44702 audit_rate_limit=0 audit_backlog_limit=64