Warning: Permanently added '10.128.0.252' (ED25519) to the list of known hosts. 2024/05/21 16:40:28 fuzzer started 2024/05/21 16:40:28 dialing manager at 10.128.0.163:30004 [ 18.164269][ T30] audit: type=1400 audit(1716309628.594:66): avc: denied { node_bind } for pid=281 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 18.168211][ T30] audit: type=1400 audit(1716309628.594:67): avc: denied { name_bind } for pid=281 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 18.195515][ T30] audit: type=1400 audit(1716309628.624:68): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.222088][ T291] cgroup: Unknown subsys name 'net' [ 18.229741][ T291] cgroup: Unknown subsys name 'devices' [ 18.233508][ T30] audit: type=1400 audit(1716309628.624:69): avc: denied { integrity } for pid=291 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 18.257309][ T30] audit: type=1400 audit(1716309628.634:70): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.280273][ T30] audit: type=1400 audit(1716309628.654:71): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.302699][ T30] audit: type=1400 audit(1716309628.654:72): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.325093][ T30] audit: type=1400 audit(1716309628.664:73): avc: denied { setattr } for pid=292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.329679][ T295] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.348096][ T30] audit: type=1400 audit(1716309628.664:74): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.376012][ T30] audit: type=1400 audit(1716309628.794:75): avc: denied { relabelto } for pid=295 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.407854][ T293] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.498807][ T291] cgroup: Unknown subsys name 'hugetlb' [ 18.504332][ T291] cgroup: Unknown subsys name 'rlimit' 2024/05/21 16:40:29 starting 5 executor processes [ 19.058151][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.065007][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.073136][ T303] device bridge_slave_0 entered promiscuous mode [ 19.080719][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.087598][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.094751][ T303] device bridge_slave_1 entered promiscuous mode [ 19.165797][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.172690][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.179887][ T305] device bridge_slave_0 entered promiscuous mode [ 19.187494][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.194326][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.201540][ T305] device bridge_slave_1 entered promiscuous mode [ 19.246664][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.253603][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.260775][ T306] device bridge_slave_0 entered promiscuous mode [ 19.267401][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.274230][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.281502][ T306] device bridge_slave_1 entered promiscuous mode [ 19.310662][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.317541][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.324566][ T309] device bridge_slave_0 entered promiscuous mode [ 19.339892][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.346733][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.353950][ T309] device bridge_slave_1 entered promiscuous mode [ 19.393534][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.400387][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.407481][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.414256][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.449490][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.456341][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.463464][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.470244][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.523050][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.530140][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.537583][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.544498][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.552104][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.559797][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.588317][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.595904][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.603292][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.611519][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.618360][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.625491][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.633381][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.640228][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.647424][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.655334][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.662319][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.669451][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.677326][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.684140][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.691512][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.699221][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.721366][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.729298][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.736136][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.743474][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 19.756411][ T303] device veth0_vlan entered promiscuous mode [ 19.763249][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.770992][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.778309][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.786686][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.794821][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.802736][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.809568][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.816748][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.838780][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.847717][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.855728][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.863620][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.871385][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.883639][ T309] device veth0_vlan entered promiscuous mode [ 19.891695][ T305] device veth0_vlan entered promiscuous mode [ 19.897981][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.905440][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.913154][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.920567][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.927735][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.935412][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.942640][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.953448][ T309] device veth1_macvtap entered promiscuous mode [ 19.962403][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.976275][ T303] device veth1_macvtap entered promiscuous mode [ 19.988726][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.996796][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.005250][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.013217][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.020040][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.027379][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.035251][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.042032][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.049161][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.057541][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.067280][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.075227][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.083170][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.091098][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.102663][ T305] device veth1_macvtap entered promiscuous mode [ 20.111494][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.119136][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.127490][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) [ 20.135591][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.143802][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.167263][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.175358][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.183858][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), 0x4) [ 20.192543][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.244275][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.258120][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.271142][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.279481][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.290833][ T306] device veth0_vlan entered promiscuous mode [ 20.299107][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.306990][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.318868][ T306] device veth1_macvtap entered promiscuous mode [ 20.327397][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.334785][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.342389][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.350542][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.358540][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.377176][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.385618][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000980)={'syztnl1\x00', &(0x7f0000000b00)={'syztnl0\x00', 0x0, 0x20, 0x700, 0x3, 0x9f, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x5c, 0x29, 0x0, @private=0xa010102, @rand_addr=0x64010100, {[@timestamp={0x44, 0x8, 0x7, 0x0, 0x0, [0xb5ec]}, @ra={0x94, 0x4}]}}}}}) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r2 = open$dir(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @adiantum, 0x0, @auto="e303522bae30d93f"}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) [ 20.393798][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.401913][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000540)={0x2c, &(0x7f0000000300)={0x0, 0x0, 0x5, {0x5, 0x0, "a8c6df"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, 0x0, &(0x7f0000000380)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x90) syz_usb_control_io(r0, &(0x7f0000001780)={0x2c, 0x0, &(0x7f00000014c0)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_usb_control_io$hid(r0, &(0x7f0000000280)={0x24, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="000312000000"], 0x0, 0x0}, 0x0) [ 20.477034][ T338] syz-executor.3 (pid 338) is setting deprecated v1 encryption policy; recommend upgrading to v2. executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000540)={0x2c, &(0x7f0000000300)={0x0, 0x0, 0x5, {0x5, 0x0, "a8c6df"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, 0x0, &(0x7f0000000380)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0}, 0x90) syz_usb_control_io(r0, &(0x7f0000001780)={0x2c, 0x0, &(0x7f00000014c0)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) syz_usb_control_io$hid(r0, &(0x7f0000000280)={0x24, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="00031200000012033f"], 0x0, 0x0}, 0x0) [ 20.610178][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.617146][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.624350][ T341] device bridge_slave_0 entered promiscuous mode [ 20.631145][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.638406][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.645721][ T341] device bridge_slave_1 entered promiscuous mode [ 20.809494][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.816380][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.823457][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.830295][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.837990][ T321] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 20.845350][ T20] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 20.920473][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.936212][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.951584][ T351] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) io_submit(r1, 0x9f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x6, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) write$binfmt_script(r0, 0x0, 0xb) [ 20.975141][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.986422][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.993293][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.051216][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.068522][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.075473][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) syz_emit_ethernet(0x36, &(0x7f0000000180)={@link_local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @private=0xa010102}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0x240) [ 21.107532][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.122883][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.157333][ T341] device veth0_vlan entered promiscuous mode [ 21.167840][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.179083][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.195390][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.219726][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.281163][ T360] device syzkaller0 entered promiscuous mode [ 21.287254][ T321] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 21.292411][ T341] device veth1_macvtap entered promiscuous mode [ 21.298061][ T20] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 21.314891][ T321] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 21.324673][ T20] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 21.334270][ T321] usb 3-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 21.343118][ T20] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 21.351968][ T321] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 21.359866][ T20] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 21.370337][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.377494][ T321] usb 3-1: config 0 descriptor?? [ 21.382778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.391714][ T20] usb 1-1: config 0 descriptor?? [ 21.396655][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.404665][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.412565][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@metacopy_on}], [], 0x2c}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000580)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000380)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3, &(0x7f0000000040)='./file1\x00', 0x2) executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x256c, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001440)={0xfffffffffffffd87, 0x0, 0x0, &(0x7f00000013c0)={0x0, 0x22, 0x5, {[@local=@item_4={0x3, 0x2, 0x0, "741cb976"}]}}, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001840)={0x24, 0x0, &(0x7f0000001740)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000300)={0x24, 0x0, &(0x7f0000000200)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r1}, &(0x7f0000000640), &(0x7f0000000680)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0003"], 0x0, 0x0}, 0x0) executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000380), 0x20000000}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000540)="fb", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 21.428119][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.437969][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.457623][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.467559][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.517119][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 121.523663][ C0] rcu: 0-...!: (9999 ticks this GP) idle=b51/1/0x4000000000000000 softirq=2482/2482 fqs=0 last_accelerate: 92e8/b9f8 dyntick_enabled: 1 [ 121.537440][ C0] (t=10002 jiffies g=869 q=155) [ 121.542214][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10001 jiffies! g869 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 121.554318][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=365 [ 121.561817][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g869 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 121.572840][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 121.582751][ C0] rcu: RCU grace-period kthread stack dump: [ 121.588472][ C0] task:rcu_preempt state:I stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 121.597500][ C0] Call Trace: [ 121.600615][ C0] [ 121.603399][ C0] __schedule+0xccc/0x1590 [ 121.607647][ C0] ? __sched_text_start+0x8/0x8 [ 121.612332][ C0] ? __kasan_check_write+0x14/0x20 [ 121.617279][ C0] schedule+0x11f/0x1e0 [ 121.621274][ C0] schedule_timeout+0x18c/0x370 [ 121.625958][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 121.631083][ C0] ? console_conditional_schedule+0x30/0x30 [ 121.636807][ C0] ? update_process_times+0x200/0x200 [ 121.642016][ C0] ? prepare_to_swait_event+0x308/0x320 [ 121.647397][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 121.652003][ C0] ? debug_smp_processor_id+0x17/0x20 [ 121.657205][ C0] ? __note_gp_changes+0x4ab/0x920 [ 121.662153][ C0] ? rcu_gp_init+0xc30/0xc30 [ 121.666576][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 121.671610][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 121.676037][ C0] rcu_gp_kthread+0xa4/0x350 [ 121.680463][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 121.685150][ C0] ? rcu_barrier_callback+0x50/0x50 [ 121.690185][ C0] ? __kasan_check_read+0x11/0x20 [ 121.695043][ C0] ? __kthread_parkme+0xb2/0x200 [ 121.699818][ C0] kthread+0x421/0x510 [ 121.703723][ C0] ? rcu_barrier_callback+0x50/0x50 [ 121.708760][ C0] ? kthread_blkcg+0xd0/0xd0 [ 121.713185][ C0] ret_from_fork+0x1f/0x30 [ 121.717438][ C0] [ 121.720311][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 121.726464][ C0] Sending NMI from CPU 0 to CPUs 1: [ 121.731525][ C1] NMI backtrace for cpu 1 [ 121.731541][ C1] CPU: 1 PID: 100 Comm: udevd Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 121.731557][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 121.731569][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 121.731587][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 121.731599][ C1] RSP: 0018:ffffc900009a7720 EFLAGS: 00000246 [ 121.731612][ C1] RAX: 0000000000000001 RBX: 1ffff92000134ee8 RCX: 1ffffffff0d1aa9c [ 121.731623][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7137ed4 [ 121.731633][ C1] RBP: ffffc900009a77d0 R08: dffffc0000000000 R09: ffffed103ee26fdb [ 121.731643][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 121.731653][ C1] R13: ffff8881f7137ed4 R14: 0000000000000001 R15: 1ffff92000134eec [ 121.731663][ C1] FS: 00007ff58b83ec80(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 121.731677][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 121.731687][ C1] CR2: 00007f45d3f9b988 CR3: 000000010cca5000 CR4: 00000000003506a0 [ 121.731701][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 121.731710][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 121.731719][ C1] Call Trace: [ 121.731723][ C1] [ 121.731729][ C1] ? show_regs+0x58/0x60 [ 121.731744][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 121.731761][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 121.731778][ C1] ? kvm_wait+0x147/0x180 [ 121.731790][ C1] ? kvm_wait+0x147/0x180 [ 121.731803][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 121.731819][ C1] ? nmi_handle+0xa8/0x280 [ 121.731838][ C1] ? kvm_wait+0x147/0x180 [ 121.731851][ C1] ? default_do_nmi+0x69/0x160 [ 121.731867][ C1] ? exc_nmi+0xaf/0x120 [ 121.731880][ C1] ? end_repeat_nmi+0x16/0x31 [ 121.731896][ C1] ? kvm_wait+0x147/0x180 [ 121.731909][ C1] ? kvm_wait+0x147/0x180 [ 121.731922][ C1] ? kvm_wait+0x147/0x180 [ 121.731935][ C1] [ 121.731939][ C1] [ 121.731943][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 121.731957][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 121.731972][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 121.731992][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 121.732009][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 121.732025][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 121.732041][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 121.732058][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 121.732073][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 121.732087][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x264 [ 121.732100][ C1] bpf_trace_run2+0xec/0x210 [ 121.732117][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 121.732131][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 121.732144][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 121.732158][ C1] __bpf_trace_kfree+0x6f/0x90 [ 121.732171][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 121.732184][ C1] kfree+0x1f3/0x220 [ 121.732198][ C1] ? import_iovec+0xe5/0x120 [ 121.732214][ C1] ___sys_sendmsg+0x27b/0x2e0 [ 121.732228][ C1] ? __sys_sendmsg+0x260/0x260 [ 121.732242][ C1] ? ___sys_recvmsg+0x210/0x690 [ 121.732260][ C1] ? __kasan_check_read+0x11/0x20 [ 121.732274][ C1] ? __fdget+0x179/0x240 [ 121.732287][ C1] __se_sys_sendmsg+0x19a/0x260 [ 121.732300][ C1] ? __x64_sys_sendmsg+0x90/0x90 [ 121.732315][ C1] ? debug_smp_processor_id+0x17/0x20 [ 121.732330][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 121.732347][ C1] __x64_sys_sendmsg+0x7b/0x90 [ 121.732360][ C1] do_syscall_64+0x3d/0xb0 [ 121.732374][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 121.732390][ C1] RIP: 0033:0x7ff58b977a4b [ 121.732403][ C1] Code: ff 89 ef 48 89 04 24 e8 22 56 f9 ff 48 8b 04 24 48 83 c4 20 5d c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6d 48 8b 15 ae c3 0c 00 f7 d8 64 89 02 48 83 [ 121.732414][ C1] RSP: 002b:00007fffe1005b98 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 121.732428][ C1] RAX: ffffffffffffffda RBX: 0000557bbc443230 RCX: 00007ff58b977a4b [ 121.732438][ C1] RDX: 0000000000000000 RSI: 00007fffe1005ba8 RDI: 0000000000000005 [ 121.732448][ C1] RBP: 0000557bbc468980 R08: 0000000000000001 R09: 0000000000000000 [ 121.732457][ C1] R10: 000000000000010f R11: 0000000000000246 R12: 0000000000000000 [ 121.732466][ C1] R13: 00000000000000b1 R14: 0000000000000000 R15: 0000000000000000 [ 121.732477][ C1] [ 121.732563][ C0] NMI backtrace for cpu 0 [ 122.165320][ C0] CPU: 0 PID: 368 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 122.175284][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 122.185186][ C0] Call Trace: [ 122.188300][ C0] [ 122.191003][ C0] dump_stack_lvl+0x151/0x1b7 [ 122.195502][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 122.200985][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 122.205654][ C0] dump_stack+0x15/0x17 [ 122.209646][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 122.214522][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 122.220509][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 122.225801][ C0] ? __kasan_check_write+0x14/0x20 [ 122.230745][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 122.235442][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 122.241338][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 122.247303][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 122.253203][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 122.258931][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 122.263878][ C0] print_cpu_stall+0x315/0x5f0 [ 122.268479][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 122.273511][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 122.279499][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 122.284534][ C0] update_process_times+0x198/0x200 [ 122.289567][ C0] tick_sched_timer+0x188/0x240 [ 122.294254][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 122.299723][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 122.304757][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 122.309704][ C0] ? clockevents_program_event+0x22f/0x300 [ 122.315346][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 122.321253][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 122.326037][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 122.331750][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 122.337220][ C0] [ 122.339995][ C0] [ 122.342778][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 122.348587][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 122.353362][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 122.372801][ C0] RSP: 0018:ffffc900044df260 EFLAGS: 00000246 [ 122.378703][ C0] RAX: 0000000000000003 RBX: 1ffff9200089be50 RCX: ffffffff8154fa7f [ 122.386515][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810e61b2d8 [ 122.394347][ C0] RBP: ffffc900044df310 R08: dffffc0000000000 R09: ffffed1021cc365c [ 122.402254][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 122.410150][ C0] R13: ffff88810e61b2d8 R14: 0000000000000003 R15: 1ffff9200089be54 [ 122.417968][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 122.424040][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 122.430029][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 122.434973][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 122.441051][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 122.446953][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 122.453202][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 122.457978][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 122.463013][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 122.468314][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 122.473337][ C0] ? sock_map_unref+0x352/0x4d0 [ 122.478024][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x264 [ 122.483405][ C0] bpf_trace_run2+0xec/0x210 [ 122.487831][ C0] ? preempt_schedule_thunk+0x16/0x18 [ 122.493129][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 122.497900][ C0] ? sock_map_unref+0x352/0x4d0 [ 122.502586][ C0] ? try_to_wake_up+0x6ee/0x1160 [ 122.507360][ C0] ? sock_map_unref+0x352/0x4d0 [ 122.512046][ C0] __bpf_trace_kfree+0x6f/0x90 [ 122.516646][ C0] ? sock_map_unref+0x352/0x4d0 [ 122.521341][ C0] kfree+0x1f3/0x220 [ 122.525067][ C0] sock_map_unref+0x352/0x4d0 [ 122.529580][ C0] sock_hash_delete_elem+0x274/0x2f0 [ 122.534710][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 122.540087][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x264 [ 122.545463][ C0] bpf_trace_run2+0xec/0x210 [ 122.549892][ C0] ? context_to_sid+0x5a8/0x600 [ 122.554577][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 122.559266][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 122.564650][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 122.570037][ C0] __bpf_trace_kfree+0x6f/0x90 [ 122.574626][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 122.580186][ C0] kfree+0x1f3/0x220 [ 122.583917][ C0] ? policydb_context_isvalid+0x1de/0x430 [ 122.589506][ C0] security_compute_sid+0x1d7d/0x1f40 [ 122.594678][ C0] ? security_transition_sid+0x90/0x90 [ 122.599970][ C0] ? __mutex_lock_slowpath+0x10/0x10 [ 122.605094][ C0] ? tracepoint_add_func+0x77e/0x940 [ 122.610216][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 122.615159][ C0] ? preempt_count_add+0x92/0x1a0 [ 122.620024][ C0] ? fd_install+0x144/0x250 [ 122.624360][ C0] ? bpf_link_settle+0xc0/0x150 [ 122.629045][ C0] security_transition_sid+0x7d/0x90 [ 122.634168][ C0] selinux_socket_create+0x204/0x330 [ 122.639287][ C0] ? selinux_socket_unix_may_send+0x2f0/0x2f0 [ 122.645213][ C0] security_socket_create+0x77/0xb0 [ 122.650224][ C0] __sock_create+0xd6/0x760 [ 122.654561][ C0] __sys_socketpair+0x29f/0x6e0 [ 122.659249][ C0] ? __ia32_sys_socket+0x90/0x90 [ 122.664022][ C0] ? __kasan_check_read+0x11/0x20 [ 122.668886][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 122.673774][ C0] do_syscall_64+0x3d/0xb0 [ 122.677998][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 122.683748][ C0] RIP: 0033:0x7f5a784aaee9 [ 122.687992][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 122.707507][ C0] RSP: 002b:00007f5a7721f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 122.715752][ C0] RAX: ffffffffffffffda RBX: 00007f5a785d9f80 RCX: 00007f5a784aaee9 [ 122.723574][ C0] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 122.731374][ C0] RBP: 00007f5a784f749e R08: 0000000000000000 R09: 0000000000000000 [ 122.739189][ C0] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000000 [ 122.747002][ C0] R13: 000000000000000b R14: 00007f5a785d9f80 R15: 00007ffc51853448 [ 122.754813][ C0] [ 265.057188][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.3:368] [ 265.065521][ C0] Modules linked in: [ 265.069253][ C0] CPU: 0 PID: 368 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 265.079230][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 265.089165][ C0] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 265.095818][ C0] Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 [ 265.115770][ C0] RSP: 0018:ffffc900044df320 EFLAGS: 00000206 [ 265.121671][ C0] RAX: 0000000000000000 RBX: 00000000ffff9ed5 RCX: ffffffff8154fa7f [ 265.129481][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810e61b2d8 [ 265.137305][ C0] RBP: ffffc900044df410 R08: dffffc0000000000 R09: ffffed1021cc365c [ 265.145105][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7037ed4 [ 265.153005][ C0] R13: 1ffff11021cc365b R14: 1ffff1103ee00001 R15: ffff88810e61b2d8 [ 265.160814][ C0] FS: 00007f5a7721f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 265.169582][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.176004][ C0] CR2: 0000001b2e922000 CR3: 000000012b44e000 CR4: 00000000003506b0 [ 265.183827][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.191627][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.199437][ C0] Call Trace: [ 265.202572][ C0] [ 265.205307][ C0] ? show_regs+0x58/0x60 [ 265.209331][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 265.214278][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 265.219401][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 265.224610][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 265.229555][ C0] ? clockevents_program_event+0x22f/0x300 [ 265.235196][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 265.241099][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 265.246046][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 265.251950][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 265.257590][ C0] [ 265.260365][ C0] [ 265.263259][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.269251][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 265.275759][ C0] ? __pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 265.281834][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 265.288084][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 265.292858][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 265.297890][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 265.303186][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 265.308218][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.312904][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x264 [ 265.318290][ C0] bpf_trace_run2+0xec/0x210 [ 265.322714][ C0] ? preempt_schedule_thunk+0x16/0x18 [ 265.327922][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.332606][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.337297][ C0] ? try_to_wake_up+0x6ee/0x1160 [ 265.342154][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.346841][ C0] __bpf_trace_kfree+0x6f/0x90 [ 265.351443][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.356129][ C0] kfree+0x1f3/0x220 [ 265.359865][ C0] sock_map_unref+0x352/0x4d0 [ 265.364375][ C0] sock_hash_delete_elem+0x274/0x2f0 [ 265.369496][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 265.374877][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x264 [ 265.380257][ C0] bpf_trace_run2+0xec/0x210 [ 265.384682][ C0] ? context_to_sid+0x5a8/0x600 [ 265.389378][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.394059][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 265.399442][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 265.404820][ C0] __bpf_trace_kfree+0x6f/0x90 [ 265.409419][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 265.414799][ C0] kfree+0x1f3/0x220 [ 265.418530][ C0] ? policydb_context_isvalid+0x1de/0x430 [ 265.424087][ C0] security_compute_sid+0x1d7d/0x1f40 [ 265.429385][ C0] ? security_transition_sid+0x90/0x90 [ 265.434675][ C0] ? __mutex_lock_slowpath+0x10/0x10 [ 265.439796][ C0] ? tracepoint_add_func+0x77e/0x940 [ 265.444917][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 265.449872][ C0] ? preempt_count_add+0x92/0x1a0 [ 265.454727][ C0] ? fd_install+0x144/0x250 [ 265.459066][ C0] ? bpf_link_settle+0xc0/0x150 [ 265.463751][ C0] security_transition_sid+0x7d/0x90 [ 265.468874][ C0] selinux_socket_create+0x204/0x330 [ 265.473993][ C0] ? selinux_socket_unix_may_send+0x2f0/0x2f0 [ 265.479895][ C0] security_socket_create+0x77/0xb0 [ 265.484927][ C0] __sock_create+0xd6/0x760 [ 265.489444][ C0] __sys_socketpair+0x29f/0x6e0 [ 265.494171][ C0] ? __ia32_sys_socket+0x90/0x90 [ 265.498903][ C0] ? __kasan_check_read+0x11/0x20 [ 265.503764][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 265.508626][ C0] do_syscall_64+0x3d/0xb0 [ 265.512877][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.518604][ C0] RIP: 0033:0x7f5a784aaee9 [ 265.522873][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 265.542302][ C0] RSP: 002b:00007f5a7721f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 265.550543][ C0] RAX: ffffffffffffffda RBX: 00007f5a785d9f80 RCX: 00007f5a784aaee9 [ 265.558356][ C0] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 265.566167][ C0] RBP: 00007f5a784f749e R08: 0000000000000000 R09: 0000000000000000 [ 265.573980][ C0] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000000 [ 265.581793][ C0] R13: 000000000000000b R14: 00007f5a785d9f80 R15: 00007ffc51853448 [ 265.589609][ C0] [ 265.592589][ C0] Sending NMI from CPU 0 to CPUs 1: [ 265.597612][ C1] NMI backtrace for cpu 1 [ 265.597622][ C1] CPU: 1 PID: 100 Comm: udevd Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 265.597638][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 265.597647][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.597680][ C1] Code: 48 ba 00 00 00 00 00 fc ff df 41 0f b6 04 16 84 c0 0f 85 ac 00 00 00 48 8b 44 24 08 83 38 00 0f 85 15 01 00 00 45 84 e4 74 09 90 41 ff cc 75 d9 eb 1b 48 8b 44 24 20 0f b6 04 10 84 c0 0f 85 [ 265.597691][ C1] RSP: 0018:ffffc900009a77e0 EFLAGS: 00000246 [ 265.597705][ C1] RAX: ffff8881f7037ed4 RBX: ffff8881f7137ed4 RCX: 0000000000000000 [ 265.597716][ C1] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8881f7137ed4 [ 265.597726][ C1] RBP: ffffc900009a78d0 R08: dffffc0000000000 R09: ffffed103ee26fdb [ 265.597737][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000002400 [ 265.597746][ C1] R13: 1ffff11021cc365b R14: 1ffff1103ee26fd9 R15: ffff88810e61b2d8 [ 265.597757][ C1] FS: 00007ff58b83ec80(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 265.597770][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.597781][ C1] CR2: 00007f45d3f9b988 CR3: 000000010cca5000 CR4: 00000000003506a0 [ 265.597794][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.597802][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.597811][ C1] Call Trace: [ 265.597816][ C1] [ 265.597822][ C1] ? show_regs+0x58/0x60 [ 265.597837][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 265.597855][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 265.597872][ C1] ? __pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.597887][ C1] ? __pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.597903][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 265.597919][ C1] ? nmi_handle+0xa8/0x280 [ 265.597933][ C1] ? __pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.597949][ C1] ? kvm_wait+0x147/0x180 [ 265.597962][ C1] ? default_do_nmi+0x69/0x160 [ 265.597978][ C1] ? exc_nmi+0xaf/0x120 [ 265.597991][ C1] ? end_repeat_nmi+0x16/0x31 [ 265.598007][ C1] ? __pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.598022][ C1] ? __pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.598039][ C1] ? __pv_queued_spin_lock_slowpath+0x389/0xc40 [ 265.598055][ C1] [ 265.598059][ C1] [ 265.598065][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 265.598082][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 265.598098][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 265.598114][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 265.598131][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 265.598146][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 265.598161][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x264 [ 265.598173][ C1] bpf_trace_run2+0xec/0x210 [ 265.598190][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.598204][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 265.598218][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 265.598231][ C1] __bpf_trace_kfree+0x6f/0x90 [ 265.598245][ C1] ? ___sys_sendmsg+0x27b/0x2e0 [ 265.598258][ C1] kfree+0x1f3/0x220 [ 265.598273][ C1] ? import_iovec+0xe5/0x120 [ 265.598289][ C1] ___sys_sendmsg+0x27b/0x2e0 [ 265.598303][ C1] ? __sys_sendmsg+0x260/0x260 [ 265.598316][ C1] ? ___sys_recvmsg+0x210/0x690 [ 265.598335][ C1] ? __kasan_check_read+0x11/0x20 [ 265.598349][ C1] ? __fdget+0x179/0x240 [ 265.598362][ C1] __se_sys_sendmsg+0x19a/0x260 [ 265.598377][ C1] ? __x64_sys_sendmsg+0x90/0x90 [ 265.598392][ C1] ? debug_smp_processor_id+0x17/0x20 [ 265.598407][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 265.598424][ C1] __x64_sys_sendmsg+0x7b/0x90 [ 265.598438][ C1] do_syscall_64+0x3d/0xb0 [ 265.598451][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.598468][ C1] RIP: 0033:0x7ff58b977a4b [ 265.598480][ C1] Code: ff 89 ef 48 89 04 24 e8 22 56 f9 ff 48 8b 04 24 48 83 c4 20 5d c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6d 48 8b 15 ae c3 0c 00 f7 d8 64 89 02 48 83 [ 265.598492][ C1] RSP: 002b:00007fffe1005b98 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.598506][ C1] RAX: ffffffffffffffda RBX: 0000557bbc443230 RCX: 00007ff58b977a4b [ 265.598516][ C1] RDX: 0000000000000000 RSI: 00007fffe1005ba8 RDI: 0000000000000005 [ 265.598525][ C1] RBP: 0000557bbc468980 R08: 0000000000000001 R09: 0000000000000000 [ 265.598534][ C1] R10: 000000000000010f R11: 0000000000000246 R12: 0000000000000000 [ 265.598543][ C1] R13: 00000000000000b1 R14: 0000000000000000 R15: 0000000000000000 [ 265.598554][ C1]