last executing test programs: 1.908602056s ago: executing program 0 (id=2033): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = memfd_secret(0x0) ftruncate(r2, 0x51a9497) write$UHID_CREATE(r2, &(0x7f0000000c00)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000007c0)=""/203, 0xcb, 0x8, 0xffffffff, 0x7, 0x98}}, 0x120) finit_module(r2, 0x0, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x80000000000000}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='mpol=interleave,mpol=local']) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x3}, 0x94) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x3) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x65, 0x0, 0xf, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2, 0xffff}}}}}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x34, 0xda18, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x8, 0x4, 0x0, 0x0, 0x1000, {[@timestamp={0x8, 0xa, 0x3, 0x20000006}]}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3, 0x0, 0x80}, 0x18) syz_pidfd_open(0x0, 0x0) 1.86380289s ago: executing program 0 (id=2036): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r3) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000004c0)={'syz_tun\x00', 0x0}) vmsplice(r3, &(0x7f00000001c0)=[{&(0x7f0000000240)="ac4c0f3103d82bc8edeb55470f42024945549a5810d7c78e91222f62a98e923fbfb45bc1fa0ce311675276afffbb5bff9a70bcfc905b28fa2d9c853a4f7f287d12f360abccfd835b5c6d30f2cbbb277025", 0x51}, {&(0x7f0000000380)="34b73d9c646763fbb2a5f0ac4b7e87831230f815b05060630110509d45909400f8b23a53b764fe702dec2c8315292256dc8b8496c24cbe1a1c82b2cac7f2dc8fa22dbad57e7eb12d66919165e8a157f81c1a42d789bf183f62f4993e9e2327ec2b0aab08d093a3366ba14a883391906128a2c80500fcd49623c443ce62413da142b308e65cbbc9548a", 0x89}, {&(0x7f0000000440)="e5c77ee12e73b4d439a2784ffafa44e71f37b0786aee1248ab84ba52c908e0c5255fb2b3ad4f4295ad542b1a91017c014f338cccdc33db7400e2cd4613863e48509c2140a4c22e3fe1a5ee344ba9861af58ebe7031b4", 0x56}, {&(0x7f0000000500)="90e0f6185e64935827fad15aef61ac7a7ce417d1692a4994b538d29f30cbccb10b3af92521880f47eb0d5bedd404346ffe9d05acb0c490cd82efefe66df1c99b8a741525291e3e94b2bd441b98dab6db9d1c13e03d0ad4bf3764af619e008c3ff3bfead1f2b1903e8ed1995db6c427110f2b265fb22d66bfcf64fb833760dbd0ce05f4a16e593c0d140c6f9dc05e76eb500d82f049", 0x95}], 0x4, 0x6) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x30, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4044094) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x7, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000000000007}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x82, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x200000000000, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.772211657s ago: executing program 0 (id=2039): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="07000000040000008000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000092a58216a1c8f0c3128cd987af6505ab20564da7af05840a0fbfa93600edd40946f67e26dcd534ac117abc9cc5a8e9b880", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) r3 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r4 = fcntl$dupfd(r3, 0x0, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1f, 0x0, 0xc, 0x8, 0x20024, r4, 0xfff, '\x00', 0x0, r4, 0x3, 0x2, 0x2}, 0x50) write$sndseq(r4, &(0x7f0000000180)=[{0xff, 0x0, 0x0, 0x0, @tick=0x4, {}, {0x1}, @result={0x1, 0x2}}, {0x0, 0x0, 0x5, 0x3, @time={0x2, 0x9}, {0x1, 0x31}, {0x0, 0xfd}, @addr={0x2a, 0x6}}], 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x6, @time={0x20000000, 0x1}, 0x4, {0xfa, 0x7}, 0x8, 0x0, 0x2}) readv(r4, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x3f}], 0x1) setsockopt(r4, 0x9, 0x7, &(0x7f00000000c0)="ebab6859dcbc0f308aa92ee34df05d63e3294a5987cc0959264ef0121e78b3baa01873f5b37edad430427e8db2c8be16602ad4e73bb5c3aa84f361dd6363af45", 0x40) 1.771985818s ago: executing program 0 (id=2040): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet6(r1, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) syz_io_uring_setup(0x18d6, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x0, 0xad}, &(0x7f0000000440), &(0x7f0000ffe000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000d000000000000002018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) r4 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000140)=ANY=[@ANYBLOB="7851160007"]) 1.758732819s ago: executing program 0 (id=2041): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x25}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x634}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4001}, 0x20000000) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents64(r1, &(0x7f00000002c0)=""/45, 0x2d) getdents(r1, 0xffffffffffffffff, 0x5a) socket(0x2, 0x80805, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r7, 0x0, 0x7, 0x9) write$P9_RWRITE(r7, &(0x7f0000000200)={0xb, 0x77, 0x2}, 0xb) read(r6, &(0x7f0000032440)=""/102364, 0x18fdc) syz_read_part_table(0x106d, &(0x7f0000001080)="$eJzsz7FNw0AYBeB3trFNR0VD44qaGdiBFiExiBENDSPQ0rAIG7AAI6SOLjpFyQhJiu8r7p6eTvfrD2d2M+UlQ0peP/okJbW8JXVbpyRdUoav9uy2HUvmtPo6ufp/f75v3WNfxvwefhv3V5+7tZaWNnN3HNXSw3dZaq1rks+/p5+TrwsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF2gXAAD//wCmE1Q=") syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x14c343) getpgid(0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b000000070000000200000004", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB], 0x48) 898.782508ms ago: executing program 0 (id=2070): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80, 0x0, 0x0, 0x5}, 0x10) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c05fffff600000000fcffffffd70400000000000040000000000000"], 0x1c}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x100003c}, 0x18) r3 = syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file0\x00', 0x3204400, &(0x7f0000000880)=ANY=[], 0x1, 0x282, &(0x7f0000000c00)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0x2, &(0x7f0000000440)=ANY=[@ANYRESHEX=r2, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x52, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r5}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffff7ffffffd]}, 0x0, 0x8) r6 = gettid() tkill(r6, 0x12) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) syz_usb_connect$cdc_ecm(0x2, 0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000020000082505a5a4400000000101090244000101000000090400000302060000052406000005240000000d240f0100000000000000000009058103200000000009058202080000000009050302"], 0x0) r7 = eventfd(0xbe) read$eventfd(r7, &(0x7f0000000400), 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xc, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r8}, 0x10) mkdirat(r3, &(0x7f0000000500)='./file2\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x4, &(0x7f0000000380)=[{0x1, 0x57, 0x4, 0x5}, {0x4a, 0xc2, 0x7, 0x1}, {0x74, 0x2, 0x2, 0x101}, {0x2, 0x1, 0xc7, 0x56be3970}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="18000000520001000000000000cf050000"], 0x18}}, 0x4004008) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r9, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x84042, 0x1fb) write$P9_RUNLINKAT(r10, &(0x7f00000004c0)={0xfffffffffffffe15, 0x4d, 0x6}, 0x7395a0d2) close_range(r8, r3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r10) 858.620531ms ago: executing program 3 (id=2073): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) syz_emit_ethernet(0xe, &(0x7f0000000e80)={@empty, @dev, @void, {@generic={0x88f5}}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r3) memfd_secret(0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r4, 0x800, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x7, 0x50}}}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x8c0}, 0x51) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, r2, 0x400, 0x70bd2a, 0x25dfdbff, {{0x15}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 791.892926ms ago: executing program 1 (id=2075): r0 = socket$kcm(0x2d, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000040)={0x2a, 0x0, 0x7ffe}, 0xc) socket$rxrpc(0x21, 0x2, 0xa) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r3 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000000), 0x4) 751.12107ms ago: executing program 3 (id=2077): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES8=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x4}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/14, @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="900000001c00010029bd7000fedbdf250a020000", @ANYRES32=r6, @ANYBLOB="0000420305000c00010000000800010000000000070000000500010004000000040002"], 0x90}, 0x1, 0x0, 0x0, 0xc051}, 0x44040) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000000)='./bus\x00', 0x2000404, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES64=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESDEC], 0x1, 0x2b8, &(0x7f0000000ac0)="$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") mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) rename(&(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='./bus/../file0\x00') 750.736579ms ago: executing program 1 (id=2078): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='9', 0x1, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000280)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x800, 0x0, 0xff, 0x9}, 0x20) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000003980)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r5) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x60, r7, 0x1, 0x0, 0x10000, {}, [@TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "e3de3d7b4cd07ec3ee777de774fc7987cca41989"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0xfffffffe}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r3, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'team0\x00'}}}}}, 0x34}}, 0x0) 688.103674ms ago: executing program 1 (id=2081): socket$kcm(0xa, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='kfree\x00', r0, 0x0, 0xfffffffffffffbff}, 0x18) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000380)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@max_batch_time={'max_batch_time', 0x3d, 0x131}}, {@mblk_io_submit}, {@quota}]}, 0x3, 0x437, &(0x7f0000000d80)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), 0x0, 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') socket$kcm(0x10, 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42202) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0xb, 0xfffffffffffffffc, 0x0, 0x0) (fail_nth: 2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x401c2, 0x0) ftruncate(r2, 0x8800000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) sendfile(r3, r2, 0x0, 0x578410eb) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x68, 0x30, 0x829, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x0, 0x10000000, 0x0, 0x3}}, @TCA_SKBEDIT_PRIORITY={0x4}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) write$binfmt_misc(r2, &(0x7f0000000480)="ddea613bc1978861e5c37e396a2fb889293fffede8b42c9ba248676f19a40c7f6b0bdf33f89ca57b7425066f6a6a448153442d640d86023908af8dd9d080d2ac25abab129930ddc58bbb030ad56d2eae23d72eb3f4fce5a1fb9a20eef8802c918862df85d613da6ffa0a238ca6e38c676985a26ad262b3c3cf855d14e193a2fade32196090739ad434c135990fc75d7010ddb79ca6f76d9c88154209f9a2db55f5302634cd02184efa3c2b17fc75c68e90c0f99c", 0xb4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000080), &(0x7f0000000240)=r8}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x18000000000002a0, 0xd50, 0x0, &(0x7f0000000580)='wvh', 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x33) 673.705426ms ago: executing program 4 (id=2082): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = memfd_secret(0x0) ftruncate(r2, 0x51a9497) write$UHID_CREATE(r2, &(0x7f0000000c00)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000007c0)=""/203, 0xcb, 0x8, 0xffffffff, 0x7, 0x98}}, 0x120) finit_module(r2, 0x0, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x80000000000000}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='mpol=interleave,mpol=local']) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r6, 0x3) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x65, 0x0, 0xf, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2, 0xffff}}}}}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x34, 0xda18, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x8, 0x4, 0x0, 0x0, 0x1000, {[@timestamp={0x8, 0xa, 0x3, 0x20000006}]}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3, 0x0, 0x80}, 0x18) syz_pidfd_open(0x0, 0x0) 455.534784ms ago: executing program 3 (id=2084): set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x20000001}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x44, 0x1, 0x9, 0x401, 0x0, 0x0, {0x5, 0x0, 0x4}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x8}, @NFCTH_STATUS={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x77}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, 0x44}}, 0x400d0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r6, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x6, 0x1, 0x201, 0x0, 0x0, {0xe, 0x0, 0xa}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4040000) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r6, 0x0, 0x2000c000) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={&(0x7f0000002980)=@dellink={0x34, 0x11, 0x1, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0xc0, 0x1400}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'wg2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000100}, 0x40004) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) sched_setaffinity(r8, 0x8, &(0x7f0000000240)=0x81) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e1e}, 0xffffffffffffffcd) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x54, 0x0, 0x8, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x10}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xc}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x800) r9 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r9, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f0000000000)={[], [{@seclabel}]}, 0x6, 0x623, &(0x7f0000001fc0)="$eJzs3U9oXNUaAPDvziR5SZv30j4ej9fyHi/QRQuPpklfserGti7somDBLkRcNDRJDZ3+oUnBxoIJuFBQEHEr0o3g2r10704EdedaqCIVBZWO3Jk77SSZSaZJZm6S+/vBzdxz7p0555s7Z+659+bMDaCwRtM/pYgDEQ8vJhEjTcuGo75wNFvvwU93LqVTEtXqSz8mkWR5jfWT7HFvlhiMiC/PRPy9vLrcudsLVyYr1bo3I47NX71xbO72wtHZq5OXpy9PX5s4/vSJk+PPTJyY2JI492aPZ8+9+O/33nrtqZmvKkeTOBUX+t+YihVxbJXRGI2HWYjN+X0RcTKdafG+7DS7IIRCK2efx/6I+GeMRLmWqhuJ2XdzrRzQVdVyRBUoqGQz7f/TBV8fsGM1+gGNY/vOjoMvdLlX0jv3T9cPgFbH31c/NxKDtWOjPQ+SpiOj+rmNfVtQflrGH3cOfpROsew8xK+Ptk7fFpTTzuJSRPyrVfxJrW77apGm8ZeW1SOJiPGIGMjq9/wm6pA0zXfjPMxaNhp/KSJOZY9p/pkNlj+6It3r+AEopnunsx35Ypp6vP9L+x6N/k+06P8Mt9h3bUTe+7/2/b/G/n6wdo68tKIflvZZzrd+yf6VGd+9c/aDduU39//SKS2/0RfshftLEQdXxP92GmzW/0njT1ps/3SVi6c6K+OFr384225Z3vFX70Ycbnn887hXms6tcX3y2MxsZXq8/rdlGZ9/8eon7crPO/50++9pE3/T9i+tfF76ntzosIzPzt+92m7Z8Lrxl74fSOrHmwNZzuuT8/M3JyIGknPZKk35x9euS2Odxmuk8R851Lr9L/v8Ly1/naHGV2YHbrx85UG7Zc3bP0nq9Vhv+zddTH5Y7bAO7aTxT62//Ve1/zTv/Q7L+OWVW/9pt2ytz//QZgIDAAAAAACAAirVrsEmpbFH86XS2Fh9vOw/Yk+pcn1u/n8z129dm4o4Uvt/yP5S40r3SD2dpOmJ7P9hG+njK9L/j4j9EfFheaiWHrt0vTKVd/AAAAAAAAAAAAAAAAAAAACwTezNxv837lP9c7k+/h8oiG7eYA7Y3rR/KK5a+191iyegCNrt/+d6XA+g9/T/obi0fygu7R+KS/uH4tL+obi0fygu7R8AAAAAdqX9/733bRIRi88O1abUQLbMiCDY3frzrgCQm3LeFQBy8+jSv84+FE5H/f/fsh8H7H51gBwkrTJrnYPq2o3/XstnAgAAAAAAAAAAAABdcPhA+/H/xgbD7vYEw/6WulkPoPc2Mf7fTwfADuen/6G4NnyMP7i19QDys94o/rbN3fh/AAAAAAAAAAAAAOiZ4dqUlMayscDDUSqNjUX8NSL2RX8yM1uZHo+Iv0XEN+X+v6TpibwrDQAAAAAAAAAAAAAAAAAAALvM3O2FK5OVyvTN5pnfV+Xs7pnGXVB7UNZz8YTPiqT3b8tQROS+Ubo209eUk0Qsplt+W1Ts5lxsj2rUZnL+YgIAAAAAAAAAAAAAAAAAgAJqGnvc2sGPe1wjAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOi9x/f/f9KZQx2vnHeMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDO9GcAAAD//4+rO+Q=") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) 415.719267ms ago: executing program 1 (id=2085): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff000001000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 414.926386ms ago: executing program 3 (id=2087): r0 = syz_io_uring_setup(0x3fb1, &(0x7f0000000300)={0x0, 0x9cb1, 0x40, 0x5, 0xd6}, &(0x7f0000000100), &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'geneve1\x00', 0x0}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r5, &(0x7f0000000140)="240000000100", 0x6) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001500)=ANY=[@ANYBLOB="4c0000001000030400"/20, @ANYBLOB="46060900000000001c00128009000100766c616e000000000c00028006000100020000000800", @ANYRES32=r4], 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r7) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r10 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) readv(r10, &(0x7f0000000000)=[{&(0x7f0000000280)=""/240, 0xf0}], 0x1) recvmmsg(r10, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x600000a2, 0x0) sendmsg$can_raw(r10, &(0x7f0000000240)={&(0x7f0000000540)={0x1d, r11}, 0x10, &(0x7f0000000480)={&(0x7f00000000c0)=@canfd={{0x4}, 0x19, 0x3, 0x0, 0x0, "341368dd69973ba43697fd3853b77774d3daf0dee220eefd4ac91f43e3fee193ad12fb680c68822e97d1632ef02be9feb07d94cc57c139af5655e2c38ecfcf25"}, 0x48}, 0x1, 0x0, 0x0, 0x40880}, 0x4040) sendmsg$TIPC_CMD_ENABLE_BEARER(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x0) writev(r6, &(0x7f0000000040)=[{&(0x7f0000000100)="89e7ee2c78dad9b4b473fec988ca", 0x140}], 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r12}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x22, &(0x7f0000000380)={&(0x7f0000003000)={[{0x0, 0x0, 0x3}]}, 0x1}, 0x1) 397.167888ms ago: executing program 1 (id=2088): socketpair(0x1b, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000060000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r1}, 0x20) io_setup(0x5, &(0x7f0000000100)=0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000007000000010000000600000004000000", @ANYRES8=r0, @ANYBLOB="0600000000000000000000000020000000000000", @ANYRES32=0x0, @ANYRESDEC=r1, @ANYBLOB="05000000000000000200"/28], 0x50) ioctl$EXT4_IOC_SETFSUUID(r4, 0x4008662c, &(0x7f0000000400)={0xe6b8cc449d7395a6, 0x0, "b82e2514f7fa0394bdc93ca96d3578e7"}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$bt_hci(r7, &(0x7f0000000240)={0x27, 0x3}, 0x6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000ff030000020000000400000000000200", @ANYRES32, @ANYBLOB="0100"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000040000000200"/28], 0x50) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r4, &(0x7f00000002c0)="655c24062cd50df29b70743cb92090ae00520e7ebeff5dfbaf61b983c8e83428fd46e24f58eea89fca1b770090d0a960653b248390dd566b5ffcc9040036f014b96086024d132264cb0fcff66ef2c5057765853d9438a6e64861eddf2368b352713c8d742c8ab7566904fec7ca7b86cb1116544238e5", &(0x7f0000000340)=""/128}, 0x20) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x40201, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000002060101000000000000001800000000140007800800080000000000080006400000825d0500010006000000050005000a0000000900020073797a310000000011000300686173683a69702c6d61726b00000000"], 0x60}}, 0x0) r10 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f8b) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x2, 0x803fd, 0x1, 0x800}) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r8, 0x330f, 0x3) openat(r7, &(0x7f0000000440)='./file0\x00', 0x40201, 0x12) eventfd2(0x1ff, 0x800) io_submit(r3, 0x0, &(0x7f0000000300)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r4, &(0x7f0000000640)="228e0110000000000000bc3e2f7c00000000000000008e3983b35e286a1ee63470e2df868ce337ec2ae8ee4408b5ac9f045f7a00c023827793735f785845dc59a6fcbf94f5925adc1673926e527a62494b695e30b921bb5e9dd900a38f5593430500a6669c04d512ca2202fb699039d4bdb1718540f70b5cda25e5841d16c37a2cc19fe044970863e03ce16592e25260f5efb0c233df243cf54f50eeacd8a1344aa6"}, 0x20) 342.205273ms ago: executing program 4 (id=2090): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) prlimit64(0x0, 0xe, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000570000"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x60800, 0x0) sendfile(r3, r4, 0x0, 0x1000000000004) 296.074896ms ago: executing program 3 (id=2091): socket$inet6(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x488c, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r1, 0x0, 0x0}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r5) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r7, 0x0, 0x5}, 0x18) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r6, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) 295.316796ms ago: executing program 3 (id=2093): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41101, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$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") openat(0xffffffffffffff9c, 0x0, 0x88240, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xb10, 0x7}, 0x0, 0x2, 0xfffff7f0, 0x0, 0x12, 0x4, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fsopen(0x0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00'}, 0x18) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e34f5b16c29f56f7debe73b6f78307d36b6215ba3116801f4ead28122609073b90e8b504105fae8f031c0e81dd482ddd778015f820a125d2e5c81e4ef9d1fd92ab05991a0795"], &(0x7f0000000700)='GPL\x00'}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r4, 0xfe, 0xfffffffffffffffe}, 0xf) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f0000"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x18) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0x400000000000000, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r2, 0x0, 0xf7}, 0x18) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) 293.070127ms ago: executing program 2 (id=2094): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES8=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x4}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/14, @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="900000001c00010029bd7000fedbdf250a020000", @ANYRES32=r6, @ANYBLOB="0000420305000c00010000000800010000000000070000000500010004000000040002"], 0x90}, 0x1, 0x0, 0x0, 0xc051}, 0x44040) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000000)='./bus\x00', 0x2000404, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES64=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESDEC], 0x1, 0x2b8, &(0x7f0000000ac0)="$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") mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) rename(&(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='./bus/../file0\x00') 292.725407ms ago: executing program 4 (id=2095): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2008002, &(0x7f0000000400)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xffc}}, {@nodiscard}, {@quota}]}, 0x1, 0x56f, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x575100, 0x142) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x2, r0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x5}, [], {0x4, 0x3}, [], {0x10, 0x7}, {0x20, 0x4}}, 0x24, 0x3) accept4$llc(r0, &(0x7f0000000480)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000b40)=0x10, 0x80800) r3 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r3, 0x29, 0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000300)={0x0, 0xff03, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000800)=@can_newroute={0x14c, 0x18, 0x1, 0x70bd29, 0x20000000, {0x1d, 0x1, 0x4}, [@CGW_CS_CRC8={0x11e, 0x6, {0x4, 0x2, 0x6b, 0x0, 0xff, "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", 0x0, "5c8d586b2a88d818b56d2a5e15c8a95d29e5b2ea"}}, @CGW_MOD_SET={0x15, 0x4, {{{0x3, 0x1, 0x0, 0x1}, 0x0, 0x5, 0x0, 0x0, '\t\x00'}, 0x2}}]}, 0x14c}}, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x1, @broadcast}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000a40)="e6f2505f433d7c8b9a8923f29e01ca5d99cefc0ebd9edc760324a34dcae2e1281116907686bfddb1086ff8141c05080c487d99ae773bdfef47c80c7946877fe2305401f5019500000000000032f4fc30170be839354198b227e7c345c2106cccc90d737266c0c4163b10b85ee74112f7ab6947c0ab6d7160860516bbeb0d78b68d9b898817f585a43bf290d19cf2a75c6c5e883168f8628eb379a7ef48cbb83caa09ebe650591ed94400bb43e1adc4185f8833fc684e8f5907940d7080327ff5af8f53294b0dae08f28d3f5e1d2a3584a7853a1b", 0xd4}, {&(0x7f00000001c0)="7bd10f6028094cd6baaa3cbbac1db4d7ca53f375c3d1e1539118ffc2ac7681ba55b96f285015f3", 0x27}, {&(0x7f0000000240)="89144d26a05c8dffde93487b9e304ece5e3dbee9dae1953e49f16f0618710e0e651c8648ca3b155137780b784be7d78e", 0x30}], 0x3, &(0x7f00000003c0)=[@mark={{0x14}}], 0x18}, 0x4004004) 247.40863ms ago: executing program 1 (id=2096): syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0xc00000000) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x6c136, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x6, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x407, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="00ff010000000000b708001b0d0000007b8af8ff00000000bfa20000001c000007020000f8ffffffb7030000080044ee77caea586d5761d3e688e9920000b704000000000000030000000000000095fc93412fb70f9b45268edccae9f76e5f23fc2b33f5f30200000089a6ea8749bab7788a000000000000000ba3d506b0e59794c3174856d81095f37f164eb08ffce758239f003516023e215705d127e4c385317d88ff12c47c642e0f61f9d158"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071103200000000000084be288e72a7d71c8fbb79046c0adbac627f46ddd5835ac828725e6cac41e45582a33ed3eb617d83ecb8ec70f618427857950676873df5ebeccbb39133e50e0b307c71d089f745cfb27f00000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) sendmmsg$inet6(r3, &(0x7f0000000200)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x9}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="7957d404736da65f9d132319c6a5", 0xe}, {&(0x7f0000000ec0)="ada3468ff5b811c75a5cb675c4e3a6039748de9cec396af675712339f7fcdf", 0x1f}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x590}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="8dd083295e246ca2e4077bbea2f0939e88dcf8749e2625d783fc33d874ff84346cfe602a3f9f7dbb", 0x28}], 0x1}}], 0x2, 0x8008801) sendmmsg$inet6(r3, &(0x7f0000019880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2604082c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r7, 0x0, 0x9, 0xc) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x80, 0x7) timer_settime(r5, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000000, 0x13, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) process_vm_writev(0x0, &(0x7f0000000000), 0x1, &(0x7f0000121000)=[{&(0x7f0000000540)=""/237, 0xffffffad}], 0x23a, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x97, 0x2a8, &(0x7f0000000500)="$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") mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000a80)='./file1\x00', 0x2800810, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], 0x3, 0x15d, &(0x7f0000000f00)="$eJzs27+KE1EUB+AzJmrUJrVYDNhYBbWyVCSCOKAoKbRSiDaJBEwzWgWfxNaHEyRVCuGKzpLshoRl/8zO7ub7mhz4ccM9xZ3LGZj3dz6PhpPpp8mreXSyLNqPI49FFt24Eq2ozAIAuEwWKcXvlFK6PosbPyKl1PSOAIC6uf8BYPccev8/amhjAEBtzP8AsHvevH334klR9F/neSfi16wclIPqt8qfPS/69/P/uqtV87IctJb5gyrPD+ZX4+Ze/nBjfi3u3a3yf9nTl8VafiuG9bcPAAAAO6GXL22c73u9bXlV7Xs/sDa/t+N2+8zaAACOYPr12+jDePzxi0JxQYs/KaVjLP/+szoC56SL0y2yiDjZ/zT9ZALqtjr0Te8EAAAAAAAAAAAAAADYpt6vkVpNtwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAb/Q0AAP//LjxONw==") 223.470062ms ago: executing program 2 (id=2097): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r2], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0) 221.332312ms ago: executing program 4 (id=2098): set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x20000001}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x44, 0x1, 0x9, 0x401, 0x0, 0x0, {0x5, 0x0, 0x4}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x8}, @NFCTH_STATUS={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x77}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, 0x44}}, 0x400d0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r6, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x6, 0x1, 0x201, 0x0, 0x0, {0xe, 0x0, 0xa}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4040000) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4d008}, 0x2000c000) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={&(0x7f0000002980)=@dellink={0x34, 0x11, 0x1, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0xc0, 0x1400}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'wg2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000100}, 0x40004) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) sched_setaffinity(r8, 0x8, &(0x7f0000000240)=0x81) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e1e}, 0xffffffffffffffcd) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x54, 0x0, 0x8, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x10}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xc}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x800) r9 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r9, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f0000000000)={[], [{@seclabel}]}, 0x6, 0x623, &(0x7f0000001fc0)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) 131.161319ms ago: executing program 2 (id=2099): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff000001000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 130.71856ms ago: executing program 2 (id=2100): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100cb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x2000c041) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) 115.227981ms ago: executing program 4 (id=2101): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = memfd_secret(0x0) ftruncate(r2, 0x51a9497) write$UHID_CREATE(r2, &(0x7f0000000c00)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000007c0)=""/203, 0xcb, 0x8, 0xffffffff, 0x7, 0x98}}, 0x120) finit_module(r2, 0x0, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x80000000000000}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='mpol=interleave,mpol=local']) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r6, 0x3) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x65, 0x0, 0xf, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2, 0xffff}}}}}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x34, 0xda18, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x8, 0x4, 0x0, 0x0, 0x1000, {[@timestamp={0x8, 0xa, 0x3, 0x20000006}]}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3, 0x0, 0x80}, 0x18) syz_pidfd_open(0x0, 0x0) 54.580506ms ago: executing program 2 (id=2102): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000001c0)=0x8, 0x4) r1 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg$inet(r1, &(0x7f0000000540)=[{{&(0x7f0000000200)={0x2, 0x4e1e, @remote}, 0x2, &(0x7f0000001900)=[{&(0x7f00000002c0)='\b\x00\x00\x00(\x00', 0x6}, {&(0x7f0000000840)="554922b1072630a11418416a825df4f823b02097793bff55a455468569d2c92c0473f603cb0ccb06257aac0d2e18f538c6d1022c2c2d25fcb3916b3ce32069ccfcd717609352f973fb", 0x49}, {&(0x7f0000000680)="5a95401a980d8d493cc279e293381cd41572e391d32f9f48f527170815d34c1294ecb99cdb1b1978a00ca61858e2f6390dc047358ca3e3dfb2b8c9ebe9563e99bb98b694f79524e22a69822f14fff43220f803ccb2173c01e4bc33694ebb9a895462d5d86c6398f95aeb5e400a496456473065e09438c7fad0adb8c0", 0x7c}, {&(0x7f0000000700)="fbb1a3f0f9a7f65040e5fb83af16117c4b0e2d6240ed64afdcc83c89c77b5f66b046b027e74534a3d70ed3580f78017ffac4935807906ce30c0952ec92985119f85590596f185c68c5f9aacc2c0bebce40517f54dd076c40f8d265c77f586564e34ede5252a1f751762f87f7b82ec9c0bcada5bd4436392e70a1302d60c05f88c4a5382ea667358b61208566cea9e34469e7d84b53c445fd5c2a9bc6958bc9", 0x9f}, {&(0x7f00000007c0)="b3429d03c3cd69b5c83412255735c6356784b39bff8d30a291cd9613b2b8e4c3d67a18dc334b9c54dcb4e693cce778c1399409b883abe833355acb7369faba97bbe8a40d03c4488480321c7581cf3b4a19d5e203acded6f23fd4ccbbc86a7410024973b57fb4287b4ce431fe", 0x6c}, {&(0x7f00000000c0)="5ef8212557", 0x5}, {&(0x7f00000019c0)="62a974381bcabb2f4c693b9d670145c2233d628844e4cc3dc1d8d2e5a700ff7b7fbf0129434b678c57e2c98bbf92ed9a1fb7cea93884e14cf1956cc9080d4d7e50eb2184c373b54e4f7090e7361f7dc628fc0dcce4e9979e944d2c0eb9fbc40c17f5a7434c8b78e5fbf9822976945b3dc3aab737a6000424b8f28184ef8ae6928750267ae6ea4dc7c6dbd16e04e4dc779729f06bead24f561335e04610f9c6987681cf5a8dd16564df2ba04b859e2cb95dc78e80287eee9c052da276", 0xbc}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000000180)="3260e302265d2d89db89abde7a6a", 0xe}], 0x9}}], 0x1, 0x4048810) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x10}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x200408, &(0x7f0000000280)=ANY=[@ANYBLOB='nodots,nodots,dots,dots,nodots,errors=continue,time_offset=0xfffffffffffffa93,dots,showexec,nodots,dots,gid=', @ANYRESHEX=0xee00, @ANYBLOB="2c646f74732c646f74732c6e66732c6e6f646f74732c646f74732c6e6f646f74732c646f74732c646f74732c6e6f646f74732c646f74732c646f74732c646f74732c636865636b3d72656c617865642c74696d655f6f66667365743d3078303030303030303030303030303437612c646f6e745f686173682c7365636c6162656c2c667373c322e2a50762a3d3fcae283b43ea02757569643d31643067586564382d353166312d62326634"], 0x1, 0x1d3, &(0x7f0000001a00)="$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") 53.974266ms ago: executing program 4 (id=2103): syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x8000, &(0x7f0000000000)=ANY=[@ANYBLOB="006cd52ecbf8336c2fe03ba553ff06c7fccd5b37930c20421d6f251d107d2fc61d2a837378090f8e99abc7eb97415ecec3e476d0ced59b60f6"], 0x1, 0x294, &(0x7f0000000800)="$eJzs3cFqE10UAOCTNG2S8kO6/nEx4MZVUN8gSAQhIESyN1DdtCKkm+jGPIZrlz6MD+BjdCHdjSQzSUxTabXTTGO+D4Y5uWcucyaLuRO4d/L6wbuT4/dnb9Pvn6PRSL61IiZxEXEU1diLTCXfVyOiFqsmAQBsm35/2Pn73p+KLIUiVNabRqPOcPrcVl/LDL5upigAAAAAAAAAAACKdmn+f9Sumf9fiYOV/ub/A8D2ud38f+69ZkSMOsPD/Pltlfn/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQHku0rSVzrYvjazlv4iYt6WtsusDAIq3HP+v3squDwAo3mL8bxr/AWBX3OL3/94GywQACvTqRz2i1+v2k6QRcT4ZD8aDbJ/ln7/odR8n9SRJkqNlr/PxeLCfx73ukyQTEZWIybRxlj/M+z9d5n/pfxCPHmb5ae7Zy94sPz/JeFCP4019CQAAAAAAAAAAAAAAAAAAAFCydrJwaX1/9nqfdvt3+SzK3g9w1fr+Wvxfyz82N3IpAAAAAAAAAAAAAAAAAAAAsLXOPnw8GZ6evhkJdiSoxvXHNG9wzFrQiPtxgYI/CdL8RrCWutHto3anNycAAAAAAAAAAAAAAAAAANgxi0W/+2VXAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADlWfz//x0G83NNyr1UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4B/3MwAA///UpIPg") (async) prctl$PR_GET_KEEPCAPS(0x7) (async) r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_regs={0x4, 0x4}}) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r1}, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000180), 0x10, &(0x7f0000000380)=[{&(0x7f0000000480)="c3e972bd85a6d84136d6dd55048d3593a74f338ce6772ab9a6f64041c2f6fbbecdc08ebcd3192b6a53662dae7c8e9c665e80a5d0925f728dcac30c29793992e588952653d414cb8ccdabc38767fee819ec5af0c5ee936880fe8549b4ed347779cab4ffd4e0b62c53a1c01db28f2b3f91c34211c9353bc1dece61511917c2245fd66cb8dffeacb4d46d627c97b498bf1ff6b313bfbc9765457c831771d5eec799", 0xa0}, {0x0}, {&(0x7f0000000340)="b768eb20304f2fdc5a9694a4867840d931", 0x11}], 0x3, 0x0, 0x0, 0x8010}, 0x0) (async) r4 = dup2(r3, r2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x21, &(0x7f0000000140)=[{&(0x7f00000004c0)="d8000000190081154e81f782db4cb904021d0800fd02fe02e8fe50a10a000548258848000c600e41b0000900ac00080325000000040015000a00ff150048035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x18) (async) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) close(r8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) (async) sendmsg$NFT_BATCH(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r9 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_mtu(r9, 0x0, 0x19, 0x0, 0x0) unshare(0x2c020400) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f0000000000)=0xfffffc3c) (async) unlinkat(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f0000000580)={{0x2}, 'port1\x00', 0x2, 0x28001, 0x3ff, 0x10001, 0x0, 0x3a7, 0x0, 0x0, 0x0, 0x2}) (async) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) pread64(r10, &(0x7f0000001440)=""/113, 0x71, 0x41) 0s ago: executing program 2 (id=2104): socket$inet6(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x488c, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r1, 0x0, 0x0}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r5) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r7, 0x0, 0x5}, 0x18) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r6, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) kernel console output (not intermixed with test programs): x77/0x7f [ 59.940882][ T5334] RIP: 0033:0x7f5df850ebe9 [ 59.940897][ T5334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.940982][ T5334] RSP: 002b:00007f5df6f6ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 59.941003][ T5334] RAX: ffffffffffffffda RBX: 0000000000000512 RCX: 00007f5df850ebe9 [ 59.941016][ T5334] RDX: 00007f5df6f6eef0 RSI: 0000000000000000 RDI: 00007f5df85927e8 [ 59.941098][ T5334] RBP: 0000200000000380 R08: 00007f5df6f6ebb7 R09: 00007f5df6f6ee40 [ 59.941109][ T5334] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 59.941120][ T5334] R13: 00007f5df6f6eef0 R14: 00007f5df6f6eeb0 R15: 0000200000000040 [ 59.941136][ T5334] [ 60.176845][ T5344] FAULT_INJECTION: forcing a failure. [ 60.176845][ T5344] name failslab, interval 1, probability 0, space 0, times 0 [ 60.189536][ T5344] CPU: 1 UID: 0 PID: 5344 Comm: syz.0.729 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 60.189612][ T5344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.189624][ T5344] Call Trace: [ 60.189630][ T5344] [ 60.189637][ T5344] __dump_stack+0x1d/0x30 [ 60.189659][ T5344] dump_stack_lvl+0xe8/0x140 [ 60.189694][ T5344] dump_stack+0x15/0x1b [ 60.189710][ T5344] should_fail_ex+0x265/0x280 [ 60.189789][ T5344] should_failslab+0x8c/0xb0 [ 60.189814][ T5344] __kmalloc_noprof+0xa5/0x3e0 [ 60.189890][ T5344] ? alloc_pipe_info+0x1c9/0x350 [ 60.189967][ T5344] alloc_pipe_info+0x1c9/0x350 [ 60.190019][ T5344] splice_direct_to_actor+0x592/0x680 [ 60.190040][ T5344] ? kstrtouint_from_user+0x9f/0xf0 [ 60.190057][ T5344] ? __pfx_direct_splice_actor+0x10/0x10 [ 60.190124][ T5344] ? __rcu_read_unlock+0x4f/0x70 [ 60.190147][ T5344] ? get_pid_task+0x96/0xd0 [ 60.190170][ T5344] ? avc_policy_seqno+0x15/0x30 [ 60.190194][ T5344] ? selinux_file_permission+0x1e4/0x320 [ 60.190231][ T5344] do_splice_direct+0xda/0x150 [ 60.190288][ T5344] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 60.190313][ T5344] do_sendfile+0x380/0x650 [ 60.190366][ T5344] __x64_sys_sendfile64+0x105/0x150 [ 60.190392][ T5344] x64_sys_call+0x2bb0/0x2ff0 [ 60.190433][ T5344] do_syscall_64+0xd2/0x200 [ 60.190458][ T5344] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 60.190484][ T5344] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 60.190592][ T5344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.190667][ T5344] RIP: 0033:0x7f5df850ebe9 [ 60.190683][ T5344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.190700][ T5344] RSP: 002b:00007f5df6f6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 60.190721][ T5344] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850ebe9 [ 60.190736][ T5344] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 60.190748][ T5344] RBP: 00007f5df6f6f090 R08: 0000000000000000 R09: 0000000000000000 [ 60.190762][ T5344] R10: 000000007ffff000 R11: 0000000000000246 R12: 0000000000000001 [ 60.190775][ T5344] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 60.190819][ T5344] [ 60.787873][ T5388] FAULT_INJECTION: forcing a failure. [ 60.787873][ T5388] name failslab, interval 1, probability 0, space 0, times 0 [ 60.800616][ T5388] CPU: 1 UID: 0 PID: 5388 Comm: syz.2.747 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 60.800643][ T5388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.800654][ T5388] Call Trace: [ 60.800705][ T5388] [ 60.800712][ T5388] __dump_stack+0x1d/0x30 [ 60.800733][ T5388] dump_stack_lvl+0xe8/0x140 [ 60.800750][ T5388] dump_stack+0x15/0x1b [ 60.800843][ T5388] should_fail_ex+0x265/0x280 [ 60.800880][ T5388] ? alloc_fdtable+0x8c/0x1d0 [ 60.800904][ T5388] should_failslab+0x8c/0xb0 [ 60.800929][ T5388] __kmalloc_cache_noprof+0x4c/0x320 [ 60.801034][ T5388] alloc_fdtable+0x8c/0x1d0 [ 60.801057][ T5388] dup_fd+0x4c7/0x540 [ 60.801080][ T5388] copy_files+0x98/0xf0 [ 60.801106][ T5388] copy_process+0xc5b/0x2000 [ 60.801133][ T5388] kernel_clone+0x16c/0x5c0 [ 60.801252][ T5388] ? vfs_write+0x75e/0x8e0 [ 60.801278][ T5388] __x64_sys_clone+0xe6/0x120 [ 60.801314][ T5388] x64_sys_call+0x119c/0x2ff0 [ 60.801341][ T5388] do_syscall_64+0xd2/0x200 [ 60.801447][ T5388] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 60.801475][ T5388] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 60.801548][ T5388] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.801597][ T5388] RIP: 0033:0x7f0f4cbfebe9 [ 60.801654][ T5388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.801674][ T5388] RSP: 002b:00007f0f4b645fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 60.801694][ T5388] RAX: ffffffffffffffda RBX: 00007f0f4ce26090 RCX: 00007f0f4cbfebe9 [ 60.801706][ T5388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 60.801718][ T5388] RBP: 00007f0f4b646090 R08: 0000000000000000 R09: 0000000000000000 [ 60.801731][ T5388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 60.801742][ T5388] R13: 00007f0f4ce26128 R14: 00007f0f4ce26090 R15: 00007fffb8d57238 [ 60.801830][ T5388] [ 61.041502][ T5393] netlink: 'syz.3.749': attribute type 29 has an invalid length. [ 61.050174][ T5393] netlink: 'syz.3.749': attribute type 29 has an invalid length. [ 61.129242][ T5405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5405 comm=syz.3.754 [ 61.373169][ T5426] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5426 comm=syz.3.764 [ 61.620972][ T5442] FAULT_INJECTION: forcing a failure. [ 61.620972][ T5442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.634070][ T5442] CPU: 1 UID: 0 PID: 5442 Comm: syz.3.772 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 61.634102][ T5442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 61.634176][ T5442] Call Trace: [ 61.634183][ T5442] [ 61.634191][ T5442] __dump_stack+0x1d/0x30 [ 61.634375][ T5442] dump_stack_lvl+0xe8/0x140 [ 61.634403][ T5442] dump_stack+0x15/0x1b [ 61.634423][ T5442] should_fail_ex+0x265/0x280 [ 61.634459][ T5442] should_fail+0xb/0x20 [ 61.634512][ T5442] should_fail_usercopy+0x1a/0x20 [ 61.634531][ T5442] _copy_to_user+0x20/0xa0 [ 61.634594][ T5442] simple_read_from_buffer+0xb5/0x130 [ 61.634618][ T5442] proc_fail_nth_read+0x10e/0x150 [ 61.634649][ T5442] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 61.634678][ T5442] vfs_read+0x1a0/0x6f0 [ 61.634780][ T5442] ? __rcu_read_unlock+0x4f/0x70 [ 61.634804][ T5442] ? __fget_files+0x184/0x1c0 [ 61.634833][ T5442] ksys_read+0xda/0x1a0 [ 61.634855][ T5442] __x64_sys_read+0x40/0x50 [ 61.634941][ T5442] x64_sys_call+0x27bc/0x2ff0 [ 61.634966][ T5442] do_syscall_64+0xd2/0x200 [ 61.634993][ T5442] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 61.635019][ T5442] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 61.635044][ T5442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.635128][ T5442] RIP: 0033:0x7fd166cbd5fc [ 61.635145][ T5442] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 61.635164][ T5442] RSP: 002b:00007fd165727030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 61.635262][ T5442] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbd5fc [ 61.635331][ T5442] RDX: 000000000000000f RSI: 00007fd1657270a0 RDI: 0000000000000004 [ 61.635345][ T5442] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 61.635359][ T5442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.635372][ T5442] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 61.635443][ T5442] [ 62.184587][ T5462] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 62.837877][ T5497] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 63.019635][ T5513] netlink: 4 bytes leftover after parsing attributes in process `syz.3.803'. [ 63.068898][ T5520] FAULT_INJECTION: forcing a failure. [ 63.068898][ T5520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.082302][ T5520] CPU: 0 UID: 0 PID: 5520 Comm: syz.3.806 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 63.082336][ T5520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 63.082356][ T5520] Call Trace: [ 63.082364][ T5520] [ 63.082372][ T5520] __dump_stack+0x1d/0x30 [ 63.082394][ T5520] dump_stack_lvl+0xe8/0x140 [ 63.082501][ T5520] dump_stack+0x15/0x1b [ 63.082566][ T5520] should_fail_ex+0x265/0x280 [ 63.082603][ T5520] should_fail+0xb/0x20 [ 63.082666][ T5520] should_fail_usercopy+0x1a/0x20 [ 63.082687][ T5520] strncpy_from_user+0x25/0x230 [ 63.082713][ T5520] ? kmem_cache_alloc_noprof+0x186/0x310 [ 63.082816][ T5520] ? getname_flags+0x80/0x3b0 [ 63.082884][ T5520] getname_flags+0xae/0x3b0 [ 63.082992][ T5520] path_setxattrat+0x223/0x310 [ 63.083028][ T5520] __x64_sys_lsetxattr+0x71/0x90 [ 63.083056][ T5520] x64_sys_call+0x2877/0x2ff0 [ 63.083132][ T5520] do_syscall_64+0xd2/0x200 [ 63.083152][ T5520] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 63.083176][ T5520] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 63.083201][ T5520] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.083225][ T5520] RIP: 0033:0x7fd166cbebe9 [ 63.083241][ T5520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.083259][ T5520] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 63.083281][ T5520] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 63.083325][ T5520] RDX: 0000200000000280 RSI: 0000200000000000 RDI: 0000200000000400 [ 63.083337][ T5520] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 63.083367][ T5520] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000001 [ 63.083426][ T5520] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 63.083442][ T5520] [ 63.949689][ T5555] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 64.064724][ T5559] netlink: 4 bytes leftover after parsing attributes in process `syz.0.822'. [ 64.149677][ T5565] FAULT_INJECTION: forcing a failure. [ 64.149677][ T5565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.162790][ T5565] CPU: 1 UID: 0 PID: 5565 Comm: syz.0.826 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 64.162864][ T5565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 64.162876][ T5565] Call Trace: [ 64.162882][ T5565] [ 64.162889][ T5565] __dump_stack+0x1d/0x30 [ 64.162913][ T5565] dump_stack_lvl+0xe8/0x140 [ 64.162934][ T5565] dump_stack+0x15/0x1b [ 64.162953][ T5565] should_fail_ex+0x265/0x280 [ 64.163063][ T5565] should_fail+0xb/0x20 [ 64.163096][ T5565] should_fail_usercopy+0x1a/0x20 [ 64.163244][ T5565] _copy_to_user+0x20/0xa0 [ 64.163274][ T5565] simple_read_from_buffer+0xb5/0x130 [ 64.163296][ T5565] proc_fail_nth_read+0x10e/0x150 [ 64.163325][ T5565] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 64.163370][ T5565] vfs_read+0x1a0/0x6f0 [ 64.163392][ T5565] ? __rcu_read_unlock+0x4f/0x70 [ 64.163467][ T5565] ? __fget_files+0x184/0x1c0 [ 64.163576][ T5565] ksys_read+0xda/0x1a0 [ 64.163602][ T5565] __x64_sys_read+0x40/0x50 [ 64.163672][ T5565] x64_sys_call+0x27bc/0x2ff0 [ 64.163741][ T5565] do_syscall_64+0xd2/0x200 [ 64.163766][ T5565] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 64.163794][ T5565] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 64.163892][ T5565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.163939][ T5565] RIP: 0033:0x7f5df850d5fc [ 64.163953][ T5565] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 64.163969][ T5565] RSP: 002b:00007f5df6f6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 64.163987][ T5565] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850d5fc [ 64.163999][ T5565] RDX: 000000000000000f RSI: 00007f5df6f6f0a0 RDI: 0000000000000007 [ 64.164032][ T5565] RBP: 00007f5df6f6f090 R08: 0000000000000000 R09: 0000000000000000 [ 64.164046][ T5565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.164060][ T5565] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 64.164079][ T5565] [ 64.370676][ T29] kauditd_printk_skb: 25293 callbacks suppressed [ 64.370741][ T29] audit: type=1400 audit(1754698482.241:20110): avc: denied { read write } for pid=5560 comm="syz.4.823" name="uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 64.420890][ T29] audit: type=1400 audit(1754698482.451:20111): avc: denied { read write } for pid=3301 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.445271][ T29] audit: type=1400 audit(1754698482.471:20112): avc: denied { create } for pid=5568 comm="syz.0.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 64.445334][ T29] audit: type=1400 audit(1754698482.471:20113): avc: denied { map_create } for pid=5568 comm="syz.0.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 64.445358][ T29] audit: type=1400 audit(1754698482.471:20114): avc: denied { prog_load } for pid=5568 comm="syz.0.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 64.445379][ T29] audit: type=1400 audit(1754698482.481:20115): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.445509][ T29] audit: type=1400 audit(1754698482.491:20116): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.449827][ T29] audit: type=1400 audit(1754698482.491:20117): avc: denied { map_create } for pid=5570 comm="syz.4.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 64.476301][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 64.485509][ T29] audit: type=1400 audit(1754698482.491:20118): avc: denied { execmem } for pid=5570 comm="syz.4.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.103294][ T5593] IPv6: Can't replace route, no match found [ 65.809900][ T5627] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 66.106745][ T5655] FAULT_INJECTION: forcing a failure. [ 66.106745][ T5655] name failslab, interval 1, probability 0, space 0, times 0 [ 66.119628][ T5655] CPU: 0 UID: 0 PID: 5655 Comm: syz.1.860 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 66.119662][ T5655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 66.119676][ T5655] Call Trace: [ 66.119682][ T5655] [ 66.119690][ T5655] __dump_stack+0x1d/0x30 [ 66.119715][ T5655] dump_stack_lvl+0xe8/0x140 [ 66.119771][ T5655] dump_stack+0x15/0x1b [ 66.119823][ T5655] should_fail_ex+0x265/0x280 [ 66.119902][ T5655] should_failslab+0x8c/0xb0 [ 66.119930][ T5655] kmem_cache_alloc_noprof+0x50/0x310 [ 66.119961][ T5655] ? getname_flags+0x80/0x3b0 [ 66.119993][ T5655] getname_flags+0x80/0x3b0 [ 66.120043][ T5655] __se_sys_quotactl+0x16a/0x670 [ 66.120064][ T5655] ? fput+0x8f/0xc0 [ 66.120097][ T5655] __x64_sys_quotactl+0x55/0x70 [ 66.120118][ T5655] x64_sys_call+0x15d6/0x2ff0 [ 66.120200][ T5655] do_syscall_64+0xd2/0x200 [ 66.120234][ T5655] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 66.120261][ T5655] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 66.120286][ T5655] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.120332][ T5655] RIP: 0033:0x7fb826f3ebe9 [ 66.120349][ T5655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.120368][ T5655] RSP: 002b:00007fb82599f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 66.120390][ T5655] RAX: ffffffffffffffda RBX: 00007fb827165fa0 RCX: 00007fb826f3ebe9 [ 66.120404][ T5655] RDX: 0000000000000000 RSI: 0000200000000100 RDI: ffffffff80000800 [ 66.120418][ T5655] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 66.120432][ T5655] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 66.120466][ T5655] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 66.120485][ T5655] [ 66.307211][ T5666] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 66.359599][ T5667] 8021q: adding VLAN 0 to HW filter on device bond1 [ 66.526020][ T5689] Zero length message leads to an empty skb [ 66.598315][ T5696] pim6reg1: entered promiscuous mode [ 66.603705][ T5696] pim6reg1: entered allmulticast mode [ 66.696804][ T5702] netlink: 24 bytes leftover after parsing attributes in process `syz.3.878'. [ 66.790811][ T5716] FAULT_INJECTION: forcing a failure. [ 66.790811][ T5716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.804334][ T5716] CPU: 1 UID: 0 PID: 5716 Comm: syz.0.883 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 66.804365][ T5716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 66.804448][ T5716] Call Trace: [ 66.804454][ T5716] [ 66.804462][ T5716] __dump_stack+0x1d/0x30 [ 66.804485][ T5716] dump_stack_lvl+0xe8/0x140 [ 66.804505][ T5716] dump_stack+0x15/0x1b [ 66.804600][ T5716] should_fail_ex+0x265/0x280 [ 66.804631][ T5716] should_fail+0xb/0x20 [ 66.804728][ T5716] should_fail_usercopy+0x1a/0x20 [ 66.804780][ T5716] _copy_to_user+0x20/0xa0 [ 66.804818][ T5716] simple_read_from_buffer+0xb5/0x130 [ 66.804842][ T5716] proc_fail_nth_read+0x10e/0x150 [ 66.804870][ T5716] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 66.804898][ T5716] vfs_read+0x1a0/0x6f0 [ 66.804940][ T5716] ? __rcu_read_unlock+0x4f/0x70 [ 66.804960][ T5716] ? __fget_files+0x184/0x1c0 [ 66.804984][ T5716] ksys_read+0xda/0x1a0 [ 66.805004][ T5716] __x64_sys_read+0x40/0x50 [ 66.805086][ T5716] x64_sys_call+0x27bc/0x2ff0 [ 66.805109][ T5716] do_syscall_64+0xd2/0x200 [ 66.805132][ T5716] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 66.805188][ T5716] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 66.805213][ T5716] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.805243][ T5716] RIP: 0033:0x7f5df850d5fc [ 66.805258][ T5716] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 66.805275][ T5716] RSP: 002b:00007f5df6f6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 66.805296][ T5716] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850d5fc [ 66.805371][ T5716] RDX: 000000000000000f RSI: 00007f5df6f6f0a0 RDI: 0000000000000003 [ 66.805383][ T5716] RBP: 00007f5df6f6f090 R08: 0000000000000000 R09: 0000000000000000 [ 66.805394][ T5716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.805405][ T5716] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 66.805456][ T5716] [ 67.072643][ T5722] pim6reg1: entered promiscuous mode [ 67.077961][ T5722] pim6reg1: entered allmulticast mode [ 67.174551][ T5735] netlink: 24 bytes leftover after parsing attributes in process `syz.3.893'. [ 67.341529][ T5749] netlink: 'syz.3.898': attribute type 30 has an invalid length. [ 67.359583][ T5749] (unnamed net_device) (uninitialized): option arp_missed_max: invalid value (0) [ 67.368792][ T5749] (unnamed net_device) (uninitialized): option arp_missed_max: allowed values 1 - 255 [ 67.687506][ T5769] netlink: 'syz.1.907': attribute type 3 has an invalid length. [ 67.697910][ T5767] netlink: 84 bytes leftover after parsing attributes in process `syz.0.906'. [ 67.800918][ T5775] netlink: 4 bytes leftover after parsing attributes in process `syz.3.910'. [ 67.979146][ T5797] netlink: 84 bytes leftover after parsing attributes in process `syz.3.921'. [ 68.009847][ T5795] netlink: 4 bytes leftover after parsing attributes in process `syz.1.920'. [ 68.290749][ T5818] netlink: 'syz.0.930': attribute type 3 has an invalid length. [ 68.298429][ T5818] netlink: 132 bytes leftover after parsing attributes in process `syz.0.930'. [ 68.332152][ T5820] netlink: 4 bytes leftover after parsing attributes in process `syz.3.931'. [ 68.379584][ T5822] netlink: 84 bytes leftover after parsing attributes in process `syz.0.932'. [ 68.802225][ T5850] netlink: 'syz.3.945': attribute type 3 has an invalid length. [ 68.885286][ T5856] netlink: 'syz.0.948': attribute type 1 has an invalid length. [ 68.952819][ T5862] pim6reg1: entered promiscuous mode [ 68.958240][ T5862] pim6reg1: entered allmulticast mode [ 69.056837][ T5875] ALSA: seq fatal error: cannot create timer (-19) [ 69.160849][ T5879] __nla_validate_parse: 2 callbacks suppressed [ 69.160863][ T5879] netlink: 4 bytes leftover after parsing attributes in process `syz.3.958'. [ 69.380162][ T29] kauditd_printk_skb: 42157 callbacks suppressed [ 69.380175][ T29] audit: type=1400 audit(1754698487.451:40711): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 69.391808][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.414200][ T3030] audit: audit_lost=11383 audit_rate_limit=0 audit_backlog_limit=64 [ 69.422282][ T3030] audit: backlog limit exceeded [ 69.428427][ T3302] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.435083][ T3302] audit: audit_lost=11384 audit_rate_limit=0 audit_backlog_limit=64 [ 69.443154][ T3302] audit: backlog limit exceeded [ 69.457546][ T3308] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.464141][ T3308] audit: audit_lost=11385 audit_rate_limit=0 audit_backlog_limit=64 [ 69.472257][ T3308] audit: backlog limit exceeded [ 69.512524][ T5899] pim6reg1: entered promiscuous mode [ 69.517858][ T5899] pim6reg1: entered allmulticast mode [ 69.531373][ T5904] FAULT_INJECTION: forcing a failure. [ 69.531373][ T5904] name failslab, interval 1, probability 0, space 0, times 0 [ 69.544115][ T5904] CPU: 0 UID: 0 PID: 5904 Comm: syz.4.969 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 69.544141][ T5904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 69.544229][ T5904] Call Trace: [ 69.544235][ T5904] [ 69.544241][ T5904] __dump_stack+0x1d/0x30 [ 69.544261][ T5904] dump_stack_lvl+0xe8/0x140 [ 69.544279][ T5904] dump_stack+0x15/0x1b [ 69.544297][ T5904] should_fail_ex+0x265/0x280 [ 69.544390][ T5904] should_failslab+0x8c/0xb0 [ 69.544413][ T5904] kmem_cache_alloc_noprof+0x50/0x310 [ 69.544486][ T5904] ? audit_log_start+0x365/0x6c0 [ 69.544519][ T5904] audit_log_start+0x365/0x6c0 [ 69.544554][ T5904] audit_seccomp+0x48/0x100 [ 69.544583][ T5904] ? __seccomp_filter+0x68c/0x10d0 [ 69.544658][ T5904] __seccomp_filter+0x69d/0x10d0 [ 69.544680][ T5904] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 69.544738][ T5904] ? vfs_write+0x75e/0x8e0 [ 69.544763][ T5904] ? __rcu_read_unlock+0x4f/0x70 [ 69.544787][ T5904] ? __fget_files+0x184/0x1c0 [ 69.544825][ T5904] __secure_computing+0x82/0x150 [ 69.544846][ T5904] syscall_trace_enter+0xcf/0x1e0 [ 69.544992][ T5904] do_syscall_64+0xac/0x200 [ 69.545019][ T5904] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 69.545091][ T5904] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 69.545119][ T5904] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.545144][ T5904] RIP: 0033:0x7fc3b01eebe9 [ 69.545165][ T5904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.545184][ T5904] RSP: 002b:00007fc3aec4f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 69.545203][ T5904] RAX: ffffffffffffffda RBX: 00007fc3b0415fa0 RCX: 00007fc3b01eebe9 [ 69.545214][ T5904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 69.545226][ T5904] RBP: 00007fc3aec4f090 R08: 0000000000000000 R09: 0000000000000000 [ 69.545237][ T5904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.545248][ T5904] R13: 00007fc3b0416038 R14: 00007fc3b0415fa0 R15: 00007ffc8f8e5188 [ 69.545269][ T5904] [ 70.679993][ T5962] pim6reg1: entered promiscuous mode [ 70.685389][ T5962] pim6reg1: entered allmulticast mode [ 71.363825][ T6006] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1011'. [ 71.568892][ T6011] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1013'. [ 71.686433][ T6016] netlink: 'syz.1.1015': attribute type 12 has an invalid length. [ 71.849707][ T6033] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1022'. [ 71.950654][ T6040] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1025'. [ 72.844019][ T6073] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1039'. [ 72.953330][ T6084] FAULT_INJECTION: forcing a failure. [ 72.953330][ T6084] name fail_futex, interval 1, probability 0, space 0, times 1 [ 72.966225][ T6084] CPU: 1 UID: 0 PID: 6084 Comm: syz.4.1042 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 72.966275][ T6084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 72.966288][ T6084] Call Trace: [ 72.966293][ T6084] [ 72.966299][ T6084] __dump_stack+0x1d/0x30 [ 72.966320][ T6084] dump_stack_lvl+0xe8/0x140 [ 72.966340][ T6084] dump_stack+0x15/0x1b [ 72.966358][ T6084] should_fail_ex+0x265/0x280 [ 72.966419][ T6084] should_fail+0xb/0x20 [ 72.966458][ T6084] get_futex_key+0x594/0xbd0 [ 72.966481][ T6084] futex_wait_setup+0x4a/0x3e0 [ 72.966546][ T6084] futex_wait_requeue_pi+0x1ac/0x640 [ 72.966575][ T6084] ? __pfx_futex_wake_mark+0x10/0x10 [ 72.966682][ T6084] do_futex+0x136/0x380 [ 72.966710][ T6084] __se_sys_futex+0x2ed/0x360 [ 72.966737][ T6084] __x64_sys_futex+0x78/0x90 [ 72.966765][ T6084] x64_sys_call+0x2e39/0x2ff0 [ 72.966800][ T6084] do_syscall_64+0xd2/0x200 [ 72.966827][ T6084] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 72.966853][ T6084] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 72.966877][ T6084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 72.966965][ T6084] RIP: 0033:0x7fc3b01eebe9 [ 72.966979][ T6084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.967018][ T6084] RSP: 002b:00007fc3aec2e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 72.967038][ T6084] RAX: ffffffffffffffda RBX: 00007fc3b0416090 RCX: 00007fc3b01eebe9 [ 72.967052][ T6084] RDX: 0000000000000004 RSI: 000000000000010b RDI: 000020000000cffc [ 72.967066][ T6084] RBP: 00007fc3aec2e090 R08: 0000200000048000 R09: 0000000000000000 [ 72.967080][ T6084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.967094][ T6084] R13: 00007fc3b0416128 R14: 00007fc3b0416090 R15: 00007ffc8f8e5188 [ 72.967113][ T6084] [ 73.259802][ T6098] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 73.436520][ T6109] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 73.561959][ T6113] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 73.725922][ T6128] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 73.931508][ T6155] pim6reg1: entered promiscuous mode [ 73.936925][ T6155] pim6reg1: entered allmulticast mode [ 74.021889][ T6161] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 74.188582][ T6171] FAULT_INJECTION: forcing a failure. [ 74.188582][ T6171] name failslab, interval 1, probability 0, space 0, times 0 [ 74.201350][ T6171] CPU: 1 UID: 0 PID: 6171 Comm: syz.2.1078 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 74.201439][ T6171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 74.201452][ T6171] Call Trace: [ 74.201459][ T6171] [ 74.201468][ T6171] __dump_stack+0x1d/0x30 [ 74.201493][ T6171] dump_stack_lvl+0xe8/0x140 [ 74.201551][ T6171] dump_stack+0x15/0x1b [ 74.201566][ T6171] should_fail_ex+0x265/0x280 [ 74.201639][ T6171] ? rtnl_newlink+0x5c/0x12d0 [ 74.201660][ T6171] should_failslab+0x8c/0xb0 [ 74.201683][ T6171] __kmalloc_cache_noprof+0x4c/0x320 [ 74.201712][ T6171] rtnl_newlink+0x5c/0x12d0 [ 74.201739][ T6171] ? xas_load+0x413/0x430 [ 74.201779][ T6171] ? try_charge_memcg+0x200/0x9e0 [ 74.201799][ T6171] ? __memcg_slab_free_hook+0x135/0x230 [ 74.201832][ T6171] ? __rcu_read_unlock+0x4f/0x70 [ 74.201851][ T6171] ? avc_has_perm_noaudit+0x1b1/0x200 [ 74.201879][ T6171] ? cred_has_capability+0x210/0x280 [ 74.201920][ T6171] ? selinux_capable+0x31/0x40 [ 74.201980][ T6171] ? security_capable+0x83/0x90 [ 74.201999][ T6171] ? ns_capable+0x7d/0xb0 [ 74.202020][ T6171] ? __pfx_rtnl_newlink+0x10/0x10 [ 74.202044][ T6171] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 74.202114][ T6171] netlink_rcv_skb+0x120/0x220 [ 74.202150][ T6171] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 74.202180][ T6171] rtnetlink_rcv+0x1c/0x30 [ 74.202211][ T6171] netlink_unicast+0x5c0/0x690 [ 74.202314][ T6171] netlink_sendmsg+0x58b/0x6b0 [ 74.202350][ T6171] ? __pfx_netlink_sendmsg+0x10/0x10 [ 74.202384][ T6171] __sock_sendmsg+0x142/0x180 [ 74.202415][ T6171] ____sys_sendmsg+0x31e/0x4e0 [ 74.202449][ T6171] ___sys_sendmsg+0x17b/0x1d0 [ 74.202495][ T6171] __x64_sys_sendmsg+0xd4/0x160 [ 74.202532][ T6171] x64_sys_call+0x191e/0x2ff0 [ 74.202557][ T6171] do_syscall_64+0xd2/0x200 [ 74.202581][ T6171] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 74.202605][ T6171] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 74.202628][ T6171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.202668][ T6171] RIP: 0033:0x7f0f4cbfebe9 [ 74.202685][ T6171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.202704][ T6171] RSP: 002b:00007f0f4b667038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 74.202787][ T6171] RAX: ffffffffffffffda RBX: 00007f0f4ce25fa0 RCX: 00007f0f4cbfebe9 [ 74.202802][ T6171] RDX: 0000000000008000 RSI: 0000200000000280 RDI: 0000000000000003 [ 74.202891][ T6171] RBP: 00007f0f4b667090 R08: 0000000000000000 R09: 0000000000000000 [ 74.202905][ T6171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.202919][ T6171] R13: 00007f0f4ce26038 R14: 00007f0f4ce25fa0 R15: 00007fffb8d57238 [ 74.202937][ T6171] [ 74.479453][ T29] kauditd_printk_skb: 34151 callbacks suppressed [ 74.479468][ T29] audit: type=1400 audit(1754698492.271:65333): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.507055][ T29] audit: type=1400 audit(1754698492.271:65334): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.528306][ T29] audit: type=1400 audit(1754698492.271:65335): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.549694][ T29] audit: type=1400 audit(1754698492.281:65336): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.573967][ T29] audit: type=1400 audit(1754698492.541:65337): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.595104][ T29] audit: type=1400 audit(1754698492.541:65338): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.639051][ T6177] vlan2: entered allmulticast mode [ 74.642004][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 74.644228][ T6177] bond0: entered allmulticast mode [ 74.650728][ T3030] audit: audit_lost=14563 audit_rate_limit=0 audit_backlog_limit=64 [ 74.655821][ T6177] bond_slave_0: entered allmulticast mode [ 74.655839][ T6177] bond_slave_1: entered allmulticast mode [ 74.663846][ T3030] audit: backlog limit exceeded [ 74.670875][ T29] audit: type=1400 audit(1754698492.541:65339): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 74.688780][ T6179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=6179 comm=syz.1.1079 [ 74.736496][ T6181] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1083'. [ 74.770660][ T6183] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1084'. [ 74.830210][ T6192] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 75.323334][ T6227] netlink: 620 bytes leftover after parsing attributes in process `syz.0.1101'. [ 75.337993][ T6227] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1101'. [ 75.571858][ T6238] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 75.849374][ T6248] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1109'. [ 75.858495][ T6248] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1109'. [ 75.869581][ T6248] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1109'. [ 75.878637][ T6248] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1109'. [ 76.164846][ T6256] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1112'. [ 76.460652][ T6264] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1114'. [ 77.982009][ T6217] FAULT_INJECTION: forcing a failure. [ 77.982009][ T6217] name fail_futex, interval 1, probability 0, space 0, times 0 [ 77.994865][ T6217] CPU: 0 UID: 0 PID: 6217 Comm: syz.4.1096 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 77.994938][ T6217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 77.994951][ T6217] Call Trace: [ 77.994958][ T6217] [ 77.994967][ T6217] __dump_stack+0x1d/0x30 [ 77.994990][ T6217] dump_stack_lvl+0xe8/0x140 [ 77.995076][ T6217] dump_stack+0x15/0x1b [ 77.995096][ T6217] should_fail_ex+0x265/0x280 [ 77.995130][ T6217] should_fail+0xb/0x20 [ 77.995157][ T6217] get_futex_key+0x594/0xbd0 [ 77.995179][ T6217] futex_wake+0x7d/0x360 [ 77.995218][ T6217] ? __rcu_read_unlock+0x4f/0x70 [ 77.995243][ T6217] do_futex+0x323/0x380 [ 77.995403][ T6217] mm_release+0xb2/0x1e0 [ 77.995432][ T6217] exit_mm_release+0x25/0x30 [ 77.995459][ T6217] exit_mm+0x38/0x190 [ 77.995487][ T6217] do_exit+0x417/0x15c0 [ 77.995617][ T6217] do_group_exit+0xff/0x140 [ 77.995649][ T6217] ? get_signal+0xe51/0xf70 [ 77.995683][ T6217] get_signal+0xe59/0xf70 [ 77.995726][ T6217] arch_do_signal_or_restart+0x96/0x480 [ 77.995761][ T6217] exit_to_user_mode_loop+0x7a/0x100 [ 77.995828][ T6217] do_syscall_64+0x1d6/0x200 [ 77.995852][ T6217] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 77.995873][ T6217] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 77.995893][ T6217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.995918][ T6217] RIP: 0033:0x7fc3b01eebe9 [ 77.995965][ T6217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.996053][ T6217] RSP: 002b:00007fc3aec0d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 77.996071][ T6217] RAX: fffffffffffffe00 RBX: 00007fc3b0416180 RCX: 00007fc3b01eebe9 [ 77.996083][ T6217] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000005 [ 77.996094][ T6217] RBP: 00007fc3aec0d090 R08: 000000000406f413 R09: 0000000000000000 [ 77.996121][ T6217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.996135][ T6217] R13: 00007fc3b0416218 R14: 00007fc3b0416180 R15: 00007ffc8f8e5188 [ 77.996152][ T6217] [ 78.757628][ T6421] FAULT_INJECTION: forcing a failure. [ 78.757628][ T6421] name failslab, interval 1, probability 0, space 0, times 0 [ 78.770371][ T6421] CPU: 0 UID: 0 PID: 6421 Comm: syz.3.1181 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 78.770400][ T6421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 78.770412][ T6421] Call Trace: [ 78.770417][ T6421] [ 78.770424][ T6421] __dump_stack+0x1d/0x30 [ 78.770457][ T6421] dump_stack_lvl+0xe8/0x140 [ 78.770478][ T6421] dump_stack+0x15/0x1b [ 78.770493][ T6421] should_fail_ex+0x265/0x280 [ 78.770526][ T6421] should_failslab+0x8c/0xb0 [ 78.770622][ T6421] kmem_cache_alloc_noprof+0x50/0x310 [ 78.770648][ T6421] ? prepare_creds+0x37/0x4c0 [ 78.770674][ T6421] prepare_creds+0x37/0x4c0 [ 78.770770][ T6421] copy_creds+0x8f/0x3f0 [ 78.770815][ T6421] copy_process+0x658/0x2000 [ 78.770840][ T6421] ? kstrtouint+0x76/0xc0 [ 78.770872][ T6421] ? __rcu_read_unlock+0x4f/0x70 [ 78.770893][ T6421] kernel_clone+0x16c/0x5c0 [ 78.770923][ T6421] ? vfs_write+0x75e/0x8e0 [ 78.770944][ T6421] __x64_sys_clone+0xe6/0x120 [ 78.770973][ T6421] x64_sys_call+0x119c/0x2ff0 [ 78.770994][ T6421] do_syscall_64+0xd2/0x200 [ 78.771049][ T6421] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 78.771133][ T6421] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 78.771166][ T6421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.771187][ T6421] RIP: 0033:0x7fd166cbebe9 [ 78.771200][ T6421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.771217][ T6421] RSP: 002b:00007fd165726fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 78.771236][ T6421] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 78.771250][ T6421] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 78.771320][ T6421] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 78.771332][ T6421] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 78.771343][ T6421] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 78.771359][ T6421] [ 79.451196][ T6454] netlink: 'syz.3.1196': attribute type 30 has an invalid length. [ 79.480235][ T29] kauditd_printk_skb: 27073 callbacks suppressed [ 79.480248][ T29] audit: type=1400 audit(1754698497.551:90274): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.496221][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 79.507721][ T29] audit: type=1400 audit(1754698497.551:90275): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.528581][ T29] audit: type=1400 audit(1754698497.551:90276): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.535505][ T3030] audit: audit_lost=15277 audit_rate_limit=0 audit_backlog_limit=64 [ 79.535518][ T3030] audit: backlog limit exceeded [ 79.541462][ T3308] audit: audit_backlog=65 > audit_backlog_limit=64 [ 79.556676][ T29] audit: type=1400 audit(1754698497.551:90277): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.564637][ T3308] audit: audit_lost=15278 audit_rate_limit=0 audit_backlog_limit=64 [ 79.569473][ T29] audit: type=1400 audit(1754698497.551:90278): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 79.651164][ T6467] FAULT_INJECTION: forcing a failure. [ 79.651164][ T6467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.664309][ T6467] CPU: 1 UID: 0 PID: 6467 Comm: syz.0.1200 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 79.664341][ T6467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 79.664353][ T6467] Call Trace: [ 79.664413][ T6467] [ 79.664421][ T6467] __dump_stack+0x1d/0x30 [ 79.664497][ T6467] dump_stack_lvl+0xe8/0x140 [ 79.664519][ T6467] dump_stack+0x15/0x1b [ 79.664537][ T6467] should_fail_ex+0x265/0x280 [ 79.664608][ T6467] should_fail+0xb/0x20 [ 79.664641][ T6467] should_fail_usercopy+0x1a/0x20 [ 79.664663][ T6467] _copy_from_user+0x1c/0xb0 [ 79.664724][ T6467] __sys_bpf+0x178/0x7b0 [ 79.664759][ T6467] __x64_sys_bpf+0x41/0x50 [ 79.664864][ T6467] x64_sys_call+0x2aea/0x2ff0 [ 79.664886][ T6467] do_syscall_64+0xd2/0x200 [ 79.664988][ T6467] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 79.665011][ T6467] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 79.665033][ T6467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.665129][ T6467] RIP: 0033:0x7f5df850ebe9 [ 79.665201][ T6467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.665220][ T6467] RSP: 002b:00007f5df6f6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 79.665240][ T6467] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850ebe9 [ 79.665253][ T6467] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 79.665266][ T6467] RBP: 00007f5df6f6f090 R08: 0000000000000000 R09: 0000000000000000 [ 79.665277][ T6467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.665290][ T6467] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 79.665308][ T6467] [ 80.094668][ T6482] __nla_validate_parse: 6 callbacks suppressed [ 80.094682][ T6482] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1208'. [ 80.260884][ T6503] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=6503 comm=syz.3.1218 [ 80.371063][ T6515] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1223'. [ 80.380006][ T6515] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1223'. [ 80.393675][ T6514] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1222'. [ 81.140736][ T6589] FAULT_INJECTION: forcing a failure. [ 81.140736][ T6589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.153855][ T6589] CPU: 1 UID: 0 PID: 6589 Comm: GPL Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 81.153883][ T6589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.153897][ T6589] Call Trace: [ 81.153904][ T6589] [ 81.153988][ T6589] __dump_stack+0x1d/0x30 [ 81.154011][ T6589] dump_stack_lvl+0xe8/0x140 [ 81.154033][ T6589] dump_stack+0x15/0x1b [ 81.154055][ T6589] should_fail_ex+0x265/0x280 [ 81.154085][ T6589] should_fail+0xb/0x20 [ 81.154116][ T6589] should_fail_usercopy+0x1a/0x20 [ 81.154137][ T6589] _copy_to_user+0x20/0xa0 [ 81.154191][ T6589] simple_read_from_buffer+0xb5/0x130 [ 81.154214][ T6589] proc_pid_attr_read+0x134/0x1a0 [ 81.154237][ T6589] ? __pfx_proc_pid_attr_read+0x10/0x10 [ 81.154380][ T6589] vfs_read+0x1a0/0x6f0 [ 81.154398][ T6589] ? __rcu_read_unlock+0x4f/0x70 [ 81.154419][ T6589] ? __fget_files+0x184/0x1c0 [ 81.154446][ T6589] __x64_sys_pread64+0xfd/0x150 [ 81.154472][ T6589] x64_sys_call+0x29e2/0x2ff0 [ 81.154518][ T6589] do_syscall_64+0xd2/0x200 [ 81.154544][ T6589] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 81.154567][ T6589] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 81.154590][ T6589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.154664][ T6589] RIP: 0033:0x7f0f4cbfebe9 [ 81.154679][ T6589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.154752][ T6589] RSP: 002b:00007f0f4b667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 81.154769][ T6589] RAX: ffffffffffffffda RBX: 00007f0f4ce25fa0 RCX: 00007f0f4cbfebe9 [ 81.154781][ T6589] RDX: 0000000000001700 RSI: 0000000000000000 RDI: 0000000000000003 [ 81.154794][ T6589] RBP: 00007f0f4b667090 R08: 0000000000000000 R09: 0000000000000000 [ 81.154838][ T6589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.154852][ T6589] R13: 00007f0f4ce26038 R14: 00007f0f4ce25fa0 R15: 00007fffb8d57238 [ 81.154871][ T6589] [ 81.649876][ T6599] FAULT_INJECTION: forcing a failure. [ 81.649876][ T6599] name failslab, interval 1, probability 0, space 0, times 0 [ 81.662545][ T6599] CPU: 0 UID: 0 PID: 6599 Comm: syz.0.1257 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 81.662576][ T6599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.662589][ T6599] Call Trace: [ 81.662596][ T6599] [ 81.662604][ T6599] __dump_stack+0x1d/0x30 [ 81.662627][ T6599] dump_stack_lvl+0xe8/0x140 [ 81.662645][ T6599] dump_stack+0x15/0x1b [ 81.662660][ T6599] should_fail_ex+0x265/0x280 [ 81.662694][ T6599] should_failslab+0x8c/0xb0 [ 81.662720][ T6599] kmem_cache_alloc_noprof+0x50/0x310 [ 81.662747][ T6599] ? mas_alloc_nodes+0x265/0x520 [ 81.662772][ T6599] mas_alloc_nodes+0x265/0x520 [ 81.662795][ T6599] mas_preallocate+0x33e/0x520 [ 81.662822][ T6599] commit_merge+0x3a5/0x730 [ 81.662843][ T6599] vma_modify+0xad7/0xc80 [ 81.662864][ T6599] vma_modify_policy+0x101/0x130 [ 81.662888][ T6599] mbind_range+0x1b8/0x440 [ 81.662910][ T6599] __se_sys_mbind+0x648/0xac0 [ 81.662941][ T6599] __x64_sys_mbind+0x78/0x90 [ 81.662966][ T6599] x64_sys_call+0x2932/0x2ff0 [ 81.662986][ T6599] do_syscall_64+0xd2/0x200 [ 81.663012][ T6599] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 81.663038][ T6599] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 81.663060][ T6599] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.663080][ T6599] RIP: 0033:0x7f5df850ebe9 [ 81.663093][ T6599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.663111][ T6599] RSP: 002b:00007f5df6f6f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 81.663132][ T6599] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850ebe9 [ 81.663146][ T6599] RDX: 0000000000004005 RSI: 0000000000004000 RDI: 0000200000000000 [ 81.663157][ T6599] RBP: 00007f5df6f6f090 R08: 0000000000000006 R09: 0000000000000002 [ 81.663168][ T6599] R10: 0000200000000c00 R11: 0000000000000246 R12: 0000000000000001 [ 81.663179][ T6599] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 81.663195][ T6599] [ 82.774659][ T6661] netlink: 84 bytes leftover after parsing attributes in process `syz.4.1279'. [ 83.321407][ T6686] FAULT_INJECTION: forcing a failure. [ 83.321407][ T6686] name failslab, interval 1, probability 0, space 0, times 0 [ 83.334054][ T6686] CPU: 1 UID: 0 PID: 6686 Comm: syz.3.1288 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 83.334144][ T6686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 83.334156][ T6686] Call Trace: [ 83.334162][ T6686] [ 83.334169][ T6686] __dump_stack+0x1d/0x30 [ 83.334188][ T6686] dump_stack_lvl+0xe8/0x140 [ 83.334206][ T6686] dump_stack+0x15/0x1b [ 83.334225][ T6686] should_fail_ex+0x265/0x280 [ 83.334307][ T6686] should_failslab+0x8c/0xb0 [ 83.334335][ T6686] kmem_cache_alloc_noprof+0x50/0x310 [ 83.334366][ T6686] ? __inet_hash_connect+0xbdf/0x1350 [ 83.334399][ T6686] __inet_hash_connect+0xbdf/0x1350 [ 83.334492][ T6686] inet6_hash_connect+0xaf/0xc0 [ 83.334526][ T6686] tcp_v6_connect+0x983/0xc30 [ 83.334559][ T6686] __inet_stream_connect+0x166/0x7e0 [ 83.334593][ T6686] ? _raw_spin_unlock_bh+0x36/0x40 [ 83.334700][ T6686] ? release_sock+0x116/0x150 [ 83.334795][ T6686] ? _raw_spin_unlock_bh+0x36/0x40 [ 83.334828][ T6686] ? lock_sock_nested+0x112/0x140 [ 83.334852][ T6686] ? selinux_netlbl_socket_connect+0x115/0x130 [ 83.334884][ T6686] inet_stream_connect+0x44/0x70 [ 83.334940][ T6686] ? __pfx_inet_stream_connect+0x10/0x10 [ 83.334969][ T6686] __sys_connect+0x1f2/0x2b0 [ 83.335029][ T6686] __x64_sys_connect+0x3f/0x50 [ 83.335058][ T6686] x64_sys_call+0x2c08/0x2ff0 [ 83.335081][ T6686] do_syscall_64+0xd2/0x200 [ 83.335104][ T6686] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 83.335162][ T6686] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 83.335187][ T6686] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.335207][ T6686] RIP: 0033:0x7fd166cbebe9 [ 83.335221][ T6686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.335237][ T6686] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 83.335255][ T6686] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 83.335340][ T6686] RDX: 000000000000001c RSI: 0000200000000000 RDI: 0000000000000003 [ 83.335355][ T6686] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 83.335368][ T6686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.335444][ T6686] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 83.335461][ T6686] [ 84.032350][ T6711] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1298'. [ 84.256491][ T6734] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1309'. [ 84.490338][ T29] kauditd_printk_skb: 22440 callbacks suppressed [ 84.490353][ T29] audit: type=1400 audit(1754698502.551:109187): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.503867][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.518138][ T29] audit: type=1400 audit(1754698502.551:109188): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.518164][ T29] audit: type=1400 audit(1754698502.551:109189): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.518187][ T29] audit: type=1400 audit(1754698502.551:109190): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.524749][ T3030] audit: audit_lost=16456 audit_rate_limit=0 audit_backlog_limit=64 [ 84.545997][ T29] audit: type=1400 audit(1754698502.561:109191): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.567322][ T3030] audit: backlog limit exceeded [ 84.592032][ T6766] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.596538][ T29] audit: type=1400 audit(1754698502.561:109192): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.657896][ T6768] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1322'. [ 84.775297][ T6784] FAULT_INJECTION: forcing a failure. [ 84.775297][ T6784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.788815][ T6784] CPU: 1 UID: 0 PID: 6784 Comm: syz.3.1330 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 84.788846][ T6784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 84.788857][ T6784] Call Trace: [ 84.788862][ T6784] [ 84.788868][ T6784] __dump_stack+0x1d/0x30 [ 84.788888][ T6784] dump_stack_lvl+0xe8/0x140 [ 84.788909][ T6784] dump_stack+0x15/0x1b [ 84.788980][ T6784] should_fail_ex+0x265/0x280 [ 84.789010][ T6784] should_fail+0xb/0x20 [ 84.789043][ T6784] should_fail_usercopy+0x1a/0x20 [ 84.789063][ T6784] _copy_from_user+0x1c/0xb0 [ 84.789088][ T6784] __sys_bpf+0x178/0x7b0 [ 84.789199][ T6784] __x64_sys_bpf+0x41/0x50 [ 84.789226][ T6784] x64_sys_call+0x2aea/0x2ff0 [ 84.789251][ T6784] do_syscall_64+0xd2/0x200 [ 84.789395][ T6784] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 84.789417][ T6784] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 84.789445][ T6784] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.789470][ T6784] RIP: 0033:0x7fd166cbebe9 [ 84.789487][ T6784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.789530][ T6784] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 84.789547][ T6784] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 84.789599][ T6784] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 84.789611][ T6784] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 84.789622][ T6784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.789633][ T6784] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 84.789649][ T6784] [ 85.067357][ T6797] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1336'. [ 85.229231][ T6816] capability: warning: `syz.3.1345' uses 32-bit capabilities (legacy support in use) [ 85.267529][ T6822] netlink: 84 bytes leftover after parsing attributes in process `syz.4.1349'. [ 85.283848][ T6824] vlan2: entered allmulticast mode [ 85.289020][ T6824] bond0: entered allmulticast mode [ 85.294233][ T6824] bond_slave_0: entered allmulticast mode [ 85.299981][ T6824] bond_slave_1: entered allmulticast mode [ 85.645903][ T6859] netlink: 84 bytes leftover after parsing attributes in process `syz.2.1363'. [ 85.832653][ T6872] FAULT_INJECTION: forcing a failure. [ 85.832653][ T6872] name failslab, interval 1, probability 0, space 0, times 0 [ 85.845407][ T6872] CPU: 1 UID: 0 PID: 6872 Comm: syz.4.1368 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 85.845456][ T6872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 85.845468][ T6872] Call Trace: [ 85.845474][ T6872] [ 85.845481][ T6872] __dump_stack+0x1d/0x30 [ 85.845572][ T6872] dump_stack_lvl+0xe8/0x140 [ 85.845593][ T6872] dump_stack+0x15/0x1b [ 85.845611][ T6872] should_fail_ex+0x265/0x280 [ 85.845666][ T6872] should_failslab+0x8c/0xb0 [ 85.845774][ T6872] kmem_cache_alloc_noprof+0x50/0x310 [ 85.845815][ T6872] ? getname_kernel+0x3c/0x1f0 [ 85.845902][ T6872] getname_kernel+0x3c/0x1f0 [ 85.845928][ T6872] kern_path+0x23/0x130 [ 85.845982][ T6872] lookup_bdev+0x66/0x150 [ 85.846017][ T6872] __se_sys_quotactl+0x1b7/0x670 [ 85.846039][ T6872] ? fput+0x8f/0xc0 [ 85.846138][ T6872] __x64_sys_quotactl+0x55/0x70 [ 85.846162][ T6872] x64_sys_call+0x15d6/0x2ff0 [ 85.846183][ T6872] do_syscall_64+0xd2/0x200 [ 85.846207][ T6872] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 85.846233][ T6872] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 85.846254][ T6872] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.846276][ T6872] RIP: 0033:0x7fc3b01eebe9 [ 85.846290][ T6872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.846306][ T6872] RSP: 002b:00007fc3aec4f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 85.846356][ T6872] RAX: ffffffffffffffda RBX: 00007fc3b0415fa0 RCX: 00007fc3b01eebe9 [ 85.846373][ T6872] RDX: 0000000000000000 RSI: 00002000000080c0 RDI: ffffffff80000901 [ 85.846400][ T6872] RBP: 00007fc3aec4f090 R08: 0000000000000000 R09: 0000000000000000 [ 85.846413][ T6872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.846425][ T6872] R13: 00007fc3b0416038 R14: 00007fc3b0415fa0 R15: 00007ffc8f8e5188 [ 85.846441][ T6872] [ 85.913617][ T6875] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1369'. [ 85.966761][ T6879] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1370'. [ 86.104885][ T6879] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1370'. [ 86.170469][ T6865] netlink: 'syz.2.1365': attribute type 13 has an invalid length. [ 86.178300][ T6865] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1365'. [ 86.187915][ T6865] erspan0: refused to change device tx_queue_len [ 86.230243][ T6865] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 86.496998][ T6912] netlink: 'syz.1.1384': attribute type 1 has an invalid length. [ 86.513321][ T6909] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1382'. [ 86.565275][ T6912] 8021q: adding VLAN 0 to HW filter on device bond1 [ 86.588919][ T6919] netlink: 'syz.2.1386': attribute type 29 has an invalid length. [ 86.596929][ T6919] netlink: 'syz.2.1386': attribute type 3 has an invalid length. [ 86.604758][ T6919] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1386'. [ 86.659488][ T6917] bond1: (slave gretap1): making interface the new active one [ 86.682652][ T6917] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 86.932683][ T6942] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1396'. [ 87.246580][ T6972] pim6reg1: entered promiscuous mode [ 87.252008][ T6972] pim6reg1: entered allmulticast mode [ 87.429343][ T6989] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1416'. [ 87.837143][ T7025] FAULT_INJECTION: forcing a failure. [ 87.837143][ T7025] name failslab, interval 1, probability 0, space 0, times 0 [ 87.849908][ T7025] CPU: 0 UID: 0 PID: 7025 Comm: syz.3.1430 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 87.849990][ T7025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 87.850004][ T7025] Call Trace: [ 87.850010][ T7025] [ 87.850017][ T7025] __dump_stack+0x1d/0x30 [ 87.850062][ T7025] dump_stack_lvl+0xe8/0x140 [ 87.850161][ T7025] dump_stack+0x15/0x1b [ 87.850180][ T7025] should_fail_ex+0x265/0x280 [ 87.850212][ T7025] should_failslab+0x8c/0xb0 [ 87.850240][ T7025] kmem_cache_alloc_noprof+0x50/0x310 [ 87.850323][ T7025] ? skb_clone+0x151/0x1f0 [ 87.850341][ T7025] skb_clone+0x151/0x1f0 [ 87.850357][ T7025] __netlink_deliver_tap+0x2c9/0x500 [ 87.850453][ T7025] ? netlink_attachskb+0x2d0/0x610 [ 87.850484][ T7025] netlink_sendskb+0x126/0x150 [ 87.850575][ T7025] netlink_unicast+0x2a2/0x690 [ 87.850603][ T7025] netlink_ack+0x4c8/0x500 [ 87.850634][ T7025] netlink_rcv_skb+0x192/0x220 [ 87.850708][ T7025] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 87.850738][ T7025] rtnetlink_rcv+0x1c/0x30 [ 87.850757][ T7025] netlink_unicast+0x5c0/0x690 [ 87.850784][ T7025] netlink_sendmsg+0x58b/0x6b0 [ 87.850904][ T7025] ? __pfx_netlink_sendmsg+0x10/0x10 [ 87.850992][ T7025] __sock_sendmsg+0x142/0x180 [ 87.851019][ T7025] ____sys_sendmsg+0x31e/0x4e0 [ 87.851195][ T7025] ___sys_sendmsg+0x17b/0x1d0 [ 87.851233][ T7025] __x64_sys_sendmsg+0xd4/0x160 [ 87.851271][ T7025] x64_sys_call+0x191e/0x2ff0 [ 87.851294][ T7025] do_syscall_64+0xd2/0x200 [ 87.851321][ T7025] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 87.851347][ T7025] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 87.851430][ T7025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.851450][ T7025] RIP: 0033:0x7fd166cbebe9 [ 87.851463][ T7025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.851514][ T7025] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 87.851536][ T7025] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 87.851550][ T7025] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 87.851564][ T7025] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 87.851577][ T7025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.851590][ T7025] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 87.851678][ T7025] [ 88.391439][ T7065] pim6reg1: entered promiscuous mode [ 88.396881][ T7065] pim6reg1: entered allmulticast mode [ 88.486713][ T7071] FAULT_INJECTION: forcing a failure. [ 88.486713][ T7071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 88.500043][ T7071] CPU: 0 UID: 0 PID: 7071 Comm: syz.4.1451 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 88.500134][ T7071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 88.500147][ T7071] Call Trace: [ 88.500155][ T7071] [ 88.500163][ T7071] __dump_stack+0x1d/0x30 [ 88.500186][ T7071] dump_stack_lvl+0xe8/0x140 [ 88.500204][ T7071] dump_stack+0x15/0x1b [ 88.500220][ T7071] should_fail_ex+0x265/0x280 [ 88.500266][ T7071] should_fail_alloc_page+0xf2/0x100 [ 88.500294][ T7071] __alloc_frozen_pages_noprof+0xff/0x360 [ 88.500333][ T7071] alloc_pages_mpol+0xb3/0x250 [ 88.500408][ T7071] vma_alloc_folio_noprof+0x1aa/0x300 [ 88.500447][ T7071] handle_mm_fault+0xec2/0x2c20 [ 88.500546][ T7071] do_user_addr_fault+0x636/0x1090 [ 88.500578][ T7071] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 88.500602][ T7071] exc_page_fault+0x62/0xa0 [ 88.500673][ T7071] asm_exc_page_fault+0x26/0x30 [ 88.500695][ T7071] RIP: 0033:0x7fc3b019c20b [ 88.500711][ T7071] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 88.500730][ T7071] RSP: 002b:00007fc3aec4ce10 EFLAGS: 00010246 [ 88.500747][ T7071] RAX: 00007fc3aec4ef30 RBX: 00007fc3b03e7640 RCX: 0000000000000000 [ 88.500810][ T7071] RDX: 00007fc3aec4ef78 RSI: 00007fc3b024eca8 RDI: 00007fc3aec4ce30 [ 88.500823][ T7071] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 88.500834][ T7071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.500846][ T7071] R13: 00007fc3b0416038 R14: 00007fc3b0415fa0 R15: 00007ffc8f8e5188 [ 88.500862][ T7071] [ 88.500885][ T7071] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 89.081784][ T7148] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(5) [ 89.088399][ T7148] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 89.095954][ T7148] vhci_hcd vhci_hcd.0: Device attached [ 89.097994][ T7152] FAULT_INJECTION: forcing a failure. [ 89.097994][ T7152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.114823][ T7152] CPU: 0 UID: 0 PID: 7152 Comm: syz.1.1486 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 89.114850][ T7152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 89.114862][ T7152] Call Trace: [ 89.114869][ T7152] [ 89.114877][ T7152] __dump_stack+0x1d/0x30 [ 89.114906][ T7152] dump_stack_lvl+0xe8/0x140 [ 89.114927][ T7152] dump_stack+0x15/0x1b [ 89.114945][ T7152] should_fail_ex+0x265/0x280 [ 89.115039][ T7152] should_fail+0xb/0x20 [ 89.115069][ T7152] should_fail_usercopy+0x1a/0x20 [ 89.115090][ T7152] _copy_from_user+0x1c/0xb0 [ 89.115117][ T7152] do_sys_poll+0x149/0xbd0 [ 89.115162][ T7152] ? avc_has_perm+0xf7/0x180 [ 89.115207][ T7152] ? set_user_sigmask+0x84/0x190 [ 89.115229][ T7152] __se_sys_ppoll+0x1b9/0x200 [ 89.115287][ T7152] __x64_sys_ppoll+0x67/0x80 [ 89.115311][ T7152] x64_sys_call+0x1d52/0x2ff0 [ 89.115365][ T7152] do_syscall_64+0xd2/0x200 [ 89.115390][ T7152] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 89.115416][ T7152] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 89.115439][ T7152] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.115462][ T7152] RIP: 0033:0x7fb826f3ebe9 [ 89.115478][ T7152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.115573][ T7152] RSP: 002b:00007fb82599f038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 89.115594][ T7152] RAX: ffffffffffffffda RBX: 00007fb827165fa0 RCX: 00007fb826f3ebe9 [ 89.115607][ T7152] RDX: 0000200000001bc0 RSI: 0000000000000001 RDI: 0000200000001b40 [ 89.115621][ T7152] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 89.115634][ T7152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.115646][ T7152] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 89.115664][ T7152] [ 89.230709][ T7170] FAULT_INJECTION: forcing a failure. [ 89.230709][ T7170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.230759][ T7170] CPU: 1 UID: 0 PID: 7170 Comm: syz.1.1492 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 89.230853][ T7170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 89.230867][ T7170] Call Trace: [ 89.230873][ T7170] [ 89.230879][ T7170] __dump_stack+0x1d/0x30 [ 89.230980][ T7170] dump_stack_lvl+0xe8/0x140 [ 89.230999][ T7170] dump_stack+0x15/0x1b [ 89.231014][ T7170] should_fail_ex+0x265/0x280 [ 89.231090][ T7170] should_fail+0xb/0x20 [ 89.231119][ T7170] should_fail_usercopy+0x1a/0x20 [ 89.231140][ T7170] _copy_from_iter+0xcf/0xe40 [ 89.231209][ T7170] ? __build_skb_around+0x1a0/0x200 [ 89.231251][ T7170] ? __alloc_skb+0x223/0x320 [ 89.231318][ T7170] netlink_sendmsg+0x471/0x6b0 [ 89.231421][ T7170] ? __pfx_netlink_sendmsg+0x10/0x10 [ 89.231510][ T7170] __sock_sendmsg+0x142/0x180 [ 89.231570][ T7170] ____sys_sendmsg+0x31e/0x4e0 [ 89.231606][ T7170] ___sys_sendmsg+0x17b/0x1d0 [ 89.231649][ T7170] __x64_sys_sendmsg+0xd4/0x160 [ 89.231731][ T7170] x64_sys_call+0x191e/0x2ff0 [ 89.231754][ T7170] do_syscall_64+0xd2/0x200 [ 89.231779][ T7170] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 89.231833][ T7170] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 89.231934][ T7170] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.231955][ T7170] RIP: 0033:0x7fb826f3ebe9 [ 89.231969][ T7170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.231988][ T7170] RSP: 002b:00007fb82599f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.232010][ T7170] RAX: ffffffffffffffda RBX: 00007fb827165fa0 RCX: 00007fb826f3ebe9 [ 89.232023][ T7170] RDX: 0000000000048000 RSI: 00002000000002c0 RDI: 0000000000000004 [ 89.232047][ T7170] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 89.232060][ T7170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.232074][ T7170] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 89.232093][ T7170] [ 89.350132][ T36] usb 1-1: new low-speed USB device number 2 using vhci_hcd [ 89.507461][ T29] kauditd_printk_skb: 23810 callbacks suppressed [ 89.507477][ T29] audit: type=1400 audit(1754698507.561:128856): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507563][ T29] audit: type=1400 audit(1754698507.561:128857): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507605][ T29] audit: type=1400 audit(1754698507.561:128858): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507635][ T29] audit: type=1400 audit(1754698507.561:128859): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507704][ T29] audit: type=1400 audit(1754698507.561:128860): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507877][ T29] audit: type=1400 audit(1754698507.561:128861): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507902][ T29] audit: type=1400 audit(1754698507.571:128862): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.507925][ T29] audit: type=1400 audit(1754698507.571:128863): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.508042][ T29] audit: type=1400 audit(1754698507.571:128864): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.508066][ T29] audit: type=1400 audit(1754698507.571:128865): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.510668][ T7185] FAULT_INJECTION: forcing a failure. [ 89.510668][ T7185] name failslab, interval 1, probability 0, space 0, times 0 [ 89.510703][ T7185] CPU: 1 UID: 0 PID: 7185 Comm: syz.2.1498 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 89.510730][ T7185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 89.510744][ T7185] Call Trace: [ 89.510785][ T7185] [ 89.510792][ T7185] __dump_stack+0x1d/0x30 [ 89.510811][ T7185] dump_stack_lvl+0xe8/0x140 [ 89.510829][ T7185] dump_stack+0x15/0x1b [ 89.510844][ T7185] should_fail_ex+0x265/0x280 [ 89.510901][ T7185] should_failslab+0x8c/0xb0 [ 89.510928][ T7185] kmem_cache_alloc_noprof+0x50/0x310 [ 89.510958][ T7185] ? security_file_alloc+0x32/0x100 [ 89.510988][ T7185] security_file_alloc+0x32/0x100 [ 89.511083][ T7185] init_file+0x5c/0x1d0 [ 89.511114][ T7185] alloc_empty_file+0x8b/0x200 [ 89.511144][ T7185] path_openat+0x68/0x2170 [ 89.511164][ T7185] ? _parse_integer_limit+0x170/0x190 [ 89.511222][ T7185] ? kstrtoull+0x111/0x140 [ 89.511255][ T7185] ? kstrtouint+0x76/0xc0 [ 89.511289][ T7185] do_filp_open+0x109/0x230 [ 89.511327][ T7185] do_sys_openat2+0xa6/0x110 [ 89.511358][ T7185] __x64_sys_openat+0xf2/0x120 [ 89.511393][ T7185] x64_sys_call+0x2e9c/0x2ff0 [ 89.511470][ T7185] do_syscall_64+0xd2/0x200 [ 89.511497][ T7185] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 89.511524][ T7185] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 89.511557][ T7185] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.511577][ T7185] RIP: 0033:0x7f0f4cbfebe9 [ 89.511590][ T7185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.511606][ T7185] RSP: 002b:00007f0f4b667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 89.511626][ T7185] RAX: ffffffffffffffda RBX: 00007f0f4ce25fa0 RCX: 00007f0f4cbfebe9 [ 89.511639][ T7185] RDX: 0000000000105480 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 89.511718][ T7185] RBP: 00007f0f4b667090 R08: 0000000000000000 R09: 0000000000000000 [ 89.511731][ T7185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.511743][ T7185] R13: 00007f0f4ce26038 R14: 00007f0f4ce25fa0 R15: 00007fffb8d57238 [ 89.511832][ T7185] [ 89.924438][ T7149] vhci_hcd: connection reset by peer [ 89.924869][ T12] vhci_hcd: stop threads [ 89.924912][ T12] vhci_hcd: release socket [ 89.924969][ T12] vhci_hcd: disconnect device [ 90.147191][ T7234] FAULT_INJECTION: forcing a failure. [ 90.147191][ T7234] name failslab, interval 1, probability 0, space 0, times 0 [ 90.147222][ T7234] CPU: 0 UID: 0 PID: 7234 Comm: syz.3.1521 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 90.147252][ T7234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 90.147264][ T7234] Call Trace: [ 90.147272][ T7234] [ 90.147309][ T7234] __dump_stack+0x1d/0x30 [ 90.147383][ T7234] dump_stack_lvl+0xe8/0x140 [ 90.147404][ T7234] dump_stack+0x15/0x1b [ 90.147421][ T7234] should_fail_ex+0x265/0x280 [ 90.147496][ T7234] should_failslab+0x8c/0xb0 [ 90.147519][ T7234] kmem_cache_alloc_noprof+0x50/0x310 [ 90.147595][ T7234] ? getname_flags+0x80/0x3b0 [ 90.147620][ T7234] ? vfs_write+0x75e/0x8e0 [ 90.147683][ T7234] getname_flags+0x80/0x3b0 [ 90.147710][ T7234] user_path_at+0x28/0x130 [ 90.147760][ T7234] vfs_open_tree+0xef/0x540 [ 90.147792][ T7234] __x64_sys_open_tree+0x45/0xc0 [ 90.147816][ T7234] x64_sys_call+0x2a87/0x2ff0 [ 90.147850][ T7234] do_syscall_64+0xd2/0x200 [ 90.147877][ T7234] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 90.147899][ T7234] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.147953][ T7234] RIP: 0033:0x7fd166cbebe9 [ 90.147967][ T7234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.147983][ T7234] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ac [ 90.148002][ T7234] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 90.148016][ T7234] RDX: 0000000000000800 RSI: 0000200000000000 RDI: ffffffffffffffff [ 90.148030][ T7234] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 90.148042][ T7234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.148109][ T7234] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 90.148128][ T7234] [ 90.416527][ T7244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7244 comm=syz.4.1526 [ 90.434684][ T7244] netlink: 'syz.4.1526': attribute type 1 has an invalid length. [ 90.450679][ T7242] __nla_validate_parse: 3 callbacks suppressed [ 90.450712][ T7242] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1525'. [ 90.559566][ T7248] bond1: (slave bridge1): making interface the new active one [ 90.561213][ T7248] bond1: (slave bridge1): Enslaving as an active interface with an up link [ 90.631853][ T7252] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1529'. [ 90.902942][ T7275] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1537'. [ 90.925770][ T7281] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1542'. [ 90.925796][ T7281] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1542'. [ 91.302426][ T7308] netlink: 84 bytes leftover after parsing attributes in process `syz.2.1552'. [ 91.400596][ T7312] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1551'. [ 91.474376][ T7316] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1553'. [ 91.510129][ T7298] FAULT_INJECTION: forcing a failure. [ 91.510129][ T7298] name failslab, interval 1, probability 0, space 0, times 0 [ 91.557698][ T7298] CPU: 1 UID: 0 PID: 7298 Comm: syz.1.1548 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 91.557733][ T7298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 91.557755][ T7298] Call Trace: [ 91.557763][ T7298] [ 91.557771][ T7298] __dump_stack+0x1d/0x30 [ 91.557796][ T7298] dump_stack_lvl+0xe8/0x140 [ 91.557870][ T7298] dump_stack+0x15/0x1b [ 91.557909][ T7298] should_fail_ex+0x265/0x280 [ 91.557946][ T7298] should_failslab+0x8c/0xb0 [ 91.557974][ T7298] __kmalloc_noprof+0xa5/0x3e0 [ 91.558025][ T7298] ? security_prepare_creds+0x52/0x120 [ 91.558065][ T7298] security_prepare_creds+0x52/0x120 [ 91.558164][ T7298] prepare_creds+0x34a/0x4c0 [ 91.558236][ T7298] __se_sys_setns+0x23e/0xf20 [ 91.558273][ T7298] __x64_sys_setns+0x31/0x40 [ 91.558306][ T7298] x64_sys_call+0x2b16/0x2ff0 [ 91.558358][ T7298] do_syscall_64+0xd2/0x200 [ 91.558385][ T7298] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 91.558412][ T7298] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 91.558436][ T7298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.558459][ T7298] RIP: 0033:0x7fb826f3ebe9 [ 91.558575][ T7298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.558596][ T7298] RSP: 002b:00007fb82599f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000134 [ 91.558618][ T7298] RAX: ffffffffffffffda RBX: 00007fb827165fa0 RCX: 00007fb826f3ebe9 [ 91.558632][ T7298] RDX: 0000000000000000 RSI: 0000000010000000 RDI: 0000000000000003 [ 91.558647][ T7298] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 91.558731][ T7298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.558744][ T7298] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 91.558763][ T7298] [ 91.767503][ T7322] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1556'. [ 91.941908][ T7341] netlink: 84 bytes leftover after parsing attributes in process `syz.4.1564'. [ 92.051347][ T7350] pim6reg1: entered promiscuous mode [ 92.056677][ T7350] pim6reg1: entered allmulticast mode [ 92.258860][ T7365] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 92.354366][ T7374] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 92.360968][ T7374] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 92.368591][ T7374] vhci_hcd vhci_hcd.0: Device attached [ 92.391461][ T7378] vhci_hcd: connection closed [ 92.391663][ T1458] vhci_hcd: stop threads [ 92.400634][ T1458] vhci_hcd: release socket [ 92.405040][ T1458] vhci_hcd: disconnect device [ 92.830223][ T7390] FAULT_INJECTION: forcing a failure. [ 92.830223][ T7390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.843435][ T7390] CPU: 1 UID: 0 PID: 7390 Comm: syz.1.1586 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 92.843466][ T7390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 92.843480][ T7390] Call Trace: [ 92.843488][ T7390] [ 92.843497][ T7390] __dump_stack+0x1d/0x30 [ 92.843550][ T7390] dump_stack_lvl+0xe8/0x140 [ 92.843623][ T7390] dump_stack+0x15/0x1b [ 92.843643][ T7390] should_fail_ex+0x265/0x280 [ 92.843675][ T7390] should_fail+0xb/0x20 [ 92.843762][ T7390] should_fail_usercopy+0x1a/0x20 [ 92.843813][ T7390] _copy_to_user+0x20/0xa0 [ 92.843836][ T7390] simple_read_from_buffer+0xb5/0x130 [ 92.843864][ T7390] proc_fail_nth_read+0x10e/0x150 [ 92.843893][ T7390] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 92.843921][ T7390] vfs_read+0x1a0/0x6f0 [ 92.843943][ T7390] ? __rcu_read_unlock+0x4f/0x70 [ 92.844045][ T7390] ? __fget_files+0x184/0x1c0 [ 92.844073][ T7390] ksys_read+0xda/0x1a0 [ 92.844097][ T7390] __x64_sys_read+0x40/0x50 [ 92.844121][ T7390] x64_sys_call+0x27bc/0x2ff0 [ 92.844165][ T7390] do_syscall_64+0xd2/0x200 [ 92.844191][ T7390] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 92.844217][ T7390] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 92.844242][ T7390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.844266][ T7390] RIP: 0033:0x7fb826f3d5fc [ 92.844321][ T7390] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 92.844339][ T7390] RSP: 002b:00007fb82599f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.844439][ T7390] RAX: ffffffffffffffda RBX: 00007fb827165fa0 RCX: 00007fb826f3d5fc [ 92.844454][ T7390] RDX: 000000000000000f RSI: 00007fb82599f0a0 RDI: 0000000000000003 [ 92.844469][ T7390] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 92.844488][ T7390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.844500][ T7390] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 92.844575][ T7390] [ 93.138196][ T7411] FAULT_INJECTION: forcing a failure. [ 93.138196][ T7411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.151367][ T7411] CPU: 1 UID: 0 PID: 7411 Comm: Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 93.151400][ T7411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 93.151413][ T7411] Call Trace: [ 93.151420][ T7411] [ 93.151439][ T7411] __dump_stack+0x1d/0x30 [ 93.151462][ T7411] dump_stack_lvl+0xe8/0x140 [ 93.151505][ T7411] dump_stack+0x15/0x1b [ 93.151520][ T7411] should_fail_ex+0x265/0x280 [ 93.151581][ T7411] should_fail+0xb/0x20 [ 93.151631][ T7411] should_fail_usercopy+0x1a/0x20 [ 93.151647][ T7411] strncpy_from_user+0x25/0x230 [ 93.151675][ T7411] ? getname_flags+0x9b/0x3b0 [ 93.151707][ T7411] getname_flags+0xae/0x3b0 [ 93.151800][ T7411] do_sys_openat2+0x60/0x110 [ 93.151833][ T7411] __x64_sys_openat+0xf2/0x120 [ 93.151866][ T7411] x64_sys_call+0x2e9c/0x2ff0 [ 93.151967][ T7411] do_syscall_64+0xd2/0x200 [ 93.152055][ T7411] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 93.152093][ T7411] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 93.152116][ T7411] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.152140][ T7411] RIP: 0033:0x7f5df850ebe9 [ 93.152155][ T7411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.152239][ T7411] RSP: 002b:00007f5df6f6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 93.152259][ T7411] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850ebe9 [ 93.152273][ T7411] RDX: 000000000000275a RSI: 0000200000000140 RDI: ffffffffffffff9c [ 93.152288][ T7411] RBP: 00007f5df6f6f090 R08: 0000000000000000 R09: 0000000000000000 [ 93.152299][ T7411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.152446][ T7411] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 93.152465][ T7411] [ 93.685131][ T7464] FAULT_INJECTION: forcing a failure. [ 93.685131][ T7464] name failslab, interval 1, probability 0, space 0, times 0 [ 93.697842][ T7464] CPU: 0 UID: 0 PID: 7464 Comm: syz.3.1620 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 93.697948][ T7464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 93.697959][ T7464] Call Trace: [ 93.697966][ T7464] [ 93.697975][ T7464] __dump_stack+0x1d/0x30 [ 93.697999][ T7464] dump_stack_lvl+0xe8/0x140 [ 93.698021][ T7464] dump_stack+0x15/0x1b [ 93.698040][ T7464] should_fail_ex+0x265/0x280 [ 93.698147][ T7464] should_failslab+0x8c/0xb0 [ 93.698213][ T7464] kmem_cache_alloc_noprof+0x50/0x310 [ 93.698302][ T7464] ? dup_fd+0x3a/0x540 [ 93.698380][ T7464] dup_fd+0x3a/0x540 [ 93.698452][ T7464] copy_files+0x98/0xf0 [ 93.698484][ T7464] copy_process+0xc5b/0x2000 [ 93.698516][ T7464] kernel_clone+0x16c/0x5c0 [ 93.698540][ T7464] ? vfs_write+0x75e/0x8e0 [ 93.698569][ T7464] __x64_sys_clone+0xe6/0x120 [ 93.698687][ T7464] x64_sys_call+0x119c/0x2ff0 [ 93.698708][ T7464] do_syscall_64+0xd2/0x200 [ 93.698747][ T7464] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 93.698812][ T7464] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 93.698833][ T7464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.698854][ T7464] RIP: 0033:0x7fd166cbebe9 [ 93.698927][ T7464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.698945][ T7464] RSP: 002b:00007fd165726fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 93.698967][ T7464] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 93.698981][ T7464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 93.698995][ T7464] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 93.699015][ T7464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 93.699028][ T7464] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 93.699099][ T7464] [ 93.852297][ T7461] FAULT_INJECTION: forcing a failure. [ 93.852297][ T7461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.900916][ T7461] CPU: 1 UID: 0 PID: 7461 Comm: syz.1.1619 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 93.900947][ T7461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 93.901062][ T7461] Call Trace: [ 93.901069][ T7461] [ 93.901076][ T7461] __dump_stack+0x1d/0x30 [ 93.901099][ T7461] dump_stack_lvl+0xe8/0x140 [ 93.901174][ T7461] dump_stack+0x15/0x1b [ 93.901190][ T7461] should_fail_ex+0x265/0x280 [ 93.901258][ T7461] should_fail+0xb/0x20 [ 93.901291][ T7461] should_fail_usercopy+0x1a/0x20 [ 93.901334][ T7461] _copy_to_user+0x20/0xa0 [ 93.901363][ T7461] simple_read_from_buffer+0xb5/0x130 [ 93.901386][ T7461] proc_fail_nth_read+0x10e/0x150 [ 93.901416][ T7461] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 93.901517][ T7461] vfs_read+0x1a0/0x6f0 [ 93.901535][ T7461] ? __fget_files+0x184/0x1c0 [ 93.901593][ T7461] ? __rcu_read_unlock+0x4f/0x70 [ 93.901689][ T7461] ? __fget_files+0x184/0x1c0 [ 93.901718][ T7461] ksys_read+0xda/0x1a0 [ 93.901750][ T7461] __x64_sys_read+0x40/0x50 [ 93.901819][ T7461] x64_sys_call+0x27bc/0x2ff0 [ 93.901843][ T7461] do_syscall_64+0xd2/0x200 [ 93.901870][ T7461] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 93.901895][ T7461] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 93.901934][ T7461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.902030][ T7461] RIP: 0033:0x7fb826f3d5fc [ 93.902043][ T7461] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 93.902062][ T7461] RSP: 002b:00007fb82599f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.902081][ T7461] RAX: ffffffffffffffda RBX: 00007fb827165fa0 RCX: 00007fb826f3d5fc [ 93.902095][ T7461] RDX: 000000000000000f RSI: 00007fb82599f0a0 RDI: 0000000000000007 [ 93.902108][ T7461] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 93.902174][ T7461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.902185][ T7461] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 93.902202][ T7461] [ 94.311696][ T7499] Q6\bY4: renamed from lo (while UP) [ 94.380061][ T36] usb 1-1: enqueue for inactive port 0 [ 94.400292][ T36] usb 1-1: enqueue for inactive port 0 [ 94.471854][ T36] vhci_hcd: vhci_device speed not set [ 94.509916][ T29] kauditd_printk_skb: 33056 callbacks suppressed [ 94.509931][ T29] audit: type=1400 audit(1754698512.581:146434): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.546494][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.553066][ T3030] audit: audit_lost=23003 audit_rate_limit=0 audit_backlog_limit=64 [ 94.554417][ T7531] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.561173][ T3030] audit: backlog limit exceeded [ 94.561431][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.567816][ T7531] audit: audit_lost=23004 audit_rate_limit=0 audit_backlog_limit=64 [ 94.572689][ T3030] audit: audit_lost=23005 audit_rate_limit=0 audit_backlog_limit=64 [ 94.579151][ T7531] audit: backlog limit exceeded [ 94.587158][ T3030] audit: backlog limit exceeded [ 94.636143][ T7536] FAULT_INJECTION: forcing a failure. [ 94.636143][ T7536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 94.649295][ T7536] CPU: 1 UID: 0 PID: 7536 Comm: syz.2.1652 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 94.649366][ T7536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 94.649381][ T7536] Call Trace: [ 94.649388][ T7536] [ 94.649397][ T7536] __dump_stack+0x1d/0x30 [ 94.649419][ T7536] dump_stack_lvl+0xe8/0x140 [ 94.649439][ T7536] dump_stack+0x15/0x1b [ 94.649454][ T7536] should_fail_ex+0x265/0x280 [ 94.649498][ T7536] should_fail+0xb/0x20 [ 94.649531][ T7536] should_fail_usercopy+0x1a/0x20 [ 94.649553][ T7536] _copy_from_iter+0xcf/0xe40 [ 94.649580][ T7536] ? alloc_pages_mpol+0x201/0x250 [ 94.649719][ T7536] copy_page_from_iter+0x178/0x2a0 [ 94.649751][ T7536] tun_get_user+0x679/0x2680 [ 94.649834][ T7536] ? ref_tracker_alloc+0x1f2/0x2f0 [ 94.649926][ T7536] tun_chr_write_iter+0x15e/0x210 [ 94.650007][ T7536] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 94.650037][ T7536] vfs_write+0x4a0/0x8e0 [ 94.650066][ T7536] ksys_write+0xda/0x1a0 [ 94.650128][ T7536] __x64_sys_write+0x40/0x50 [ 94.650154][ T7536] x64_sys_call+0x27fe/0x2ff0 [ 94.650179][ T7536] do_syscall_64+0xd2/0x200 [ 94.650206][ T7536] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 94.650233][ T7536] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 94.650269][ T7536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.650353][ T7536] RIP: 0033:0x7f0f4cbfd69f [ 94.650369][ T7536] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 94.650387][ T7536] RSP: 002b:00007f0f4b667000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 94.650424][ T7536] RAX: ffffffffffffffda RBX: 00007f0f4ce25fa0 RCX: 00007f0f4cbfd69f [ 94.650458][ T7536] RDX: 000000000000003a RSI: 0000200000000000 RDI: 00000000000000c8 [ 94.650579][ T7536] RBP: 00007f0f4b667090 R08: 0000000000000000 R09: 0000000000000000 [ 94.650591][ T7536] R10: 000000000000003a R11: 0000000000000293 R12: 0000000000000001 [ 94.650602][ T7536] R13: 00007f0f4ce26038 R14: 00007f0f4ce25fa0 R15: 00007fffb8d57238 [ 94.650618][ T7536] [ 94.935967][ T7546] pim6reg1: entered promiscuous mode [ 94.941494][ T7546] pim6reg1: entered allmulticast mode [ 95.038009][ T7564] FAULT_INJECTION: forcing a failure. [ 95.038009][ T7564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.051172][ T7564] CPU: 1 UID: 0 PID: 7564 Comm: syz.0.1663 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 95.051226][ T7564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 95.051254][ T7564] Call Trace: [ 95.051261][ T7564] [ 95.051268][ T7564] __dump_stack+0x1d/0x30 [ 95.051290][ T7564] dump_stack_lvl+0xe8/0x140 [ 95.051307][ T7564] dump_stack+0x15/0x1b [ 95.051358][ T7564] should_fail_ex+0x265/0x280 [ 95.051394][ T7564] should_fail+0xb/0x20 [ 95.051473][ T7564] should_fail_usercopy+0x1a/0x20 [ 95.051502][ T7564] strncpy_from_user+0x25/0x230 [ 95.051531][ T7564] ? kmem_cache_alloc_noprof+0x186/0x310 [ 95.051644][ T7564] ? getname_flags+0x80/0x3b0 [ 95.051671][ T7564] getname_flags+0xae/0x3b0 [ 95.051698][ T7564] path_setxattrat+0x223/0x310 [ 95.051739][ T7564] __x64_sys_setxattr+0x6e/0x90 [ 95.051797][ T7564] x64_sys_call+0xad2/0x2ff0 [ 95.051877][ T7564] do_syscall_64+0xd2/0x200 [ 95.051920][ T7564] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 95.051943][ T7564] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 95.051964][ T7564] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.051985][ T7564] RIP: 0033:0x7f5df850ebe9 [ 95.052002][ T7564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.052044][ T7564] RSP: 002b:00007f5df6f6f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 95.052062][ T7564] RAX: ffffffffffffffda RBX: 00007f5df8735fa0 RCX: 00007f5df850ebe9 [ 95.052074][ T7564] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000000 [ 95.052085][ T7564] RBP: 00007f5df6f6f090 R08: 0000000000000002 R09: 0000000000000000 [ 95.052097][ T7564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.052111][ T7564] R13: 00007f5df8736038 R14: 00007f5df8735fa0 R15: 00007ffc9c91f668 [ 95.052130][ T7564] [ 95.840202][ T7621] pim6reg1: entered promiscuous mode [ 95.845547][ T7621] pim6reg1: entered allmulticast mode [ 95.978798][ T7631] __nla_validate_parse: 15 callbacks suppressed [ 95.978814][ T7631] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1689'. [ 96.046173][ T7639] FAULT_INJECTION: forcing a failure. [ 96.046173][ T7639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.059298][ T7639] CPU: 1 UID: 0 PID: 7639 Comm: syz.2.1693 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 96.059370][ T7639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 96.059384][ T7639] Call Trace: [ 96.059391][ T7639] [ 96.059448][ T7639] __dump_stack+0x1d/0x30 [ 96.059472][ T7639] dump_stack_lvl+0xe8/0x140 [ 96.059492][ T7639] dump_stack+0x15/0x1b [ 96.059510][ T7639] should_fail_ex+0x265/0x280 [ 96.059546][ T7639] should_fail+0xb/0x20 [ 96.059625][ T7639] should_fail_usercopy+0x1a/0x20 [ 96.059646][ T7639] _copy_from_user+0x1c/0xb0 [ 96.059734][ T7639] kstrtouint_from_user+0x69/0xf0 [ 96.059770][ T7639] ? 0xffffffff81000000 [ 96.059784][ T7639] ? selinux_file_permission+0x1e4/0x320 [ 96.059822][ T7639] proc_fail_nth_write+0x50/0x160 [ 96.059851][ T7639] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 96.059953][ T7639] vfs_write+0x269/0x8e0 [ 96.059999][ T7639] ? vfs_read+0x47f/0x6f0 [ 96.060020][ T7639] ? __rcu_read_unlock+0x4f/0x70 [ 96.060045][ T7639] ? __fget_files+0x184/0x1c0 [ 96.060069][ T7639] ksys_write+0xda/0x1a0 [ 96.060099][ T7639] __x64_sys_write+0x40/0x50 [ 96.060177][ T7639] x64_sys_call+0x27fe/0x2ff0 [ 96.060220][ T7639] do_syscall_64+0xd2/0x200 [ 96.060248][ T7639] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 96.060355][ T7639] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 96.060431][ T7639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.060454][ T7639] RIP: 0033:0x7f0f4cbfd69f [ 96.060467][ T7639] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 96.060498][ T7639] RSP: 002b:00007f0f4b667030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 96.060520][ T7639] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f4cbfd69f [ 96.060535][ T7639] RDX: 0000000000000001 RSI: 00007f0f4b6670a0 RDI: 0000000000000003 [ 96.060549][ T7639] RBP: 00007f0f4b667090 R08: 0000000000000000 R09: 0000000000000000 [ 96.060563][ T7639] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 96.060647][ T7639] R13: 00007f0f4ce26038 R14: 00007f0f4ce25fa0 R15: 00007fffb8d57238 [ 96.060666][ T7639] [ 96.316586][ T7645] pim6reg1: entered promiscuous mode [ 96.321954][ T7645] pim6reg1: entered allmulticast mode [ 96.443452][ T7655] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1701'. [ 96.526129][ T7657] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1702'. [ 96.945589][ T7691] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1715'. [ 97.034698][ T7693] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1716'. [ 97.126810][ T7702] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1721'. [ 97.244776][ T7713] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1726'. [ 97.361061][ T7725] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1731'. [ 97.572303][ T7720] FAULT_INJECTION: forcing a failure. [ 97.572303][ T7720] name failslab, interval 1, probability 0, space 0, times 0 [ 97.585097][ T7720] CPU: 0 UID: 0 PID: 7720 Comm: syz.4.1729 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 97.585125][ T7720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 97.585159][ T7720] Call Trace: [ 97.585166][ T7720] [ 97.585174][ T7720] __dump_stack+0x1d/0x30 [ 97.585198][ T7720] dump_stack_lvl+0xe8/0x140 [ 97.585224][ T7720] dump_stack+0x15/0x1b [ 97.585239][ T7720] should_fail_ex+0x265/0x280 [ 97.585341][ T7720] should_failslab+0x8c/0xb0 [ 97.585365][ T7720] kmem_cache_alloc_noprof+0x50/0x310 [ 97.585536][ T7720] ? audit_log_start+0x365/0x6c0 [ 97.585580][ T7720] audit_log_start+0x365/0x6c0 [ 97.585613][ T7720] ? __fget_files+0x184/0x1c0 [ 97.585642][ T7720] audit_seccomp+0x48/0x100 [ 97.585853][ T7720] ? __seccomp_filter+0x68c/0x10d0 [ 97.585906][ T7720] __seccomp_filter+0x69d/0x10d0 [ 97.585928][ T7720] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 97.585956][ T7720] ? vfs_write+0x75e/0x8e0 [ 97.585981][ T7720] __secure_computing+0x82/0x150 [ 97.586001][ T7720] syscall_trace_enter+0xcf/0x1e0 [ 97.586068][ T7720] do_syscall_64+0xac/0x200 [ 97.586092][ T7720] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 97.586115][ T7720] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 97.586212][ T7720] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.586235][ T7720] RIP: 0033:0x7fc3b01ed5fc [ 97.586307][ T7720] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 97.586328][ T7720] RSP: 002b:00007fc3aec4f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 97.586348][ T7720] RAX: ffffffffffffffda RBX: 00007fc3b0415fa0 RCX: 00007fc3b01ed5fc [ 97.586362][ T7720] RDX: 000000000000000f RSI: 00007fc3aec4f0a0 RDI: 0000000000000006 [ 97.586377][ T7720] RBP: 00007fc3aec4f090 R08: 0000000000000000 R09: fffffffffffffd1d [ 97.586391][ T7720] R10: 0000000000000043 R11: 0000000000000246 R12: 0000000000000001 [ 97.586426][ T7720] R13: 00007fc3b0416038 R14: 00007fc3b0415fa0 R15: 00007ffc8f8e5188 [ 97.586442][ T7720] [ 97.592270][ T7737] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1737'. [ 97.794319][ T7745] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1740'. [ 97.840795][ T7754] FAULT_INJECTION: forcing a failure. [ 97.840795][ T7754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.854004][ T7754] CPU: 0 UID: 0 PID: 7754 Comm: syz.3.1744 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 97.854034][ T7754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 97.854048][ T7754] Call Trace: [ 97.854056][ T7754] [ 97.854064][ T7754] __dump_stack+0x1d/0x30 [ 97.854085][ T7754] dump_stack_lvl+0xe8/0x140 [ 97.854244][ T7754] dump_stack+0x15/0x1b [ 97.854263][ T7754] should_fail_ex+0x265/0x280 [ 97.854298][ T7754] should_fail+0xb/0x20 [ 97.854328][ T7754] should_fail_usercopy+0x1a/0x20 [ 97.854465][ T7754] _copy_to_user+0x20/0xa0 [ 97.854522][ T7754] simple_read_from_buffer+0xb5/0x130 [ 97.854547][ T7754] proc_fail_nth_read+0x10e/0x150 [ 97.854578][ T7754] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 97.854662][ T7754] vfs_read+0x1a0/0x6f0 [ 97.854747][ T7754] ? __rcu_read_unlock+0x4f/0x70 [ 97.854771][ T7754] ? __fget_files+0x184/0x1c0 [ 97.854799][ T7754] ksys_read+0xda/0x1a0 [ 97.854824][ T7754] __x64_sys_read+0x40/0x50 [ 97.854848][ T7754] x64_sys_call+0x27bc/0x2ff0 [ 97.854876][ T7754] do_syscall_64+0xd2/0x200 [ 97.854944][ T7754] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 97.854966][ T7754] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 97.855052][ T7754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.855081][ T7754] RIP: 0033:0x7fd166cbd5fc [ 97.855098][ T7754] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 97.855115][ T7754] RSP: 002b:00007fd165727030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 97.855193][ T7754] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbd5fc [ 97.855207][ T7754] RDX: 000000000000000f RSI: 00007fd1657270a0 RDI: 0000000000000003 [ 97.855219][ T7754] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 97.855231][ T7754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.855300][ T7754] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 97.855430][ T7754] [ 98.125822][ T7759] FAULT_INJECTION: forcing a failure. [ 98.125822][ T7759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.138963][ T7759] CPU: 0 UID: 0 PID: 7759 Comm: syz.1.1745 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 98.138991][ T7759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 98.139003][ T7759] Call Trace: [ 98.139010][ T7759] [ 98.139017][ T7759] __dump_stack+0x1d/0x30 [ 98.139057][ T7759] dump_stack_lvl+0xe8/0x140 [ 98.139075][ T7759] dump_stack+0x15/0x1b [ 98.139092][ T7759] should_fail_ex+0x265/0x280 [ 98.139127][ T7759] should_fail+0xb/0x20 [ 98.139162][ T7759] should_fail_usercopy+0x1a/0x20 [ 98.139189][ T7759] _copy_to_user+0x20/0xa0 [ 98.139218][ T7759] copy_siginfo_to_user+0x22/0xb0 [ 98.139244][ T7759] x64_setup_rt_frame+0x2b5/0x580 [ 98.139267][ T7759] arch_do_signal_or_restart+0x27c/0x480 [ 98.139303][ T7759] exit_to_user_mode_loop+0x7a/0x100 [ 98.139324][ T7759] do_syscall_64+0x1d6/0x200 [ 98.139352][ T7759] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 98.139427][ T7759] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 98.139448][ T7759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.139469][ T7759] RIP: 0033:0x7fb826f3ebe7 [ 98.139485][ T7759] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 98.139516][ T7759] RSP: 002b:00007fb82599f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000114 [ 98.139553][ T7759] RAX: 0000000000000114 RBX: 00007fb827165fa0 RCX: 00007fb826f3ebe9 [ 98.139568][ T7759] RDX: 00000000000008f5 RSI: 0000000000000006 RDI: 0000000000000003 [ 98.139581][ T7759] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 98.139594][ T7759] R10: 0100000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.139607][ T7759] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 98.139696][ T7759] [ 98.931102][ T7823] netem: change failed [ 99.519776][ T29] kauditd_printk_skb: 56185 callbacks suppressed [ 99.519791][ T29] audit: type=1400 audit(1754698517.581:172737): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.534581][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.547480][ T7869] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.553983][ T3030] audit: audit_lost=32968 audit_rate_limit=0 audit_backlog_limit=64 [ 99.554001][ T3030] audit: backlog limit exceeded [ 99.554277][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.560605][ T7869] audit: audit_lost=32969 audit_rate_limit=0 audit_backlog_limit=64 [ 99.568671][ T3030] audit: audit_lost=32970 audit_rate_limit=0 audit_backlog_limit=64 [ 99.573543][ T7869] audit: backlog limit exceeded [ 99.579982][ T3030] audit: backlog limit exceeded [ 100.166949][ T7916] FAULT_INJECTION: forcing a failure. [ 100.166949][ T7916] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.180173][ T7916] CPU: 0 UID: 0 PID: 7916 Comm: syz.3.1818 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 100.180202][ T7916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.180260][ T7916] Call Trace: [ 100.180265][ T7916] [ 100.180273][ T7916] __dump_stack+0x1d/0x30 [ 100.180294][ T7916] dump_stack_lvl+0xe8/0x140 [ 100.180316][ T7916] dump_stack+0x15/0x1b [ 100.180335][ T7916] should_fail_ex+0x265/0x280 [ 100.180371][ T7916] should_fail+0xb/0x20 [ 100.180443][ T7916] should_fail_usercopy+0x1a/0x20 [ 100.180463][ T7916] _copy_to_user+0x20/0xa0 [ 100.180492][ T7916] simple_read_from_buffer+0xb5/0x130 [ 100.180596][ T7916] proc_fail_nth_read+0x10e/0x150 [ 100.180660][ T7916] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 100.180685][ T7916] vfs_read+0x1a0/0x6f0 [ 100.180766][ T7916] ? __rcu_read_unlock+0x4f/0x70 [ 100.180791][ T7916] ? __fget_files+0x184/0x1c0 [ 100.180817][ T7916] ksys_read+0xda/0x1a0 [ 100.180838][ T7916] __x64_sys_read+0x40/0x50 [ 100.180928][ T7916] x64_sys_call+0x27bc/0x2ff0 [ 100.181009][ T7916] do_syscall_64+0xd2/0x200 [ 100.181038][ T7916] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 100.181065][ T7916] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 100.181118][ T7916] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.181142][ T7916] RIP: 0033:0x7fd166cbd5fc [ 100.181157][ T7916] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 100.181175][ T7916] RSP: 002b:00007fd165727030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.181194][ T7916] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbd5fc [ 100.181210][ T7916] RDX: 000000000000000f RSI: 00007fd1657270a0 RDI: 0000000000000003 [ 100.181225][ T7916] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 100.181239][ T7916] R10: 0000000000000016 R11: 0000000000000246 R12: 0000000000000001 [ 100.181254][ T7916] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 100.181273][ T7916] [ 100.888936][ T7972] netlink: 'syz.2.1838': attribute type 10 has an invalid length. [ 100.901781][ T7972] team0: Port device dummy0 added [ 101.073335][ T7990] __nla_validate_parse: 11 callbacks suppressed [ 101.073350][ T7990] netlink: 84 bytes leftover after parsing attributes in process `syz.1.1847'. [ 101.076922][ T7994] FAULT_INJECTION: forcing a failure. [ 101.076922][ T7994] name failslab, interval 1, probability 0, space 0, times 0 [ 101.101315][ T7994] CPU: 1 UID: 0 PID: 7994 Comm: syz.3.1848 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 101.101383][ T7994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 101.101395][ T7994] Call Trace: [ 101.101402][ T7994] [ 101.101409][ T7994] __dump_stack+0x1d/0x30 [ 101.101433][ T7994] dump_stack_lvl+0xe8/0x140 [ 101.101480][ T7994] dump_stack+0x15/0x1b [ 101.101544][ T7994] should_fail_ex+0x265/0x280 [ 101.101575][ T7994] should_failslab+0x8c/0xb0 [ 101.101598][ T7994] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 101.101716][ T7994] ? sidtab_sid2str_get+0xa0/0x130 [ 101.101773][ T7994] kmemdup_noprof+0x2b/0x70 [ 101.101801][ T7994] sidtab_sid2str_get+0xa0/0x130 [ 101.101902][ T7994] security_sid_to_context_core+0x1eb/0x2e0 [ 101.101965][ T7994] security_sid_to_context+0x27/0x40 [ 101.101996][ T7994] avc_audit_post_callback+0x10f/0x520 [ 101.102064][ T7994] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 101.102090][ T7994] common_lsm_audit+0x1bb/0x230 [ 101.102118][ T7994] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 101.102140][ T7994] slow_avc_audit+0x104/0x140 [ 101.102200][ T7994] avc_has_perm+0x13a/0x180 [ 101.102221][ T7994] selinux_bpf+0xa3/0xc0 [ 101.102275][ T7994] security_bpf+0x52/0x90 [ 101.102305][ T7994] __sys_bpf+0x1bf/0x7b0 [ 101.102336][ T7994] __x64_sys_bpf+0x41/0x50 [ 101.102408][ T7994] x64_sys_call+0x2aea/0x2ff0 [ 101.102503][ T7994] do_syscall_64+0xd2/0x200 [ 101.102527][ T7994] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 101.102554][ T7994] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 101.102578][ T7994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.102663][ T7994] RIP: 0033:0x7fd166cbebe9 [ 101.102678][ T7994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.102698][ T7994] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.102720][ T7994] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 101.102742][ T7994] RDX: 0000000000000094 RSI: 0000200000000580 RDI: 0000000000000005 [ 101.102757][ T7994] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 101.102806][ T7994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.102820][ T7994] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 101.102838][ T7994] [ 101.142956][ T7997] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1846'. [ 101.316487][ T8016] pim6reg1: entered promiscuous mode [ 101.375478][ T8016] pim6reg1: entered allmulticast mode [ 101.438481][ T8023] netlink: 84 bytes leftover after parsing attributes in process `syz.3.1862'. [ 101.604391][ T8046] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1871'. [ 101.681077][ T8049] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 101.692954][ T8052] netlink: 84 bytes leftover after parsing attributes in process `syz.1.1874'. [ 101.845564][ T8072] pim6reg1: entered promiscuous mode [ 101.851038][ T8072] pim6reg1: entered allmulticast mode [ 101.962739][ T8090] netlink: 84 bytes leftover after parsing attributes in process `syz.1.1891'. [ 102.003088][ T8097] netlink: 'syz.4.1895': attribute type 21 has an invalid length. [ 102.010965][ T8097] netlink: 'syz.4.1895': attribute type 1 has an invalid length. [ 102.018687][ T8097] netlink: 100 bytes leftover after parsing attributes in process `syz.4.1895'. [ 102.163998][ T8114] pim6reg1: entered promiscuous mode [ 102.169333][ T8114] pim6reg1: entered allmulticast mode [ 102.335386][ T8126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=22376 sclass=netlink_route_socket pid=8126 comm=syz.0.1908 [ 102.651308][ T8155] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1922'. [ 103.009259][ T8191] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1935'. [ 103.206540][ T8209] FAULT_INJECTION: forcing a failure. [ 103.206540][ T8209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.219691][ T8209] CPU: 1 UID: 0 PID: 8209 Comm: syz.2.1944 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 103.219757][ T8209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 103.219771][ T8209] Call Trace: [ 103.219777][ T8209] [ 103.219823][ T8209] __dump_stack+0x1d/0x30 [ 103.219845][ T8209] dump_stack_lvl+0xe8/0x140 [ 103.219863][ T8209] dump_stack+0x15/0x1b [ 103.219878][ T8209] should_fail_ex+0x265/0x280 [ 103.219983][ T8209] should_fail+0xb/0x20 [ 103.220016][ T8209] should_fail_usercopy+0x1a/0x20 [ 103.220038][ T8209] _copy_to_user+0x20/0xa0 [ 103.220083][ T8209] simple_read_from_buffer+0xb5/0x130 [ 103.220168][ T8209] proc_fail_nth_read+0x10e/0x150 [ 103.220260][ T8209] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 103.220302][ T8209] vfs_read+0x1a0/0x6f0 [ 103.220321][ T8209] ? __rcu_read_unlock+0x4f/0x70 [ 103.220341][ T8209] ? __fget_files+0x184/0x1c0 [ 103.220365][ T8209] ksys_read+0xda/0x1a0 [ 103.220401][ T8209] __x64_sys_read+0x40/0x50 [ 103.220424][ T8209] x64_sys_call+0x27bc/0x2ff0 [ 103.220444][ T8209] do_syscall_64+0xd2/0x200 [ 103.220491][ T8209] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 103.220511][ T8209] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.220531][ T8209] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.220553][ T8209] RIP: 0033:0x7f0f4cbfd5fc [ 103.220570][ T8209] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 103.220643][ T8209] RSP: 002b:00007f0f4b667030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 103.220661][ T8209] RAX: ffffffffffffffda RBX: 00007f0f4ce25fa0 RCX: 00007f0f4cbfd5fc [ 103.220675][ T8209] RDX: 000000000000000f RSI: 00007f0f4b6670a0 RDI: 0000000000000003 [ 103.220734][ T8209] RBP: 00007f0f4b667090 R08: 0000000000000000 R09: 0000000000000000 [ 103.220747][ T8209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.220758][ T8209] R13: 00007f0f4ce26038 R14: 00007f0f4ce25fa0 R15: 00007fffb8d57238 [ 103.220774][ T8209] [ 103.568157][ T8221] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1950'. [ 103.627177][ T8234] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 104.110217][ T8295] FAULT_INJECTION: forcing a failure. [ 104.110217][ T8295] name failslab, interval 1, probability 0, space 0, times 0 [ 104.122982][ T8295] CPU: 1 UID: 0 PID: 8295 Comm: syz.3.1983 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 104.123014][ T8295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 104.123028][ T8295] Call Trace: [ 104.123035][ T8295] [ 104.123042][ T8295] __dump_stack+0x1d/0x30 [ 104.123066][ T8295] dump_stack_lvl+0xe8/0x140 [ 104.123123][ T8295] dump_stack+0x15/0x1b [ 104.123139][ T8295] should_fail_ex+0x265/0x280 [ 104.123170][ T8295] should_failslab+0x8c/0xb0 [ 104.123234][ T8295] kmem_cache_alloc_noprof+0x50/0x310 [ 104.123265][ T8295] ? audit_log_start+0x365/0x6c0 [ 104.123375][ T8295] audit_log_start+0x365/0x6c0 [ 104.123445][ T8295] audit_seccomp+0x48/0x100 [ 104.123611][ T8295] ? __seccomp_filter+0x68c/0x10d0 [ 104.123703][ T8295] __seccomp_filter+0x69d/0x10d0 [ 104.123725][ T8295] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 104.123755][ T8295] ? vfs_write+0x75e/0x8e0 [ 104.123782][ T8295] __secure_computing+0x82/0x150 [ 104.123830][ T8295] syscall_trace_enter+0xcf/0x1e0 [ 104.123857][ T8295] do_syscall_64+0xac/0x200 [ 104.123884][ T8295] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 104.123928][ T8295] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 104.123951][ T8295] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.123995][ T8295] RIP: 0033:0x7fd166cbebe9 [ 104.124009][ T8295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.124040][ T8295] RSP: 002b:00007fd165727038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f4 [ 104.124061][ T8295] RAX: ffffffffffffffda RBX: 00007fd166ee5fa0 RCX: 00007fd166cbebe9 [ 104.124075][ T8295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 104.124087][ T8295] RBP: 00007fd165727090 R08: 0000000000000000 R09: 0000000000000000 [ 104.124099][ T8295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.124110][ T8295] R13: 00007fd166ee6038 R14: 00007fd166ee5fa0 R15: 00007ffc6a48cc38 [ 104.124178][ T8295] [ 104.127144][ T8300] pim6reg1: entered promiscuous mode [ 104.331576][ T8300] pim6reg1: entered allmulticast mode [ 104.525674][ T8323] FAULT_INJECTION: forcing a failure. [ 104.525674][ T8323] name failslab, interval 1, probability 0, space 0, times 0 [ 104.530626][ T29] kauditd_printk_skb: 35836 callbacks suppressed [ 104.530640][ T29] audit: type=1326 audit(1754698522.601:195982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8314 comm="syz.2.1992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f4cbfebe9 code=0x7ffc0000 [ 104.538313][ T8323] CPU: 1 UID: 0 PID: 8323 Comm: syz.4.1995 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 104.538412][ T8323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 104.538423][ T8323] Call Trace: [ 104.538430][ T8323] [ 104.538439][ T8323] __dump_stack+0x1d/0x30 [ 104.538462][ T8323] dump_stack_lvl+0xe8/0x140 [ 104.538483][ T8323] dump_stack+0x15/0x1b [ 104.538500][ T8323] should_fail_ex+0x265/0x280 [ 104.538554][ T8323] should_failslab+0x8c/0xb0 [ 104.538587][ T8323] kmem_cache_alloc_noprof+0x50/0x310 [ 104.538617][ T8323] ? security_inode_alloc+0x37/0x100 [ 104.538645][ T8323] security_inode_alloc+0x37/0x100 [ 104.538687][ T8323] inode_init_always_gfp+0x4b7/0x500 [ 104.538792][ T8323] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 104.538819][ T8323] alloc_inode+0x58/0x170 [ 104.538841][ T8323] new_inode+0x1d/0xe0 [ 104.538866][ T8323] __debugfs_create_file+0x109/0x330 [ 104.538892][ T8323] debugfs_create_file_full+0x3f/0x60 [ 104.538992][ T8323] ? __pfx_br_dev_setup+0x10/0x10 [ 104.539020][ T8323] ref_tracker_dir_debugfs+0x100/0x1e0 [ 104.539096][ T8323] alloc_netdev_mqs+0x1a2/0xa20 [ 104.539117][ T8323] rtnl_create_link+0x239/0x710 [ 104.539154][ T8323] rtnl_newlink_create+0x14c/0x620 [ 104.539220][ T8323] ? security_capable+0x83/0x90 [ 104.539243][ T8323] ? netlink_ns_capable+0x86/0xa0 [ 104.539273][ T8323] rtnl_newlink+0xf29/0x12d0 [ 104.539302][ T8323] ? xas_load+0x413/0x430 [ 104.539378][ T8323] ? __rcu_read_unlock+0x4f/0x70 [ 104.539402][ T8323] ? xa_load+0xb1/0xe0 [ 104.539476][ T8323] ? __rcu_read_unlock+0x4f/0x70 [ 104.539498][ T8323] ? avc_has_perm_noaudit+0x1b1/0x200 [ 104.539524][ T8323] ? cred_has_capability+0x210/0x280 [ 104.539583][ T8323] ? selinux_capable+0x31/0x40 [ 104.539609][ T8323] ? security_capable+0x83/0x90 [ 104.539662][ T8323] ? ns_capable+0x7d/0xb0 [ 104.539683][ T8323] ? __pfx_rtnl_newlink+0x10/0x10 [ 104.539707][ T8323] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 104.539779][ T8323] netlink_rcv_skb+0x120/0x220 [ 104.539874][ T8323] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 104.539903][ T8323] rtnetlink_rcv+0x1c/0x30 [ 104.539925][ T8323] netlink_unicast+0x5c0/0x690 [ 104.539957][ T8323] netlink_sendmsg+0x58b/0x6b0 [ 104.540119][ T8323] ? __pfx_netlink_sendmsg+0x10/0x10 [ 104.540154][ T8323] __sock_sendmsg+0x142/0x180 [ 104.540200][ T8323] ____sys_sendmsg+0x31e/0x4e0 [ 104.540238][ T8323] ___sys_sendmsg+0x17b/0x1d0 [ 104.540314][ T8323] __x64_sys_sendmsg+0xd4/0x160 [ 104.540417][ T8323] x64_sys_call+0x191e/0x2ff0 [ 104.540440][ T8323] do_syscall_64+0xd2/0x200 [ 104.540465][ T8323] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 104.540490][ T8323] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 104.540560][ T8323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.540588][ T8323] RIP: 0033:0x7fc3b01eebe9 [ 104.540604][ T8323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.540624][ T8323] RSP: 002b:00007fc3aec4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.540655][ T8323] RAX: ffffffffffffffda RBX: 00007fc3b0415fa0 RCX: 00007fc3b01eebe9 [ 104.540669][ T8323] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 104.540680][ T8323] RBP: 00007fc3aec4f090 R08: 0000000000000000 R09: 0000000000000000 [ 104.540691][ T8323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.540702][ T8323] R13: 00007fc3b0416038 R14: 00007fc3b0415fa0 R15: 00007ffc8f8e5188 [ 104.540778][ T8323] [ 104.540806][ T8323] debugfs: out of free dentries, can not create file 'netdev@ffff88812b5c2550' [ 104.544692][ T29] audit: type=1400 audit(1754698522.601:195983): avc: denied { prog_load } for pid=8314 comm="syz.2.1992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.585761][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.612851][ T29] audit: type=1400 audit(1754698522.641:195984): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.614647][ T3030] audit: audit_lost=37169 audit_rate_limit=0 audit_backlog_limit=64 [ 104.619224][ T29] audit: type=1326 audit(1754698522.641:195985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8314 comm="syz.2.1992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f4cbfebe9 code=0x7ffc0000 [ 104.624785][ T3030] audit: backlog limit exceeded [ 104.631611][ T8326] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.635300][ T29] audit: type=1326 audit(1754698522.641:195986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8314 comm="syz.2.1992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f4cbfebe9 code=0x7ffc0000 [ 104.640604][ T8326] audit: audit_lost=37170 audit_rate_limit=0 audit_backlog_limit=64 [ 105.647330][ T8412] pim6reg1: entered promiscuous mode [ 105.652952][ T8412] pim6reg1: entered allmulticast mode [ 106.182231][ T8470] __nla_validate_parse: 18 callbacks suppressed [ 106.182247][ T8470] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2061'. [ 106.228473][ T8466] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2059'. [ 106.389675][ T8485] netlink: 84 bytes leftover after parsing attributes in process `syz.3.2066'. [ 106.633099][ T8503] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8503 comm=syz.3.2073 [ 106.740691][ T8510] netlink: 84 bytes leftover after parsing attributes in process `syz.3.2077'. [ 106.764656][ T8521] FAULT_INJECTION: forcing a failure. [ 106.764656][ T8521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.777842][ T8521] CPU: 0 UID: 0 PID: 8521 Comm: syz.1.2081 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 106.777870][ T8521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 106.777884][ T8521] Call Trace: [ 106.777892][ T8521] [ 106.777901][ T8521] __dump_stack+0x1d/0x30 [ 106.777989][ T8521] dump_stack_lvl+0xe8/0x140 [ 106.778006][ T8521] dump_stack+0x15/0x1b [ 106.778025][ T8521] should_fail_ex+0x265/0x280 [ 106.778062][ T8521] should_fail+0xb/0x20 [ 106.778093][ T8521] should_fail_usercopy+0x1a/0x20 [ 106.778146][ T8521] _copy_from_user+0x1c/0xb0 [ 106.778175][ T8521] kstrtouint_from_user+0x69/0xf0 [ 106.778197][ T8521] ? 0xffffffff81000000 [ 106.778212][ T8521] ? selinux_file_permission+0x1e4/0x320 [ 106.778279][ T8521] proc_fail_nth_write+0x50/0x160 [ 106.778308][ T8521] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 106.778338][ T8521] vfs_write+0x269/0x8e0 [ 106.778421][ T8521] ? vfs_read+0x47f/0x6f0 [ 106.778469][ T8521] ? __rcu_read_unlock+0x4f/0x70 [ 106.778490][ T8521] ? __fget_files+0x184/0x1c0 [ 106.778513][ T8521] ksys_write+0xda/0x1a0 [ 106.778606][ T8521] __x64_sys_write+0x40/0x50 [ 106.778626][ T8521] x64_sys_call+0x27fe/0x2ff0 [ 106.778656][ T8521] do_syscall_64+0xd2/0x200 [ 106.778718][ T8521] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 106.778744][ T8521] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 106.778769][ T8521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.778846][ T8521] RIP: 0033:0x7fb826f3d69f [ 106.778859][ T8521] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 106.778877][ T8521] RSP: 002b:00007fb82599f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 106.778902][ T8521] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb826f3d69f [ 106.778917][ T8521] RDX: 0000000000000001 RSI: 00007fb82599f0a0 RDI: 0000000000000005 [ 106.778931][ T8521] RBP: 00007fb82599f090 R08: 0000000000000000 R09: 0000000000000000 [ 106.778944][ T8521] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 106.778958][ T8521] R13: 00007fb827166038 R14: 00007fb827165fa0 R15: 00007ffd232fe208 [ 106.778978][ T8521] [ 107.022596][ T8527] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2083'. [ 107.190524][ T8549] netlink: 84 bytes leftover after parsing attributes in process `syz.2.2094'. [ 107.426932][ T8569] ================================================================== [ 107.435179][ T8569] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 107.442468][ T8569] [ 107.444773][ T8569] write to 0xffff8881036d7200 of 8 bytes by task 8568 on cpu 1: [ 107.452384][ T8569] mas_wmb_replace+0x20d/0x14a0 [ 107.457230][ T8569] mas_wr_store_entry+0x1773/0x2b50 [ 107.462424][ T8569] mas_store_prealloc+0x74d/0x9e0 [ 107.467440][ T8569] vma_iter_store_new+0x1c5/0x200 [ 107.472459][ T8569] vma_complete+0x125/0x580 [ 107.476960][ T8569] __split_vma+0x5d9/0x650 [ 107.481368][ T8569] vma_modify+0x3f2/0xc80 [ 107.485688][ T8569] vma_modify_flags+0x101/0x130 [ 107.490525][ T8569] mprotect_fixup+0x2cc/0x570 [ 107.495192][ T8569] do_mprotect_pkey+0x6d6/0x980 [ 107.500038][ T8569] __x64_sys_mprotect+0x48/0x60 [ 107.504893][ T8569] x64_sys_call+0x274e/0x2ff0 [ 107.509567][ T8569] do_syscall_64+0xd2/0x200 [ 107.514181][ T8569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.520076][ T8569] [ 107.522387][ T8569] read to 0xffff8881036d7200 of 8 bytes by task 8569 on cpu 0: [ 107.529916][ T8569] mas_state_walk+0x119/0x650 [ 107.534602][ T8569] mas_walk+0x60/0x150 [ 107.538665][ T8569] lock_vma_under_rcu+0x8d/0x160 [ 107.543635][ T8569] do_user_addr_fault+0x233/0x1090 [ 107.548761][ T8569] exc_page_fault+0x62/0xa0 [ 107.553251][ T8569] asm_exc_page_fault+0x26/0x30 [ 107.558092][ T8569] [ 107.560399][ T8569] value changed: 0xffff88810483b401 -> 0xffff8881036d7200 [ 107.567488][ T8569] [ 107.569796][ T8569] Reported by Kernel Concurrency Sanitizer on: [ 107.575931][ T8569] CPU: 0 UID: 0 PID: 8569 Comm: syz.4.2103 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(voluntary) [ 107.587981][ T8569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 107.598023][ T8569] ================================================================== [ 109.539799][ T29] kauditd_printk_skb: 35917 callbacks suppressed [ 109.539817][ T29] audit: type=1400 audit(1754698527.601:230757): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.546364][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 109.568376][ T29] audit: type=1400 audit(1754698527.611:230758): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.573885][ T3030] audit: audit_lost=37553 audit_rate_limit=0 audit_backlog_limit=64 [ 109.573900][ T3030] audit: backlog limit exceeded [ 109.595152][ T29] audit: type=1400 audit(1754698527.611:230759): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.603538][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 109.608004][ T29] audit: type=1400 audit(1754698527.611:230760): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.608029][ T29] audit: type=1400 audit(1754698527.611:230761): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.608067][ T29] audit: type=1400 audit(1754698527.611:230762): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.549969][ T29] kauditd_printk_skb: 54996 callbacks suppressed [ 114.549985][ T29] audit: type=1400 audit(1754698532.611:284815): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.556256][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.558754][ T29] audit: type=1400 audit(1754698532.621:284816): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.577740][ T3030] audit: audit_lost=37869 audit_rate_limit=0 audit_backlog_limit=64 [ 114.577758][ T3030] audit: backlog limit exceeded [ 114.578020][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.584263][ T29] audit: type=1400 audit(1754698532.621:284817): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.605455][ T3030] audit: audit_lost=37870 audit_rate_limit=0 audit_backlog_limit=64 [ 114.605473][ T3030] audit: backlog limit exceeded [ 114.613447][ T29] audit: type=1400 audit(1754698532.621:284818): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0