last executing test programs: 3.37263987s ago: executing program 1 (id=796): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'geneve1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000540)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x1}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x0, 0x2, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0x7, 0xfffffff7, 0x101, 0x14, 0xd}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x0) 3.372370881s ago: executing program 1 (id=797): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r4}, 0x18) writev(r2, &(0x7f0000000f40)=[{&(0x7f0000000a40)='\'', 0x1}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) rt_sigprocmask(0x2, &(0x7f00000002c0)={[0xffffffffffffffff]}, 0x0, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_emit_ethernet(0x7e, &(0x7f00000010c0)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb08004500007000000000000190780a010102ac1414aa03009078010000004500000000000000001100000000000000000000440c0001ac1414bb4e21000044340001e0000001000000000000000000000000ac14140004000000000000000000e5ffffff000000000000ac1e000100000000"], 0x0) syz_pidfd_open(r5, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) 2.670619781s ago: executing program 1 (id=813): r0 = socket(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="d8000000030101080000000000000000070000001c00028006000340000100000600034000030000060003400c56cd6760317dc79d000300003c001980080002000000000008000200220000000800020039000000080001000001000008000100240000000800020002080000080002000200000018000e801400018008000100ac14142308000200ffffffff08000740000000010400164048000e800600034000010000060003400002000006000340000400000c00028005000100010000000c000280050001008800000006000340000100000c0002800500010088000000"], 0xd8}, 0x1, 0x0, 0x0, 0x80}, 0x40810) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000700)={0x2, 0x3, 0x0, 0x3, 0x10, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, '\n'}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x80}, 0x1, 0x7}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x0, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b208850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xf, &(0x7f0000000000), 0x4) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c520bbb8d809f07feaa687e80e1da3e209bc92d6c61766e42ae047e93dcdc04bd760f01198ce502a3c30ec89788f3e663991e3f52b0cbbffc521368f3304144787d", @ANYRES16=r7, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x24044815}, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x47) syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), 0xffffffffffffffff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r8}, 0x38) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r10, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) 2.427424594s ago: executing program 1 (id=816): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r0 = socket$nl_audit(0x10, 0x3, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x18) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r1, {0x0, 0x1}, {0xffff, 0xffff}, {0xc}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x7, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x3f, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x272, 0xb, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffe, 0x0, 0x80007, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80003, 0x0, 0xffffffff, 0x1, 0x0, 0x9, 0x0, 0x0, 0x5, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0xffff, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x7, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe6]}, @TCA_TBF_PARMS={0xfffffffffffffff4, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xff, 0x2, 0x0, 0x0, 0x19, 0x40000000}, 0x0, 0x7f}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) syz_clone3(&(0x7f0000002680)={0x80000, 0x0, 0x0, 0x0, {0xf}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000440)={[{@noblock_validity}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@journal_dev}, {@usrjquota}]}, 0x3, 0x42f, &(0x7f00000011c0)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") mount$bind(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x23100b9, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = memfd_create(0x0, 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340), 0x400, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000380)={r0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000005304"], 0x14}, 0x1, 0x0, 0x0, 0x24000841}, 0x4008840) 1.820255403s ago: executing program 3 (id=822): getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xa, 0x10}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000300)={r0, 0x101}, &(0x7f0000000340)=0x8) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) setsockopt$MRT_ADD_MFC(0xffffffffffffffff, 0x0, 0xcc, &(0x7f0000000200)={@empty, @private, 0x0, "606b177019716ea6ff1f4d7ed79c31e2e0f1da00000000230000002000", 0x3e1f}, 0x3c) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x2e, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000007000000000000000800000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b70800007f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000006000000182b0000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000500)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000001080)=""/4096, 0x100, 0x0, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x0, 0x1, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000580)=[r1], &(0x7f00000005c0)=[{0x2, 0x3, 0x2}], 0x10, 0x5}, 0x94) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 1.673100506s ago: executing program 3 (id=824): openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x103600, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0xfffffffffffffcec) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000c80)=ANY=[@ANYBLOB="7a0a00ff40000000711088000000000095"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/11], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x20, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000800000000000070000000900010073797a30000000007c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d38001280140001800c000100636f756e7465720004000280200001800e000100636f6e"], 0xc4}}, 0x280108d5) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0xfffffffc, 0xb, 0x0, 0xfffffffc, 0x7f, "db8f2d2b3b7596160c6981acf8805944823a7f"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x83, "00000000000000000000ffff00"}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0xfffffffd, 0x0, 0x6, 0x1, "e315bc1cc24ff7b7cdb242e1ff0aa6905446b3"}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) connect$inet6(r5, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "0002002000", "07f217bd74511e465bbbd5de01000000f9044677d4d588363d63af84db44be59", "00f8ff00", "8ce63ecbc640735f"}, 0x38) sendto$inet6(r5, &(0x7f0000000280)='S', 0x1, 0x8000, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r6, &(0x7f0000000340)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7fff}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000002c0)="14", 0x25}], 0x1}}, {{&(0x7f0000000300)={0xa, 0x4e20, 0x1, @local, 0x8}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000800)="ff", 0x1}], 0x1}}], 0x2, 0x931766f6119eed40) 1.465714029s ago: executing program 3 (id=826): r0 = socket(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="d8000000030101080000000000000000070000001c00028006000340000100000600034000030000060003400c56cd6760317dc79d000300003c001980080002000000000008000200220000000800020039000000080001000001000008000100240000000800020002080000080002000200000018000e801400018008000100ac14142308000200ffffffff08000740000000010400164048000e800600034000010000060003400002000006000340000400000c00028005000100010000000c000280050001008800000006000340000100000c0002800500010088000000"], 0xd8}, 0x1, 0x0, 0x0, 0x80}, 0x40810) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000700)={0x2, 0x3, 0x0, 0x3, 0x10, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, '\n'}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x80}, 0x1, 0x7}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x0, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b208850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xf, &(0x7f0000000000), 0x4) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c520bbb8d809f07feaa687e80e1da3e209bc92d6c61766e42ae047e93dcdc04bd760f01198ce502a3c30ec89788f3e663991e3f52b0cbbffc521368f3304144787d", @ANYRES16=r7, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x24044815}, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x47) syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), 0xffffffffffffffff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r8}, 0x38) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r10, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) 1.415080429s ago: executing program 1 (id=828): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0xf2ff, &(0x7f0000000140)={&(0x7f0000000600)=@newtfilter={0xd4, 0x2c, 0xd27, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r3, {0x9, 0x9}, {}, {0xc, 0xe}}, [@filter_kind_options=@f_u32={{0x8}, {0xa8, 0x2, [@TCA_U32_POLICE={0x40, 0x6, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x20000000, 0x4, 0x3, 0x7fff, {0xa, 0x82c614eb2c1442bd, 0x1, 0x445, 0x5, 0xfffffff7}, {0x5, 0x1, 0x6, 0x8001, 0x1, 0x3}, 0x3, 0x9, 0x3}}]}, @TCA_U32_SEL={0x64, 0x5, {0x0, 0xf7, 0x5, 0x0, 0x0, 0x0, 0x200, 0xc, [{0x9, 0x2, 0xf2f, 0x24}, {0x72f, 0x1, 0x3, 0x6}, {0x10000000, 0x3, 0x6, 0x4}, {0x8, 0x400000c9, 0x10000, 0x3}, {0x5, 0x3, 0x5, 0x1b}]}}]}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) 1.34403195s ago: executing program 3 (id=830): ptrace(0x10, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ff0aa16106000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5400000012000100000000000000000021d6bed56b07111803000000014e2200000000000000000000000000000000000000000201000000", @ANYRES32=0x0, @ANYBLOB="010000000300000000000000000000000800030011"], 0x54}}, 0x20004010) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x122}}, 0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./bus\x00', 0x4010, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES16], 0x1, 0x11ee, &(0x7f0000002480)="$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") r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x2, 0x9, 0x6, 0x8, 0x6, 0x0, 0x70bd26, 0x25dfdbfd, [@sadb_key={0x4, 0x9, 0x88, 0x0, "010090722a570594f23823f03036b9f84c"}]}, 0x30}}, 0x8040) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000000)=0x10000000000000, 0xffffff6a) creat(&(0x7f0000000580)='./bus\x00', 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = memfd_create(&(0x7f0000000100)='\vem\xda\x99R@m\xfc\xfe\x9b#*\xff', 0x0) write(r8, &(0x7f00000004c0)="0600", 0x2) sendfile(r8, r8, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r8, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f000002eff0)={0x135, &(0x7f0000000000)=[{}]}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 1.306802001s ago: executing program 1 (id=831): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000500)={[{@jqfmt_vfsv1}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}, {@nodioread_nolock}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@norecovery}, {@resgid}, {@errors_remount}, {@orlov}, {@grpid}, {@data_ordered}]}, 0xfc, 0x572, &(0x7f0000003780)="$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") chdir(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f00000003c0)=@framed={{0x18, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000380)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xffffffffffffff39, 0x0, &(0x7f0000000a00)="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", 0x0, 0xa02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) r2 = memfd_create(&(0x7f0000001880)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r10, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x48050}, 0x40004) recvmmsg(r11, &(0x7f0000005140)=[{{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f00000052c0)=""/235, 0xeb}, {&(0x7f0000003080)=""/4096, 0x1000}], 0x3}, 0x3}], 0x1b00, 0x0, 0x0) 1.140266993s ago: executing program 0 (id=837): r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x1}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000880)='kfree_skb\x00', r1, 0x0, 0x2}, 0xfffffe37) r2 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, 0x0, &(0x7f0000000080)) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x200000, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x1400, 0x2010000, 0x0, 0x2, 0x8, 0x20005, 0xb, 0x0, 0xfffffffb, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xf3e\t\x9f\x918\xc0y\x01c\x1fnux\x00sV\ad\xb0l \xfd\xd7\x8e\x7f\x89\xb8\xc5;~\x04\x03~K\xfbP\x84=\xfa\x81\f\x1et\x10\x0e\xcf^9\xbe\\', 0x0) pwrite64(r4, &(0x7f00000008c0)='/', 0x1, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000240)=0x20000000, 0x4) sendfile(r4, r4, &(0x7f00000001c0), 0x7fa) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x480, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)='B', 0x1}], 0x1, 0x0, 0x0, 0x11000000}, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000005600)='sys_enter\x00', r7, 0x0, 0x2}, 0x18) ioprio_set$uid(0x3, 0x0, 0x6001) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000540)) ptrace$cont(0x20, r5, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="385e6379fc7478bae265289d2966770056fdd281f62c0dc1a48c88e5ea1949dffc9b1c3463d2616ec4455eeac9ab6661e477449884be"], 0x7c}}, 0x8850) sendmsg$NFT_BATCH(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @cmp={{0x8}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_CMP_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x7c}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x50) 1.107750384s ago: executing program 0 (id=838): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="89e7ee2c78dad9b4b473fec988ca", 0xe}], 0x12) 1.107420094s ago: executing program 2 (id=839): statfs(&(0x7f0000000200)='.\x00', &(0x7f0000000440)=""/137) 1.055072575s ago: executing program 2 (id=840): statfs(&(0x7f0000000200)='.\x00', &(0x7f0000000440)=""/137) (fail_nth: 1) 760.566399ms ago: executing program 2 (id=841): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%pK \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x3, 0x4, 0xff, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x40, 0x2) 699.02854ms ago: executing program 4 (id=842): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) socket$inet(0x2, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', r3, 0x29, 0x9, 0x5, 0x1, 0x0, @mcast1, @local, 0x8, 0x1, 0x400, 0x2}}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010000300"/20, @ANYRES32=r4], 0x3c}, 0x1, 0x2}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000040)=""/27, 0x1b, 0x0, &(0x7f0000000080)=""/97, 0x61}}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000001100)='./file1\x00', 0x0, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@usrjquota}, {@errors_remount}, {@dioread_lock}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}, {@mblk_io_submit}, {@minixdf}, {@barrier_val}, {@nombcache}, {}]}, 0x45, 0x7b6, &(0x7f0000001140)="$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") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$eJzs3W1rZFcdAPD/vcmk2d3UTFVkLdgWW9ktujNJY9so0lYQfVVQ6/s1JpMQMsmEzKRuQtEsfgBBRAU/gG8EP4Ag+xFEWND3oqKI7upL3St35kbzMJMMySSzTn4/OJlz7sP5n3PJ3LkPh3sDuLJeioh3ImIsIl6NiOlielqk2OukfLnHjz5YzFMSWfbe35JIimn7deXl8Yi4Uaw2GRFf/0rEt5LjcZs7u2sL9XptqyhXW+ub1ebO7p3V9YWV2kptY25u9o35N+dfn5/JCufqZzki3vrSn370/Z99+a1ffebbv7/7l9vfyZv1hY912h0Ri+cK0EOn7lJ7W+zLt9HWRQQbkrw/pbFhtwIAgH7kx/gfjohPto//p2OsfTQHAAAAjJLs7an4VxKRAQAAACMrjYipSNJKMRZgKtK0UumM4f1oXE/rjWbr08uN7Y2lfF5EOUrp8mq9NlOMFS5HKcnLs8UY2/3ya0fKcxHxXET8cPpau1xZbNSXhn3xAwAAAK6IGy8ePv//53TazgMAAAAjptyzAAAAAIwKp/wAAAAw+pz/AwAAwEj76rvv5inbf4/30vs722uN9+8s1ZprlfXtxcpiY2uzstJorLSf2bd+Wn31RmPzs7Gxfa/aqjVb1ebO7t31xvZG6+7qoVdgAwAAAJfouRcf/C6JiL3PX2unKJ4DCHDIH4fdAGCQxobdAGBoxofdAGBoSqcuYQ8Boy45Zf7xwTuda4Xx64tpDwAAMHi3Pn78/v9EMe/0awPA/zNjfQDg6nF3D66u0llHAN4cdEuAYflQ5+OZXvN7Pryjj/v/nWsMWXamhgEAAAMz1U5JWimO06ciTSuViGfbrwUoJcur9dpMcX7w2+nSM3l5tr1mcuqYYQAAAAAAAAAAAAAAAAAAAAAAAACgI8uSyAAAAICRFpH+OWk/zT/i1vQrU4evDhx569dP3/vxvYVWa2s2YiL5+3Q+aSIiWj8ppr+WeSUAAAAAPAU65+nF5+ywWwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn86IPF/XSZcf/6xYgod4s/HpPtz8koRcT1fyQxfmC9JCLGBhB/735E3OwWP4knWZaVi1Z0i3/tguOX25ume/w0Im4MID5cZQ/y/c873b5/abzU/uz+/Rsv0nn13v+l/93/jfXY/zx7pNzL8w9/Ue0Z/37E8+Pd9z/78ZNO/EMh8sLLffbxm9/Y3e0640CV3eIfjFVtrW9Wmzu7d1bXF1ZqK7WNubnZN+bfnH99fqa6vFqvFX+7hvnBJ3755KT+X+8Rv3y4/8e2/yt99T6Lfz+89+gjnUKpW/zbL3f//b3ZI35a/PZ9qsjn82/t5/c6+YNe+PlvXjip/0s9+j95Sv9v99X/+NyrX/veH7rOObY1AIDL0NzZXVuo12tbJ2Qm+1jmkjNvPx3NGGAmno5mDCuTfbfz/3i+es65+rFMdp7Vx2MAzZg49j0di7NWmETs5XX1+Q8JAACMmP8d9J90BwkAAAAAAAAAAAAAAAAAAAC4SGd8LNlkRPS98NGYe8PpKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAif4TAAD//4RX0Xo=") openat(0xffffffffffffff9c, 0x0, 0x88882, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, 0x104, 0x3}) quotactl$Q_GETQUOTA(0xffffffff80000701, 0x0, 0xee00, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r1, r3, 0x25, 0xc, @void}, 0x10) 565.024372ms ago: executing program 4 (id=843): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x2, 0x0, 0x9, 0x8, 0x24005, 0xb, 0x0, 0x8004, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000700)='mm_lru_insertion\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, 0x0, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000003c00070100000000000000000300"], 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r0}, 0x3, &(0x7f0000000080)=[0xee95, 0x5, 0x9], 0x0, 0x5, 0x1}) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42202) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r10, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f0000000900)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_SET(r8, &(0x7f0000000b40)={&(0x7f0000000880), 0xc, &(0x7f0000000a80)={&(0x7f0000000b80)=ANY=[@ANYBLOB="30010000", @ANYRES16=0x0, @ANYBLOB="10002dbd7000fbdbdf250a000000280001801400020064766d7270310000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="af08950100", @ANYRES32=r11, @ANYBLOB="f40002800800020008000000620004004a76c5050a18d8816cc54ee7dfbe9bb0fdfb5247f26f982169952eac94ce6c9a5f8ae4dcc4ef3682e287a4033d53dbfdb04b3a9ef129b2bb0a1f4835e760be7da3a0028d770fc3bf76cc867cb674434a40db35ab47914a68d79c4708f351000084000400cc80a5eaf2f5f1827b200e4d6bcef81a4e884fb88e31aaff666b9c93f37eb2af916a5dd1ebd0ade0c57c6704552f975220f1842a8bf0890ad13b9f3cbac2ad27bb922743ae33d43e7240b27c4c47ec639a7eac7f0a0e64c10436b88b76d536443351605320c1a5b71d32bcd25959e393418f63dde1bd3748411a1394fd1ad1cc"], 0x130}}, 0x2400c044) write$sndseq(r10, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick=0xbf, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r10, 0x4040534e, &(0x7f0000000180)={0xf7, @tick=0x186b, 0x0, {0x0, 0x1}}) pipe2(&(0x7f0000000840), 0x4000) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007300ff070c58000003000000df00000004000000043424480fd7ea20270fcdd69ac16b565ef376c345b0337dfaaf6af6357c8dedd6c004dd66609485b59ff626c1f9a99feb4f950be432ab0e9901b31516d5d4e8634a64a755e2f210cbf17d8cc3364867a13c1b83bfeacaba280411f64386c48cf3597062f84e0b59d9"], 0x18b) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x00r1, {0xff, 0x7}}, './file0\x00'}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)='%-5lx \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x18) getxattr(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000008850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) gettid() r5 = socket$inet(0x2, 0x4, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000180)={0x0, @empty, @local}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES8], 0x50) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="fc0000001900010000000000fcdbdf2500000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f56a9d7c00000000000000000400000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000018000000000000044000500fc020000000000000000000000000001000000022b0000000a000000e000000200000000000000000000000000000000040000000000000000000000000000000000000dabefb007bff47c91b66752503320c191816627360324b0ec7fe0bddd828b7f9752"], 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000440)='GPL\x00', 0x4}, 0x94) 427.969544ms ago: executing program 4 (id=846): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r4, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x7, 0x8, &(0x7f0000000740)=ANY=[@ANYRES16=r2, @ANYRES32=r2, @ANYRES64=r3], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x7f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) sendmsg$tipc(r0, &(0x7f0000000400)={&(0x7f00000008c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2400c09d}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket(0x10, 0x3, 0x9) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180373f6b4dc0000000000000000000018000000", @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0xb34, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffef0, 0x0, r9, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum64={0x3, 0x0, 0x0, 0x13, 0x0, 0x2}]}, {0x0, [0x30, 0x61, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x9}, 0x28) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000013c0)={{0x14, 0x453, 0x1, 0x0, 0x0, {0x5}}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x64841}, 0x40000) ioctl$INCFS_IOC_PERMIT_FILL(r6, 0x40046721, &(0x7f0000000040)={r6}) getsockopt(0xffffffffffffffff, 0x1, 0x13, 0x0, &(0x7f0000000080)) 413.730554ms ago: executing program 0 (id=847): r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000080)='8', 0x20000081}], 0x300) writev(r0, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {}], 0x2) 396.393814ms ago: executing program 2 (id=848): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x11040000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, r1, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x3}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000300)={0x41c902, 0x128, 0x5}, 0x18) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="5953fdfffffffddbdf256b0000000a0003006f0d5c17deb549612c14a3c6e6149f2150d5b73231fa6d6447503d2595f9627d566a9783f9977c8a6b34ddaa259c7a19f4ffbad44baaf59b1d3127506fefd851dca6f717ba45f128ea3e2b9f789be82bd4da8a544de3c676667c9a32a60289684a6c2881370e34543a3586550bdc3bded0527735ecc3d10274d8f9b59dbcbf176a4ba4", @ANYRES32=0x0, @ANYBLOB="0c009900020000007200000010001d800c00008008000d8004000380"], 0x38}}, 0x0) 366.558485ms ago: executing program 0 (id=849): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r3 = epoll_create(0x3ff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0) fcntl$lock(r4, 0x24, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x7, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @alu={0x4, 0x0, 0xb, 0x6, 0xb, 0xfffffffffffffff0, 0x4}], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x7a, &(0x7f0000000340)=""/122, 0x40f00, 0x20, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f00000001c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x7, 0x1, 0xa}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000400)=[r0], &(0x7f00000004c0)=[{0x3, 0x3, 0xb, 0x9}, {0x0, 0x1, 0xf, 0x3}, {0x5, 0x5, 0x4, 0x5}, {0x4, 0x3, 0x6, 0x1}, {0x1, 0x5, 0xb, 0x1}, {0x2, 0x4, 0x0, 0x8}, {0x2, 0x5, 0xe, 0x3}], 0x10, 0x6}, 0x94) r5 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000240)={0xa0000000}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000640)={0x31cc3a338543ef4b}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f00000007c0)=0xc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000008c0)=0x0) kcmp(r6, r7, 0x6, r5, r0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001100000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', r8, 0x0, 0x100a}, 0x18) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) r11 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r11, &(0x7f0000000280)={'system_u:object_r:cron_log_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x9}, 0x4c) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r12, 0x5423, &(0x7f0000000200)=0x1) 312.563285ms ago: executing program 4 (id=850): openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x40400, 0x0) (fail_nth: 6) 312.255505ms ago: executing program 2 (id=851): ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000240)={0x0, 0x6, 0x78ec1e30}) (async) socket(0x22, 0x4, 0x6) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000640)={r0, "e8e2d8bd81f3ba0ae23af6d86d00b2be"}) (async) unshare(0x6a040000) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) (async) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000080)={@val={0x3, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x1400, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x8, 0x0, 0x0, 0x0, 0x1400, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @loopback}}}}, 0x3e) 308.138055ms ago: executing program 3 (id=852): r0 = syz_open_dev$sg(&(0x7f0000000000), 0xfffffffffffffff8, 0x181c02) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e80)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0xa0, 0x2, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_USERDATA={0x37, 0x6, "5dd1ac195b5877ac7ae4a4a5a4ceefad10e098314185a2c9e11a464af5f905652e278dabad255fcaae4a570ba40ab2f3be1607"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELOBJ={0x7c, 0x14, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x164}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0xfffd, 0x0, 0x1, 0xa, 0x20002, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6c000000000101040000000000000000020000002c0001801400018008000100e000000108000200040014000c00028005000100000000000600034000040000240002801400018008000100e000000108000200e00000010c000280050001000000000008000740"], 0x6c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r8) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r10, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x48050}, 0x40004) recvmmsg(r11, &(0x7f0000005140)=[{{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f00000052c0)=""/235, 0xeb}, {&(0x7f0000003080)=""/4096, 0x1000}], 0x3}, 0x3}], 0x1b00, 0x0, 0x0) 32.97053ms ago: executing program 4 (id=853): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002502000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe5d6405000000000075040000000d00000701000000000000b70400001000e5207b0700fe0000000085000000b5000000b70000000a00000095000000000000006458c2c62fc206000000f909a63796c113a80c19aab9d60700ffffffff483be3f0d3253730e78000000062c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766aeb39439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c013700e69274f8e9c31975e551558055dc2dc29edc33b375fa325dcf3e91e20f63d7030dbe7ff7f51fe89c3d17cf45a1616ad237682057034dfdc81f5a53cd640212c88e8b687a2446049577c580207815c1e301caf2465ed4b2ad56b848d046c52bfc3737127120ab17d82a294d174f240a3cdc725cfe6e839a1f80f59486578e45b008d39ab618f660e3c53ed4409aa92ae4fecd913060ca74ed8a303e22de12087a217d8d7be0ae1117cc791313b1318497dd5ebeef0d7e1795a6ff20f699870ebb137cffa79465da52ab2b3430ba0ba59152496a1ea5dd1e4dee46f6d3688603b5f25a588a31da4e481884074e211dd09a8b8039d0834507656ed7d552a990c1354d7638b2c2215dd9f606b01a92fabc6eb6fa033a86f8920e2168a80d7c86da5ad1d27c8d2a180e56046a49b989128ea736894d3eef8dca16ed63520be4654ddb14bfe4268c487c5a75c044e21021c089608c50adbc4e3f4c6a4ca86c7d2df5bc7c76e413d05e8f57b1e22d4af34f9d4d2e6e4d4f57f47aebdd5f98f67834c656b2fe09df4a1b15116fceaa404a6df278c7c629f584ba8d37c1137c2263ae02ad371"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x53) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f00000002c0), &(0x7f0000000480)=0x1c) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x20180, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3fa1049600000000000000000080000000000000", @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000002ebb717957a2bd2ed7e9e19cf16469cb2f5473ed"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x0, 0x0, 0x0, 0x2}, 0x94) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) recvmmsg(r5, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x60010002, 0x0) 0s ago: executing program 0 (id=854): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) socket$inet(0x2, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', r3, 0x29, 0x9, 0x5, 0x1, 0x0, @mcast1, @local, 0x8, 0x1, 0x400, 0x2}}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010000300"/20, @ANYRES32=r4, @ANYBLOB], 0x3c}, 0x1, 0x2}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000040)=""/27, 0x1b, 0x0, &(0x7f0000000080)=""/97, 0x61}}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000001100)='./file1\x00', 0x0, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@usrjquota}, {@errors_remount}, {@dioread_lock}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}, {@mblk_io_submit}, {@minixdf}, {@barrier_val}, {@nombcache}, {}]}, 0x45, 0x7b6, &(0x7f0000001140)="$eJzs3c9rG1ceAPDvyPLPZNdeWNjNngwLu4EQeZ31JruwsF72sBQaCLSnHpoYWTGpZStYcoiNaRNKoZdCW3prLzn356X02h+HXtr/oySkrROa0kNxGf2wZVtyrMSWkubzgYne07zRe995ozcvmrEUwBNrPP0nE3EsIl5PIkbrzycR0V9NZSOma+Xura/l0yWJjY1nvkuqZe6ur+WjaZvUkXrmjxHx+SsRJzK76y2vrM7PFIuFpXp+orJweaK8snry0sLMXGGusHh6cmrq1Jl/nDn9UOENN2d++Hr16K03/v/XD6Z/evkPH772RRLTcbS+rjmOgzIe4/V90p/uwm3+d9CV9czHL+6jUNMRkD3MxtChtGP66r1yLEajb6/+Ge5mywCAw/JSRGy009d2DQDwWEtq5///9LodAEC3ND4HuLu+lm8svf1Eortu/zcihobqudr1zVo6W79mN1S9DjpyN9l2ZSSJiLEDqH88It755Pn30iUO6TokQCvXrkfEhbHx3eN/suuehU79rfXTc82Z8R0rjX/QPZ+m859/tpr/ZTbnP9Fi/jPY4r37IO7//s/cPIBq2krnf/9uurftXlP8dWN99dxvqnO+/uTipWIhHdt+GxHHo38wzU/uUcfxOz/fabeuef73/ZsvvJvWnz5ulcjczA5u32Z2pjLzMDE3u3094k/ZVvGn4/9gtf+TNvPfc/X0wH3qeOpfr77dbl0afxpvY9kd/+HauBHxl5b9n2yWSfa8P3GiejhMNA6KFj6ajpF29Y9nt/o/XdL6G/8X6Ia0/0f2jn8sab5fs7zvl968W+yrG6OftSvUfPy3jr/18T+QPFtNN469qzOVytJkxEDy9O7nT21t28g3yqfxH/9z6/d/Y/xrcfw/l77+hX3uiOytb99/8PgPVxr/bEf933Eihu7N97Wrf3/9P7Vtm/2Mf/tt4IPuNwAAAAAAAAAAAAAAAAAAAAAAAADoRCYijkaSyW2mM5lcrvYb3r+PkUyxVK6cuFhaXpyN6m9lj0V/pvFVl6NN34c6Wf8+/Eb+1I783yPidxHx1uBwNZ/Ll4qzvQ4eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOqOtPn9/9Q3gzsK9/WihQDAoRhyYgeAJ02Szfa6CQBAtw11VHr40NoBAHRPZ+d/AODXwPkfAJ489zn/7/wzAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOjUubNn02Xjx/W1fJqfvbKyPF+6cnK2UJ7PLSznc/nS0uXcXKk0Vyzk8qWFti90rfZQLJUuT8Xi8tWJSqFcmSivrJ5fKC0vVs5fWpiZK5wv9HctMgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYv/LK6vxMsVhYkuhJYv7LWj88Ku2R6CwR12r996i05+ASMbA1Sgz3ZnACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeAz8EgAA//99gB7t") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$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") openat(0xffffffffffffff9c, 0x0, 0x88882, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, 0x104, 0x3}) quotactl$Q_GETQUOTA(0xffffffff80000701, 0x0, 0xee00, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r1, r3, 0x25, 0xc, @void}, 0x10) kernel console output (not intermixed with test programs): d_fail_usercopy+0x1a/0x20 [ 58.691006][ T4548] _copy_to_user+0x20/0xa0 [ 58.691042][ T4548] simple_read_from_buffer+0xb5/0x130 [ 58.691080][ T4548] proc_fail_nth_read+0x100/0x140 [ 58.691120][ T4548] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 58.691196][ T4548] vfs_read+0x19d/0x6f0 [ 58.691234][ T4548] ? __rcu_read_unlock+0x4f/0x70 [ 58.691257][ T4548] ? __fget_files+0x184/0x1c0 [ 58.691282][ T4548] ksys_read+0xda/0x1a0 [ 58.691389][ T4548] __x64_sys_read+0x40/0x50 [ 58.691492][ T4548] x64_sys_call+0x2d77/0x2fb0 [ 58.691524][ T4548] do_syscall_64+0xd2/0x200 [ 58.691549][ T4548] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 58.691593][ T4548] ? clear_bhb_loop+0x40/0x90 [ 58.691619][ T4548] ? clear_bhb_loop+0x40/0x90 [ 58.691708][ T4548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 58.691771][ T4548] RIP: 0033:0x7ff6f14fd33c [ 58.691798][ T4548] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 58.691831][ T4548] RSP: 002b:00007ff6efb67030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 58.691853][ T4548] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fd33c [ 58.691871][ T4548] RDX: 000000000000000f RSI: 00007ff6efb670a0 RDI: 0000000000000003 [ 58.691887][ T4548] RBP: 00007ff6efb67090 R08: 0000000000000000 R09: 0000000000000000 [ 58.691904][ T4548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.691920][ T4548] R13: 0000000000000000 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 58.691969][ T4548] [ 59.085220][ T4555] syz.3.419(4555): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 60.344631][ T4592] netlink: 8 bytes leftover after parsing attributes in process `syz.4.433'. [ 60.355015][ T4592] netlink: 8 bytes leftover after parsing attributes in process `syz.4.433'. [ 60.709989][ T4612] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(9) [ 60.716649][ T4612] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 60.724266][ T4612] vhci_hcd vhci_hcd.0: Device attached [ 60.749610][ T4612] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(11) [ 60.756273][ T4612] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 60.763864][ T4612] vhci_hcd vhci_hcd.0: Device attached [ 60.851532][ T4620] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 60.919189][ T4621] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 60.953327][ T4620] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(18) [ 60.960028][ T4620] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 60.967815][ T4620] vhci_hcd vhci_hcd.0: Device attached [ 60.986636][ T4623] FAULT_INJECTION: forcing a failure. [ 60.986636][ T4623] name failslab, interval 1, probability 0, space 0, times 0 [ 60.999334][ T4623] CPU: 1 UID: 0 PID: 4623 Comm: syz.3.443 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 60.999433][ T4623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 60.999450][ T4623] Call Trace: [ 60.999458][ T4623] [ 60.999467][ T4623] __dump_stack+0x1d/0x30 [ 60.999493][ T4623] dump_stack_lvl+0xe8/0x140 [ 60.999526][ T4623] dump_stack+0x15/0x1b [ 60.999585][ T4623] should_fail_ex+0x265/0x280 [ 60.999632][ T4623] should_failslab+0x8c/0xb0 [ 60.999661][ T4623] kmem_cache_alloc_noprof+0x50/0x310 [ 60.999690][ T4623] ? audit_log_start+0x365/0x6c0 [ 60.999743][ T4623] audit_log_start+0x365/0x6c0 [ 60.999777][ T4623] audit_seccomp+0x48/0x100 [ 60.999851][ T4623] ? __seccomp_filter+0x68c/0x10d0 [ 60.999939][ T4623] __seccomp_filter+0x69d/0x10d0 [ 61.000022][ T4623] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 61.000064][ T4623] ? vfs_write+0x75e/0x8e0 [ 61.000157][ T4623] ? __rcu_read_unlock+0x4f/0x70 [ 61.000184][ T4623] ? __fget_files+0x184/0x1c0 [ 61.000263][ T4623] __secure_computing+0x82/0x150 [ 61.000285][ T4623] syscall_trace_enter+0xcf/0x1e0 [ 61.000309][ T4623] do_syscall_64+0xac/0x200 [ 61.000326][ T4623] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 61.000411][ T4623] ? clear_bhb_loop+0x40/0x90 [ 61.000437][ T4623] ? clear_bhb_loop+0x40/0x90 [ 61.000512][ T4623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.000532][ T4623] RIP: 0033:0x7f566dfbe929 [ 61.000548][ T4623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.000571][ T4623] RSP: 002b:00007f566c627038 EFLAGS: 00000246 ORIG_RAX: 0000000000000112 [ 61.000594][ T4623] RAX: ffffffffffffffda RBX: 00007f566e1e5fa0 RCX: 00007f566dfbe929 [ 61.000609][ T4623] RDX: 00002000000003c0 RSI: 0000200000000380 RDI: 00000000000000e0 [ 61.000679][ T4623] RBP: 00007f566c627090 R08: 0000000000000000 R09: 0000000000000000 [ 61.000693][ T4623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.000708][ T4623] R13: 0000000000000000 R14: 00007f566e1e5fa0 R15: 00007ffe9d398788 [ 61.000729][ T4623] [ 61.226417][ T3354] usb 5-1: new low-speed USB device number 2 using vhci_hcd [ 61.245576][ T4612] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(13) [ 61.252253][ T4612] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 61.260033][ T4612] vhci_hcd vhci_hcd.0: Device attached [ 61.265851][ T4621] vhci_hcd vhci_hcd.0: pdev(2) rhport(5) sockfd(20) [ 61.272510][ T4621] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 61.280248][ T4621] vhci_hcd vhci_hcd.0: Device attached [ 61.295916][ T4612] vhci_hcd vhci_hcd.0: pdev(2) rhport(6) sockfd(25) [ 61.302672][ T4612] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 61.310237][ T4612] vhci_hcd vhci_hcd.0: Device attached [ 61.333739][ T4624] vhci_hcd: connection closed [ 61.334192][ T4634] vhci_hcd: connection closed [ 61.335313][ T4613] vhci_hcd: connection reset by peer [ 61.356374][ T1001] vhci_hcd: stop threads [ 61.360616][ T4640] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(9) [ 61.360676][ T4640] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 61.360708][ T4640] vhci_hcd vhci_hcd.0: Device attached [ 61.367237][ T1001] vhci_hcd: release socket [ 61.384732][ T1001] vhci_hcd: disconnect device [ 61.391039][ T4630] vhci_hcd: connection closed [ 61.392753][ T4625] vhci_hcd: connection closed [ 61.395626][ T4616] vhci_hcd: connection closed [ 61.410829][ T4638] netlink: 'syz.3.445': attribute type 1 has an invalid length. [ 61.435688][ T4640] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(11) [ 61.442418][ T4640] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 61.445504][ T1001] vhci_hcd: stop threads [ 61.449985][ T4640] vhci_hcd vhci_hcd.0: Device attached [ 61.454167][ T1001] vhci_hcd: release socket [ 61.464147][ T1001] vhci_hcd: disconnect device [ 61.479798][ T4645] vhci_hcd vhci_hcd.0: pdev(0) rhport(2) sockfd(14) [ 61.486446][ T4645] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 61.494282][ T4645] vhci_hcd vhci_hcd.0: Device attached [ 61.503111][ T4648] veth7: entered promiscuous mode [ 61.524722][ T1001] vhci_hcd: stop threads [ 61.527724][ T4640] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 61.529046][ T1001] vhci_hcd: release socket [ 61.529064][ T1001] vhci_hcd: disconnect device [ 61.549944][ T4638] netlink: 28 bytes leftover after parsing attributes in process `syz.3.445'. [ 61.560017][ T4640] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(16) [ 61.561188][ T1001] vhci_hcd: stop threads [ 61.566646][ T4640] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 61.571051][ T1001] vhci_hcd: release socket [ 61.578795][ T4640] vhci_hcd vhci_hcd.0: Device attached [ 61.583102][ T1001] vhci_hcd: disconnect device [ 61.589333][ T4650] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(9) [ 61.599834][ T4650] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 61.607498][ T4650] vhci_hcd vhci_hcd.0: Device attached [ 61.613436][ T9] usb 1-1: new low-speed USB device number 2 using vhci_hcd [ 61.633838][ T4645] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 61.651717][ T4659] vhci_hcd vhci_hcd.0: pdev(4) rhport(2) sockfd(15) [ 61.658405][ T4659] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 61.666070][ T4655] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(12) [ 61.672701][ T4655] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 61.680207][ T4659] vhci_hcd vhci_hcd.0: Device attached [ 61.680223][ T4655] vhci_hcd vhci_hcd.0: Device attached [ 61.696856][ T1001] vhci_hcd: stop threads [ 61.701202][ T1001] vhci_hcd: release socket [ 61.705725][ T1001] vhci_hcd: disconnect device [ 61.712636][ T4650] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 61.723977][ T4662] vhci_hcd vhci_hcd.0: pdev(0) rhport(5) sockfd(23) [ 61.730685][ T4662] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 61.738363][ T4662] vhci_hcd vhci_hcd.0: Device attached [ 61.747883][ T1001] vhci_hcd: stop threads [ 61.752380][ T1001] vhci_hcd: release socket [ 61.756817][ T1001] vhci_hcd: disconnect device [ 61.763746][ T4640] vhci_hcd vhci_hcd.0: pdev(0) rhport(6) sockfd(22) [ 61.770398][ T4640] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 61.777893][ T4640] vhci_hcd vhci_hcd.0: Device attached [ 61.820625][ T4650] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(14) [ 61.827271][ T4650] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 61.834989][ T4650] vhci_hcd vhci_hcd.0: Device attached [ 61.849729][ T10] usb 9-1: new low-speed USB device number 2 using vhci_hcd [ 61.863814][ T4640] FAULT_INJECTION: forcing a failure. [ 61.863814][ T4640] name failslab, interval 1, probability 0, space 0, times 0 [ 61.876842][ T4640] CPU: 1 UID: 0 PID: 4640 Comm: syz.0.446 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 61.876869][ T4640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 61.876882][ T4640] Call Trace: [ 61.876888][ T4640] [ 61.876895][ T4640] __dump_stack+0x1d/0x30 [ 61.876916][ T4640] dump_stack_lvl+0xe8/0x140 [ 61.876963][ T4640] dump_stack+0x15/0x1b [ 61.877008][ T4640] should_fail_ex+0x265/0x280 [ 61.877044][ T4640] should_failslab+0x8c/0xb0 [ 61.877072][ T4640] kmem_cache_alloc_noprof+0x50/0x310 [ 61.877155][ T4640] ? getname_flags+0x80/0x3b0 [ 61.877175][ T4640] getname_flags+0x80/0x3b0 [ 61.877218][ T4640] do_sys_openat2+0x60/0x110 [ 61.877248][ T4640] __x64_sys_openat+0xf2/0x120 [ 61.877340][ T4640] x64_sys_call+0x1af/0x2fb0 [ 61.877363][ T4640] do_syscall_64+0xd2/0x200 [ 61.877381][ T4640] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 61.877406][ T4640] ? clear_bhb_loop+0x40/0x90 [ 61.877459][ T4640] ? clear_bhb_loop+0x40/0x90 [ 61.877485][ T4640] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.877511][ T4640] RIP: 0033:0x7fe42de0d290 [ 61.877529][ T4640] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 61.877630][ T4640] RSP: 002b:00007fe42c474ef0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 61.877679][ T4640] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fe42de0d290 [ 61.877693][ T4640] RDX: 0000000000000002 RSI: 00007fe42de90814 RDI: 00000000ffffff9c [ 61.877706][ T4640] RBP: 00007fe42de90814 R08: 0000000000000000 R09: 0000000000000000 [ 61.877719][ T4640] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 61.877730][ T4640] R13: 0000000000000036 R14: 0000200000000000 R15: 00007ffc3b023c88 [ 61.877746][ T4640] [ 61.885577][ T4655] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 62.020044][ T4643] vhci_hcd: connection closed [ 62.027926][ T4641] vhci_hcd: connection reset by peer [ 62.049587][ T4646] vhci_hcd: connection closed [ 62.052304][ T4653] vhci_hcd: connection closed [ 62.060314][ T4663] vhci_hcd: connection closed [ 62.079788][ T4665] vhci_hcd: connection closed [ 62.096559][ T60] vhci_hcd: stop threads [ 62.105615][ T60] vhci_hcd: release socket [ 62.109767][ T4650] vhci_hcd vhci_hcd.0: pdev(4) rhport(5) sockfd(19) [ 62.110068][ T60] vhci_hcd: disconnect device [ 62.116628][ T4650] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 62.129006][ T4650] vhci_hcd vhci_hcd.0: Device attached [ 62.149639][ T60] vhci_hcd: stop threads [ 62.154045][ T60] vhci_hcd: release socket [ 62.158486][ T60] vhci_hcd: disconnect device [ 62.163286][ T4659] vhci_hcd vhci_hcd.0: pdev(4) rhport(6) sockfd(26) [ 62.170094][ T4659] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 62.177604][ T4659] vhci_hcd vhci_hcd.0: Device attached [ 62.203539][ T60] vhci_hcd: stop threads [ 62.207837][ T60] vhci_hcd: release socket [ 62.212325][ T60] vhci_hcd: disconnect device [ 62.233776][ T60] vhci_hcd: stop threads [ 62.238217][ T60] vhci_hcd: release socket [ 62.242854][ T60] vhci_hcd: disconnect device [ 62.250305][ T60] vhci_hcd: stop threads [ 62.254605][ T60] vhci_hcd: release socket [ 62.259140][ T60] vhci_hcd: disconnect device [ 62.267800][ T60] vhci_hcd: stop threads [ 62.272155][ T60] vhci_hcd: release socket [ 62.276680][ T60] vhci_hcd: disconnect device [ 62.287661][ T4651] vhci_hcd: connection reset by peer [ 62.287682][ T4680] vhci_hcd: connection closed [ 62.293120][ T4678] vhci_hcd: connection closed [ 62.293351][ T4656] vhci_hcd: connection closed [ 62.298098][ T4660] vhci_hcd: connection closed [ 62.302926][ T4671] vhci_hcd: connection closed [ 62.313235][ T60] vhci_hcd: stop threads [ 62.322279][ T60] vhci_hcd: release socket [ 62.326764][ T60] vhci_hcd: disconnect device [ 62.334204][ T60] vhci_hcd: stop threads [ 62.338498][ T60] vhci_hcd: release socket [ 62.343085][ T60] vhci_hcd: disconnect device [ 62.358003][ T60] vhci_hcd: stop threads [ 62.362458][ T60] vhci_hcd: release socket [ 62.366925][ T60] vhci_hcd: disconnect device [ 62.382361][ T60] vhci_hcd: stop threads [ 62.386665][ T60] vhci_hcd: release socket [ 62.391144][ T60] vhci_hcd: disconnect device [ 62.410914][ T60] vhci_hcd: stop threads [ 62.415278][ T60] vhci_hcd: release socket [ 62.419776][ T60] vhci_hcd: disconnect device [ 62.433846][ T60] vhci_hcd: stop threads [ 62.438160][ T60] vhci_hcd: release socket [ 62.442626][ T60] vhci_hcd: disconnect device [ 62.775634][ T4709] FAULT_INJECTION: forcing a failure. [ 62.775634][ T4709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.788886][ T4709] CPU: 0 UID: 0 PID: 4709 Comm: syz.0.461 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 62.788981][ T4709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 62.788997][ T4709] Call Trace: [ 62.789006][ T4709] [ 62.789022][ T4709] __dump_stack+0x1d/0x30 [ 62.789042][ T4709] dump_stack_lvl+0xe8/0x140 [ 62.789135][ T4709] dump_stack+0x15/0x1b [ 62.789150][ T4709] should_fail_ex+0x265/0x280 [ 62.789328][ T4709] should_fail+0xb/0x20 [ 62.789361][ T4709] should_fail_usercopy+0x1a/0x20 [ 62.789401][ T4709] _copy_to_user+0x20/0xa0 [ 62.789456][ T4709] simple_read_from_buffer+0xb5/0x130 [ 62.789494][ T4709] proc_fail_nth_read+0x100/0x140 [ 62.789543][ T4709] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 62.789664][ T4709] vfs_read+0x19d/0x6f0 [ 62.789700][ T4709] ? __rcu_read_unlock+0x4f/0x70 [ 62.789803][ T4709] ? __fget_files+0x184/0x1c0 [ 62.789828][ T4709] ksys_read+0xda/0x1a0 [ 62.789924][ T4709] __x64_sys_read+0x40/0x50 [ 62.789962][ T4709] x64_sys_call+0x2d77/0x2fb0 [ 62.790032][ T4709] do_syscall_64+0xd2/0x200 [ 62.790163][ T4709] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 62.790196][ T4709] ? clear_bhb_loop+0x40/0x90 [ 62.790218][ T4709] ? clear_bhb_loop+0x40/0x90 [ 62.790238][ T4709] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.790298][ T4709] RIP: 0033:0x7fe42de0d33c [ 62.790350][ T4709] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 62.790366][ T4709] RSP: 002b:00007fe42c477030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 62.790384][ T4709] RAX: ffffffffffffffda RBX: 00007fe42e035fa0 RCX: 00007fe42de0d33c [ 62.790399][ T4709] RDX: 000000000000000f RSI: 00007fe42c4770a0 RDI: 0000000000000004 [ 62.790414][ T4709] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 62.790429][ T4709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.790444][ T4709] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 62.790466][ T4709] [ 63.210045][ T4721] FAULT_INJECTION: forcing a failure. [ 63.210045][ T4721] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.223442][ T4721] CPU: 0 UID: 0 PID: 4721 Comm: Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 63.223469][ T4721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 63.223482][ T4721] Call Trace: [ 63.223488][ T4721] [ 63.223497][ T4721] __dump_stack+0x1d/0x30 [ 63.223522][ T4721] dump_stack_lvl+0xe8/0x140 [ 63.223594][ T4721] dump_stack+0x15/0x1b [ 63.223615][ T4721] should_fail_ex+0x265/0x280 [ 63.223644][ T4721] should_fail+0xb/0x20 [ 63.223743][ T4721] should_fail_usercopy+0x1a/0x20 [ 63.223800][ T4721] _copy_from_user+0x1c/0xb0 [ 63.223821][ T4721] tls_setsockopt+0x3ec/0xce0 [ 63.223846][ T4721] sock_common_setsockopt+0x69/0x80 [ 63.223874][ T4721] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 63.223941][ T4721] __sys_setsockopt+0x184/0x200 [ 63.223988][ T4721] __x64_sys_setsockopt+0x64/0x80 [ 63.224028][ T4721] x64_sys_call+0x2bd5/0x2fb0 [ 63.224055][ T4721] do_syscall_64+0xd2/0x200 [ 63.224175][ T4721] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 63.224201][ T4721] ? clear_bhb_loop+0x40/0x90 [ 63.224224][ T4721] ? clear_bhb_loop+0x40/0x90 [ 63.224252][ T4721] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.224276][ T4721] RIP: 0033:0x7ff6f14fe929 [ 63.224290][ T4721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.224379][ T4721] RSP: 002b:00007ff6efb67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 63.224401][ T4721] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fe929 [ 63.224412][ T4721] RDX: 0000000000000002 RSI: 000000000000011a RDI: 0000000000000003 [ 63.224424][ T4721] RBP: 00007ff6efb67090 R08: 0000000000000038 R09: 0000000000000000 [ 63.224435][ T4721] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 63.224446][ T4721] R13: 0000000000000000 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 63.224465][ T4721] [ 63.469781][ T29] kauditd_printk_skb: 14814 callbacks suppressed [ 63.469801][ T29] audit: type=1400 audit(1752457792.290:93664): avc: denied { read write } for pid=3306 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.546553][ T4730] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.549840][ T29] audit: type=1400 audit(1752457792.300:93665): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.553244][ T4730] audit: audit_lost=13603 audit_rate_limit=0 audit_backlog_limit=64 [ 63.577622][ T29] audit: type=1400 audit(1752457792.300:93666): avc: denied { prog_load } for pid=4722 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.585772][ T4730] audit: backlog limit exceeded [ 63.591334][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.604282][ T29] audit: type=1400 audit(1752457792.300:93667): avc: denied { read } for pid=4722 comm="" dev="nsfs" ino=4026532372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 63.609111][ T3035] audit: audit_lost=13604 audit_rate_limit=0 audit_backlog_limit=64 [ 63.615663][ T29] audit: type=1400 audit(1752457792.300:93668): avc: denied { map_create } for pid=4722 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 64.470281][ T4753] FAULT_INJECTION: forcing a failure. [ 64.470281][ T4753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.483438][ T4753] CPU: 1 UID: 0 PID: 4753 Comm: syz.2.479 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 64.483535][ T4753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 64.483551][ T4753] Call Trace: [ 64.483559][ T4753] [ 64.483567][ T4753] __dump_stack+0x1d/0x30 [ 64.483591][ T4753] dump_stack_lvl+0xe8/0x140 [ 64.483793][ T4753] dump_stack+0x15/0x1b [ 64.483816][ T4753] should_fail_ex+0x265/0x280 [ 64.483860][ T4753] should_fail+0xb/0x20 [ 64.483897][ T4753] should_fail_usercopy+0x1a/0x20 [ 64.483937][ T4753] _copy_from_user+0x1c/0xb0 [ 64.483958][ T4753] kstrtouint_from_user+0x69/0xf0 [ 64.483989][ T4753] ? 0xffffffff81000000 [ 64.484004][ T4753] ? selinux_file_permission+0x1e4/0x320 [ 64.484156][ T4753] proc_fail_nth_write+0x50/0x160 [ 64.484203][ T4753] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 64.484308][ T4753] vfs_write+0x269/0x8e0 [ 64.484348][ T4753] ? vfs_read+0x47f/0x6f0 [ 64.484380][ T4753] ? __rcu_read_unlock+0x4f/0x70 [ 64.484486][ T4753] ? __fget_files+0x184/0x1c0 [ 64.484508][ T4753] ksys_write+0xda/0x1a0 [ 64.484623][ T4753] __x64_sys_write+0x40/0x50 [ 64.484666][ T4753] x64_sys_call+0x2cdd/0x2fb0 [ 64.484695][ T4753] do_syscall_64+0xd2/0x200 [ 64.484719][ T4753] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 64.484803][ T4753] ? clear_bhb_loop+0x40/0x90 [ 64.484833][ T4753] ? clear_bhb_loop+0x40/0x90 [ 64.484932][ T4753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.485038][ T4753] RIP: 0033:0x7f478b1bd3df [ 64.485065][ T4753] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 64.485089][ T4753] RSP: 002b:00007f4789827030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 64.485108][ T4753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f478b1bd3df [ 64.485121][ T4753] RDX: 0000000000000001 RSI: 00007f47898270a0 RDI: 0000000000000003 [ 64.485133][ T4753] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000014 [ 64.485145][ T4753] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 64.485226][ T4753] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 64.485250][ T4753] [ 65.705553][ T4777] netlink: 60 bytes leftover after parsing attributes in process `syz.4.489'. [ 65.726401][ T4779] FAULT_INJECTION: forcing a failure. [ 65.726401][ T4779] name failslab, interval 1, probability 0, space 0, times 0 [ 65.739207][ T4779] CPU: 0 UID: 0 PID: 4779 Comm: syz.3.488 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 65.739263][ T4779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 65.739275][ T4779] Call Trace: [ 65.739282][ T4779] [ 65.739291][ T4779] __dump_stack+0x1d/0x30 [ 65.739397][ T4779] dump_stack_lvl+0xe8/0x140 [ 65.739423][ T4779] dump_stack+0x15/0x1b [ 65.739444][ T4779] should_fail_ex+0x265/0x280 [ 65.739538][ T4779] should_failslab+0x8c/0xb0 [ 65.739566][ T4779] kmem_cache_alloc_noprof+0x50/0x310 [ 65.739598][ T4779] ? audit_log_start+0x365/0x6c0 [ 65.739682][ T4779] audit_log_start+0x365/0x6c0 [ 65.739714][ T4779] audit_seccomp+0x48/0x100 [ 65.739809][ T4779] ? __seccomp_filter+0x68c/0x10d0 [ 65.739830][ T4779] __seccomp_filter+0x69d/0x10d0 [ 65.739893][ T4779] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 65.739937][ T4779] ? vfs_write+0x75e/0x8e0 [ 65.740011][ T4779] __secure_computing+0x82/0x150 [ 65.740047][ T4779] syscall_trace_enter+0xcf/0x1e0 [ 65.740078][ T4779] do_syscall_64+0xac/0x200 [ 65.740102][ T4779] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 65.740134][ T4779] ? clear_bhb_loop+0x40/0x90 [ 65.740154][ T4779] ? clear_bhb_loop+0x40/0x90 [ 65.740235][ T4779] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 65.740262][ T4779] RIP: 0033:0x7f566dfbe929 [ 65.740281][ T4779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.740304][ T4779] RSP: 002b:00007f566c627038 EFLAGS: 00000246 ORIG_RAX: 0000000000000112 [ 65.740413][ T4779] RAX: ffffffffffffffda RBX: 00007f566e1e5fa0 RCX: 00007f566dfbe929 [ 65.740429][ T4779] RDX: 0000200000000300 RSI: 0000200000000200 RDI: 0000000000000000 [ 65.740445][ T4779] RBP: 00007f566c627090 R08: 0000000000000000 R09: 0000000000000000 [ 65.740460][ T4779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.740475][ T4779] R13: 0000000000000000 R14: 00007f566e1e5fa0 R15: 00007ffe9d398788 [ 65.740497][ T4779] [ 66.042491][ T4792] ip6gre1: entered allmulticast mode [ 66.289833][ T3354] usb 5-1: enqueue for inactive port 0 [ 66.295620][ T3354] usb 5-1: enqueue for inactive port 0 [ 66.369583][ T3354] vhci_hcd: vhci_device speed not set [ 66.689584][ T9] usb 1-1: enqueue for inactive port 0 [ 66.706896][ T9] usb 1-1: enqueue for inactive port 0 [ 66.790643][ T9] vhci_hcd: vhci_device speed not set [ 66.929593][ T10] usb 9-1: enqueue for inactive port 0 [ 66.945795][ T10] usb 9-1: enqueue for inactive port 0 [ 67.031706][ T10] vhci_hcd: vhci_device speed not set [ 67.290080][ T4827] FAULT_INJECTION: forcing a failure. [ 67.290080][ T4827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 67.290116][ T4827] CPU: 0 UID: 0 PID: 4827 Comm: syz.4.504 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 67.290230][ T4827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 67.290335][ T4827] Call Trace: [ 67.290343][ T4827] [ 67.290353][ T4827] __dump_stack+0x1d/0x30 [ 67.290438][ T4827] dump_stack_lvl+0xe8/0x140 [ 67.290461][ T4827] dump_stack+0x15/0x1b [ 67.290482][ T4827] should_fail_ex+0x265/0x280 [ 67.290516][ T4827] should_fail+0xb/0x20 [ 67.290551][ T4827] should_fail_usercopy+0x1a/0x20 [ 67.290590][ T4827] _copy_from_user+0x1c/0xb0 [ 67.290614][ T4827] __sys_bpf+0x178/0x790 [ 67.290680][ T4827] __x64_sys_bpf+0x41/0x50 [ 67.290711][ T4827] x64_sys_call+0x2478/0x2fb0 [ 67.290732][ T4827] do_syscall_64+0xd2/0x200 [ 67.290748][ T4827] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 67.290798][ T4827] ? clear_bhb_loop+0x40/0x90 [ 67.290825][ T4827] ? clear_bhb_loop+0x40/0x90 [ 67.290860][ T4827] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.290888][ T4827] RIP: 0033:0x7ff6f14fe929 [ 67.290907][ T4827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.290961][ T4827] RSP: 002b:00007ff6efb67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.290979][ T4827] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fe929 [ 67.290991][ T4827] RDX: 0000000000000028 RSI: 0000200000000140 RDI: 0000000000000012 [ 67.291005][ T4827] RBP: 00007ff6efb67090 R08: 0000000000000000 R09: 0000000000000000 [ 67.291020][ T4827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.291035][ T4827] R13: 0000000000000001 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 67.291104][ T4827] [ 67.623897][ T4843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4843 comm=syz.0.511 [ 68.479579][ T29] kauditd_printk_skb: 23397 callbacks suppressed [ 68.479593][ T29] audit: type=1400 audit(1752457797.300:110952): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.519187][ T29] audit: type=1400 audit(1752457797.300:110953): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.527831][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.540662][ T29] audit: type=1400 audit(1752457797.310:110954): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.547181][ T3035] audit: audit_lost=15643 audit_rate_limit=0 audit_backlog_limit=64 [ 68.547198][ T3035] audit: backlog limit exceeded [ 68.568860][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.576943][ T29] audit: type=1400 audit(1752457797.310:110955): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.576975][ T29] audit: type=1400 audit(1752457797.310:110956): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.582190][ T3035] audit: audit_lost=15644 audit_rate_limit=0 audit_backlog_limit=64 [ 68.679763][ T4871] FAULT_INJECTION: forcing a failure. [ 68.679763][ T4871] name failslab, interval 1, probability 0, space 0, times 0 [ 68.692651][ T4871] CPU: 1 UID: 0 PID: 4871 Comm: syz.2.519 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 68.692686][ T4871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 68.692757][ T4871] Call Trace: [ 68.692765][ T4871] [ 68.692774][ T4871] __dump_stack+0x1d/0x30 [ 68.692851][ T4871] dump_stack_lvl+0xe8/0x140 [ 68.692910][ T4871] dump_stack+0x15/0x1b [ 68.692928][ T4871] should_fail_ex+0x265/0x280 [ 68.693009][ T4871] should_failslab+0x8c/0xb0 [ 68.693037][ T4871] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 68.693068][ T4871] ? sidtab_sid2str_get+0xa0/0x130 [ 68.693174][ T4871] kmemdup_noprof+0x2b/0x70 [ 68.693196][ T4871] sidtab_sid2str_get+0xa0/0x130 [ 68.693216][ T4871] security_sid_to_context_core+0x1eb/0x2e0 [ 68.693271][ T4871] security_sid_to_context+0x27/0x40 [ 68.693290][ T4871] selinux_lsmprop_to_secctx+0x67/0xf0 [ 68.693321][ T4871] security_lsmprop_to_secctx+0x43/0x80 [ 68.693352][ T4871] audit_log_task_context+0x77/0x190 [ 68.693392][ T4871] audit_log_task+0xf4/0x250 [ 68.693427][ T4871] audit_seccomp+0x61/0x100 [ 68.693503][ T4871] ? __seccomp_filter+0x68c/0x10d0 [ 68.693531][ T4871] __seccomp_filter+0x69d/0x10d0 [ 68.693556][ T4871] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 68.693593][ T4871] ? vfs_write+0x75e/0x8e0 [ 68.693635][ T4871] ? __rcu_read_unlock+0x4f/0x70 [ 68.693660][ T4871] ? __fget_files+0x184/0x1c0 [ 68.693754][ T4871] __secure_computing+0x82/0x150 [ 68.693779][ T4871] syscall_trace_enter+0xcf/0x1e0 [ 68.693821][ T4871] do_syscall_64+0xac/0x200 [ 68.693843][ T4871] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 68.693875][ T4871] ? clear_bhb_loop+0x40/0x90 [ 68.693902][ T4871] ? clear_bhb_loop+0x40/0x90 [ 68.693924][ T4871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.694006][ T4871] RIP: 0033:0x7f478b1be929 [ 68.694020][ T4871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.694037][ T4871] RSP: 002b:00007f4789827038 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 68.694054][ T4871] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1be929 [ 68.694067][ T4871] RDX: 0000000000000001 RSI: 0000000000003000 RDI: 0000000000000000 [ 68.694082][ T4871] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 68.694142][ T4871] R10: 0000200000ffd000 R11: 0000000000000246 R12: 0000000000000001 [ 68.694157][ T4871] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 68.694178][ T4871] [ 69.024284][ T4875] blkio.reset_stats is deprecated [ 69.096372][ T4879] netlink: 'syz.2.520': attribute type 46 has an invalid length. [ 69.179892][ T1038] usb usb6-port1: attempt power cycle [ 69.203005][ T4888] FAULT_INJECTION: forcing a failure. [ 69.203005][ T4888] name failslab, interval 1, probability 0, space 0, times 0 [ 69.216011][ T4888] CPU: 0 UID: 0 PID: 4888 Comm: syz.0.525 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 69.216046][ T4888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 69.216062][ T4888] Call Trace: [ 69.216070][ T4888] [ 69.216077][ T4888] __dump_stack+0x1d/0x30 [ 69.216101][ T4888] dump_stack_lvl+0xe8/0x140 [ 69.216148][ T4888] dump_stack+0x15/0x1b [ 69.216168][ T4888] should_fail_ex+0x265/0x280 [ 69.216205][ T4888] should_failslab+0x8c/0xb0 [ 69.216231][ T4888] __kmalloc_node_noprof+0xa9/0x410 [ 69.216291][ T4888] ? load_msg+0x41/0x2f0 [ 69.216315][ T4888] load_msg+0x41/0x2f0 [ 69.216405][ T4888] do_mq_timedsend+0x23e/0x6b0 [ 69.216441][ T4888] __x64_sys_mq_timedsend+0xd1/0x160 [ 69.216509][ T4888] x64_sys_call+0x2db9/0x2fb0 [ 69.216532][ T4888] do_syscall_64+0xd2/0x200 [ 69.216601][ T4888] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 69.216632][ T4888] ? clear_bhb_loop+0x40/0x90 [ 69.216657][ T4888] ? clear_bhb_loop+0x40/0x90 [ 69.216756][ T4888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.216787][ T4888] RIP: 0033:0x7fe42de0e929 [ 69.216804][ T4888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.216824][ T4888] RSP: 002b:00007fe42c477038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f2 [ 69.216913][ T4888] RAX: ffffffffffffffda RBX: 00007fe42e035fa0 RCX: 00007fe42de0e929 [ 69.217006][ T4888] RDX: 000000000000000e RSI: 0000000000000000 RDI: 0000000000000003 [ 69.217021][ T4888] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 69.217037][ T4888] R10: 000000000000002e R11: 0000000000000246 R12: 0000000000000001 [ 69.217051][ T4888] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 69.217073][ T4888] [ 69.285630][ T4891] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 69.579789][ T3370] usb usb2-port1: attempt power cycle [ 69.952055][ T4909] FAULT_INJECTION: forcing a failure. [ 69.952055][ T4909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.965297][ T4909] CPU: 1 UID: 0 PID: 4909 Comm: syz.3.533 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 69.965402][ T4909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 69.965418][ T4909] Call Trace: [ 69.965426][ T4909] [ 69.965435][ T4909] __dump_stack+0x1d/0x30 [ 69.965514][ T4909] dump_stack_lvl+0xe8/0x140 [ 69.965532][ T4909] dump_stack+0x15/0x1b [ 69.965547][ T4909] should_fail_ex+0x265/0x280 [ 69.965643][ T4909] should_fail+0xb/0x20 [ 69.965711][ T4909] should_fail_usercopy+0x1a/0x20 [ 69.965802][ T4909] strncpy_from_user+0x25/0x230 [ 69.965826][ T4909] ? __kmalloc_cache_noprof+0x189/0x320 [ 69.965887][ T4909] __se_sys_memfd_create+0x1ff/0x590 [ 69.965925][ T4909] __x64_sys_memfd_create+0x31/0x40 [ 69.965963][ T4909] x64_sys_call+0x122f/0x2fb0 [ 69.966045][ T4909] do_syscall_64+0xd2/0x200 [ 69.966112][ T4909] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 69.966146][ T4909] ? clear_bhb_loop+0x40/0x90 [ 69.966174][ T4909] ? clear_bhb_loop+0x40/0x90 [ 69.966217][ T4909] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.966263][ T4909] RIP: 0033:0x7f566dfbe929 [ 69.966277][ T4909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.966299][ T4909] RSP: 002b:00007f566c626e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 69.966322][ T4909] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007f566dfbe929 [ 69.966337][ T4909] RDX: 00007f566c626ef0 RSI: 0000000000000000 RDI: 00007f566e0414cc [ 69.966401][ T4909] RBP: 0000200000000180 R08: 00007f566c626bb7 R09: 00007f566c626e40 [ 69.966418][ T4909] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 69.966430][ T4909] R13: 00007f566c626ef0 R14: 00007f566c626eb0 R15: 0000200000000940 [ 69.966446][ T4909] [ 70.294209][ T3389] usb usb10-port1: attempt power cycle [ 70.316843][ T4922] FAULT_INJECTION: forcing a failure. [ 70.316843][ T4922] name failslab, interval 1, probability 0, space 0, times 0 [ 70.329814][ T4922] CPU: 0 UID: 0 PID: 4922 Comm: syz.2.539 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 70.329851][ T4922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 70.329863][ T4922] Call Trace: [ 70.329870][ T4922] [ 70.329877][ T4922] __dump_stack+0x1d/0x30 [ 70.329962][ T4922] dump_stack_lvl+0xe8/0x140 [ 70.329986][ T4922] dump_stack+0x15/0x1b [ 70.330006][ T4922] should_fail_ex+0x265/0x280 [ 70.330042][ T4922] should_failslab+0x8c/0xb0 [ 70.330137][ T4922] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 70.330227][ T4922] ? sidtab_sid2str_get+0xa0/0x130 [ 70.330309][ T4922] kmemdup_noprof+0x2b/0x70 [ 70.330336][ T4922] sidtab_sid2str_get+0xa0/0x130 [ 70.330363][ T4922] security_sid_to_context_core+0x1eb/0x2e0 [ 70.330403][ T4922] security_sid_to_context+0x27/0x40 [ 70.330428][ T4922] avc_audit_post_callback+0x10f/0x520 [ 70.330489][ T4922] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 70.330520][ T4922] common_lsm_audit+0x1b8/0x230 [ 70.330543][ T4922] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 70.330572][ T4922] slow_avc_audit+0x104/0x140 [ 70.330607][ T4922] avc_has_perm+0x128/0x150 [ 70.330633][ T4922] may_create+0x21a/0x2b0 [ 70.330663][ T4922] selinux_inode_mknod+0xb3/0xc0 [ 70.330717][ T4922] security_inode_mknod+0x82/0xd0 [ 70.330751][ T4922] vfs_mknod+0x281/0x310 [ 70.330840][ T4922] do_mknodat+0x24b/0x610 [ 70.330865][ T4922] __x64_sys_mknodat+0x5e/0x70 [ 70.330894][ T4922] x64_sys_call+0x2355/0x2fb0 [ 70.330914][ T4922] do_syscall_64+0xd2/0x200 [ 70.330948][ T4922] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 70.330980][ T4922] ? clear_bhb_loop+0x40/0x90 [ 70.331007][ T4922] ? clear_bhb_loop+0x40/0x90 [ 70.331103][ T4922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.331129][ T4922] RIP: 0033:0x7f478b1be929 [ 70.331186][ T4922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.331205][ T4922] RSP: 002b:00007f4789827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 70.331228][ T4922] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1be929 [ 70.331243][ T4922] RDX: b0a54e68b1cd2fdb RSI: 0000200000000040 RDI: ffffffffffffff9c [ 70.331315][ T4922] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 70.331330][ T4922] R10: 0000000000000103 R11: 0000000000000246 R12: 0000000000000001 [ 70.331344][ T4922] R13: 0000000000000001 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 70.331364][ T4922] [ 71.819888][ T3370] usb usb2-port1: unable to enumerate USB device [ 72.244751][ T4954] FAULT_INJECTION: forcing a failure. [ 72.244751][ T4954] name failslab, interval 1, probability 0, space 0, times 0 [ 72.257619][ T4954] CPU: 1 UID: 0 PID: 4954 Comm: syz.2.550 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 72.257655][ T4954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 72.257671][ T4954] Call Trace: [ 72.257680][ T4954] [ 72.257689][ T4954] __dump_stack+0x1d/0x30 [ 72.257711][ T4954] dump_stack_lvl+0xe8/0x140 [ 72.257729][ T4954] dump_stack+0x15/0x1b [ 72.257765][ T4954] should_fail_ex+0x265/0x280 [ 72.257803][ T4954] should_failslab+0x8c/0xb0 [ 72.257831][ T4954] kmem_cache_alloc_node_noprof+0x57/0x320 [ 72.257880][ T4954] ? __alloc_skb+0x101/0x320 [ 72.257907][ T4954] __alloc_skb+0x101/0x320 [ 72.257939][ T4954] ? avc_has_perm+0xd3/0x150 [ 72.257971][ T4954] alloc_skb_with_frags+0x7d/0x470 [ 72.258087][ T4954] ? selinux_file_open+0x2df/0x330 [ 72.258109][ T4954] ? __rcu_read_unlock+0x4f/0x70 [ 72.258130][ T4954] sock_alloc_send_pskb+0x43a/0x4f0 [ 72.258154][ T4954] ? terminate_walk+0x27f/0x2a0 [ 72.258178][ T4954] tun_get_user+0x8d3/0x2500 [ 72.258210][ T4954] ? avc_has_perm+0xd3/0x150 [ 72.258243][ T4954] ? ref_tracker_alloc+0x1f2/0x2f0 [ 72.258420][ T4954] ? selinux_file_permission+0x2f0/0x320 [ 72.258451][ T4954] tun_chr_write_iter+0x15e/0x210 [ 72.258500][ T4954] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 72.258523][ T4954] vfs_write+0x49d/0x8e0 [ 72.258619][ T4954] ksys_write+0xda/0x1a0 [ 72.258659][ T4954] __x64_sys_write+0x40/0x50 [ 72.258698][ T4954] x64_sys_call+0x2cdd/0x2fb0 [ 72.258741][ T4954] do_syscall_64+0xd2/0x200 [ 72.258763][ T4954] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 72.258796][ T4954] ? clear_bhb_loop+0x40/0x90 [ 72.258846][ T4954] ? clear_bhb_loop+0x40/0x90 [ 72.258872][ T4954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 72.258891][ T4954] RIP: 0033:0x7f478b1bd3df [ 72.258905][ T4954] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 72.258927][ T4954] RSP: 002b:00007f4789827000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 72.258949][ T4954] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1bd3df [ 72.258993][ T4954] RDX: 000000000000fdef RSI: 0000200000000a40 RDI: 00000000000000c8 [ 72.259004][ T4954] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 72.259015][ T4954] R10: 000000000000fdef R11: 0000000000000293 R12: 0000000000000001 [ 72.259026][ T4954] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 72.259063][ T4954] [ 72.410986][ T4957] FAULT_INJECTION: forcing a failure. [ 72.410986][ T4957] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 72.432314][ T1038] usb usb6-port1: unable to enumerate USB device [ 72.434474][ T4957] CPU: 0 UID: 0 PID: 4957 Comm: syz.4.547 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 72.434526][ T4957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 72.434544][ T4957] Call Trace: [ 72.434554][ T4957] [ 72.434566][ T4957] __dump_stack+0x1d/0x30 [ 72.434594][ T4957] dump_stack_lvl+0xe8/0x140 [ 72.434622][ T4957] dump_stack+0x15/0x1b [ 72.434652][ T4957] should_fail_ex+0x265/0x280 [ 72.434693][ T4957] should_fail_alloc_page+0xf2/0x100 [ 72.434726][ T4957] alloc_pages_bulk_noprof+0xef/0x540 [ 72.434831][ T4957] copy_splice_read+0xf3/0x5f0 [ 72.434924][ T4957] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 72.435021][ T4957] splice_direct_to_actor+0x290/0x680 [ 72.435062][ T4957] ? __pfx_direct_splice_actor+0x10/0x10 [ 72.435157][ T4957] do_splice_direct+0xda/0x150 [ 72.435193][ T4957] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 72.435264][ T4957] do_sendfile+0x380/0x650 [ 72.435298][ T4957] __x64_sys_sendfile64+0x105/0x150 [ 72.435408][ T4957] x64_sys_call+0xb39/0x2fb0 [ 72.435446][ T4957] do_syscall_64+0xd2/0x200 [ 72.435470][ T4957] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 72.435506][ T4957] ? clear_bhb_loop+0x40/0x90 [ 72.435534][ T4957] ? clear_bhb_loop+0x40/0x90 [ 72.435570][ T4957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 72.435599][ T4957] RIP: 0033:0x7ff6f14fe929 [ 72.435620][ T4957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.435673][ T4957] RSP: 002b:00007ff6efb46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 72.435720][ T4957] RAX: ffffffffffffffda RBX: 00007ff6f1726080 RCX: 00007ff6f14fe929 [ 72.435731][ T4957] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 72.435743][ T4957] RBP: 00007ff6efb46090 R08: 0000000000000000 R09: 0000000000000000 [ 72.435758][ T4957] R10: 0100000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 72.435775][ T4957] R13: 0000000000000000 R14: 00007ff6f1726080 R15: 00007ffdc4130dd8 [ 72.435843][ T4957] [ 72.949848][ T3389] usb usb10-port1: unable to enumerate USB device [ 73.490532][ T29] kauditd_printk_skb: 20163 callbacks suppressed [ 73.490550][ T29] audit: type=1400 audit(1752457802.320:121407): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.528055][ T29] audit: type=1400 audit(1752457802.320:121408): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.549425][ T29] audit: type=1400 audit(1752457802.320:121409): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.570882][ T29] audit: type=1400 audit(1752457802.320:121410): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.573798][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 73.592354][ T29] audit: type=1400 audit(1752457802.320:121411): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.598808][ T3035] audit: audit_lost=18882 audit_rate_limit=0 audit_backlog_limit=64 [ 73.598826][ T3035] audit: backlog limit exceeded [ 73.602181][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 73.620306][ T29] audit: type=1400 audit(1752457802.320:121412): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.673728][ T4985] netlink: 87 bytes leftover after parsing attributes in process `syz.4.560'. [ 73.790979][ T4997] À: port 1(vlan1) entered blocking state [ 73.796964][ T4997] À: port 1(vlan1) entered disabled state [ 73.805223][ T4997] vlan1: entered allmulticast mode [ 73.810524][ T4997] veth0_vlan: entered allmulticast mode [ 73.840240][ T4997] vlan1: entered promiscuous mode [ 74.120896][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.128153][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.231724][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.242709][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.309881][ T5013] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.318894][ T5013] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.327898][ T5013] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.337169][ T5013] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.778853][ T5046] ip6erspan0: entered promiscuous mode [ 74.910459][ T5057] FAULT_INJECTION: forcing a failure. [ 74.910459][ T5057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 74.923596][ T5057] CPU: 1 UID: 0 PID: 5057 Comm: syz.4.588 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 74.923632][ T5057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 74.923645][ T5057] Call Trace: [ 74.923666][ T5057] [ 74.923676][ T5057] __dump_stack+0x1d/0x30 [ 74.923701][ T5057] dump_stack_lvl+0xe8/0x140 [ 74.923725][ T5057] dump_stack+0x15/0x1b [ 74.923745][ T5057] should_fail_ex+0x265/0x280 [ 74.923780][ T5057] should_fail+0xb/0x20 [ 74.923852][ T5057] should_fail_usercopy+0x1a/0x20 [ 74.923897][ T5057] _copy_from_iter+0xcf/0xe40 [ 74.923937][ T5057] ? __build_skb_around+0x1a0/0x200 [ 74.923967][ T5057] ? __alloc_skb+0x223/0x320 [ 74.924005][ T5057] netlink_sendmsg+0x471/0x6b0 [ 74.924053][ T5057] ? __pfx_netlink_sendmsg+0x10/0x10 [ 74.924098][ T5057] __sock_sendmsg+0x145/0x180 [ 74.924120][ T5057] ____sys_sendmsg+0x31e/0x4e0 [ 74.924152][ T5057] ___sys_sendmsg+0x17b/0x1d0 [ 74.924237][ T5057] __x64_sys_sendmsg+0xd4/0x160 [ 74.924280][ T5057] x64_sys_call+0x2999/0x2fb0 [ 74.924300][ T5057] do_syscall_64+0xd2/0x200 [ 74.924383][ T5057] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 74.924472][ T5057] ? clear_bhb_loop+0x40/0x90 [ 74.924492][ T5057] ? clear_bhb_loop+0x40/0x90 [ 74.924517][ T5057] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.924544][ T5057] RIP: 0033:0x7ff6f14fe929 [ 74.924562][ T5057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.924655][ T5057] RSP: 002b:00007ff6efb67038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 74.924678][ T5057] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fe929 [ 74.924693][ T5057] RDX: 0000000000008000 RSI: 0000200000000280 RDI: 0000000000000004 [ 74.924708][ T5057] RBP: 00007ff6efb67090 R08: 0000000000000000 R09: 0000000000000000 [ 74.924723][ T5057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.924738][ T5057] R13: 0000000000000000 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 74.924757][ T5057] [ 75.199806][ T5077] netlink: 'syz.2.597': attribute type 21 has an invalid length. [ 75.199858][ T5077] netlink: 132 bytes leftover after parsing attributes in process `syz.2.597'. [ 75.446781][ T5086] FAULT_INJECTION: forcing a failure. [ 75.446781][ T5086] name failslab, interval 1, probability 0, space 0, times 0 [ 75.446816][ T5086] CPU: 1 UID: 0 PID: 5086 Comm: syz.3.601 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 75.446881][ T5086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 75.446897][ T5086] Call Trace: [ 75.446906][ T5086] [ 75.446915][ T5086] __dump_stack+0x1d/0x30 [ 75.446942][ T5086] dump_stack_lvl+0xe8/0x140 [ 75.446965][ T5086] dump_stack+0x15/0x1b [ 75.447055][ T5086] should_fail_ex+0x265/0x280 [ 75.447084][ T5086] should_failslab+0x8c/0xb0 [ 75.447105][ T5086] kmem_cache_alloc_noprof+0x50/0x310 [ 75.447230][ T5086] ? do_set_mempolicy+0x17c/0x3e0 [ 75.447278][ T5086] do_set_mempolicy+0x17c/0x3e0 [ 75.447319][ T5086] __x64_sys_set_mempolicy+0x139/0x170 [ 75.447443][ T5086] x64_sys_call+0x273c/0x2fb0 [ 75.447567][ T5086] do_syscall_64+0xd2/0x200 [ 75.447591][ T5086] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 75.447620][ T5086] ? clear_bhb_loop+0x40/0x90 [ 75.447642][ T5086] ? clear_bhb_loop+0x40/0x90 [ 75.447683][ T5086] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.447708][ T5086] RIP: 0033:0x7f566dfbe929 [ 75.447724][ T5086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.447771][ T5086] RSP: 002b:00007f566c627038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ee [ 75.447795][ T5086] RAX: ffffffffffffffda RBX: 00007f566e1e5fa0 RCX: 00007f566dfbe929 [ 75.447811][ T5086] RDX: 0000000000000009 RSI: 0000200000000040 RDI: 0000000000000001 [ 75.447825][ T5086] RBP: 00007f566c627090 R08: 0000000000000000 R09: 0000000000000000 [ 75.447839][ T5086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.447853][ T5086] R13: 0000000000000001 R14: 00007f566e1e5fa0 R15: 00007ffe9d398788 [ 75.447873][ T5086] [ 75.836242][ T5102] FAULT_INJECTION: forcing a failure. [ 75.836242][ T5102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.849691][ T5102] CPU: 0 UID: 0 PID: 5102 Comm: syz.2.607 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 75.849721][ T5102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 75.849737][ T5102] Call Trace: [ 75.849745][ T5102] [ 75.849755][ T5102] __dump_stack+0x1d/0x30 [ 75.849780][ T5102] dump_stack_lvl+0xe8/0x140 [ 75.849804][ T5102] dump_stack+0x15/0x1b [ 75.849854][ T5102] should_fail_ex+0x265/0x280 [ 75.849889][ T5102] should_fail+0xb/0x20 [ 75.849966][ T5102] should_fail_usercopy+0x1a/0x20 [ 75.850000][ T5102] _copy_from_user+0x1c/0xb0 [ 75.850052][ T5102] __sys_bpf+0x178/0x790 [ 75.850096][ T5102] __x64_sys_bpf+0x41/0x50 [ 75.850193][ T5102] x64_sys_call+0x2478/0x2fb0 [ 75.850220][ T5102] do_syscall_64+0xd2/0x200 [ 75.850242][ T5102] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 75.850282][ T5102] ? clear_bhb_loop+0x40/0x90 [ 75.850307][ T5102] ? clear_bhb_loop+0x40/0x90 [ 75.850331][ T5102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.850413][ T5102] RIP: 0033:0x7f478b1be929 [ 75.850427][ T5102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.850482][ T5102] RSP: 002b:00007f4789827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.850505][ T5102] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1be929 [ 75.850545][ T5102] RDX: 0000000000000020 RSI: 0000200000000140 RDI: 0000000000000012 [ 75.850573][ T5102] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 75.850584][ T5102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.850595][ T5102] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 75.850611][ T5102] [ 76.222163][ T5115] netlink: 12 bytes leftover after parsing attributes in process `syz.0.614'. [ 76.232210][ T5110] netlink: 'syz.1.612': attribute type 21 has an invalid length. [ 76.241574][ T5110] netlink: 132 bytes leftover after parsing attributes in process `syz.1.612'. [ 76.566100][ T5135] FAULT_INJECTION: forcing a failure. [ 76.566100][ T5135] name failslab, interval 1, probability 0, space 0, times 0 [ 76.578831][ T5135] CPU: 0 UID: 0 PID: 5135 Comm: syz.1.621 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 76.578863][ T5135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 76.578877][ T5135] Call Trace: [ 76.578884][ T5135] [ 76.578894][ T5135] __dump_stack+0x1d/0x30 [ 76.578921][ T5135] dump_stack_lvl+0xe8/0x140 [ 76.578941][ T5135] dump_stack+0x15/0x1b [ 76.578962][ T5135] should_fail_ex+0x265/0x280 [ 76.578992][ T5135] should_failslab+0x8c/0xb0 [ 76.579056][ T5135] __kvmalloc_node_noprof+0x123/0x4e0 [ 76.579082][ T5135] ? nf_hook_entries_grow+0x1bc/0x450 [ 76.579116][ T5135] nf_hook_entries_grow+0x1bc/0x450 [ 76.579159][ T5135] __nf_register_net_hook+0x18e/0x480 [ 76.579291][ T5135] nf_register_net_hook+0x88/0x130 [ 76.579320][ T5135] nf_register_net_hooks+0x44/0x150 [ 76.579477][ T5135] nf_defrag_ipv4_enable+0x6e/0xc0 [ 76.579512][ T5135] tproxy_tg4_check+0x2d/0x100 [ 76.579537][ T5135] xt_check_target+0x28d/0x4c0 [ 76.579614][ T5135] ? xt_find_target+0x141/0x200 [ 76.579690][ T5135] ? strcmp+0x22/0x50 [ 76.579707][ T5135] ? xt_find_target+0x1cd/0x200 [ 76.579737][ T5135] translate_table+0xc31/0xf90 [ 76.579783][ T5135] do_ipt_set_ctl+0x66f/0x820 [ 76.579825][ T5135] ? _raw_spin_unlock_bh+0x36/0x40 [ 76.579854][ T5135] ? tcp_release_cb+0xf1/0x370 [ 76.579897][ T5135] nf_setsockopt+0x196/0x1b0 [ 76.579916][ T5135] ip_setsockopt+0x102/0x110 [ 76.580007][ T5135] tcp_setsockopt+0x95/0xb0 [ 76.580125][ T5135] sock_common_setsockopt+0x69/0x80 [ 76.580157][ T5135] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 76.580206][ T5135] __sys_setsockopt+0x184/0x200 [ 76.580245][ T5135] __x64_sys_setsockopt+0x64/0x80 [ 76.580305][ T5135] x64_sys_call+0x2bd5/0x2fb0 [ 76.580393][ T5135] do_syscall_64+0xd2/0x200 [ 76.580412][ T5135] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 76.580445][ T5135] ? clear_bhb_loop+0x40/0x90 [ 76.580471][ T5135] ? clear_bhb_loop+0x40/0x90 [ 76.580550][ T5135] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 76.580631][ T5135] RIP: 0033:0x7f9776aae929 [ 76.580650][ T5135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.580672][ T5135] RSP: 002b:00007f9775117038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 76.580695][ T5135] RAX: ffffffffffffffda RBX: 00007f9776cd5fa0 RCX: 00007f9776aae929 [ 76.580710][ T5135] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 76.580724][ T5135] RBP: 00007f9775117090 R08: 0000000000000570 R09: 0000000000000000 [ 76.580737][ T5135] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000001 [ 76.580748][ T5135] R13: 0000000000000000 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 76.580807][ T5135] [ 76.857012][ T5132] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 77.081447][ T5144] syzkaller0: entered promiscuous mode [ 77.087026][ T5144] syzkaller0: entered allmulticast mode [ 77.253874][ T5168] FAULT_INJECTION: forcing a failure. [ 77.253874][ T5168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.267034][ T5168] CPU: 0 UID: 0 PID: 5168 Comm: syz.1.636 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 77.267117][ T5168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 77.267133][ T5168] Call Trace: [ 77.267141][ T5168] [ 77.267150][ T5168] __dump_stack+0x1d/0x30 [ 77.267176][ T5168] dump_stack_lvl+0xe8/0x140 [ 77.267195][ T5168] dump_stack+0x15/0x1b [ 77.267235][ T5168] should_fail_ex+0x265/0x280 [ 77.267271][ T5168] should_fail+0xb/0x20 [ 77.267304][ T5168] should_fail_usercopy+0x1a/0x20 [ 77.267342][ T5168] strncpy_from_user+0x25/0x230 [ 77.267384][ T5168] ? kmem_cache_alloc_noprof+0x186/0x310 [ 77.267413][ T5168] ? getname_flags+0x80/0x3b0 [ 77.267433][ T5168] getname_flags+0xae/0x3b0 [ 77.267453][ T5168] user_path_at+0x28/0x130 [ 77.267488][ T5168] do_fchmodat+0x9c/0x180 [ 77.267523][ T5168] __x64_sys_fchmodat+0x42/0x50 [ 77.267550][ T5168] x64_sys_call+0x847/0x2fb0 [ 77.267617][ T5168] do_syscall_64+0xd2/0x200 [ 77.267639][ T5168] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 77.267721][ T5168] ? clear_bhb_loop+0x40/0x90 [ 77.267741][ T5168] ? clear_bhb_loop+0x40/0x90 [ 77.267766][ T5168] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.267791][ T5168] RIP: 0033:0x7f9776aae929 [ 77.267805][ T5168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.267886][ T5168] RSP: 002b:00007f9775117038 EFLAGS: 00000246 ORIG_RAX: 000000000000010c [ 77.267909][ T5168] RAX: ffffffffffffffda RBX: 00007f9776cd5fa0 RCX: 00007f9776aae929 [ 77.267924][ T5168] RDX: 00000000fffffed3 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 77.267974][ T5168] RBP: 00007f9775117090 R08: 0000000000000000 R09: 0000000000000000 [ 77.267986][ T5168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.268000][ T5168] R13: 0000000000000001 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 77.268094][ T5168] [ 77.522801][ T5177] wg2: entered promiscuous mode [ 77.527717][ T5177] wg2: entered allmulticast mode [ 77.731202][ T5183] netlink: 28 bytes leftover after parsing attributes in process `syz.2.642'. [ 77.740275][ T5183] netlink: 28 bytes leftover after parsing attributes in process `syz.2.642'. [ 77.750100][ T5183] netlink: 28 bytes leftover after parsing attributes in process `syz.2.642'. [ 77.759014][ T5183] netlink: 28 bytes leftover after parsing attributes in process `syz.2.642'. [ 78.177712][ T5209] syzkaller0: entered promiscuous mode [ 78.183461][ T5209] syzkaller0: entered allmulticast mode [ 78.262452][ T5217] netlink: 12 bytes leftover after parsing attributes in process `syz.3.656'. [ 78.334214][ T5220] FAULT_INJECTION: forcing a failure. [ 78.334214][ T5220] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.347612][ T5220] CPU: 0 UID: 0 PID: 5220 Comm: syz.0.657 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 78.347718][ T5220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 78.347736][ T5220] Call Trace: [ 78.347746][ T5220] [ 78.347756][ T5220] __dump_stack+0x1d/0x30 [ 78.347785][ T5220] dump_stack_lvl+0xe8/0x140 [ 78.347821][ T5220] dump_stack+0x15/0x1b [ 78.347844][ T5220] should_fail_ex+0x265/0x280 [ 78.347876][ T5220] should_fail+0xb/0x20 [ 78.347909][ T5220] should_fail_usercopy+0x1a/0x20 [ 78.347997][ T5220] strncpy_from_user+0x25/0x230 [ 78.348023][ T5220] ? kmem_cache_alloc_noprof+0x186/0x310 [ 78.348054][ T5220] ? getname_flags+0x80/0x3b0 [ 78.348165][ T5220] getname_flags+0xae/0x3b0 [ 78.348238][ T5220] do_sys_openat2+0x60/0x110 [ 78.348274][ T5220] __x64_sys_openat+0xf2/0x120 [ 78.348318][ T5220] x64_sys_call+0x1af/0x2fb0 [ 78.348348][ T5220] do_syscall_64+0xd2/0x200 [ 78.348372][ T5220] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 78.348415][ T5220] ? clear_bhb_loop+0x40/0x90 [ 78.348440][ T5220] ? clear_bhb_loop+0x40/0x90 [ 78.348470][ T5220] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.348530][ T5220] RIP: 0033:0x7fe42de0d290 [ 78.348547][ T5220] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 78.348582][ T5220] RSP: 002b:00007fe42c476b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 78.348655][ T5220] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe42de0d290 [ 78.348672][ T5220] RDX: 0000000000000000 RSI: 00007fe42c476c10 RDI: 00000000ffffff9c [ 78.348689][ T5220] RBP: 00007fe42c476c10 R08: 0000000000000000 R09: 00236e6f6d627375 [ 78.348707][ T5220] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 78.348723][ T5220] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 78.348742][ T5220] [ 78.510982][ T5217] netlink: 12 bytes leftover after parsing attributes in process `syz.3.656'. [ 78.516454][ T29] kauditd_printk_skb: 22606 callbacks suppressed [ 78.516475][ T29] audit: type=1400 audit(1752457807.340:133442): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.577657][ T29] audit: type=1400 audit(1752457807.340:133443): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.599974][ T29] audit: type=1400 audit(1752457807.340:133444): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.621298][ T29] audit: type=1400 audit(1752457807.340:133445): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.643431][ T29] audit: type=1400 audit(1752457807.340:133446): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.656032][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 78.665914][ T29] audit: type=1400 audit(1752457807.340:133447): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.672452][ T3035] audit: audit_lost=22409 audit_rate_limit=0 audit_backlog_limit=64 [ 78.693773][ T29] audit: type=1400 audit(1752457807.340:133448): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.701798][ T3035] audit: backlog limit exceeded [ 78.786718][ T5229] batadv_slave_0: entered promiscuous mode [ 78.830939][ T5229] batadv_slave_0: left promiscuous mode [ 78.907637][ T5240] FAULT_INJECTION: forcing a failure. [ 78.907637][ T5240] name failslab, interval 1, probability 0, space 0, times 0 [ 78.920502][ T5240] CPU: 0 UID: 0 PID: 5240 Comm: syz.3.665 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 78.920536][ T5240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 78.920610][ T5240] Call Trace: [ 78.920618][ T5240] [ 78.920626][ T5240] __dump_stack+0x1d/0x30 [ 78.920653][ T5240] dump_stack_lvl+0xe8/0x140 [ 78.920679][ T5240] dump_stack+0x15/0x1b [ 78.920718][ T5240] should_fail_ex+0x265/0x280 [ 78.920755][ T5240] should_failslab+0x8c/0xb0 [ 78.920779][ T5240] kmem_cache_alloc_node_noprof+0x57/0x320 [ 78.920921][ T5240] ? __alloc_skb+0x101/0x320 [ 78.920953][ T5240] __alloc_skb+0x101/0x320 [ 78.921056][ T5240] inet_netconf_notify_devconf+0x173/0x230 [ 78.921143][ T5240] inetdev_event+0x743/0xc10 [ 78.921195][ T5240] ? __pfx_ib_netdevice_event+0x10/0x10 [ 78.921282][ T5240] ? ib_netdevice_event+0x186/0x5f0 [ 78.921306][ T5240] ? __pfx_arp_netdev_event+0x10/0x10 [ 78.921392][ T5240] ? __pfx_inetdev_event+0x10/0x10 [ 78.921422][ T5240] raw_notifier_call_chain+0x6c/0x1b0 [ 78.921485][ T5240] ? call_netdevice_notifiers_info+0x9c/0x100 [ 78.921521][ T5240] call_netdevice_notifiers_info+0xae/0x100 [ 78.921631][ T5240] unregister_netdevice_many_notify+0xd9d/0x1690 [ 78.921689][ T5240] unregister_netdevice_queue+0x1f5/0x220 [ 78.921735][ T5240] unregister_netdev+0xb3/0xe0 [ 78.921828][ T5240] slip_close+0xe4/0x100 [ 78.921857][ T5240] ? __pfx_slip_close+0x10/0x10 [ 78.921880][ T5240] tty_ldisc_close+0x71/0xa0 [ 78.921917][ T5240] tty_set_ldisc+0x1b9/0x380 [ 78.921965][ T5240] tiocsetd+0x51/0x60 [ 78.921998][ T5240] tty_ioctl+0xa7f/0xb80 [ 78.922030][ T5240] ? __pfx_tty_ioctl+0x10/0x10 [ 78.922063][ T5240] __se_sys_ioctl+0xcb/0x140 [ 78.922110][ T5240] __x64_sys_ioctl+0x43/0x50 [ 78.922146][ T5240] x64_sys_call+0x19a8/0x2fb0 [ 78.922235][ T5240] do_syscall_64+0xd2/0x200 [ 78.922254][ T5240] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 78.922284][ T5240] ? clear_bhb_loop+0x40/0x90 [ 78.922318][ T5240] ? clear_bhb_loop+0x40/0x90 [ 78.922347][ T5240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.922446][ T5240] RIP: 0033:0x7f566dfbe929 [ 78.922464][ T5240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.922489][ T5240] RSP: 002b:00007f566c627038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 78.922515][ T5240] RAX: ffffffffffffffda RBX: 00007f566e1e5fa0 RCX: 00007f566dfbe929 [ 78.922532][ T5240] RDX: 0000200000000100 RSI: 0000000000005423 RDI: 0000000000000003 [ 78.922549][ T5240] RBP: 00007f566c627090 R08: 0000000000000000 R09: 0000000000000000 [ 78.922566][ T5240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.922583][ T5240] R13: 0000000000000000 R14: 00007f566e1e5fa0 R15: 00007ffe9d398788 [ 78.922640][ T5240] [ 79.245683][ T5240] Falling back ldisc for ttyS3. [ 79.370838][ T5249] Cannot find add_set index 0 as target [ 79.384060][ T5246] syzkaller0: entered promiscuous mode [ 79.389637][ T5246] syzkaller0: entered allmulticast mode [ 79.412455][ T5250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5250 comm=syz.3.670 [ 79.424393][ T5253] FAULT_INJECTION: forcing a failure. [ 79.424393][ T5253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.437988][ T5253] CPU: 0 UID: 0 PID: 5253 Comm: syz.4.667 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 79.438020][ T5253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 79.438035][ T5253] Call Trace: [ 79.438043][ T5253] [ 79.438082][ T5253] __dump_stack+0x1d/0x30 [ 79.438108][ T5253] dump_stack_lvl+0xe8/0x140 [ 79.438159][ T5253] dump_stack+0x15/0x1b [ 79.438178][ T5253] should_fail_ex+0x265/0x280 [ 79.438288][ T5253] should_fail+0xb/0x20 [ 79.438343][ T5253] should_fail_usercopy+0x1a/0x20 [ 79.438380][ T5253] _copy_to_user+0x20/0xa0 [ 79.438399][ T5253] lsm_fill_user_ctx+0x13a/0x1e0 [ 79.438423][ T5253] selinux_getselfattr+0x87/0xd0 [ 79.438457][ T5253] security_getselfattr+0x24a/0x500 [ 79.438493][ T5253] __x64_sys_lsm_get_self_attr+0x51/0x60 [ 79.438523][ T5253] x64_sys_call+0x1fc6/0x2fb0 [ 79.438550][ T5253] do_syscall_64+0xd2/0x200 [ 79.438575][ T5253] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 79.438609][ T5253] ? clear_bhb_loop+0x40/0x90 [ 79.438655][ T5253] ? clear_bhb_loop+0x40/0x90 [ 79.438683][ T5253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.438773][ T5253] RIP: 0033:0x7ff6f14fe929 [ 79.438787][ T5253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.438816][ T5253] RSP: 002b:00007ff6efb67038 EFLAGS: 00000246 ORIG_RAX: 00000000000001cb [ 79.438962][ T5253] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fe929 [ 79.438977][ T5253] RDX: 0000200000000080 RSI: 0000200000000580 RDI: 0000000000000069 [ 79.438989][ T5253] RBP: 00007ff6efb67090 R08: 0000000000000000 R09: 0000000000000000 [ 79.439002][ T5253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.439017][ T5253] R13: 0000000000000001 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 79.439038][ T5253] [ 79.827481][ T5279] FAULT_INJECTION: forcing a failure. [ 79.827481][ T5279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.840716][ T5279] CPU: 0 UID: 0 PID: 5279 Comm: syz.0.679 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 79.840742][ T5279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 79.840758][ T5279] Call Trace: [ 79.840765][ T5279] [ 79.840773][ T5279] __dump_stack+0x1d/0x30 [ 79.840798][ T5279] dump_stack_lvl+0xe8/0x140 [ 79.840850][ T5279] dump_stack+0x15/0x1b [ 79.840871][ T5279] should_fail_ex+0x265/0x280 [ 79.840907][ T5279] should_fail+0xb/0x20 [ 79.840997][ T5279] should_fail_usercopy+0x1a/0x20 [ 79.841033][ T5279] _copy_from_user+0x1c/0xb0 [ 79.841135][ T5279] get_itimerspec64+0x4c/0x1a0 [ 79.841162][ T5279] __x64_sys_timerfd_settime+0x89/0x140 [ 79.841199][ T5279] x64_sys_call+0x44c/0x2fb0 [ 79.841292][ T5279] do_syscall_64+0xd2/0x200 [ 79.841321][ T5279] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 79.841353][ T5279] ? clear_bhb_loop+0x40/0x90 [ 79.841380][ T5279] ? clear_bhb_loop+0x40/0x90 [ 79.841436][ T5279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.841462][ T5279] RIP: 0033:0x7fe42de0e929 [ 79.841481][ T5279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.841607][ T5279] RSP: 002b:00007fe42c477038 EFLAGS: 00000246 ORIG_RAX: 000000000000011e [ 79.841625][ T5279] RAX: ffffffffffffffda RBX: 00007fe42e035fa0 RCX: 00007fe42de0e929 [ 79.841636][ T5279] RDX: 00002000000000c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 79.841674][ T5279] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 79.841689][ T5279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.841704][ T5279] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 79.841725][ T5279] [ 79.842426][ T5281] FAULT_INJECTION: forcing a failure. [ 79.842426][ T5281] name failslab, interval 1, probability 0, space 0, times 0 [ 80.032803][ T5281] CPU: 1 UID: 0 PID: 5281 Comm: syz.3.676 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 80.032913][ T5281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 80.032929][ T5281] Call Trace: [ 80.032937][ T5281] [ 80.032946][ T5281] __dump_stack+0x1d/0x30 [ 80.032972][ T5281] dump_stack_lvl+0xe8/0x140 [ 80.032997][ T5281] dump_stack+0x15/0x1b [ 80.033013][ T5281] should_fail_ex+0x265/0x280 [ 80.033048][ T5281] should_failslab+0x8c/0xb0 [ 80.033069][ T5281] kmem_cache_alloc_noprof+0x50/0x310 [ 80.033093][ T5281] ? getname_flags+0x80/0x3b0 [ 80.033187][ T5281] getname_flags+0x80/0x3b0 [ 80.033211][ T5281] do_sys_openat2+0x60/0x110 [ 80.033249][ T5281] __x64_sys_openat+0xf2/0x120 [ 80.033274][ T5281] x64_sys_call+0x1af/0x2fb0 [ 80.033302][ T5281] do_syscall_64+0xd2/0x200 [ 80.033360][ T5281] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 80.033394][ T5281] ? clear_bhb_loop+0x40/0x90 [ 80.033445][ T5281] ? clear_bhb_loop+0x40/0x90 [ 80.033537][ T5281] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.033572][ T5281] RIP: 0033:0x7f566dfbe929 [ 80.033591][ T5281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.033663][ T5281] RSP: 002b:00007f566c606038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 80.033709][ T5281] RAX: ffffffffffffffda RBX: 00007f566e1e6080 RCX: 00007f566dfbe929 [ 80.033724][ T5281] RDX: 0000000000006001 RSI: 0000200000000400 RDI: ffffffffffffff9c [ 80.033739][ T5281] RBP: 00007f566c606090 R08: 0000000000000000 R09: 0000000000000000 [ 80.033755][ T5281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.033769][ T5281] R13: 0000000000000000 R14: 00007f566e1e6080 R15: 00007ffe9d398788 [ 80.033791][ T5281] [ 80.036562][ T5288] FAULT_INJECTION: forcing a failure. [ 80.036562][ T5288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.232145][ T5288] CPU: 1 UID: 0 PID: 5288 Comm: syz.0.683 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 80.232260][ T5288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 80.232276][ T5288] Call Trace: [ 80.232283][ T5288] [ 80.232293][ T5288] __dump_stack+0x1d/0x30 [ 80.232318][ T5288] dump_stack_lvl+0xe8/0x140 [ 80.232337][ T5288] dump_stack+0x15/0x1b [ 80.232416][ T5288] should_fail_ex+0x265/0x280 [ 80.232453][ T5288] should_fail+0xb/0x20 [ 80.232497][ T5288] should_fail_usercopy+0x1a/0x20 [ 80.232528][ T5288] strncpy_from_user+0x25/0x230 [ 80.232555][ T5288] ? kmem_cache_alloc_noprof+0x186/0x310 [ 80.232699][ T5288] ? getname_flags+0x80/0x3b0 [ 80.232777][ T5288] getname_flags+0xae/0x3b0 [ 80.232798][ T5288] user_path_at+0x28/0x130 [ 80.232821][ T5288] do_sys_truncate+0x5c/0x130 [ 80.232924][ T5288] __x64_sys_truncate+0x31/0x40 [ 80.232963][ T5288] x64_sys_call+0x2920/0x2fb0 [ 80.232983][ T5288] do_syscall_64+0xd2/0x200 [ 80.232999][ T5288] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 80.233082][ T5288] ? clear_bhb_loop+0x40/0x90 [ 80.233106][ T5288] ? clear_bhb_loop+0x40/0x90 [ 80.233130][ T5288] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.233218][ T5288] RIP: 0033:0x7fe42de0e929 [ 80.233236][ T5288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.233258][ T5288] RSP: 002b:00007fe42c477038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 80.233295][ T5288] RAX: ffffffffffffffda RBX: 00007fe42e035fa0 RCX: 00007fe42de0e929 [ 80.233311][ T5288] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 80.233325][ T5288] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 80.233340][ T5288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.233351][ T5288] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 80.233444][ T5288] [ 80.509808][ T5297] wg2: left promiscuous mode [ 80.514502][ T5297] wg2: left allmulticast mode [ 80.520673][ T5297] ip6gre1: left allmulticast mode [ 80.815078][ T5300] FAULT_INJECTION: forcing a failure. [ 80.815078][ T5300] name failslab, interval 1, probability 0, space 0, times 0 [ 80.827891][ T5300] CPU: 1 UID: 0 PID: 5300 Comm: syz.4.685 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 80.827969][ T5300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 80.827984][ T5300] Call Trace: [ 80.827992][ T5300] [ 80.828001][ T5300] __dump_stack+0x1d/0x30 [ 80.828027][ T5300] dump_stack_lvl+0xe8/0x140 [ 80.828050][ T5300] dump_stack+0x15/0x1b [ 80.828065][ T5300] should_fail_ex+0x265/0x280 [ 80.828095][ T5300] should_failslab+0x8c/0xb0 [ 80.828170][ T5300] kmem_cache_alloc_noprof+0x50/0x310 [ 80.828196][ T5300] ? alloc_empty_file+0x76/0x200 [ 80.828225][ T5300] alloc_empty_file+0x76/0x200 [ 80.828290][ T5300] path_openat+0x68/0x2170 [ 80.828393][ T5300] ? _parse_integer_limit+0x170/0x190 [ 80.828421][ T5300] ? _parse_integer+0x27/0x40 [ 80.828454][ T5300] ? kstrtoull+0x111/0x140 [ 80.828550][ T5300] ? kstrtouint+0x76/0xc0 [ 80.828592][ T5300] do_filp_open+0x109/0x230 [ 80.828682][ T5300] do_sys_openat2+0xa6/0x110 [ 80.828714][ T5300] __x64_sys_creat+0x65/0x90 [ 80.828742][ T5300] x64_sys_call+0x114d/0x2fb0 [ 80.828762][ T5300] do_syscall_64+0xd2/0x200 [ 80.828847][ T5300] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 80.828877][ T5300] ? clear_bhb_loop+0x40/0x90 [ 80.828903][ T5300] ? clear_bhb_loop+0x40/0x90 [ 80.828930][ T5300] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.828981][ T5300] RIP: 0033:0x7ff6f14fe929 [ 80.828995][ T5300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.829015][ T5300] RSP: 002b:00007ff6efb67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 80.829039][ T5300] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fe929 [ 80.829087][ T5300] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000200 [ 80.829098][ T5300] RBP: 00007ff6efb67090 R08: 0000000000000000 R09: 0000000000000000 [ 80.829133][ T5300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.829146][ T5300] R13: 0000000000000000 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 80.829165][ T5300] [ 81.086857][ T5305] macvlan3: entered promiscuous mode [ 81.092258][ T5305] bond0: entered promiscuous mode [ 81.097333][ T5305] bond_slave_0: entered promiscuous mode [ 81.103280][ T5305] bond_slave_1: entered promiscuous mode [ 81.109217][ T5305] macvlan3: entered allmulticast mode [ 81.115001][ T5305] bond0: entered allmulticast mode [ 81.120273][ T5305] bond_slave_0: entered allmulticast mode [ 81.126550][ T5305] bond_slave_1: entered allmulticast mode [ 81.220279][ T5305] 8021q: adding VLAN 0 to HW filter on device macvlan3 [ 81.228599][ T5305] bond0: left allmulticast mode [ 81.233597][ T5305] bond_slave_0: left allmulticast mode [ 81.239552][ T5305] bond_slave_1: left allmulticast mode [ 81.245200][ T5305] bond0: left promiscuous mode [ 81.250044][ T5305] bond_slave_0: left promiscuous mode [ 81.255558][ T5305] bond_slave_1: left promiscuous mode [ 81.270898][ T5309] FAULT_INJECTION: forcing a failure. [ 81.270898][ T5309] name failslab, interval 1, probability 0, space 0, times 0 [ 81.283762][ T5309] CPU: 0 UID: 0 PID: 5309 Comm: syz.0.691 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 81.283826][ T5309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 81.283838][ T5309] Call Trace: [ 81.283845][ T5309] [ 81.283853][ T5309] __dump_stack+0x1d/0x30 [ 81.283909][ T5309] dump_stack_lvl+0xe8/0x140 [ 81.284009][ T5309] dump_stack+0x15/0x1b [ 81.284025][ T5309] should_fail_ex+0x265/0x280 [ 81.284067][ T5309] should_failslab+0x8c/0xb0 [ 81.284092][ T5309] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 81.284119][ T5309] ? sidtab_sid2str_get+0xa0/0x130 [ 81.284153][ T5309] kmemdup_noprof+0x2b/0x70 [ 81.284238][ T5309] sidtab_sid2str_get+0xa0/0x130 [ 81.284265][ T5309] security_sid_to_context_core+0x1eb/0x2e0 [ 81.284287][ T5309] security_sid_to_context+0x27/0x40 [ 81.284305][ T5309] selinux_lsmprop_to_secctx+0x67/0xf0 [ 81.284395][ T5309] security_lsmprop_to_secctx+0x43/0x80 [ 81.284500][ T5309] audit_log_task_context+0x77/0x190 [ 81.284540][ T5309] audit_log_task+0xf4/0x250 [ 81.284583][ T5309] audit_seccomp+0x61/0x100 [ 81.284615][ T5309] ? __seccomp_filter+0x68c/0x10d0 [ 81.284675][ T5309] __seccomp_filter+0x69d/0x10d0 [ 81.284701][ T5309] ? vfs_write+0x75e/0x8e0 [ 81.284728][ T5309] ? __rcu_read_unlock+0x4f/0x70 [ 81.284754][ T5309] __secure_computing+0x82/0x150 [ 81.284779][ T5309] syscall_trace_enter+0xcf/0x1e0 [ 81.284873][ T5309] do_syscall_64+0xac/0x200 [ 81.284890][ T5309] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 81.284966][ T5309] ? clear_bhb_loop+0x40/0x90 [ 81.284990][ T5309] ? clear_bhb_loop+0x40/0x90 [ 81.285014][ T5309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.285114][ T5309] RIP: 0033:0x7fe42de0d33c [ 81.285140][ T5309] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 81.285158][ T5309] RSP: 002b:00007fe42c477030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 81.285181][ T5309] RAX: ffffffffffffffda RBX: 00007fe42e035fa0 RCX: 00007fe42de0d33c [ 81.285197][ T5309] RDX: 000000000000000f RSI: 00007fe42c4770a0 RDI: 0000000000000003 [ 81.285304][ T5309] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 81.285315][ T5309] R10: 0000000080000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.285327][ T5309] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 81.285348][ T5309] [ 81.606635][ T5316] FAULT_INJECTION: forcing a failure. [ 81.606635][ T5316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.619957][ T5316] CPU: 1 UID: 0 PID: 5316 Comm: syz.3.695 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 81.620067][ T5316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 81.620079][ T5316] Call Trace: [ 81.620136][ T5316] [ 81.620143][ T5316] __dump_stack+0x1d/0x30 [ 81.620213][ T5316] dump_stack_lvl+0xe8/0x140 [ 81.620236][ T5316] dump_stack+0x15/0x1b [ 81.620257][ T5316] should_fail_ex+0x265/0x280 [ 81.620294][ T5316] should_fail+0xb/0x20 [ 81.620374][ T5316] should_fail_usercopy+0x1a/0x20 [ 81.620412][ T5316] _copy_from_user+0x1c/0xb0 [ 81.620445][ T5316] kstrtouint_from_user+0x69/0xf0 [ 81.620480][ T5316] ? 0xffffffff81000000 [ 81.620537][ T5316] ? selinux_file_permission+0x1e4/0x320 [ 81.620606][ T5316] proc_fail_nth_write+0x50/0x160 [ 81.620688][ T5316] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 81.620761][ T5316] vfs_write+0x269/0x8e0 [ 81.620795][ T5316] ? vfs_read+0x47f/0x6f0 [ 81.620825][ T5316] ? __rcu_read_unlock+0x4f/0x70 [ 81.620845][ T5316] ? __fget_files+0x184/0x1c0 [ 81.620963][ T5316] ksys_write+0xda/0x1a0 [ 81.620998][ T5316] __x64_sys_write+0x40/0x50 [ 81.621038][ T5316] x64_sys_call+0x2cdd/0x2fb0 [ 81.621065][ T5316] do_syscall_64+0xd2/0x200 [ 81.621103][ T5316] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 81.621136][ T5316] ? clear_bhb_loop+0x40/0x90 [ 81.621162][ T5316] ? clear_bhb_loop+0x40/0x90 [ 81.621189][ T5316] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.621351][ T5316] RIP: 0033:0x7f566dfbd3df [ 81.621365][ T5316] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 81.621408][ T5316] RSP: 002b:00007f566c627030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 81.621491][ T5316] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f566dfbd3df [ 81.621504][ T5316] RDX: 0000000000000001 RSI: 00007f566c6270a0 RDI: 0000000000000003 [ 81.621515][ T5316] RBP: 00007f566c627090 R08: 0000000000000000 R09: 0000000000000000 [ 81.621528][ T5316] R10: 0000200000000000 R11: 0000000000000293 R12: 0000000000000001 [ 81.621539][ T5316] R13: 0000000000000000 R14: 00007f566e1e5fa0 R15: 00007ffe9d398788 [ 81.621558][ T5316] [ 81.861206][ T5317] netlink: 24 bytes leftover after parsing attributes in process `syz.2.692'. [ 81.952985][ T5313] pim6reg1: entered promiscuous mode [ 81.991439][ T5325] FAULT_INJECTION: forcing a failure. [ 81.991439][ T5325] name failslab, interval 1, probability 0, space 0, times 0 [ 82.004755][ T5325] CPU: 0 UID: 0 PID: 5325 Comm: syz.2.699 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 82.004820][ T5325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 82.004836][ T5325] Call Trace: [ 82.004879][ T5325] [ 82.004886][ T5325] __dump_stack+0x1d/0x30 [ 82.004905][ T5325] dump_stack_lvl+0xe8/0x140 [ 82.004923][ T5325] dump_stack+0x15/0x1b [ 82.004944][ T5325] should_fail_ex+0x265/0x280 [ 82.004981][ T5325] should_failslab+0x8c/0xb0 [ 82.005033][ T5325] kmem_cache_alloc_node_noprof+0x57/0x320 [ 82.005058][ T5325] ? __alloc_skb+0x101/0x320 [ 82.005093][ T5325] __alloc_skb+0x101/0x320 [ 82.005164][ T5325] inet_netconf_notify_devconf+0x173/0x230 [ 82.005202][ T5325] inetdev_event+0x743/0xc10 [ 82.005247][ T5325] ? __pfx_ib_netdevice_event+0x10/0x10 [ 82.005270][ T5325] ? ib_netdevice_event+0x186/0x5f0 [ 82.005294][ T5325] ? __pfx_arp_netdev_event+0x10/0x10 [ 82.005318][ T5325] ? __pfx_inetdev_event+0x10/0x10 [ 82.005460][ T5325] raw_notifier_call_chain+0x6c/0x1b0 [ 82.005480][ T5325] ? call_netdevice_notifiers_info+0x9c/0x100 [ 82.005503][ T5325] call_netdevice_notifiers_info+0xae/0x100 [ 82.005562][ T5325] unregister_netdevice_many_notify+0xd9d/0x1690 [ 82.005721][ T5325] unregister_netdevice_queue+0x1f5/0x220 [ 82.005763][ T5325] unregister_netdev+0xb3/0xe0 [ 82.005796][ T5325] slip_close+0xe4/0x100 [ 82.005877][ T5325] ? __pfx_slip_close+0x10/0x10 [ 82.005903][ T5325] tty_ldisc_close+0x71/0xa0 [ 82.005937][ T5325] tty_set_ldisc+0x1b9/0x380 [ 82.005963][ T5325] tiocsetd+0x51/0x60 [ 82.006069][ T5325] tty_ioctl+0xa7f/0xb80 [ 82.006165][ T5325] ? __pfx_tty_ioctl+0x10/0x10 [ 82.006206][ T5325] __se_sys_ioctl+0xcb/0x140 [ 82.006241][ T5325] __x64_sys_ioctl+0x43/0x50 [ 82.006274][ T5325] x64_sys_call+0x19a8/0x2fb0 [ 82.006363][ T5325] do_syscall_64+0xd2/0x200 [ 82.006381][ T5325] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 82.006463][ T5325] ? clear_bhb_loop+0x40/0x90 [ 82.006490][ T5325] ? clear_bhb_loop+0x40/0x90 [ 82.006517][ T5325] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.006543][ T5325] RIP: 0033:0x7f478b1be929 [ 82.006557][ T5325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.006601][ T5325] RSP: 002b:00007f4789827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 82.006619][ T5325] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1be929 [ 82.006634][ T5325] RDX: 0000200000000100 RSI: 0000000000005423 RDI: 0000000000000003 [ 82.006651][ T5325] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 82.006672][ T5325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.006740][ T5325] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 82.006756][ T5325] [ 82.418287][ T5342] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.469916][ T5349] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=5349 comm=syz.0.705 [ 82.522707][ T5342] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 82.532813][ T5342] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 82.566866][ T5342] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.575911][ T5342] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.585247][ T5342] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.594877][ T5342] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.623485][ T5342] netdevsim netdevsim3 netdevsim0: left promiscuous mode [ 82.640575][ T5351] macvlan2: entered promiscuous mode [ 82.645965][ T5351] bond0: entered promiscuous mode [ 82.651105][ T5351] bond_slave_0: entered promiscuous mode [ 82.656892][ T5351] bond_slave_1: entered promiscuous mode [ 82.662809][ T5351] macvlan2: entered allmulticast mode [ 82.668227][ T5351] bond0: entered allmulticast mode [ 82.673430][ T5351] bond_slave_0: entered allmulticast mode [ 82.679277][ T5351] bond_slave_1: entered allmulticast mode [ 82.692555][ T5339] serio: Serial port ptm0 [ 82.697759][ T5351] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 82.706571][ T5351] bond0: left allmulticast mode [ 82.711623][ T5351] bond_slave_0: left allmulticast mode [ 82.717182][ T5351] bond_slave_1: left allmulticast mode [ 82.722801][ T5351] bond0: left promiscuous mode [ 82.727600][ T5351] bond_slave_0: left promiscuous mode [ 82.733183][ T5351] bond_slave_1: left promiscuous mode [ 82.766466][ T5354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1816 sclass=netlink_route_socket pid=5354 comm=syz.1.708 [ 82.891869][ T5364] FAULT_INJECTION: forcing a failure. [ 82.891869][ T5364] name failslab, interval 1, probability 0, space 0, times 0 [ 82.904815][ T5364] CPU: 1 UID: 0 PID: 5364 Comm: syz.1.713 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 82.904919][ T5364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 82.904943][ T5364] Call Trace: [ 82.904952][ T5364] [ 82.904960][ T5364] __dump_stack+0x1d/0x30 [ 82.904986][ T5364] dump_stack_lvl+0xe8/0x140 [ 82.905023][ T5364] dump_stack+0x15/0x1b [ 82.905044][ T5364] should_fail_ex+0x265/0x280 [ 82.905074][ T5364] ? alloc_netdev_mqs+0x829/0xab0 [ 82.905105][ T5364] should_failslab+0x8c/0xb0 [ 82.905133][ T5364] __kmalloc_cache_noprof+0x4c/0x320 [ 82.905171][ T5364] alloc_netdev_mqs+0x829/0xab0 [ 82.905205][ T5364] rtnl_create_link+0x239/0x710 [ 82.905282][ T5364] rtnl_newlink_create+0x14c/0x620 [ 82.905363][ T5364] ? security_capable+0x83/0x90 [ 82.905387][ T5364] ? netlink_ns_capable+0x86/0xa0 [ 82.905570][ T5364] rtnl_newlink+0xf29/0x12d0 [ 82.905601][ T5364] ? css_rstat_updated+0xcd/0x5b0 [ 82.905628][ T5364] ? __rcu_read_unlock+0x4f/0x70 [ 82.905649][ T5364] ? __account_obj_stock+0x211/0x350 [ 82.905822][ T5364] ? __rcu_read_unlock+0x4f/0x70 [ 82.905842][ T5364] ? avc_has_perm_noaudit+0x1b1/0x200 [ 82.905868][ T5364] ? selinux_capable+0x1f9/0x270 [ 82.905900][ T5364] ? security_capable+0x83/0x90 [ 82.905922][ T5364] ? ns_capable+0x7d/0xb0 [ 82.905943][ T5364] ? __pfx_rtnl_newlink+0x10/0x10 [ 82.905969][ T5364] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 82.905994][ T5364] ? avc_has_perm_noaudit+0x1b1/0x200 [ 82.906082][ T5364] netlink_rcv_skb+0x120/0x220 [ 82.906156][ T5364] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 82.906225][ T5364] rtnetlink_rcv+0x1c/0x30 [ 82.906243][ T5364] netlink_unicast+0x5a5/0x680 [ 82.906273][ T5364] netlink_sendmsg+0x58b/0x6b0 [ 82.906331][ T5364] ? __pfx_netlink_sendmsg+0x10/0x10 [ 82.906354][ T5364] __sock_sendmsg+0x145/0x180 [ 82.906455][ T5364] ____sys_sendmsg+0x31e/0x4e0 [ 82.906524][ T5364] ___sys_sendmsg+0x17b/0x1d0 [ 82.906621][ T5364] __x64_sys_sendmsg+0xd4/0x160 [ 82.906735][ T5364] x64_sys_call+0x2999/0x2fb0 [ 82.906762][ T5364] do_syscall_64+0xd2/0x200 [ 82.906782][ T5364] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 82.906871][ T5364] ? clear_bhb_loop+0x40/0x90 [ 82.906950][ T5364] ? clear_bhb_loop+0x40/0x90 [ 82.907048][ T5364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.907081][ T5364] RIP: 0033:0x7f9776aae929 [ 82.907100][ T5364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.907147][ T5364] RSP: 002b:00007f9775117038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 82.907239][ T5364] RAX: ffffffffffffffda RBX: 00007f9776cd5fa0 RCX: 00007f9776aae929 [ 82.907250][ T5364] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000004 [ 82.907262][ T5364] RBP: 00007f9775117090 R08: 0000000000000000 R09: 0000000000000000 [ 82.907275][ T5364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 82.907290][ T5364] R13: 0000000000000000 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 82.907312][ T5364] [ 83.389751][ T5364] syz.1.713 (5364) used greatest stack depth: 10664 bytes left [ 83.407836][ T5371] syzkaller0: entered promiscuous mode [ 83.413453][ T5371] syzkaller0: entered allmulticast mode [ 83.449460][ T5374] FAULT_INJECTION: forcing a failure. [ 83.449460][ T5374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.462656][ T5374] CPU: 1 UID: 0 PID: 5374 Comm: syz.1.717 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 83.462697][ T5374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 83.462715][ T5374] Call Trace: [ 83.462779][ T5374] [ 83.462833][ T5374] __dump_stack+0x1d/0x30 [ 83.462868][ T5374] dump_stack_lvl+0xe8/0x140 [ 83.462894][ T5374] dump_stack+0x15/0x1b [ 83.462918][ T5374] should_fail_ex+0x265/0x280 [ 83.462959][ T5374] should_fail+0xb/0x20 [ 83.463014][ T5374] should_fail_usercopy+0x1a/0x20 [ 83.463047][ T5374] _copy_from_user+0x1c/0xb0 [ 83.463069][ T5374] kstrtouint_from_user+0x69/0xf0 [ 83.463109][ T5374] ? 0xffffffff81000000 [ 83.463126][ T5374] ? selinux_file_permission+0x1e4/0x320 [ 83.463199][ T5374] proc_fail_nth_write+0x50/0x160 [ 83.463245][ T5374] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 83.463321][ T5374] vfs_write+0x269/0x8e0 [ 83.463352][ T5374] ? vfs_read+0x47f/0x6f0 [ 83.463410][ T5374] ? __rcu_read_unlock+0x4f/0x70 [ 83.463440][ T5374] ? __fget_files+0x184/0x1c0 [ 83.463468][ T5374] ksys_write+0xda/0x1a0 [ 83.463509][ T5374] __x64_sys_write+0x40/0x50 [ 83.463625][ T5374] x64_sys_call+0x2cdd/0x2fb0 [ 83.463656][ T5374] do_syscall_64+0xd2/0x200 [ 83.463680][ T5374] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 83.463714][ T5374] ? clear_bhb_loop+0x40/0x90 [ 83.463739][ T5374] ? clear_bhb_loop+0x40/0x90 [ 83.463770][ T5374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.463799][ T5374] RIP: 0033:0x7f9776aad3df [ 83.463828][ T5374] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 83.463891][ T5374] RSP: 002b:00007f9775117030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 83.463911][ T5374] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9776aad3df [ 83.463927][ T5374] RDX: 0000000000000001 RSI: 00007f97751170a0 RDI: 0000000000000003 [ 83.463945][ T5374] RBP: 00007f9775117090 R08: 0000000000000000 R09: 0000000000000000 [ 83.464007][ T5374] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 83.464090][ T5374] R13: 0000000000000000 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 83.464114][ T5374] [ 83.689101][ T29] kauditd_printk_skb: 12727 callbacks suppressed [ 83.689114][ T29] audit: type=1400 audit(1752457812.290:140322): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.716968][ T29] audit: type=1400 audit(1752457812.290:140323): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.738216][ T29] audit: type=1400 audit(1752457812.290:140324): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.743515][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 83.759643][ T29] audit: type=1400 audit(1752457812.290:140325): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.759677][ T29] audit: type=1400 audit(1752457812.290:140326): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.759706][ T29] audit: type=1400 audit(1752457812.290:140327): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.766553][ T3035] audit: audit_lost=24361 audit_rate_limit=0 audit_backlog_limit=64 [ 83.787933][ T29] audit: type=1400 audit(1752457812.290:140328): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.787968][ T29] audit: type=1400 audit(1752457812.290:140329): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.773791][ T5422] syzkaller0: entered promiscuous mode [ 84.779365][ T5422] syzkaller0: entered allmulticast mode [ 84.949605][ T5439] FAULT_INJECTION: forcing a failure. [ 84.949605][ T5439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.962872][ T5439] CPU: 0 UID: 0 PID: 5439 Comm: syz.1.742 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 84.962909][ T5439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 84.962938][ T5439] Call Trace: [ 84.962946][ T5439] [ 84.962955][ T5439] __dump_stack+0x1d/0x30 [ 84.962982][ T5439] dump_stack_lvl+0xe8/0x140 [ 84.963005][ T5439] dump_stack+0x15/0x1b [ 84.963085][ T5439] should_fail_ex+0x265/0x280 [ 84.963121][ T5439] should_fail+0xb/0x20 [ 84.963153][ T5439] should_fail_usercopy+0x1a/0x20 [ 84.963226][ T5439] _copy_from_user+0x1c/0xb0 [ 84.963322][ T5439] kstrtouint_from_user+0x69/0xf0 [ 84.963357][ T5439] ? 0xffffffff81000000 [ 84.963374][ T5439] ? selinux_file_permission+0x1e4/0x320 [ 84.963403][ T5439] proc_fail_nth_write+0x50/0x160 [ 84.963530][ T5439] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 84.963571][ T5439] vfs_write+0x269/0x8e0 [ 84.963732][ T5439] ? vfs_read+0x47f/0x6f0 [ 84.963764][ T5439] ? __rcu_read_unlock+0x4f/0x70 [ 84.963791][ T5439] ? __fget_files+0x184/0x1c0 [ 84.963815][ T5439] ksys_write+0xda/0x1a0 [ 84.963854][ T5439] __x64_sys_write+0x40/0x50 [ 84.963931][ T5439] x64_sys_call+0x2cdd/0x2fb0 [ 84.963958][ T5439] do_syscall_64+0xd2/0x200 [ 84.963980][ T5439] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 84.964054][ T5439] ? clear_bhb_loop+0x40/0x90 [ 84.964081][ T5439] ? clear_bhb_loop+0x40/0x90 [ 84.964108][ T5439] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.964132][ T5439] RIP: 0033:0x7f9776aad3df [ 84.964150][ T5439] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 84.964242][ T5439] RSP: 002b:00007f9775117030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 84.964284][ T5439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9776aad3df [ 84.964300][ T5439] RDX: 0000000000000001 RSI: 00007f97751170a0 RDI: 0000000000000003 [ 84.964316][ T5439] RBP: 00007f9775117090 R08: 0000000000000000 R09: 0000000000000014 [ 84.964332][ T5439] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 84.964347][ T5439] R13: 0000000000000000 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 84.964369][ T5439] [ 85.418072][ T5465] netlink: 36 bytes leftover after parsing attributes in process `GPL'. [ 85.489403][ T5469] syzkaller0: entered promiscuous mode [ 85.495096][ T5469] syzkaller0: entered allmulticast mode [ 85.790745][ T5502] xt_CT: You must specify a L4 protocol and not use inversions on it [ 85.972924][ T5523] FAULT_INJECTION: forcing a failure. [ 85.972924][ T5523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.986095][ T5523] CPU: 0 UID: 0 PID: 5523 Comm: syz.1.770 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 85.986123][ T5523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 85.986135][ T5523] Call Trace: [ 85.986142][ T5523] [ 85.986149][ T5523] __dump_stack+0x1d/0x30 [ 85.986170][ T5523] dump_stack_lvl+0xe8/0x140 [ 85.986222][ T5523] dump_stack+0x15/0x1b [ 85.986237][ T5523] should_fail_ex+0x265/0x280 [ 85.986330][ T5523] should_fail+0xb/0x20 [ 85.986362][ T5523] should_fail_usercopy+0x1a/0x20 [ 85.986401][ T5523] strncpy_from_user+0x25/0x230 [ 85.986458][ T5523] ? kmem_cache_alloc_noprof+0x186/0x310 [ 85.986490][ T5523] ? getname_flags+0x80/0x3b0 [ 85.986573][ T5523] getname_flags+0xae/0x3b0 [ 85.986602][ T5523] __x64_sys_symlink+0x33/0x60 [ 85.986641][ T5523] x64_sys_call+0x2d8d/0x2fb0 [ 85.986662][ T5523] do_syscall_64+0xd2/0x200 [ 85.986679][ T5523] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 85.986867][ T5523] ? clear_bhb_loop+0x40/0x90 [ 85.986894][ T5523] ? clear_bhb_loop+0x40/0x90 [ 85.986934][ T5523] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.986993][ T5523] RIP: 0033:0x7f9776aae929 [ 85.987014][ T5523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.987034][ T5523] RSP: 002b:00007f9775117038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 85.987057][ T5523] RAX: ffffffffffffffda RBX: 00007f9776cd5fa0 RCX: 00007f9776aae929 [ 85.987073][ T5523] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000200000000340 [ 85.987088][ T5523] RBP: 00007f9775117090 R08: 0000000000000000 R09: 0000000000000000 [ 85.987103][ T5523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.987163][ T5523] R13: 0000000000000000 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 85.987183][ T5523] [ 86.269873][ T5525] syzkaller0: entered promiscuous mode [ 86.275422][ T5525] syzkaller0: entered allmulticast mode [ 86.318784][ T5534] netlink: 'syz.1.775': attribute type 10 has an invalid length. [ 86.326738][ T5534] netlink: 40 bytes leftover after parsing attributes in process `syz.1.775'. [ 86.336137][ T5534] dummy0: entered promiscuous mode [ 86.342545][ T5534] bridge0: port 3(dummy0) entered blocking state [ 86.349129][ T5534] bridge0: port 3(dummy0) entered disabled state [ 86.358045][ T5534] dummy0: entered allmulticast mode [ 86.385559][ T5536] FAULT_INJECTION: forcing a failure. [ 86.385559][ T5536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.398740][ T5536] CPU: 0 UID: 0 PID: 5536 Comm: syz.1.776 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 86.398867][ T5536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 86.398883][ T5536] Call Trace: [ 86.398890][ T5536] [ 86.398898][ T5536] __dump_stack+0x1d/0x30 [ 86.398921][ T5536] dump_stack_lvl+0xe8/0x140 [ 86.398946][ T5536] dump_stack+0x15/0x1b [ 86.398975][ T5536] should_fail_ex+0x265/0x280 [ 86.399094][ T5536] should_fail+0xb/0x20 [ 86.399198][ T5536] should_fail_usercopy+0x1a/0x20 [ 86.399240][ T5536] _copy_from_user+0x1c/0xb0 [ 86.399264][ T5536] kstrtouint_from_user+0x69/0xf0 [ 86.399292][ T5536] ? 0xffffffff81000000 [ 86.399350][ T5536] ? selinux_file_permission+0x1e4/0x320 [ 86.399377][ T5536] proc_fail_nth_write+0x50/0x160 [ 86.399486][ T5536] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 86.399586][ T5536] vfs_write+0x269/0x8e0 [ 86.399616][ T5536] ? vfs_read+0x47f/0x6f0 [ 86.399643][ T5536] ? __rcu_read_unlock+0x4f/0x70 [ 86.399664][ T5536] ? __fget_files+0x184/0x1c0 [ 86.399721][ T5536] ksys_write+0xda/0x1a0 [ 86.399793][ T5536] __x64_sys_write+0x40/0x50 [ 86.399823][ T5536] x64_sys_call+0x2cdd/0x2fb0 [ 86.399850][ T5536] do_syscall_64+0xd2/0x200 [ 86.399871][ T5536] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 86.399958][ T5536] ? clear_bhb_loop+0x40/0x90 [ 86.399986][ T5536] ? clear_bhb_loop+0x40/0x90 [ 86.400013][ T5536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.400037][ T5536] RIP: 0033:0x7f9776aad3df [ 86.400051][ T5536] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 86.400069][ T5536] RSP: 002b:00007f9775117030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 86.400171][ T5536] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9776aad3df [ 86.400186][ T5536] RDX: 0000000000000001 RSI: 00007f97751170a0 RDI: 0000000000000004 [ 86.400201][ T5536] RBP: 00007f9775117090 R08: 0000000000000000 R09: 0000000000000000 [ 86.400216][ T5536] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 86.400231][ T5536] R13: 0000000000000000 R14: 00007f9776cd5fa0 R15: 00007ffe86916da8 [ 86.400272][ T5536] [ 86.705015][ T5545] netlink: 'syz.3.780': attribute type 13 has an invalid length. [ 86.711930][ T5550] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5550 comm=syz.1.783 [ 86.712935][ T5545] netlink: 4 bytes leftover after parsing attributes in process `syz.3.780'. [ 86.736676][ T5544] FAULT_INJECTION: forcing a failure. [ 86.736676][ T5544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.749870][ T5544] CPU: 0 UID: 0 PID: 5544 Comm: syz.0.779 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 86.749904][ T5544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 86.749920][ T5544] Call Trace: [ 86.749946][ T5544] [ 86.749956][ T5544] __dump_stack+0x1d/0x30 [ 86.749981][ T5544] dump_stack_lvl+0xe8/0x140 [ 86.750005][ T5544] dump_stack+0x15/0x1b [ 86.750026][ T5544] should_fail_ex+0x265/0x280 [ 86.750062][ T5544] should_fail+0xb/0x20 [ 86.750102][ T5544] should_fail_usercopy+0x1a/0x20 [ 86.750139][ T5544] _copy_from_user+0x1c/0xb0 [ 86.750243][ T5544] kstrtouint_from_user+0x69/0xf0 [ 86.750271][ T5544] ? 0xffffffff81000000 [ 86.750360][ T5544] ? selinux_file_permission+0x1e4/0x320 [ 86.750387][ T5544] proc_fail_nth_write+0x50/0x160 [ 86.750426][ T5544] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 86.750458][ T5544] vfs_write+0x269/0x8e0 [ 86.750537][ T5544] ? vfs_read+0x47f/0x6f0 [ 86.750570][ T5544] ? __rcu_read_unlock+0x4f/0x70 [ 86.750596][ T5544] ? __fget_files+0x184/0x1c0 [ 86.750615][ T5544] ksys_write+0xda/0x1a0 [ 86.750715][ T5544] __x64_sys_write+0x40/0x50 [ 86.750825][ T5544] x64_sys_call+0x2cdd/0x2fb0 [ 86.750850][ T5544] do_syscall_64+0xd2/0x200 [ 86.750867][ T5544] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 86.750891][ T5544] ? clear_bhb_loop+0x40/0x90 [ 86.750947][ T5544] ? clear_bhb_loop+0x40/0x90 [ 86.750976][ T5544] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.751003][ T5544] RIP: 0033:0x7fe42de0d3df [ 86.751021][ T5544] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 86.751051][ T5544] RSP: 002b:00007fe42c477030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 86.751137][ T5544] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe42de0d3df [ 86.751154][ T5544] RDX: 0000000000000001 RSI: 00007fe42c4770a0 RDI: 0000000000000003 [ 86.751170][ T5544] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 86.751234][ T5544] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 86.751246][ T5544] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 86.751336][ T5544] [ 86.985730][ T5552] FAULT_INJECTION: forcing a failure. [ 86.985730][ T5552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.998874][ T5552] CPU: 0 UID: 0 PID: 5552 Comm: syz.2.784 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 86.998909][ T5552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 86.998926][ T5552] Call Trace: [ 86.998933][ T5552] [ 86.998940][ T5552] __dump_stack+0x1d/0x30 [ 86.998973][ T5552] dump_stack_lvl+0xe8/0x140 [ 86.999009][ T5552] dump_stack+0x15/0x1b [ 86.999031][ T5552] should_fail_ex+0x265/0x280 [ 86.999070][ T5552] should_fail+0xb/0x20 [ 86.999154][ T5552] should_fail_usercopy+0x1a/0x20 [ 86.999194][ T5552] _copy_to_user+0x20/0xa0 [ 86.999219][ T5552] simple_read_from_buffer+0xb5/0x130 [ 86.999264][ T5552] proc_fail_nth_read+0x100/0x140 [ 86.999301][ T5552] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 86.999338][ T5552] vfs_read+0x19d/0x6f0 [ 86.999449][ T5552] ? __rcu_read_unlock+0x4f/0x70 [ 86.999470][ T5552] ? __fget_files+0x184/0x1c0 [ 86.999490][ T5552] ksys_read+0xda/0x1a0 [ 86.999533][ T5552] __x64_sys_read+0x40/0x50 [ 86.999593][ T5552] x64_sys_call+0x2d77/0x2fb0 [ 86.999620][ T5552] do_syscall_64+0xd2/0x200 [ 86.999643][ T5552] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 86.999674][ T5552] ? clear_bhb_loop+0x40/0x90 [ 86.999736][ T5552] ? clear_bhb_loop+0x40/0x90 [ 86.999766][ T5552] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.999792][ T5552] RIP: 0033:0x7f478b1bd33c [ 86.999811][ T5552] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 86.999834][ T5552] RSP: 002b:00007f4789827030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 86.999856][ T5552] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1bd33c [ 86.999886][ T5552] RDX: 000000000000000f RSI: 00007f47898270a0 RDI: 0000000000000004 [ 86.999901][ T5552] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 86.999916][ T5552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.999930][ T5552] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 86.999947][ T5552] [ 87.466892][ T5587] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5587 comm=syz.1.795 [ 87.742591][ T5610] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5610 comm=syz.4.806 [ 88.122918][ T5619] netlink: 28 bytes leftover after parsing attributes in process `syz.0.809'. [ 88.273659][ T5635] FAULT_INJECTION: forcing a failure. [ 88.273659][ T5635] name failslab, interval 1, probability 0, space 0, times 0 [ 88.286504][ T5635] CPU: 0 UID: 0 PID: 5635 Comm: syz.0.815 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 88.286584][ T5635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 88.286600][ T5635] Call Trace: [ 88.286609][ T5635] [ 88.286618][ T5635] __dump_stack+0x1d/0x30 [ 88.286666][ T5635] dump_stack_lvl+0xe8/0x140 [ 88.286699][ T5635] dump_stack+0x15/0x1b [ 88.286721][ T5635] should_fail_ex+0x265/0x280 [ 88.286755][ T5635] should_failslab+0x8c/0xb0 [ 88.286784][ T5635] kmem_cache_alloc_noprof+0x50/0x310 [ 88.286837][ T5635] ? getname_flags+0x80/0x3b0 [ 88.286931][ T5635] getname_flags+0x80/0x3b0 [ 88.287033][ T5635] do_sys_openat2+0x60/0x110 [ 88.287214][ T5635] __x64_sys_openat+0xf2/0x120 [ 88.287243][ T5635] x64_sys_call+0x1af/0x2fb0 [ 88.287328][ T5635] do_syscall_64+0xd2/0x200 [ 88.287384][ T5635] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 88.287517][ T5635] ? clear_bhb_loop+0x40/0x90 [ 88.287538][ T5635] ? clear_bhb_loop+0x40/0x90 [ 88.287567][ T5635] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.287595][ T5635] RIP: 0033:0x7fe42de0e929 [ 88.287664][ T5635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.287742][ T5635] RSP: 002b:00007fe42c477038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 88.287767][ T5635] RAX: ffffffffffffffda RBX: 00007fe42e035fa0 RCX: 00007fe42de0e929 [ 88.287816][ T5635] RDX: 0000000000000481 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 88.287828][ T5635] RBP: 00007fe42c477090 R08: 0000000000000000 R09: 0000000000000000 [ 88.287879][ T5635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.287895][ T5635] R13: 0000000000000000 R14: 00007fe42e035fa0 R15: 00007ffc3b023c88 [ 88.287918][ T5635] [ 88.519492][ T5642] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5642 comm=syz.3.817 [ 88.689598][ T29] kauditd_printk_skb: 31362 callbacks suppressed [ 88.689616][ T29] audit: type=1400 audit(1752457817.510:165478): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.717711][ T29] audit: type=1400 audit(1752457817.510:165479): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.750377][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.757048][ T3035] audit: audit_lost=26433 audit_rate_limit=0 audit_backlog_limit=64 [ 88.765260][ T3035] audit: backlog limit exceeded [ 88.772080][ T5651] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.778741][ T5651] audit: audit_lost=26434 audit_rate_limit=0 audit_backlog_limit=64 [ 88.786837][ T5651] audit: backlog limit exceeded [ 88.793022][ T29] audit: type=1400 audit(1752457817.520:165480): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.797731][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.831259][ T5647] FAULT_INJECTION: forcing a failure. [ 88.831259][ T5647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.844526][ T5647] CPU: 1 UID: 0 PID: 5647 Comm: syz.3.819 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 88.844630][ T5647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 88.844645][ T5647] Call Trace: [ 88.844652][ T5647] [ 88.844661][ T5647] __dump_stack+0x1d/0x30 [ 88.844731][ T5647] dump_stack_lvl+0xe8/0x140 [ 88.844750][ T5647] dump_stack+0x15/0x1b [ 88.844766][ T5647] should_fail_ex+0x265/0x280 [ 88.844799][ T5647] should_fail+0xb/0x20 [ 88.844896][ T5647] should_fail_usercopy+0x1a/0x20 [ 88.844935][ T5647] _copy_from_user+0x1c/0xb0 [ 88.844959][ T5647] kstrtouint_from_user+0x69/0xf0 [ 88.845053][ T5647] ? 0xffffffff81000000 [ 88.845069][ T5647] ? selinux_file_permission+0x1e4/0x320 [ 88.845150][ T5647] proc_fail_nth_write+0x50/0x160 [ 88.845181][ T5647] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 88.845212][ T5647] vfs_write+0x269/0x8e0 [ 88.845318][ T5647] ? vfs_read+0x47f/0x6f0 [ 88.845352][ T5647] ? __rcu_read_unlock+0x4f/0x70 [ 88.845379][ T5647] ? __fget_files+0x184/0x1c0 [ 88.845436][ T5647] ksys_write+0xda/0x1a0 [ 88.845536][ T5647] __x64_sys_write+0x40/0x50 [ 88.845575][ T5647] x64_sys_call+0x2cdd/0x2fb0 [ 88.845619][ T5647] do_syscall_64+0xd2/0x200 [ 88.845635][ T5647] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 88.845666][ T5647] ? clear_bhb_loop+0x40/0x90 [ 88.845693][ T5647] ? clear_bhb_loop+0x40/0x90 [ 88.845748][ T5647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 88.845795][ T5647] RIP: 0033:0x7f566dfbd3df [ 88.845821][ T5647] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 88.845844][ T5647] RSP: 002b:00007f566c627030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 88.845862][ T5647] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f566dfbd3df [ 88.845874][ T5647] RDX: 0000000000000001 RSI: 00007f566c6270a0 RDI: 0000000000000004 [ 88.845885][ T5647] RBP: 00007f566c627090 R08: 0000000000000000 R09: 0000000000000000 [ 88.845896][ T5647] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 88.845980][ T5647] R13: 0000000000000000 R14: 00007f566e1e5fa0 R15: 00007ffe9d398788 [ 88.845998][ T5647] [ 89.134326][ T5659] FAULT_INJECTION: forcing a failure. [ 89.134326][ T5659] name failslab, interval 1, probability 0, space 0, times 0 [ 89.147151][ T5659] CPU: 1 UID: 0 PID: 5659 Comm: syz.2.823 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 89.147188][ T5659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 89.147255][ T5659] Call Trace: [ 89.147263][ T5659] [ 89.147352][ T5659] __dump_stack+0x1d/0x30 [ 89.147375][ T5659] dump_stack_lvl+0xe8/0x140 [ 89.147472][ T5659] dump_stack+0x15/0x1b [ 89.147534][ T5659] should_fail_ex+0x265/0x280 [ 89.147573][ T5659] should_failslab+0x8c/0xb0 [ 89.147622][ T5659] __kmalloc_node_noprof+0xa9/0x410 [ 89.147650][ T5659] ? qdisc_alloc+0x65/0x440 [ 89.147688][ T5659] qdisc_alloc+0x65/0x440 [ 89.147791][ T5659] ? nla_strcmp+0xc3/0xe0 [ 89.147808][ T5659] qdisc_create+0xf5/0x9e0 [ 89.147857][ T5659] tc_modify_qdisc+0xf2e/0x1420 [ 89.147894][ T5659] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 89.147924][ T5659] rtnetlink_rcv_msg+0x657/0x6d0 [ 89.147982][ T5659] ? avc_has_perm_noaudit+0x1b1/0x200 [ 89.148012][ T5659] netlink_rcv_skb+0x120/0x220 [ 89.148058][ T5659] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 89.148164][ T5659] rtnetlink_rcv+0x1c/0x30 [ 89.148259][ T5659] netlink_unicast+0x5a5/0x680 [ 89.148293][ T5659] netlink_sendmsg+0x58b/0x6b0 [ 89.148449][ T5659] ? __pfx_netlink_sendmsg+0x10/0x10 [ 89.148469][ T5659] __sock_sendmsg+0x145/0x180 [ 89.148492][ T5659] ____sys_sendmsg+0x31e/0x4e0 [ 89.148547][ T5659] ___sys_sendmsg+0x17b/0x1d0 [ 89.148600][ T5659] __x64_sys_sendmsg+0xd4/0x160 [ 89.148645][ T5659] x64_sys_call+0x2999/0x2fb0 [ 89.148671][ T5659] do_syscall_64+0xd2/0x200 [ 89.148693][ T5659] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 89.148793][ T5659] ? clear_bhb_loop+0x40/0x90 [ 89.148814][ T5659] ? clear_bhb_loop+0x40/0x90 [ 89.148841][ T5659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.148944][ T5659] RIP: 0033:0x7f478b1be929 [ 89.148961][ T5659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.148984][ T5659] RSP: 002b:00007f4789827038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.149007][ T5659] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1be929 [ 89.149028][ T5659] RDX: 0000000000000000 RSI: 0000200000001200 RDI: 0000000000000003 [ 89.149044][ T5659] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 89.149060][ T5659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.149151][ T5659] R13: 0000000000000000 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 89.149168][ T5659] [ 89.177568][ T5661] netlink: 28 bytes leftover after parsing attributes in process `syz.4.821'. [ 89.575665][ T5675] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5675 comm=syz.2.829 [ 89.797313][ T5692] syzkaller0: entered promiscuous mode [ 89.803014][ T5692] syzkaller0: entered allmulticast mode [ 89.877973][ T5708] FAULT_INJECTION: forcing a failure. [ 89.877973][ T5708] name failslab, interval 1, probability 0, space 0, times 0 [ 89.890880][ T5708] CPU: 1 UID: 0 PID: 5708 Comm: syz.2.840 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 89.890917][ T5708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 89.890945][ T5708] Call Trace: [ 89.890988][ T5708] [ 89.890997][ T5708] __dump_stack+0x1d/0x30 [ 89.891023][ T5708] dump_stack_lvl+0xe8/0x140 [ 89.891047][ T5708] dump_stack+0x15/0x1b [ 89.891068][ T5708] should_fail_ex+0x265/0x280 [ 89.891102][ T5708] should_failslab+0x8c/0xb0 [ 89.891155][ T5708] kmem_cache_alloc_noprof+0x50/0x310 [ 89.891188][ T5708] ? getname_flags+0x80/0x3b0 [ 89.891209][ T5708] ? kstrtouint+0x76/0xc0 [ 89.891240][ T5708] getname_flags+0x80/0x3b0 [ 89.891267][ T5708] user_path_at+0x28/0x130 [ 89.891325][ T5708] user_statfs+0x4d/0x110 [ 89.891347][ T5708] __x64_sys_statfs+0x65/0xf0 [ 89.891376][ T5708] ? fput+0x8f/0xc0 [ 89.891396][ T5708] ? ksys_write+0x192/0x1a0 [ 89.891569][ T5708] x64_sys_call+0x1edd/0x2fb0 [ 89.891599][ T5708] do_syscall_64+0xd2/0x200 [ 89.891631][ T5708] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 89.891658][ T5708] ? clear_bhb_loop+0x40/0x90 [ 89.891682][ T5708] ? clear_bhb_loop+0x40/0x90 [ 89.891765][ T5708] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.891858][ T5708] RIP: 0033:0x7f478b1be929 [ 89.891878][ T5708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.891904][ T5708] RSP: 002b:00007f4789827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 89.891928][ T5708] RAX: ffffffffffffffda RBX: 00007f478b3e5fa0 RCX: 00007f478b1be929 [ 89.891943][ T5708] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000200000000200 [ 89.891956][ T5708] RBP: 00007f4789827090 R08: 0000000000000000 R09: 0000000000000000 [ 89.891971][ T5708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.891985][ T5708] R13: 0000000000000001 R14: 00007f478b3e5fa0 R15: 00007ffec06cc7f8 [ 89.892044][ T5708] [ 90.234351][ T5715] netlink: 28 bytes leftover after parsing attributes in process `syz.4.842'. [ 90.484917][ T5722] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5722 comm=syz.4.846 [ 90.578086][ T5733] FAULT_INJECTION: forcing a failure. [ 90.578086][ T5733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.591347][ T5733] CPU: 1 UID: 0 PID: 5733 Comm: syz.4.850 Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 90.591388][ T5733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 90.591401][ T5733] Call Trace: [ 90.591408][ T5733] [ 90.591417][ T5733] __dump_stack+0x1d/0x30 [ 90.591443][ T5733] dump_stack_lvl+0xe8/0x140 [ 90.591468][ T5733] dump_stack+0x15/0x1b [ 90.591595][ T5733] should_fail_ex+0x265/0x280 [ 90.591631][ T5733] should_fail+0xb/0x20 [ 90.591662][ T5733] should_fail_usercopy+0x1a/0x20 [ 90.591779][ T5733] _copy_to_user+0x20/0xa0 [ 90.591803][ T5733] simple_read_from_buffer+0xb5/0x130 [ 90.591839][ T5733] proc_fail_nth_read+0x100/0x140 [ 90.591870][ T5733] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 90.591924][ T5733] vfs_read+0x19d/0x6f0 [ 90.591964][ T5733] ? putname+0xda/0x100 [ 90.592044][ T5733] ? __rcu_read_unlock+0x4f/0x70 [ 90.592071][ T5733] ? __fget_files+0x184/0x1c0 [ 90.592092][ T5733] ksys_read+0xda/0x1a0 [ 90.592200][ T5733] __x64_sys_read+0x40/0x50 [ 90.592298][ T5733] x64_sys_call+0x2d77/0x2fb0 [ 90.592324][ T5733] do_syscall_64+0xd2/0x200 [ 90.592345][ T5733] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 90.592429][ T5733] ? clear_bhb_loop+0x40/0x90 [ 90.592528][ T5733] ? clear_bhb_loop+0x40/0x90 [ 90.592556][ T5733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.592581][ T5733] RIP: 0033:0x7ff6f14fd33c [ 90.592597][ T5733] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 90.592618][ T5733] RSP: 002b:00007ff6efb67030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 90.592672][ T5733] RAX: ffffffffffffffda RBX: 00007ff6f1725fa0 RCX: 00007ff6f14fd33c [ 90.592689][ T5733] RDX: 000000000000000f RSI: 00007ff6efb670a0 RDI: 0000000000000003 [ 90.592704][ T5733] RBP: 00007ff6efb67090 R08: 0000000000000000 R09: 0000000000000000 [ 90.592719][ T5733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.592734][ T5733] R13: 0000000000000001 R14: 00007ff6f1725fa0 R15: 00007ffdc4130dd8 [ 90.592756][ T5733] [ 90.851738][ T5738] syzkaller0: entered promiscuous mode [ 90.857351][ T5738] syzkaller0: entered allmulticast mode [ 90.922355][ T5745] netlink: 28 bytes leftover after parsing attributes in process `syz.0.854'. [ 90.947073][ T3311] ================================================================== [ 90.955307][ T3311] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode [ 90.962813][ T3311] [ 90.965161][ T3311] read-write to 0xffff88811aaa62f0 of 8 bytes by task 5693 on cpu 1: [ 90.973253][ T3311] shmem_recalc_inode+0x36/0x1c0 [ 90.978226][ T3311] shmem_get_folio_gfp+0x7a3/0xd60 [ 90.983369][ T3311] shmem_write_begin+0xa8/0x190 [ 90.988265][ T3311] generic_perform_write+0x181/0x490 [ 90.993589][ T3311] shmem_file_write_iter+0xc5/0xf0 [ 90.998728][ T3311] __kernel_write_iter+0x253/0x4c0 [ 91.003876][ T3311] dump_user_range+0x407/0x8c0 [ 91.008691][ T3311] elf_core_dump+0x1dc2/0x1f80 [ 91.013481][ T3311] do_coredump+0x1dfd/0x27b0 [ 91.018147][ T3311] get_signal+0xd85/0xf70 [ 91.022533][ T3311] arch_do_signal_or_restart+0x96/0x480 [ 91.028116][ T3311] irqentry_exit_to_user_mode+0x5e/0xa0 [ 91.033727][ T3311] irqentry_exit+0x12/0x50 [ 91.038192][ T3311] asm_exc_page_fault+0x26/0x30 [ 91.043070][ T3311] [ 91.045423][ T3311] read to 0xffff88811aaa62f0 of 8 bytes by task 3311 on cpu 0: [ 91.053002][ T3311] shmem_getattr+0x41/0x200 [ 91.057536][ T3311] vfs_getattr_nosec+0x146/0x1e0 [ 91.062507][ T3311] vfs_statx+0x113/0x390 [ 91.066798][ T3311] vfs_fstatat+0x115/0x170 [ 91.071254][ T3311] __se_sys_newfstatat+0x55/0x260 [ 91.076315][ T3311] __x64_sys_newfstatat+0x55/0x70 [ 91.081389][ T3311] x64_sys_call+0x2c22/0x2fb0 [ 91.086210][ T3311] do_syscall_64+0xd2/0x200 [ 91.090759][ T3311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.096756][ T3311] [ 91.099122][ T3311] value changed: 0x000000000000149d -> 0x000000000000149e [ 91.106273][ T3311] [ 91.108621][ T3311] Reported by Kernel Concurrency Sanitizer on: [ 91.114803][ T3311] CPU: 0 UID: 0 PID: 3311 Comm: syz-executor Not tainted 6.16.0-rc5-syzkaller-00276-g5d5d62298b8b #0 PREEMPT(voluntary) [ 91.127520][ T3311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 91.137626][ T3311] ================================================================== [ 93.699585][ T29] kauditd_printk_skb: 35687 callbacks suppressed [ 93.699604][ T29] audit: type=1400 audit(1752457822.520:192454): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.709093][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.727417][ T29] audit: type=1400 audit(1752457822.530:192455): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.733983][ T3035] audit: audit_lost=29340 audit_rate_limit=0 audit_backlog_limit=64 [ 93.755192][ T29] audit: type=1400 audit(1752457822.530:192456): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.755218][ T29] audit: type=1400 audit(1752457822.530:192457): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.763276][ T3035] audit: backlog limit exceeded [ 93.766933][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.784581][ T29] audit: type=1400 audit(1752457822.530:192458): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.805839][ T3035] audit: audit_lost=29341 audit_rate_limit=0 audit_backlog_limit=64 [ 98.710644][ T29] kauditd_printk_skb: 48031 callbacks suppressed [ 98.710664][ T29] audit: type=1400 audit(1752457827.540:240489): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.717697][ T3035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 98.738312][ T29] audit: type=1400 audit(1752457827.540:240490): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.738338][ T29] audit: type=1400 audit(1752457827.540:240491): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.738361][ T29] audit: type=1400 audit(1752457827.540:240492): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.745038][ T3035] audit: audit_lost=29342 audit_rate_limit=0 audit_backlog_limit=64 [ 98.766246][ T29] audit: type=1400 audit(1752457827.540:240493): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.787511][ T3035] audit: backlog limit exceeded [ 98.808724][ T29] audit: type=1400 audit(1752457827.540:240494): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.808761][ T29] audit: type=1400 audit(1752457827.540:240495): avc: denied { read } for pid=3035 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0